We can do something about this, omnibus can sign packages. I will add the issue to a milestone but no guarantees when it is going to happen. Unless the customer needs this urgently.
@marin We're not signing packages now? If that's the case, it's strange that we ran in to this error. We figured the problem was that the packages were signed, but because the user was mirroring the repo it couldn't verify that GPG signature. Strange issue. Probably related to how the customer was mirroring the repo.
You are correct -- this is not possible with packagecloud at the moment, but I'm actually working on this after I ship another feature that I am (hopefully) wrapping up this week.One temporary workaround for now is: sign your RPMs, upload your public key somewhere, and then generate your own repository list that mentions both keys.
I don't think this is worth the effort, and I see very small number of users that would be willing to do this manually. Postponing this until we get that feature from Packagecloud or find another way of doing it.
@marin you can always create package like gitlab-release. It will contain the key and yum repo configuration. Yum conf might also point to the key at URL.... An easy solution to distribute and deploy by the end-user.
@marin I guess that it is worth doing... Having release package you can control yum setting on end-user side. So you can migrate, modify the repos, ergo you are in control. BTW create release file might take 10-15?!? mins... Just my 2 cents...
I've received another request for this from another customer who are close to implementing a security policy that won't allow them to install without signature.
@marin Just a note, if you provide the errata within the repository you might make happy users of Spacewalk. It can automatically update RPM packages based on errata within the infrastructure.
I can help with RPM spec file, I can also help with Spacewalk and repository design. I can show you real world scenario.
We already have infrastructure in place, introducing another thing we have to maintain for this one case is an effort we cannot afford. Once packagecloud introduces the support or we decide to move away from our current package server, this issue will be finished.
Sorry for bumping but are there any news?
We're using gitlab in the core of our infrastructure. Having an unsigned package there is .
Is there a packagecloud issue we can bump?
Signing data with a GPG key enables the recipient of the data to verify that no modifications occurred after the data was signed (assuming the recipient has a copy of the sender’s public GPG key).
This is actually a pretty serious issue for anyone who wants to use gitlab in highly secured environment. We have strict rules that all installed software must be cryptographically signed and that signature must be verified before it's installed.
It's also a scored CIS Benchmark, meaning any company that adopts CIS will require this.
I am aware of that @davidhrbac but I don't think it is worth the effort to be honest.
I think there's a small number of people complaining about this, but I'd be willing to bet there's a much larger number of people who simply choose another tool.