Download patch signatures and verify them
Before uploading the source files, verify the GPG signature is good. Signed-off-by: Jeremy Cline <jeremy@jcline.org>
This commit is contained in:
parent
5324c74646
commit
192ccb6e5f
1
.gitignore
vendored
1
.gitignore
vendored
@ -3,5 +3,6 @@ clog
|
|||||||
*.bz2
|
*.bz2
|
||||||
*.rpm
|
*.rpm
|
||||||
*.orig
|
*.orig
|
||||||
|
*.sign
|
||||||
kernel-[234].*/
|
kernel-[234].*/
|
||||||
perf-man-*.tar.gz
|
perf-man-*.tar.gz
|
||||||
|
@ -42,6 +42,21 @@ if [ ! -f patch-$1.xz ]; then
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [ ! -f "patch-$1.sign" ]; then
|
||||||
|
wget "https://cdn.kernel.org/pub/linux/kernel/v4.x/patch-$1.sign"
|
||||||
|
if [ ! $? -eq 0 ]; then
|
||||||
|
echo "Signature download failed"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
xzcat "patch-$1.xz" | gpg2 --verify "patch-$1.sign" -
|
||||||
|
if [ ! $? -eq 0 ]; then
|
||||||
|
echo "Patch file has invalid or untrusted signature!"
|
||||||
|
echo "See https://www.kernel.org/category/signatures.html"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
grep $1 sources &> /dev/null
|
grep $1 sources &> /dev/null
|
||||||
if [ ! $? -eq 0 ]; then
|
if [ ! $? -eq 0 ]; then
|
||||||
fedpkg upload patch-$1.xz
|
fedpkg upload patch-$1.xz
|
||||||
|
Loading…
Reference in New Issue
Block a user