Generating the signing keys¶
You can generate the key pair for signing the repository registration file by using the GnuPG tool.
This procedure is intended for users with the role cloud administrator and app developer or ISV.
Procedure¶
-
List the GPG keys by running the following command.
gpg --list-keys gpg --list-secret-keys -
The following commands create a GPG key pair, export the public key
isv_user.puband the private keyisv_user.private. The key pair is protected by using the passphraseover-the-lazy-dog. Ifisv_useris listed when you run thegpg --list-keyscommand, then you must use another name.The "export keyName=isv_user" and "Name-Real: isv_user" must be unique. You cannot use the same keys to sign multiple images. You should not have multiple keys with same username, also you should not have multiple images singed with same key in a Secure Service Container.export keyName=isv_user export passphrase=over-the-lazy-dog cat >isv_definition_keys <<EOF %echo Generating registration definition key Key-Type: RSA Key-Length: 4096 Subkey-Type: RSA Subkey-Length: 4096 Name-Real: isv_user Expire-Date: 0 Passphrase: over-the-lazy-dog # Do a commit here, so that we can later print "done" :-) %commit %echo done EOF gpg -a --batch --generate-key isv_definition_keys gpg --armor --pinentry-mode=loopback --passphrase ${passphrase} --export-secret-keys ${keyName} > ${keyName}.private gpg --armor --export ${keyName} > ${keyName}.pub -
Copy the generated key pair
isv_user.pubandisv_user.privateto the<$HOME/hpvs>/configdirectory on your x86 or Linux on IBM Z/LinuxONE (i.e., s390x architecture) management server.