Commit Graph

13 Commits

Author SHA1 Message Date
James Le Cuirot
fc0aca0068
Drop coreos-devel/fero-client and any usage of it
We sign releases manually now.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-06-17 10:44:40 +01:00
Kai Lueke
dd8c063770 core_sign_update: Work with a mapped pcscd socket
The sdk user in the container might rejected by the pcscd on the host.
Work around that by running the openssl command as root.
2024-02-13 15:43:43 +01:00
Mathieu Tortuyaux
f37db1f3b1
core_sign_update: use version 2 if only 1 key is provided
Signed-off-by: Mathieu Tortuyaux <mtortuyaux@microsoft.com>
2024-01-23 17:09:49 +01:00
Mathieu Tortuyaux
dd10c493bb
core_sign_update: use pkcs11 openssl engine
Signed-off-by: Mathieu Tortuyaux <mtortuyaux@microsoft.com>
2024-01-23 17:09:48 +01:00
James Forcier
35622c2abb core_sign_update: add support for new signing server 2018-06-21 17:31:43 -07:00
Euan Kemp
e174703778 core_sign_update: fix flag parsing for keys_separator
Introduced in #710, whoops.
2017-07-18 18:24:38 -07:00
Euan Kemp
61be39c999 core_sign_update: remain compatible with older sign.sh
The motivation behind retaining this backwards compatibility, at least
now, is that it's actually non-trivial to revert these code changes for
a given release.

The `sign.sh` changes can easily be changed, but the `core_sign_update`
code is included in the update-specific "au_zip" file. Replacing that is
a little more fiddly.

Since it's possible we'll still want to revert to the previous signing
behavior, make it so the update payload (namely core_sign_update) should
work both under the previous `sign.sh` script, and when using the new
one.
2017-07-11 13:55:59 -07:00
Euan Kemp
2146975588 coreos_sign_update: return 'legacy' signing support
We currently sign with both a devel key and a prod key. The devel key is
insecure and need not be included on a smartcard, so it makes sense to
leave it be on disk.

However, the previous commit's padding changes removed this legacy
method of signing.
For simplicity, simply re-introduce the old logic conditionally based on
whether it's a smartcard or not.

Alternate options could be using `-pkcs` instead of `-raw` for both
keys, but that is a more intricate change I'd be less confident in
making.
2017-07-06 13:50:27 -07:00
Matthew Garrett
54048fbb00 coreos_sign_update: Use smartcards for signing
Sign updates using private keys on smartcards. This involves changing the
padding approach - rather than including the padding in the hash, ask the
card to generate the padding itself, since the card will refuse to sign
pre-padded material. Use + as a key separator rather than : as the PKCS#11
URI includes colons.
2017-07-06 13:50:27 -07:00
Alex Crawford
d8ea06c5c5 *: don't hardcode path to bash
Bash isn't always at this location. These scripts in particular are
being updated because they are called from outside of the SDK.
2017-03-02 14:00:11 -08:00
Michael Marineau
5da26fa912 offline_signing: include kernel in official updates 2016-09-19 12:14:24 -07:00
Michael Marineau
112b60690c updates: fix running core_sign_update from update.zip 2014-06-25 22:44:31 -07:00
Brandon Philips
34aff6fae6 core_sign_update: initial commit
Takes a filesystem image and generates a update.gz that is signed by N
provided private keys and verified against the N public keys. This is so
we can do keyrotations.
2014-06-24 10:31:07 -07:00