What | Removed | Added |
---|---|---|
Flags | needinfo?(ma@suse.com) |
(In reply to Lubos Kocman from comment #2) > I was thinkining of running something like rpm --import on invididual keys > in something like config.sh while the image is created This would indeed be an easy clean and secure solution. The issue with a temporarily accepted key is that the downloaded metadata set is accepted and any later action will accept this set on disk as well. No matter if root is RO or RW. The next check will be done when the next set is downloaded. This requires a refresh after the data on the server side have changed, or a forced refresh. My initial idea of auto-temporarily-accepting a key is kind of dangerous, because packages from this metadata set may get installed, if at install time no refresh is needed or performed (--no-refresh). So the user must confirm that a new metadata set is temp. accepted. It's of course possible to keep accepted keys in a RO environment in a cache directory and to load those keys in addition to the rpmdb's into the zypp trusted keyring. They would get synced backed to the rpmd once libzypp finds it RW. But this would de facto introduce a 2nd authority for trusted keys besides the rpmdb. We can not prevent that keys explicitly removed from the rpmdb by the admin may get re-introduced by syncing pending keys from the cachedir later. My preferred solution would be one where the trusted keys are stored in the rpmdb and nowhere else. So either importing them in advance or by granting rw access to the rpmdb.