-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: kernel signing cache kernels #9
Conversation
@@ -166,6 +166,21 @@ jobs: | |||
io.artifacthub.package.readme-url=https://raw.githubusercontent.com/${{ github.repository }}/main/README.md | |||
io.artifacthub.package.logo-url=https://avatars.githubusercontent.com/u/1728152?s=200&v=4 | |||
|
|||
- name: Retrieve Signing Key | |||
if: (github.event_name == 'scheduled' || github.event_name == 'workflow_dispatch' || github.event_name == 'merge_group') && github.event_name != 'pull_request' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't think about it now, but it might be worth having a sample signing key that runs on PRs to make it easier to debug in future
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, we have signing keys added in this PR anyway. Any reason not to (at a later date) use the .test keys in this step during pull requests?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We do, you can see in fetch.sh
if the private-key is 0 bytes, we copy the test keys over.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ohhh, sorry. We don't need to retrieve them since they are already in the repo 🤦
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks awesome!
fi | ||
|
||
if [[ "${kernel_flavor}" =~ fsync ]]; then | ||
dnf download -y \ | ||
kernel-headers-"${kernel_version}" | ||
fi | ||
|
||
if [[ ! -s /tmp/certs/private_key.priv ]]; then |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@p5 Here is the logic for signing during PRs.
Still need to implement the workflow changes for copying in actual key.
Thank you for contributing to the Universal Blue project!
Please read the Contributor's Guide before submitting a pull request.