Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

imagebuilder: ability to sign created images #1246

Closed
wants to merge 1 commit into from

Conversation

aparcar
Copy link
Member

@aparcar aparcar commented Aug 6, 2018

Add config option CONFIG_SIGNED_IMAGES so the ImageBuilder would
automatically sign the created sha256sums files via usign.

This is a usefull feature to allow devices/routers verify firmware
images without the need of GPG installed.

Signed-off-by: Paul Spooren mail@aparcar.org

Add config option CONFIG_SIGNED_IMAGES so the ImageBuilder would
automatically sign the created sha256sums files via usign.

This is a usefull feature to allow devices/routers verify firmware
images without the need of GPG installed.

Signed-off-by: Paul Spooren <mail@aparcar.org>
@blogic
Copy link
Contributor

blogic commented Aug 6, 2018

this looks overly complicated, cant we just always sign stuff regardless ? the key is always there even if it is only the auto generated one.

@aparcar
Copy link
Member Author

aparcar commented Aug 6, 2018

I did not realize there is already some key auto generation. Sure I'm happy to simplify stuff, I just thought to stick with the SDK approach

@dangowrt
Copy link
Member

dangowrt commented Aug 6, 2018

The whole external signature approach is obsoleted by fwtool + ucert. I'll do my best to integrate this into the ImageBuilder asap, probably at some point during this week.

@aparcar
Copy link
Member Author

aparcar commented Aug 6, 2018

Glad to hear. What about the key creation part, isn't that still relevant?

@blogic blogic closed this Aug 6, 2018
@dangowrt
Copy link
Member

dangowrt commented Aug 7, 2018

That make usign_setup alone may be useful indeed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants