Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 4. Packaging software
In the following sections, learn the basics of the packaging process with the RPM package manager.
4.1. Setting up RPM packaging workspace Link kopierenLink in die Zwischenablage kopiert!
To build RPM packages, you must first create a special workspace that consists of directories used for different packaging purposes.
4.1.1. Configuring RPM packaging workspace Link kopierenLink in die Zwischenablage kopiert!
To configure the RPM packaging workspace, you can set up a directory layout by using the rpmdev-setuptree utility.
Prerequisites
You installed the
rpmdevtoolspackage, which provides utilities for packaging RPMs:dnf install rpmdevtools
# dnf install rpmdevtoolsCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Procedure
Run the
rpmdev-setuptreeutility:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.1.2. RPM packaging workspace directories Link kopierenLink in die Zwischenablage kopiert!
The following are the RPM packaging workspace directories created by using the rpmdev-setuptree utility:
| Directory | Purpose |
|---|---|
|
|
Contains build artifacts compiled from the source files from the |
|
|
Binary RPMs are created under the |
|
|
Contains compressed source code archives and patches. The |
|
|
Contains |
|
|
When you use the |
4.2. About spec files Link kopierenLink in die Zwischenablage kopiert!
A spec file is a file with instructions that the rpmbuild utility uses to build an RPM package. This file provides necessary information to the build system by defining instructions in a series of sections. These sections are defined in the Preamble and the Body part of the spec file:
- The Preamble section contains a series of metadata items that are used in the Body section.
- The Body section represents the main part of the instructions.
4.2.1. Preamble items Link kopierenLink in die Zwischenablage kopiert!
The following are some of the directives that you can use in the Preamble section of the RPM spec file.
| Directive | Definition |
|---|---|
|
|
A base name of the package that must match the |
|
| An upstream version number of the software. |
|
| The number of times the version of the package was released.
Set the initial value to |
|
| A brief one-line summary of the package. |
|
| A license of the software being packaged.
The exact format for how to label the |
|
| A full URL for more information about the software, for example, an upstream project website for the software being packaged. |
|
| A path or URL to the compressed archive of the unpatched upstream source code. This link must point to an accessible and reliable storage of the archive, for example, the upstream page, not the packager’s local storage.
You can apply the |
|
| A name of the first patch to apply to the source code, if necessary.
You can apply the
You can apply the patches individually by using the |
|
| An architecture that the software will be built for.
If the software is not architecture-dependent, for example, if you wrote the software entirely in an interpreted programming language, set the value to |
|
|
A comma- or whitespace-separated list of packages required to build the program written in a compiled language. There can be multiple entries of |
|
|
A comma- or whitespace-separated list of packages required by the software to run once installed. There can be multiple entries of |
|
|
If a piece of software cannot operate on a specific processor architecture, you can exclude this architecture in the |
|
|
A comma- or whitespace-separated list of packages that must not be installed on the system in order for your software to function properly when installed. There can be multiple entries of |
|
|
The
|
|
|
If you add the |
The Name, Version, and Release (NVR) directives comprise the file name of the RPM package in the name-version-release format.
You can display the NVR information for a specific package by querying RPM database by using the rpm command, for example:
rpm -q bash
# rpm -q bash
bash-4.4.19-7.el8.x86_64
Here, bash is the package name, 4.4.19 is the version, and 7.el8 is the release. The x86_64 marker is the package architecture. Unlike NVR, the architecture marker is not under direct control of the RPM packager, but is defined by the rpmbuild build environment. The exception to this is the architecture-independent noarch package.
4.2.2. Body items Link kopierenLink in die Zwischenablage kopiert!
The following are the items used in the Body section of the RPM spec file.
| Directive | Definition |
|---|---|
|
| A full description of the software packaged in the RPM. This description can span multiple lines and can be broken into paragraphs. |
|
|
A command or series of commands to prepare the software for building, for example, for unpacking the archive in the |
|
| A command or series of commands for building the software into machine code (for compiled languages) or bytecode (for some interpreted languages). |
|
|
A command or series of commands that the
The
Note that |
|
| A command or series of commands for testing the software, for example, unit tests. |
|
| A list of files, provided by the RPM package, to be installed in the user’s system and their full path location on the system.
During the build, if there are files in the
Within the |
|
|
A record of changes that happened to the package between different |
4.2.3. Advanced items Link kopierenLink in die Zwischenablage kopiert!
A spec file can contain advanced items, such as Scriptlets or Triggers. Scriptlets and Triggers take effect at different points during the installation process on the end user’s system, not the build process.
4.3. BuildRoots Link kopierenLink in die Zwischenablage kopiert!
In the context of RPM packaging, buildroot is a chroot environment. The build artifacts are placed here by using the same file system hierarchy as the future hierarchy in the end user’s system, with buildroot acting as the root directory. The placement of build artifacts must comply with the file system hierarchy standard of the end user’s system.
The files in buildroot are later put into a cpio archive, which becomes the main part of the RPM. When RPM is installed on the end user’s system, these files are extracted in the root directory, preserving the correct hierarchy.
The rpmbuild program has its own defaults. Overriding these defaults can cause certain issues. Therefore, avoid defining your own value of the buildroot macro. Use the default %{buildroot} macro instead.
4.4. RPM macros Link kopierenLink in die Zwischenablage kopiert!
An rpm macro is a straight text substitution that can be conditionally assigned based on the optional evaluation of a statement when certain built-in functionality is used. Therefore, RPM can perform text substitutions for you.
For example, you can define Version of the packaged software only once in the %{version} macro, and use this macro throughout the spec file. Every occurrence is automatically substituted by Version that you defined in the macro.
If you see an unfamiliar macro, you can evaluate it with the following command:
rpm --eval %{MACRO}
$ rpm --eval %{MACRO}
For example, to evaluate the %{_bindir} and %{_libexecdir} macros, enter:
rpm --eval %{_bindir}
rpm --eval %{_libexecdir}
$ rpm --eval %{_bindir}
/usr/bin
$ rpm --eval %{_libexecdir}
/usr/libexec
4.5. Working with spec files Link kopierenLink in die Zwischenablage kopiert!
To package new software, you must create a spec file. You can create the spec file either of the following ways:
-
Write the new
specfile manually from scratch. -
Use the
rpmdev-newspecutility. This utility creates an unpopulatedspecfile, where you fill the necessary directives and fields.
Some programmer-focused text editors pre-populate a new spec file with their own spec template. The rpmdev-newspec utility provides an editor-agnostic method.
4.5.1. Creating a new spec file for sample Bash, Python, and C programs Link kopierenLink in die Zwischenablage kopiert!
You can create a spec file for each of the three implementations of the Hello World! program by using the rpmdev-newspec utility.
Prerequisites
The following
Hello World!program implementations were placed into the~/rpmbuild/SOURCESdirectory:
Procedure
Navigate to the
~/rpmbuild/SPECSdirectory:cd ~/rpmbuild/SPECS
$ cd ~/rpmbuild/SPECSCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
specfile for each of the three implementations of theHello World!program:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
~/rpmbuild/SPECS/directory now contains threespecfiles namedbello.spec,cello.spec, andpello.spec.Examine the created files.
The directives in the files represent those described in About spec files. In the following sections, you will populate a particular section in the output files of
rpmdev-newspec.
4.5.2. Modifying an original spec file Link kopierenLink in die Zwischenablage kopiert!
The original output spec file generated by the rpmdev-newspec utility represents a template that you must modify to provide necessary instructions for the rpmbuild utility. rpmbuild then uses these instructions to build an RPM package.
Prerequisites
-
The unpopulated
~/rpmbuild/SPECS/<name>.specspecfile was created by using therpmdev-newspecutility. For more information, see Creating a new spec file for sample Bash, Python, and C programs.
Procedure
-
Open the
~/rpmbuild/SPECS/<name>.specfile provided by therpmdev-newspecutility. Populate the following directives of the
specfile Preamble section:Name-
Namewas already specified as an argument torpmdev-newspec. Version-
Set
Versionto match the upstream release version of the source code. Release-
Releaseis automatically set to1%{?dist}, which is initially1. Summary- Enter a one-line explanation of the package.
License- Enter the software license associated with the source code.
URL-
Enter the URL to the upstream software website. For consistency, utilize the
%{name}RPM macro variable and use thehttps://example.com/%{name}format. SourceEnter the URL to the upstream software source code. Link directly to the software version being packaged.
NoteThe example URLs in this documentation include hard-coded values that could possibly change in the future. Similarly, the release version can change as well. To simplify these potential future changes, use the
%{name}and%{version}macros. By using these macros, you need to update only one field in thespecfile.BuildRequires- Specify build-time dependencies for the package.
Requires- Specify run-time dependencies for the package.
BuildArch- Specify the software architecture.
Populate the following directives of the
specfile Body section. You can think of these directives as section headings, because these directives can define multi-line, multi-instruction, or scripted tasks to occur.%description- Enter the full description of the software.
%prep- Enter a command or series of commands to prepare software for building.
%build- Enter a command or series of commands for building software.
%install-
Enter a command or series of commands that instruct the
rpmbuildcommand on how to install the software into theBUILDROOTdirectory. %files- Specify the list of files, provided by the RPM package, to be installed on your system.
%changelogEnter the list of datestamped entries for each
Version-Releaseof the package.Start the first line of the
%changelogsection with an asterisk (*) character followed byDay-of-Week Month Day Year Name Surname <email> - Version-Release.For the actual change entry, follow these rules:
- Each change entry can contain multiple items, one for each change.
- Each item starts on a new line.
-
Each item begins with a hyphen (
-) character.
You have now written an entire spec file for the required program.
4.5.3. An example spec file for a sample Bash program Link kopierenLink in die Zwischenablage kopiert!
You can use the following example spec file for the bello program written in bash for your reference.
An example spec file for the bello program written in bash
-
The
BuildRequiresdirective, which specifies build-time dependencies for the package, was deleted because there is no building step forbello. Bash is a raw interpreted programming language, and the files are just installed to their location on the system. -
The
Requiresdirective, which specifies run-time dependencies for the package, includes onlybash, because thebelloscript requires only thebashshell environment to execute. -
The
%buildsection, which specifies how to build the software, is blank, because thebashscript does not need to be built.
To install bello, you must create the destination directory and install the executable bash script file there. Therefore, you can use the install command in the %install section. You can use RPM macros to do this without hardcoding paths.
4.5.4. An example spec file for a sample Python program Link kopierenLink in die Zwischenablage kopiert!
You can use the following example spec file for the pello program written in the Python programming language for your reference.
An example spec file for the pello program written in Python
The
Requiresdirective, which specifies run-time dependencies for the package, includes two packages:-
The
pythonpackage required to execute the byte-compiled code at runtime. -
The
bashpackage required to execute the small entry-point script.
-
The
-
The
BuildRequiresdirective, which specifies build-time dependencies for the package, includes only thepythonpackage. Thepelloprogram requirespythonto perform the byte-compile build process. -
The
%buildsection, which specifies how to build the software, creates a byte-compiled version of the script. Note that in real-world packaging, it is usually done automatically, depending on the distribution used. -
The
%installsection corresponds to the fact that you must install the byte-compiled file into a library directory on the system so that it can be accessed.
This example of creating a wrapper script in-line in the spec file shows that the spec file itself is scriptable. This wrapper script executes the Python byte-compiled code by using the here document.
4.5.5. An example spec file for a sample C program Link kopierenLink in die Zwischenablage kopiert!
You can use the following example spec file for the cello program that was written in the C programming language for your reference.
An example spec file for the cello program written in C
The
BuildRequiresdirective, which specifies build-time dependencies for the package, includes the following packages required to perform the compilation build process:-
gcc -
make
-
-
The
Requiresdirective, which specifies run-time dependencies for the package, is omitted in this example. All runtime requirements are handled byrpmbuild, and thecelloprogram does not require anything outside of the core C standard libraries. -
The
%buildsection reflects the fact that in this example theMakefilefile for the cello program was written. Therefore, you can use the GNU make command. However, you must remove the call to%configurebecause you did not provide a configure script.
You can install the cello program by using the %make_install macro. This is possible because the Makefile file for the cello program is available.
4.6. Building RPMs Link kopierenLink in die Zwischenablage kopiert!
You can build RPM packages by using the rpmbuild command. When using this command, a certain directory and file structure is expected, which is the same as the structure that was set up by the rpmdev-setuptree utility.
Different use cases and desired outcomes require different combinations of arguments to the rpmbuild command. The following are the main use cases:
- Building source RPMs.
Building binary RPMs:
- Rebuilding a binary RPM from a source RPM.
-
Building a binary RPM from the
specfile.
4.6.1. Building a source RPM Link kopierenLink in die Zwischenablage kopiert!
Building a Source RPM (SRPM) has the following advantages:
-
You can preserve the exact source of a certain
Name-Version-Releaseof an RPM file that was deployed to an environment. This includes the exactspecfile, the source code, and all relevant patches. This is useful for tracking and debugging purposes. - You can build a binary RPM on a different hardware platform or architecture.
Prerequisites
You have installed the
rpmbuildutility on your system:dnf install rpm-build
# dnf install rpm-buildCopy to Clipboard Copied! Toggle word wrap Toggle overflow The following
Hello World!implementations were placed into the~/rpmbuild/SOURCES/directory:-
A
specfile for the program that you want to package exists.
Procedure
Navigate to the
~/rpmbuild/SPECS/directive, which contains the createdspecfile:cd ~/rpmbuild/SPECS/
$ cd ~/rpmbuild/SPECS/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Build the source RPM by entering the
rpmbuildcommand with the specifiedspecfile:rpmbuild -bs <specfile>
$ rpmbuild -bs <specfile>Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
-bsoption stands for the build source.For example, to build source RPMs for the
bello,pello, andcelloprograms, enter:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
-
Verify that the
rpmbuild/SRPMSdirectory includes the resulting source RPMs. The directory is a part of the structure expected byrpmbuild.
4.6.2. Rebuilding a binary RPM from a source RPM Link kopierenLink in die Zwischenablage kopiert!
To rebuild a binary RPM from a source RPM (SRPM), use the rpmbuild command with the --rebuild option.
The output generated when creating the binary RPM is verbose, which is helpful for debugging. The output varies for different examples and corresponds to their spec files.
The resulting binary RPMs are located in either of the following directories:
-
~/rpmbuild/RPMS/YOURARCH, whereYOURARCHis your architecture. -
~/rpmbuild/RPMS/noarch/, if the package is not architecture-specific.
Prerequisites
You have installed the
rpmbuildutility on your system:dnf install rpm-build
# dnf install rpm-buildCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Procedure
Navigate to the
~/rpmbuild/SRPMS/directive, which contains the SRPM:cd ~/rpmbuild/SRPMS/
$ cd ~/rpmbuild/SRPMS/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Rebuild the binary RPM from the SRPM:
rpmbuild --rebuild <srpm>
$ rpmbuild --rebuild <srpm>Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example, to rebuild
bello,pello, andcellofrom their SRPMs, enter:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Invoking rpmbuild --rebuild involves the following processes:
-
Installing the contents of the SRPM (the
specfile and the source code) into the~/rpmbuild/directory. - Building an RPM by using the installed contents.
-
Removing the
specfile and the source code.
You can retain the spec file and the source code after building either of the following ways:
-
When building the RPM, use the
rpmbuildcommand with the--recompileoption instead of the--rebuildoption. Install SRPMs for
bello,pello, andcello:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.6.3. Building a binary RPM from a spec file Link kopierenLink in die Zwischenablage kopiert!
To build a binary RPM from its spec file, use the rpmbuild command with the -bb option.
Prerequisites
You have installed the
rpmbuildutility on your system:dnf install rpm-build
# dnf install rpm-buildCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Procedure
Navigate to the
~/rpmbuild/SPECS/directive, which containsspecfiles:cd ~/rpmbuild/SPECS/
$ cd ~/rpmbuild/SPECS/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Build the binary RPM from its
spec:rpmbuild -bb <spec_file>
$ rpmbuild -bb <spec_file>Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example, to build
bello,pello, andcellobinary RPMs from theirspecfiles, enter:rpmbuild -bb bello.spec rpmbuild -bb pello.spec rpmbuild -bb cello.spec
$ rpmbuild -bb bello.spec $ rpmbuild -bb pello.spec $ rpmbuild -bb cello.specCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.7. Logging RPM activity to syslog Link kopierenLink in die Zwischenablage kopiert!
You can log any RPM activity or transaction by using the System Logging protocol (syslog).
Prerequisites
The
syslogplug-in is installed on the system:dnf install rpm-plugin-syslog
# dnf install rpm-plugin-syslogCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe default location for the
syslogmessages is the/var/log/messagesfile. However, you can configuresyslogto use another location to store the messages.
Procedure
Open the file that you configured to store the
syslogmessages.Alternatively, if you use the default
syslogconfiguration, open the/var/log/messagesfile.-
Search for new lines including the
[RPM]string.
4.8. Extracting RPM content Link kopierenLink in die Zwischenablage kopiert!
In some cases, for example, if a package required by RPM is damaged, you might need to extract the content of the package. In such cases, if an RPM installation is still working despite the damage, you can use the rpm2archive utility to convert an .rpm file to a tar archive to use the content of the package.
If the RPM installation is severely damaged, you can use the rpm2cpio utility to convert the RPM package file to a cpio archive.
Procedure
Convert the RPM file to the tar archive:
rpm2archive <filename>.rpm
$ rpm2archive <filename>.rpmCopy to Clipboard Copied! Toggle word wrap Toggle overflow The resulting file has the
.tgzsuffix. For example, to create an archive from thebashpackage, enter:rpm2archive bash-4.4.19-6.el8.x86_64.rpm ls bash-4.4.19-6.el8.x86_64.rpm.tgz
$ rpm2archive bash-4.4.19-6.el8.x86_64.rpm $ ls bash-4.4.19-6.el8.x86_64.rpm.tgz bash-4.4.19-6.el8.x86_64.rpm.tgzCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.9. Signing RPM packages Link kopierenLink in die Zwischenablage kopiert!
You can sign RPM packages to ensure no third party can alter their content by using either of the following software:
- Sequoia PGP supports the OpenPGP standard. RPM also uses Sequoia PGP to verify software signatures.
- GNU Privacy Guard (GnuPG) supports older OpenPGP standard versions, which makes GnuPG more compatible with RHEL 9 and earlier versions.
New algorithms and signatures might not be compatible with earlier RHEL versions.
4.9.1. Signing RPM packages with GnuPG Link kopierenLink in die Zwischenablage kopiert!
You can sign RPM packages by using the GNU Privacy Guard (GnuPG) software.
4.9.1.1. Creating an OpenPGP key for signing packages with GnuPG Link kopierenLink in die Zwischenablage kopiert!
To sign an RPM package by using the GNU Privacy Guard (GnuPG) software, you must create an OpenPGP key first.
Prerequisites
-
You have the
rpm-signandpinentrypackages installed on your system.
Procedure
Generate an OpenPGP key pair:
gpg --gen-key
$ gpg --gen-keyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Check the generated key pair:
gpg --list-keys
$ gpg --list-keysCopy to Clipboard Copied! Toggle word wrap Toggle overflow Export the public key:
gpg --export -a '<public_key_name>' > RPM-GPG-KEY-pmanager
$ gpg --export -a '<public_key_name>' > RPM-GPG-KEY-pmanagerCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.9.1.2. Configuring RPM to sign a package with GnuPG Link kopierenLink in die Zwischenablage kopiert!
To sign an RPM package by using the GNU Privacy Guard (GnuPG) software, you must configure RPM by specifying the %_gpg_name RPM macro.
Prerequisites
- You created an OpenPGP key for GnuPG, For more information, see Creating an OpenPGP key for signing packages with GnuPG.
Procedure
Define the
%_gpg_namemacro in your$HOME/.rpmmacrosdirectory:%_gpg_name <key-ID>
%_gpg_name <key-ID>Copy to Clipboard Copied! Toggle word wrap Toggle overflow A valid key ID value for GnuPG can be a key fingerprint, full name, or email address you provided when creating the key.
4.9.1.3. Adding a signature to an RPM package Link kopierenLink in die Zwischenablage kopiert!
Packages are commonly built without signatures. You can add your signature before the package is released.
Prerequisites
- You created an OpenPGP key for GnuPG. For more information, see Creating an OpenPGP key for signing packages with GnuPG.
- You configured RPM for signing packages. For more information, see Configuring RPM to sign a package with GnuPG.
-
You have the
rpm-signpackage installed on your system.
Procedure
Add a signature to a package:
rpmsign --addsign <package-name>.rpm
$ rpmsign --addsign <package-name>.rpmCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Import the exported OpenPGP public key into the RPM keyring:
rpmkeys --import RPM-GPG-KEY-pmanager
# rpmkeys --import RPM-GPG-KEY-pmanagerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Display the key ID with GnuPG:
gpg --list-keys
$ gpg --list-keys [...] pub rsa3072 2025-05-13 [SC] [expires: 2028-05-12] A8AF1C39AC67A1501450734F6DE8FC866DE0394D [...]Copy to Clipboard Copied! Toggle word wrap Toggle overflow The key ID is the 40-character string in the command output, for example,
A8AF1C39AC67A1501450734F6DE8FC866DE0394D.Verify that the RPM file has the corresponding signature:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The signature key ID matches the last part of the OpenPGP key ID.
4.9.2. Signing RPM packages with Sequoia PGP Link kopierenLink in die Zwischenablage kopiert!
You can use Sequoia PGP to sign RPM packages and ensure no third party can alter their content.
4.9.2.1. Creating an OpenPGP key for signing packages with Sequoia PGP Link kopierenLink in die Zwischenablage kopiert!
To sign packages by using the Sequoia PGP software, you must create an OpenPGP key first.
Procedure
Install the Sequoia PGP tools:
dnf install sequoia-sq
# dnf install sequoia-sqCopy to Clipboard Copied! Toggle word wrap Toggle overflow Generate an OpenPGP key pair:
sq key generate --own-key --userid <key_name>
$ sq key generate --own-key --userid <key_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the generated key pair:
sq key list
$ sq key listCopy to Clipboard Copied! Toggle word wrap Toggle overflow Export the public key:
sq cert export --cert-userid '<key_name>' > RPM-PGP-KEY-pmanager
$ sq cert export --cert-userid '<key_name>' > RPM-PGP-KEY-pmanagerCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.9.2.2. Configuring RPM to sign a package with Sequoia PGP Link kopierenLink in die Zwischenablage kopiert!
To sign an RPM package with the Sequoia PGP software, you must configure the RPM to use Sequoia PGP and specify the %_gpg_name macro.
Prerequisites
-
You have the
rpm-signpackage installed on your system.
Procedure
Copy the
macros.rpmsign-sequoiafile to the/etc/rpmdirectory:cp /usr/share/doc/rpm/macros.rpmsign-sequoia /etc/rpm/
# cp /usr/share/doc/rpm/macros.rpmsign-sequoia /etc/rpm/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Get a valid OpenPGP key fingerprint value from the output of key listing:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The key fingerprint is a 40-character string on the first line of the output, for example,
7E4B52101EB3DB08967A1E5EB595D12FDA65BA50.Define the
%_gpg_namemacro in your$HOME/.rpmmacrosfile as follows:%_gpg_name <key_fingerprint>
%_gpg_name <key_fingerprint>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note that you can also use the full key ID instead of the fingerprint.
NoteUnlike GnuPG, Sequoia PGP accepts only the full key ID or fingerprint.
4.9.2.3. Adding a signature to an RPM package Link kopierenLink in die Zwischenablage kopiert!
Packages are commonly built without signatures. You can add your signature before the package is released.
Prerequisites
- You created an OpenPGP key. For more information, see Creating an OpenPGP key for signing packages with Sequoia PGP.
- You configured RPM for signing packages. For more information, see Configuring RPM to sign a package with Sequoia PGP.
-
You have the
rpm-signpackage installed on your system.
Procedure
Add a signature to a package:
rpmsign --addsign <package-name>.rpm
$ rpmsign --addsign <package-name>.rpmCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Import the exported OpenPGP public key into the RPM keyring:
rpmkeys --import RPM-PGP-KEY-pmanager
# rpmkeys --import RPM-PGP-KEY-pmanagerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Display the key fingerprint of the signing key:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The key fingerprint is usually a signing subkey in the
sq key list --cert-userid <key_name>command output, for example,E0BD231AB350AD6802D44C0A270E79FFC39C3B25.Verify that the RPM file has the corresponding signature, for example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The signature key ID matches the last part of the key fingerprint.