Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1908909 - Review Request: keyring-ima-signer - An IMA file signing tool using the kernel keyring
Summary: Review Request: keyring-ima-signer - An IMA file signing tool using the kerne...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: Package Review
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Jared Smith
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: IoT
TreeView+ depends on / blocked
 
Reported: 2020-12-17 21:44 UTC by Peter Robinson
Modified: 2021-01-30 01:54 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-01-30 01:54:20 UTC
Type: Bug
Embargoed:
jsmith.fedora: fedora-review+


Attachments (Terms of Use)

Description Peter Robinson 2020-12-17 21:44:10 UTC
SPEC: https://pbrobinson.fedorapeople.org/keyring-ima-signer.spec
SRPM: https://pbrobinson.fedorapeople.org/keyring-ima-signer-0.1.0-1.fc33.src.rpm

Description:
The IMA (Integrity Measurement Architecture) is a key component of the
Linux integrity subsystem designed to ensure integrity, authenticity,
and confidentiality of systems including hardware root of trusts (TPM).

This tool allows signing of files in userspace, inclusding options of
including the signature in xattr or a .sig file, using signing keys
stored in the kernel keyring to ensure they're not recoverable.

FAS: pbrobinson

koji: https://koji.fedoraproject.org/koji/taskinfo?taskID=57672626

Comment 1 Jared Smith 2021-01-18 12:30:19 UTC
Package is APPROVED.

There is a small typo in the description ("inclusding").

Package Review
==============

Legend:
[x] = Pass, [!] = Fail, [-] = Not applicable, [?] = Not evaluated
[ ] = Manual review needed



===== MUST items =====

Generic:
[x]: Package is licensed with an open-source compatible license and meets
     other legal requirements as defined in the legal section of Packaging
     Guidelines.
[x]: License field in the package spec file matches the actual license.
     Note: Checking patched sources after %prep for licenses. Licenses
     found: "Unknown or generated", "European Union Public License 1.2". 8
     files have unknown license. Detailed output of licensecheck in
     /tmp/1908909-keyring-ima-signer/licensecheck.txt
[x]: License file installed when any subpackage combination is installed.
[x]: %build honors applicable compiler flags or justifies otherwise.
[x]: Package contains no bundled libraries without FPC exception.
[x]: Changelog in prescribed format.
[x]: Sources contain only permissible code or content.
[-]: Package contains desktop file if it is a GUI application.
[x]: Development files must be in a -devel package
[x]: Package uses nothing in %doc for runtime.
[x]: Package consistently uses macros (instead of hard-coded directory
     names).
[x]: Package is named according to the Package Naming Guidelines.
[x]: Package does not generate any conflict.
[x]: Package obeys FHS, except libexecdir and /usr/target.
[-]: If the package is a rename of another package, proper Obsoletes and
     Provides are present.
[x]: Requires correct, justified where necessary.
[x]: Spec file is legible and written in American English.
[x]: Package contains systemd file(s) if in need.
[x]: Useful -debuginfo package or justification otherwise.
[x]: Package is not known to require an ExcludeArch tag.
[-]: Large documentation must go in a -doc subpackage. Large could be size
     (~1MB) or number of files.
     Note: Documentation size is 10240 bytes in 1 files.
[x]: Package complies to the Packaging Guidelines
[x]: Package successfully compiles and builds into binary rpms on at least
     one supported primary architecture.
[x]: Package installs properly.
[x]: Rpmlint is run on all rpms the build produces.
     Note: There are rpmlint messages (see attachment).
[x]: If (and only if) the source package includes the text of the
     license(s) in its own file, then that file, containing the text of the
     license(s) for the package is included in %license.
[x]: Package requires other packages for directories it uses.
[x]: Package must own all directories that it creates.
[x]: Package does not own files or directories owned by other packages.
[x]: Package uses either %{buildroot} or $RPM_BUILD_ROOT
[x]: Package does not run rm -rf %{buildroot} (or $RPM_BUILD_ROOT) at the
     beginning of %install.
[x]: Macros in Summary, %description expandable at SRPM build time.
[x]: Dist tag is present.
[x]: Package does not contain duplicates in %files.
[x]: Permissions on files are set properly.
[x]: Package must not depend on deprecated() packages.
[x]: Package use %makeinstall only when make install DESTDIR=... doesn't
     work.
[x]: Package is named using only allowed ASCII characters.
[x]: Package does not use a name that already exists.
[x]: Package is not relocatable.
[x]: Sources used to build the package match the upstream source, as
     provided in the spec URL.
[x]: Spec file name must match the spec package %{name}, in the format
     %{name}.spec.
[x]: File names are valid UTF-8.
[x]: Packages must not store files under /srv, /opt or /usr/local

===== SHOULD items =====

Generic:
[-]: If the source package does not include license text(s) as a separate
     file from upstream, the packager SHOULD query upstream to include it.
[x]: Final provides and requires are sane (see attachments).
[x]: Package functions as described.
[x]: Latest version is packaged.
[x]: Package does not include license text files separate from upstream.
[x]: Patches link to upstream bugs/comments/lists or are otherwise
     justified.
[-]: Sources are verified with gpgverify first in %prep if upstream
     publishes signatures.
     Note: gpgverify is not used.
[-]: Description and summary sections in the package spec file contains
     translations for supported Non-English languages, if available.
[x]: %check is present and all tests pass.
[x]: Packages should try to preserve timestamps of original installed
     files.
[x]: Reviewer should test that the package builds in mock.
[x]: Buildroot is not present
[x]: Package has no %clean section with rm -rf %{buildroot} (or
     $RPM_BUILD_ROOT)
[x]: No file requires outside of /etc, /bin, /sbin, /usr/bin, /usr/sbin.
[x]: Fully versioned dependency in subpackages if applicable.
[x]: Packager, Vendor, PreReq, Copyright tags should not be in spec file
[x]: Sources can be downloaded from URI in Source: tag
[x]: SourceX is a working URL.
[x]: Package should compile and build into binary rpms on all supported
     architectures.
[x]: Spec use %global instead of %define unless justified.

===== EXTRA items =====

Generic:
[x]: Rpmlint is run on debuginfo package(s).
     Note: There are rpmlint messages (see attachment).
[x]: Rpmlint is run on all installed packages.
     Note: There are rpmlint messages (see attachment).
[x]: Large data in /usr/share should live in a noarch subpackage if package
     is arched.
[x]: Spec file according to URL is the same as in SRPM.


Rpmlint
-------
Checking: keyring-ima-signer-0.1.0-1.fc34.x86_64.rpm
          keyring-ima-signer-debuginfo-0.1.0-1.fc34.x86_64.rpm
          keyring-ima-signer-debugsource-0.1.0-1.fc34.x86_64.rpm
          keyring-ima-signer-0.1.0-1.fc34.src.rpm
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US inclusding -> including, inclusion
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US xattr -> attract
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US sig -> dig, sign, sing
keyring-ima-signer.x86_64: W: invalid-license EUPL 1.2
keyring-ima-signer.x86_64: W: no-manual-page-for-binary keyring-ima-signer
keyring-ima-signer-debuginfo.x86_64: W: invalid-license EUPL 1.2
keyring-ima-signer-debugsource.x86_64: W: invalid-license EUPL 1.2
keyring-ima-signer.src: W: spelling-error %description -l en_US inclusding -> including, inclusion
keyring-ima-signer.src: W: spelling-error %description -l en_US xattr -> attract
keyring-ima-signer.src: W: spelling-error %description -l en_US sig -> dig, sign, sing
keyring-ima-signer.src: W: invalid-license EUPL 1.2
4 packages and 0 specfiles checked; 0 errors, 11 warnings.




Rpmlint (debuginfo)
-------------------
Checking: keyring-ima-signer-debuginfo-0.1.0-1.fc34.x86_64.rpm
keyring-ima-signer-debuginfo.x86_64: W: invalid-license EUPL 1.2
1 packages and 0 specfiles checked; 0 errors, 1 warnings.





Rpmlint (installed packages)
----------------------------
warning: Found bdb Packages database while attempting sqlite backend: using bdb backend.
warning: Found bdb Packages database while attempting sqlite backend: using bdb backend.
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US inclusding -> including, inclusion
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US xattr -> attract
keyring-ima-signer.x86_64: W: spelling-error %description -l en_US sig -> dig, sign, sing
keyring-ima-signer.x86_64: W: invalid-license EUPL 1.2
keyring-ima-signer.x86_64: W: no-manual-page-for-binary keyring-ima-signer
warning: Found bdb Packages database while attempting sqlite backend: using bdb backend.
keyring-ima-signer-debuginfo.x86_64: W: invalid-license EUPL 1.2
warning: Found bdb Packages database while attempting sqlite backend: using bdb backend.
keyring-ima-signer-debugsource.x86_64: W: invalid-license EUPL 1.2
3 packages and 0 specfiles checked; 0 errors, 7 warnings.



Source checksums
----------------
https://github.com/fedora-iot/keyring-ima-signer//archive/v0.1.0/keyring-ima-signer-0.1.0.tar.gz :
  CHECKSUM(SHA256) this package     : c964952ad24eb13d544dd3a89ccd3857b197a7507f22c2011b443a532cdacf4e
  CHECKSUM(SHA256) upstream package : c964952ad24eb13d544dd3a89ccd3857b197a7507f22c2011b443a532cdacf4e


Requires
--------
keyring-ima-signer (rpmlib, GLIBC filtered):
    ld-linux-x86-64.so.2()(64bit)
    libc.so.6()(64bit)
    libcrypto.so.1.1()(64bit)
    libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)
    libdl.so.2()(64bit)
    libgcc_s.so.1()(64bit)
    libgcc_s.so.1(GCC_3.0)(64bit)
    libgcc_s.so.1(GCC_3.3)(64bit)
    libgcc_s.so.1(GCC_4.2.0)(64bit)
    libpthread.so.0()(64bit)
    libssl.so.1.1()(64bit)
    libssl.so.1.1(OPENSSL_1_1_0)(64bit)
    rtld(GNU_HASH)

keyring-ima-signer-debuginfo (rpmlib, GLIBC filtered):

keyring-ima-signer-debugsource (rpmlib, GLIBC filtered):



Provides
--------
keyring-ima-signer:
    keyring-ima-signer
    keyring-ima-signer(x86-64)

keyring-ima-signer-debuginfo:
    debuginfo(build-id)
    keyring-ima-signer-debuginfo
    keyring-ima-signer-debuginfo(x86-64)

keyring-ima-signer-debugsource:
    keyring-ima-signer-debugsource
    keyring-ima-signer-debugsource(x86-64)



Generated by fedora-review 0.7.6 (b083f91) last change: 2020-11-10
Command line :/usr/bin/fedora-review -b 1908909
Buildroot used: fedora-rawhide-x86_64
Active plugins: Shell-api, Generic
Disabled plugins: R, PHP, Python, Java, fonts, Haskell, C/C++, SugarActivity, Perl, Ruby, Ocaml
Disabled flags: EPEL6, EPEL7, DISTTAG, BATCH, EXARCH

Comment 2 Gwyn Ciesla 2021-01-20 14:01:48 UTC
(fedscm-admin):  The Pagure repository was created at https://src.fedoraproject.org/rpms/keyring-ima-signer

Comment 3 Fedora Update System 2021-01-21 16:51:13 UTC
FEDORA-2021-01d55265cf has been submitted as an update to Fedora 33. https://bodhi.fedoraproject.org/updates/FEDORA-2021-01d55265cf

Comment 4 Fedora Update System 2021-01-22 02:12:50 UTC
FEDORA-2021-01d55265cf has been pushed to the Fedora 33 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf install --enablerepo=updates-testing --advisory=FEDORA-2021-01d55265cf \*`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-01d55265cf

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 5 Fedora Update System 2021-01-30 01:54:20 UTC
FEDORA-2021-01d55265cf has been pushed to the Fedora 33 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.