Skip to content

Integrate seco-base/kirkstone/develop_sign_key

Commit: https://git.seco.com/yocto_ng/seco-base/-/commit/d59cf02d3344ac8d899e685dde8f917fc8da3ee5

[seco-setup] Rework of the RAUC custom keyring

The keyring is no longer directly copied into the recipe but rather split into the CUSTOM_KEYRING and CUSTOM_KEYRING_PATH variables. The CUSTOM_KEYRING_PATH is added as additional search path to the RAUC recipe. From there, the CUSTOM_KEYRING can be included into the image.

--

Commit: https://git.seco.com/yocto_ng/seco-base/-/commit/c120cb415ca686c700bee13b0df4800f18451dcb

[seco-setup] Check for empty signing key/cert path

Don't set the signing_key_path and/or the signing_cert_path in the conf_string if they are empty.

Also see 46bcbc69a09496ae919f3d7c35ea74ff7c6be6f4.

--

Commit: https://git.seco.com/yocto_ng/seco-base/-/commit/41aeed9ee2b9b453697add6ca349e1eb6120841d

[seco-setup] Set custom keyring for RAUC bundles

If the user uses a custom key/cert for the signing of the RAUC bundles, we also include the custom cert as keyring into the resulting image/bundle. The custom cert is used to verify future releases that are applied using the OTA feature.

--

Commit: https://git.seco.com/yocto_ng/seco-base/-/commit/affc7c73173e3c7f29c91b19980399e606002d68

[seco-config] Added config for custom signing key/cert

The key/cert can be used in the creation of custom RAUC bundles.

Merge request reports

Loading