Skip to content
Discussion options

You must be logged in to vote

No worries, I don't see a reason why we shouldn't help you out. Rather than signing the update with the release key though, I suggest to let our GH runner (which has the production key in its secrets) to build the update file, which will be better for transparency. To do that, prepare a branch with cert.pem checked in the repo (it's gitignored by default, so use git add -f cert.pem), as it's the easiest way to include extra cert in the keyring:

openssl x509 -in "${cert}" -text >> "${TARGET_DIR}/etc/rauc/keyring.pem"

Then I'll push this branch to our repo, check it and run a build from that branch. You…

Replies: 1 comment 3 replies

Comment options

You must be logged in to vote
3 replies
@pepijndevos
Comment options

@sairon
Comment options

@pepijndevos
Comment options

Answer selected by agners
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants