-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
buildchain: embed ISO MD5 in the generated image #3032
Conversation
Hello nicolast,My role is to assist you with the merge of this Status report is not available. |
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
Peer approvals must include at least 1 approval from the following list: |
6d2dfe8
to
bf2c8f1
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe worth adding a mention of this isomd5sum
package in the developer docs (under docs/developer/building/requirements.rst
)?
bf2c8f1
to
a9e242d
Compare
As suggested (@gdemonet) I added the new requirement to the developer documentation. Also extended the Eve step which currently only tests integrity using the |
a9e242d
to
4b90c81
Compare
9c31106
4b90c81
to
9c31106
Compare
The `isomd5sum` tools allow to embed a hash of data sectors found in an ISO file in an otherwise unused section, hence allowing the integrity of (the data sectors of) an ISO image to be checked. This is, e.g., also done for RHEL/CentOS/Fedora ISOs (their integrity can be checked at boot time). This commit adds a call to `implantisomd5` at the end of the buildchain, right after the ISO is created and before its SHA256 is calculated. Given this, one can run `checkisomd5` on a resulting ISO file after download to ensure it's not corrupted. Also mention the check in the docs, the `implantisomd5` requirement in the developer docs, and add some code in the CI scripts to validate the ISO using the embedded MD5 if present, next to the `SHA256SUM`. Fixes: #3026 See: #3026 See: https://github.com/rhinstaller/isomd5sum
9c31106
to
5a92338
Compare
/approve |
In the queueThe changeset has received all authorizations and has been added to the The changeset will be merged in:
The following branches will NOT be impacted:
There is no action required on your side. You will be notified here once IMPORTANT Please do not attempt to modify this pull request.
If you need this pull request to be removed from the queue, please contact a The following options are set: approve |
I have successfully merged the changeset of this pull request
The following branches have NOT changed:
Please check the status of the associated issue None. Goodbye nicolast. |
Since #3032 (merged in 2.8), all our ISOs include an embedded MD5 checksum. We had an empirical check to know whether this checksum was indeed present, since we also need to verify ISOs from (N-1) when running upgrade/downgrade tests from version (N). Now, in 2.9, all ISOs we expect should include this checksum. The empirical check is no longer needed, and we remove it. We also add a common `requirements.sh` to install the required package for openstack workers which were only used to spawn other VMs through Terraform, since these workers are responsible for validating the integrity of retrieved artifacts.
The
isomd5sum
tools allow to embed a hash of data sectors found in anISO file in an otherwise unused section, hence allowing the integrity of
(the data sectors of) an ISO image to be checked. This is, e.g., also
done for RHEL/CentOS/Fedora ISOs (their integrity can be checked at boot
time).
This commit adds a call to
implantisomd5
at the end of the buildchain,right after the ISO is created and before its SHA256 is calculated.
Given this, one can run
checkisomd5
on a resulting ISO file afterdownload to ensure it's not corrupted.
Fixes: #3026
See: #3026
See: https://github.com/rhinstaller/isomd5sum