On 10/30/2016 01:44 PM, Michał Górny wrote: > Hi, everyone. > > Just a quick note: I've prepared a simple tool [1] to verify clones of > gentoo-mirror repositories. It's still early WiP but can be easily used > to verify a clone: > > $ ./verify-repo gentoo > [/var/db/repos/gentoo] > Untrusted signature on 42ccdf48d718287e981c00f25caea2242262906a > (you may need to import/trust developer keys) > Note: unsigned changes in metadata and/or caches found (it's fine)
I don't think it's acceptable to use an unsigned metadata/cache commit. Can't we use an infrastructure key for this? > > It can take any number of repository names and/or paths on argv, or > will verify all installed repositories if run without arguments. > > It has explicit support for unsigned cache update commits from > gentoo-mirror (verifies the last signed commits and diffs it against > HEAD); though it will probably get confused if signed commits out of > metadata/ subrepos come (very rare case). > > Verification is done using git's default GPG magic. I'd like to > improve it to use gkeys but the project still hasn't achieved > the ability to run out-of-the-box without local hackery. Is there an open bug for this? We really need gkeys to be usable. > > Oh, as a side note: since Portage defaults to --depth=1 clones, > signatures are usually lost. I've submitted a patch to increase > the default depth to 10. > > [1]:https://github.com/mgorny/verify-repo-mirror > -- Thanks, Zac