summaryrefslogtreecommitdiff
path: root/makechrootpkg.in
diff options
context:
space:
mode:
authorEli Schwartz <eschwartz@archlinux.org>2018-12-01 19:36:23 -0500
committerErich Eckner <git@eckner.net>2019-08-18 21:11:12 +0200
commit2c1965614264a8550f843bbc18234aa2ae5f6122 (patch)
tree61bbba044b1222317ac53f7c0fe0f301020cb516 /makechrootpkg.in
parent206983235a046fccd55e37d09d733314174033ba (diff)
downloaddevtools32-2c1965614264a8550f843bbc18234aa2ae5f6122.tar.xz
arch-nspawn: don't delete the guest gpg configuration
It's important to ensure the guest has up to date data because updating a chroot after quite some time can potentially rely on updated archlinux-keyring, something which the host machine either kept up to date on or manually fixed, but it kills automation to mess around with chroot configs like that. Alternatively, signed packages added with -I need to work, and we assume the host is configured to accept these. That is *not* a good reason to completely nuke whatever is in the guest, though. A guest might have been manually configured to accept keys which aren't accepted by the host; one example of this happening in practice, is archlinux32 when building 32-bit packages from an archlinux host. A simple solution is to use pacman-key's native facility to dump the known keys and trust status from one gpg configuration, and import it into another. Use this to append to, rather than overwrite, the chrooted guest's pacman keyring. While we are at it, fix a bug where we didn't respect the host's pacman.conf settings for the GpgDir. While it isn't wildly likely a user will choose to customize this, it is a valid and supported use case and we must think about this ourselves.
Diffstat (limited to 'makechrootpkg.in')
-rw-r--r--makechrootpkg.in3
1 files changed, 3 insertions, 0 deletions
diff --git a/makechrootpkg.in b/makechrootpkg.in
index 77247b0..d678714 100644
--- a/makechrootpkg.in
+++ b/makechrootpkg.in
@@ -225,6 +225,9 @@ _chrootbuild() {
# shellcheck source=/dev/null
. /etc/profile
+ # otherwise we might have missing keys
+ pacman-key --populate
+
# Beware, there are some stupid arbitrary rules on how you can
# use "$" in arguments to commands with "sudo -i". ${foo} or
# ${1} is OK, but $foo or $1 isn't.