Bug 1227617
Summary: | RFE: Automatic deployment of Package/Channel Signing Keys | ||
---|---|---|---|
Product: | [Community] Spacewalk | Reporter: | Jonathan Hoser <jonathan> |
Component: | Server | Assignee: | Tomas Lestach <tlestach> |
Status: | CLOSED NOTABUG | QA Contact: | Red Hat Satellite QA List <satqe-list> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 2.3 | CC: | jdobes, mmraka |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-28 13:09:15 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 737830 |
Description
Jonathan Hoser
2015-06-03 07:02:53 UTC
GPG key value is actually used by yum/dnf on client to import the key. However yum/dnf spacewalk plugin only allows to import keys from local /etc/pki/rpm-gpg/. This is for security reasons - you'd download both packages and a key from the (same) remote site then verification would be useless as attacker could forge both the packages and the key. |