How to create and sign a RPM-package with RedHat 4, that works with YUM?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
1
down vote

favorite












How do I make a signed RPM package for my binary?



I need to distribute my binary as a signed RPM package on RHEL 4 using GPG.



It's for distribution of my binary with YUM ( http://yum.baseurl.org ).










share|improve this question



























    up vote
    1
    down vote

    favorite












    How do I make a signed RPM package for my binary?



    I need to distribute my binary as a signed RPM package on RHEL 4 using GPG.



    It's for distribution of my binary with YUM ( http://yum.baseurl.org ).










    share|improve this question

























      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      How do I make a signed RPM package for my binary?



      I need to distribute my binary as a signed RPM package on RHEL 4 using GPG.



      It's for distribution of my binary with YUM ( http://yum.baseurl.org ).










      share|improve this question















      How do I make a signed RPM package for my binary?



      I need to distribute my binary as a signed RPM package on RHEL 4 using GPG.



      It's for distribution of my binary with YUM ( http://yum.baseurl.org ).







      yum gpg






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Nov 20 at 22:35









      Rui F Ribeiro

      38.2k1475125




      38.2k1475125










      asked Jul 15 '13 at 8:28









      Carl H. Blomqvist

      83




      83




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          3
          down vote



          accepted










          I've used these steps in the past to sign my RPMs. It's pretty much derived from this tutorial, titled: Signing RPMs with your own key.



          generate a key



          $ gpg --gen-key
          gpg (GnuPG) 1.4.5; Copyright (C) 2006 Free Software Foundation, Inc.
          This program comes with ABSOLUTELY NO WARRANTY.
          This is free software, and you are welcome to redistribute it
          under certain conditions. See the file COPYING for details.

          Please select what kind of key you want:
          (1) DSA and Elgamal (default)
          (2) DSA (sign only)
          (5) RSA (sign only)
          Your selection? 1
          DSA keypair will have 1024 bits.
          ELG-E keys may be between 1024 and 4096 bits long.
          What keysize do you want? (2048)
          Requested keysize is 2048 bits
          Please specify how long the key should be valid.
          0 = key does not expire
          = key expires in n days
          w = key expires in n weeks
          m = key expires in n months
          y = key expires in n years
          Key is valid for? (0) 0
          Key does not expire at all
          Is this correct? (y/N) y

          You need a user ID to identify your key; the software constructs the user ID
          from the Real Name, Comment and Email Address in this form:
          "Heinrich Heine (Der Dichter) "

          Real name: Repository Owner
          Email address: repository@example.org
          Comment:
          You selected this USER-ID:
          "Repository Owner "

          Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
          You need a Passphrase to protect your secret key.

          We need to generate a lot of random bytes. It is a good idea to perform
          some other action (type on the keyboard, move the mouse, utilize the
          disks) during the prime generation; this gives the random number
          generator a better chance to gain enough entropy.
          +++++.+++++++++++++++++++++++++..+++++...+++++++++++++++....++++++++++++++++++++....++++++++++++++++++++++++++++++..+++++..+++++++++++++++.++++++++++.+++++.........+++++
          We need to generate a lot of random bytes. It is a good idea to perform
          some other action (type on the keyboard, move the mouse, utilize the
          disks) during the prime generation; this gives the random number
          generator a better chance to gain enough entropy.
          +++++++++++++++++++++++++++++++++++++++++++++....+++++...+++++.+++++++++++++++..++++++++++++++++++++++++++++++.+++++++++++++++....+++++..+++++...+++++++++++++++..+++++>++++++++++>+++++>+++++.............<+++++....>.+++++..............+++++^^^
          gpg: key 79E7E0DB marked as ultimately trusted
          public and secret key created and signed.

          gpg: checking the trustdb
          gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
          gpg: depth: 0 valid: 2 signed: 13 trust: 0-, 0q, 0n, 0m, 0f, 2u
          gpg: depth: 1 valid: 13 signed: 2 trust: 13-, 0q, 0n, 0m, 0f, 0u
          gpg: next trustdb check due at 2007-12-31
          pub 1024D/79E7E0DB 2007-10-08
          Key fingerprint = 5ACE 5EBF ED46 BAF7 93BD 8F02 E0BB DB6B 79E7 E0DB
          uid Repository Owner
          sub 2048g/04F5FDBA 2007-10-08


          configuring your build env. to use key



          Add the following to your $HOME/.rpmmacros file:



          %_signature gpg
          %_gpg_name Repository Owner


          NOTE: The tag %_gpg_name should match the output of your key creation, this will tell rpm which key you wish to use to sign by default.



          sign an RPM



          $ rpm --resign sabayon-2.12.1-1.src.rpm 
          Enter pass phrase:
          Pass phrase is good.
          sabayon-2.12.1-1.src.rpm:


          Now verify that the RPM's been signed:



          $ rpm -K sabayon-2.12.1-1.src.rpm 
          sabayon-2.12.1-1.src.rpm: (SHA1) DSA sha1 md5 (GPG) NOT OK (MISSING KEYS: GPG#79e7e0db)


          This is actually OK. It's just telling you that the RPM's been signed, but that your RPM installation doesn't have the corresponding key that goes along with this signing.



          saving the key



          You can extract the key we generated above with this command:



          $ gpg --export -a "Repository Owner " >RPM-GPG-KEY-example.com


          You can import it with this command:



          $ rpm --import RPM-GPG-KEY-example.com 


          And confirm that it loaded with this:



          $ rpm -q gpg-pubkey-*
          gpg-pubkey-f51839ac-46362566
          gpg-pubkey-b2980b13-3c1d0597
          gpg-pubkey-44cb93fd-4a68c9c4





          share|improve this answer




















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "106"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f83054%2fhow-to-create-and-sign-a-rpm-package-with-redhat-4-that-works-with-yum%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            3
            down vote



            accepted










            I've used these steps in the past to sign my RPMs. It's pretty much derived from this tutorial, titled: Signing RPMs with your own key.



            generate a key



            $ gpg --gen-key
            gpg (GnuPG) 1.4.5; Copyright (C) 2006 Free Software Foundation, Inc.
            This program comes with ABSOLUTELY NO WARRANTY.
            This is free software, and you are welcome to redistribute it
            under certain conditions. See the file COPYING for details.

            Please select what kind of key you want:
            (1) DSA and Elgamal (default)
            (2) DSA (sign only)
            (5) RSA (sign only)
            Your selection? 1
            DSA keypair will have 1024 bits.
            ELG-E keys may be between 1024 and 4096 bits long.
            What keysize do you want? (2048)
            Requested keysize is 2048 bits
            Please specify how long the key should be valid.
            0 = key does not expire
            = key expires in n days
            w = key expires in n weeks
            m = key expires in n months
            y = key expires in n years
            Key is valid for? (0) 0
            Key does not expire at all
            Is this correct? (y/N) y

            You need a user ID to identify your key; the software constructs the user ID
            from the Real Name, Comment and Email Address in this form:
            "Heinrich Heine (Der Dichter) "

            Real name: Repository Owner
            Email address: repository@example.org
            Comment:
            You selected this USER-ID:
            "Repository Owner "

            Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
            You need a Passphrase to protect your secret key.

            We need to generate a lot of random bytes. It is a good idea to perform
            some other action (type on the keyboard, move the mouse, utilize the
            disks) during the prime generation; this gives the random number
            generator a better chance to gain enough entropy.
            +++++.+++++++++++++++++++++++++..+++++...+++++++++++++++....++++++++++++++++++++....++++++++++++++++++++++++++++++..+++++..+++++++++++++++.++++++++++.+++++.........+++++
            We need to generate a lot of random bytes. It is a good idea to perform
            some other action (type on the keyboard, move the mouse, utilize the
            disks) during the prime generation; this gives the random number
            generator a better chance to gain enough entropy.
            +++++++++++++++++++++++++++++++++++++++++++++....+++++...+++++.+++++++++++++++..++++++++++++++++++++++++++++++.+++++++++++++++....+++++..+++++...+++++++++++++++..+++++>++++++++++>+++++>+++++.............<+++++....>.+++++..............+++++^^^
            gpg: key 79E7E0DB marked as ultimately trusted
            public and secret key created and signed.

            gpg: checking the trustdb
            gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
            gpg: depth: 0 valid: 2 signed: 13 trust: 0-, 0q, 0n, 0m, 0f, 2u
            gpg: depth: 1 valid: 13 signed: 2 trust: 13-, 0q, 0n, 0m, 0f, 0u
            gpg: next trustdb check due at 2007-12-31
            pub 1024D/79E7E0DB 2007-10-08
            Key fingerprint = 5ACE 5EBF ED46 BAF7 93BD 8F02 E0BB DB6B 79E7 E0DB
            uid Repository Owner
            sub 2048g/04F5FDBA 2007-10-08


            configuring your build env. to use key



            Add the following to your $HOME/.rpmmacros file:



            %_signature gpg
            %_gpg_name Repository Owner


            NOTE: The tag %_gpg_name should match the output of your key creation, this will tell rpm which key you wish to use to sign by default.



            sign an RPM



            $ rpm --resign sabayon-2.12.1-1.src.rpm 
            Enter pass phrase:
            Pass phrase is good.
            sabayon-2.12.1-1.src.rpm:


            Now verify that the RPM's been signed:



            $ rpm -K sabayon-2.12.1-1.src.rpm 
            sabayon-2.12.1-1.src.rpm: (SHA1) DSA sha1 md5 (GPG) NOT OK (MISSING KEYS: GPG#79e7e0db)


            This is actually OK. It's just telling you that the RPM's been signed, but that your RPM installation doesn't have the corresponding key that goes along with this signing.



            saving the key



            You can extract the key we generated above with this command:



            $ gpg --export -a "Repository Owner " >RPM-GPG-KEY-example.com


            You can import it with this command:



            $ rpm --import RPM-GPG-KEY-example.com 


            And confirm that it loaded with this:



            $ rpm -q gpg-pubkey-*
            gpg-pubkey-f51839ac-46362566
            gpg-pubkey-b2980b13-3c1d0597
            gpg-pubkey-44cb93fd-4a68c9c4





            share|improve this answer
























              up vote
              3
              down vote



              accepted










              I've used these steps in the past to sign my RPMs. It's pretty much derived from this tutorial, titled: Signing RPMs with your own key.



              generate a key



              $ gpg --gen-key
              gpg (GnuPG) 1.4.5; Copyright (C) 2006 Free Software Foundation, Inc.
              This program comes with ABSOLUTELY NO WARRANTY.
              This is free software, and you are welcome to redistribute it
              under certain conditions. See the file COPYING for details.

              Please select what kind of key you want:
              (1) DSA and Elgamal (default)
              (2) DSA (sign only)
              (5) RSA (sign only)
              Your selection? 1
              DSA keypair will have 1024 bits.
              ELG-E keys may be between 1024 and 4096 bits long.
              What keysize do you want? (2048)
              Requested keysize is 2048 bits
              Please specify how long the key should be valid.
              0 = key does not expire
              = key expires in n days
              w = key expires in n weeks
              m = key expires in n months
              y = key expires in n years
              Key is valid for? (0) 0
              Key does not expire at all
              Is this correct? (y/N) y

              You need a user ID to identify your key; the software constructs the user ID
              from the Real Name, Comment and Email Address in this form:
              "Heinrich Heine (Der Dichter) "

              Real name: Repository Owner
              Email address: repository@example.org
              Comment:
              You selected this USER-ID:
              "Repository Owner "

              Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
              You need a Passphrase to protect your secret key.

              We need to generate a lot of random bytes. It is a good idea to perform
              some other action (type on the keyboard, move the mouse, utilize the
              disks) during the prime generation; this gives the random number
              generator a better chance to gain enough entropy.
              +++++.+++++++++++++++++++++++++..+++++...+++++++++++++++....++++++++++++++++++++....++++++++++++++++++++++++++++++..+++++..+++++++++++++++.++++++++++.+++++.........+++++
              We need to generate a lot of random bytes. It is a good idea to perform
              some other action (type on the keyboard, move the mouse, utilize the
              disks) during the prime generation; this gives the random number
              generator a better chance to gain enough entropy.
              +++++++++++++++++++++++++++++++++++++++++++++....+++++...+++++.+++++++++++++++..++++++++++++++++++++++++++++++.+++++++++++++++....+++++..+++++...+++++++++++++++..+++++>++++++++++>+++++>+++++.............<+++++....>.+++++..............+++++^^^
              gpg: key 79E7E0DB marked as ultimately trusted
              public and secret key created and signed.

              gpg: checking the trustdb
              gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
              gpg: depth: 0 valid: 2 signed: 13 trust: 0-, 0q, 0n, 0m, 0f, 2u
              gpg: depth: 1 valid: 13 signed: 2 trust: 13-, 0q, 0n, 0m, 0f, 0u
              gpg: next trustdb check due at 2007-12-31
              pub 1024D/79E7E0DB 2007-10-08
              Key fingerprint = 5ACE 5EBF ED46 BAF7 93BD 8F02 E0BB DB6B 79E7 E0DB
              uid Repository Owner
              sub 2048g/04F5FDBA 2007-10-08


              configuring your build env. to use key



              Add the following to your $HOME/.rpmmacros file:



              %_signature gpg
              %_gpg_name Repository Owner


              NOTE: The tag %_gpg_name should match the output of your key creation, this will tell rpm which key you wish to use to sign by default.



              sign an RPM



              $ rpm --resign sabayon-2.12.1-1.src.rpm 
              Enter pass phrase:
              Pass phrase is good.
              sabayon-2.12.1-1.src.rpm:


              Now verify that the RPM's been signed:



              $ rpm -K sabayon-2.12.1-1.src.rpm 
              sabayon-2.12.1-1.src.rpm: (SHA1) DSA sha1 md5 (GPG) NOT OK (MISSING KEYS: GPG#79e7e0db)


              This is actually OK. It's just telling you that the RPM's been signed, but that your RPM installation doesn't have the corresponding key that goes along with this signing.



              saving the key



              You can extract the key we generated above with this command:



              $ gpg --export -a "Repository Owner " >RPM-GPG-KEY-example.com


              You can import it with this command:



              $ rpm --import RPM-GPG-KEY-example.com 


              And confirm that it loaded with this:



              $ rpm -q gpg-pubkey-*
              gpg-pubkey-f51839ac-46362566
              gpg-pubkey-b2980b13-3c1d0597
              gpg-pubkey-44cb93fd-4a68c9c4





              share|improve this answer






















                up vote
                3
                down vote



                accepted







                up vote
                3
                down vote



                accepted






                I've used these steps in the past to sign my RPMs. It's pretty much derived from this tutorial, titled: Signing RPMs with your own key.



                generate a key



                $ gpg --gen-key
                gpg (GnuPG) 1.4.5; Copyright (C) 2006 Free Software Foundation, Inc.
                This program comes with ABSOLUTELY NO WARRANTY.
                This is free software, and you are welcome to redistribute it
                under certain conditions. See the file COPYING for details.

                Please select what kind of key you want:
                (1) DSA and Elgamal (default)
                (2) DSA (sign only)
                (5) RSA (sign only)
                Your selection? 1
                DSA keypair will have 1024 bits.
                ELG-E keys may be between 1024 and 4096 bits long.
                What keysize do you want? (2048)
                Requested keysize is 2048 bits
                Please specify how long the key should be valid.
                0 = key does not expire
                = key expires in n days
                w = key expires in n weeks
                m = key expires in n months
                y = key expires in n years
                Key is valid for? (0) 0
                Key does not expire at all
                Is this correct? (y/N) y

                You need a user ID to identify your key; the software constructs the user ID
                from the Real Name, Comment and Email Address in this form:
                "Heinrich Heine (Der Dichter) "

                Real name: Repository Owner
                Email address: repository@example.org
                Comment:
                You selected this USER-ID:
                "Repository Owner "

                Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
                You need a Passphrase to protect your secret key.

                We need to generate a lot of random bytes. It is a good idea to perform
                some other action (type on the keyboard, move the mouse, utilize the
                disks) during the prime generation; this gives the random number
                generator a better chance to gain enough entropy.
                +++++.+++++++++++++++++++++++++..+++++...+++++++++++++++....++++++++++++++++++++....++++++++++++++++++++++++++++++..+++++..+++++++++++++++.++++++++++.+++++.........+++++
                We need to generate a lot of random bytes. It is a good idea to perform
                some other action (type on the keyboard, move the mouse, utilize the
                disks) during the prime generation; this gives the random number
                generator a better chance to gain enough entropy.
                +++++++++++++++++++++++++++++++++++++++++++++....+++++...+++++.+++++++++++++++..++++++++++++++++++++++++++++++.+++++++++++++++....+++++..+++++...+++++++++++++++..+++++>++++++++++>+++++>+++++.............<+++++....>.+++++..............+++++^^^
                gpg: key 79E7E0DB marked as ultimately trusted
                public and secret key created and signed.

                gpg: checking the trustdb
                gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
                gpg: depth: 0 valid: 2 signed: 13 trust: 0-, 0q, 0n, 0m, 0f, 2u
                gpg: depth: 1 valid: 13 signed: 2 trust: 13-, 0q, 0n, 0m, 0f, 0u
                gpg: next trustdb check due at 2007-12-31
                pub 1024D/79E7E0DB 2007-10-08
                Key fingerprint = 5ACE 5EBF ED46 BAF7 93BD 8F02 E0BB DB6B 79E7 E0DB
                uid Repository Owner
                sub 2048g/04F5FDBA 2007-10-08


                configuring your build env. to use key



                Add the following to your $HOME/.rpmmacros file:



                %_signature gpg
                %_gpg_name Repository Owner


                NOTE: The tag %_gpg_name should match the output of your key creation, this will tell rpm which key you wish to use to sign by default.



                sign an RPM



                $ rpm --resign sabayon-2.12.1-1.src.rpm 
                Enter pass phrase:
                Pass phrase is good.
                sabayon-2.12.1-1.src.rpm:


                Now verify that the RPM's been signed:



                $ rpm -K sabayon-2.12.1-1.src.rpm 
                sabayon-2.12.1-1.src.rpm: (SHA1) DSA sha1 md5 (GPG) NOT OK (MISSING KEYS: GPG#79e7e0db)


                This is actually OK. It's just telling you that the RPM's been signed, but that your RPM installation doesn't have the corresponding key that goes along with this signing.



                saving the key



                You can extract the key we generated above with this command:



                $ gpg --export -a "Repository Owner " >RPM-GPG-KEY-example.com


                You can import it with this command:



                $ rpm --import RPM-GPG-KEY-example.com 


                And confirm that it loaded with this:



                $ rpm -q gpg-pubkey-*
                gpg-pubkey-f51839ac-46362566
                gpg-pubkey-b2980b13-3c1d0597
                gpg-pubkey-44cb93fd-4a68c9c4





                share|improve this answer












                I've used these steps in the past to sign my RPMs. It's pretty much derived from this tutorial, titled: Signing RPMs with your own key.



                generate a key



                $ gpg --gen-key
                gpg (GnuPG) 1.4.5; Copyright (C) 2006 Free Software Foundation, Inc.
                This program comes with ABSOLUTELY NO WARRANTY.
                This is free software, and you are welcome to redistribute it
                under certain conditions. See the file COPYING for details.

                Please select what kind of key you want:
                (1) DSA and Elgamal (default)
                (2) DSA (sign only)
                (5) RSA (sign only)
                Your selection? 1
                DSA keypair will have 1024 bits.
                ELG-E keys may be between 1024 and 4096 bits long.
                What keysize do you want? (2048)
                Requested keysize is 2048 bits
                Please specify how long the key should be valid.
                0 = key does not expire
                = key expires in n days
                w = key expires in n weeks
                m = key expires in n months
                y = key expires in n years
                Key is valid for? (0) 0
                Key does not expire at all
                Is this correct? (y/N) y

                You need a user ID to identify your key; the software constructs the user ID
                from the Real Name, Comment and Email Address in this form:
                "Heinrich Heine (Der Dichter) "

                Real name: Repository Owner
                Email address: repository@example.org
                Comment:
                You selected this USER-ID:
                "Repository Owner "

                Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
                You need a Passphrase to protect your secret key.

                We need to generate a lot of random bytes. It is a good idea to perform
                some other action (type on the keyboard, move the mouse, utilize the
                disks) during the prime generation; this gives the random number
                generator a better chance to gain enough entropy.
                +++++.+++++++++++++++++++++++++..+++++...+++++++++++++++....++++++++++++++++++++....++++++++++++++++++++++++++++++..+++++..+++++++++++++++.++++++++++.+++++.........+++++
                We need to generate a lot of random bytes. It is a good idea to perform
                some other action (type on the keyboard, move the mouse, utilize the
                disks) during the prime generation; this gives the random number
                generator a better chance to gain enough entropy.
                +++++++++++++++++++++++++++++++++++++++++++++....+++++...+++++.+++++++++++++++..++++++++++++++++++++++++++++++.+++++++++++++++....+++++..+++++...+++++++++++++++..+++++>++++++++++>+++++>+++++.............<+++++....>.+++++..............+++++^^^
                gpg: key 79E7E0DB marked as ultimately trusted
                public and secret key created and signed.

                gpg: checking the trustdb
                gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
                gpg: depth: 0 valid: 2 signed: 13 trust: 0-, 0q, 0n, 0m, 0f, 2u
                gpg: depth: 1 valid: 13 signed: 2 trust: 13-, 0q, 0n, 0m, 0f, 0u
                gpg: next trustdb check due at 2007-12-31
                pub 1024D/79E7E0DB 2007-10-08
                Key fingerprint = 5ACE 5EBF ED46 BAF7 93BD 8F02 E0BB DB6B 79E7 E0DB
                uid Repository Owner
                sub 2048g/04F5FDBA 2007-10-08


                configuring your build env. to use key



                Add the following to your $HOME/.rpmmacros file:



                %_signature gpg
                %_gpg_name Repository Owner


                NOTE: The tag %_gpg_name should match the output of your key creation, this will tell rpm which key you wish to use to sign by default.



                sign an RPM



                $ rpm --resign sabayon-2.12.1-1.src.rpm 
                Enter pass phrase:
                Pass phrase is good.
                sabayon-2.12.1-1.src.rpm:


                Now verify that the RPM's been signed:



                $ rpm -K sabayon-2.12.1-1.src.rpm 
                sabayon-2.12.1-1.src.rpm: (SHA1) DSA sha1 md5 (GPG) NOT OK (MISSING KEYS: GPG#79e7e0db)


                This is actually OK. It's just telling you that the RPM's been signed, but that your RPM installation doesn't have the corresponding key that goes along with this signing.



                saving the key



                You can extract the key we generated above with this command:



                $ gpg --export -a "Repository Owner " >RPM-GPG-KEY-example.com


                You can import it with this command:



                $ rpm --import RPM-GPG-KEY-example.com 


                And confirm that it loaded with this:



                $ rpm -q gpg-pubkey-*
                gpg-pubkey-f51839ac-46362566
                gpg-pubkey-b2980b13-3c1d0597
                gpg-pubkey-44cb93fd-4a68c9c4






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Jul 15 '13 at 9:02









                slm

                244k66505670




                244k66505670



























                     

                    draft saved


                    draft discarded















































                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f83054%2fhow-to-create-and-sign-a-rpm-package-with-redhat-4-that-works-with-yum%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown






                    Popular posts from this blog

                    How to check contact read email or not when send email to Individual?

                    Bahrain

                    Postfix configuration issue with fips on centos 7; mailgun relay