From 663de86aeaef55b71ee6f5c00514d4ee03ddca31 Mon Sep 17 00:00:00 2001 From: Mikhail Novosyolov Date: Sat, 14 Mar 2020 22:02:48 +0300 Subject: [PATCH] decode future CONFIG_SYSTEM_TRUSTED_KEYS --- kernel.spec | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel.spec b/kernel.spec index 312bca7..3d55915 100644 --- a/kernel.spec +++ b/kernel.spec @@ -915,10 +915,10 @@ find . -name '.get_maintainer.ignore' | %kxargs rm -f # is accessed, but currently I don't know how to implement this (TODO: ). _cleanup(){ # Show resulting kernel public keys for debugging - cat "%{src_dir}/%{certs_dir_rnd}/x509_certificate_list" || : + cat "%{src_dir}/%{certs_dir_rnd}/x509_certificate_list" | base64 -d || : rm -fvr "%{src_dir}/%{certs_dir_rnd}" %if %{with uml} - cat "%{src_dir}.uml/%{certs_dir_rnd}/x509_certificate_list" || : + cat "%{src_dir}.uml/%{certs_dir_rnd}/x509_certificate_list" | base64 -d || : rm -fvr "%{src_dir}.uml/%{certs_dir_rnd}" %endif }