This repository contains a set of tools and scripts to analyze and improve the supply chain security around RPM files and the Open Build Service (OBS). This can be helpful in identifying potentials to improve on security, e.g. by:
- Scanning for unused signature files, that are available upstream, but not yet used during the build process to verify the authenticity of the sources
- Looking for usage of unencrypted transfer channels, e.g. using
http://
, althoughhttps://
is available
It also contains tools to quickly create keyrings, required for verification of authenticity for signed source files.
This script will extract the OpenPGP key IDs that were used to sign the provided file(s) and will try to retrieve them using public keyservers. It minimizes these keys and exports the whole keyring to a file. The resulting keyring file can be used to verify all available sources, e.g. within a RPM spec file.
This script scans the input for any http://
URLs, and checks whether the
appropriate https://
URL is also available. In such a case, it replaces
the URLs transparently. Optionally, it can also take into account whether
the returned resources are actually the same, although this requires to
completely retrieve the URL.
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.