Try taking xcat-dep rpms from https://www.xcat.org/files/xcat/repos/yum/devel/xcat-dep/rh9/ Those were rebuild last December with SHA256 signatures.
From: Scott W Groel <sgr...@clemson.edu> Sent: Tuesday, July 25, 2023 3:32 PM To: xcat-user@lists.sourceforge.net Subject: [EXTERNAL] [xcat-user] Installing with FIPS Mode Enabled Running into a bit of an issue installing xcat on a machine with FIPS mode enabled. I am seeing some issues with signing on RPMs in the XCAT repos. These look to be the affected packages: Error: Transaction test error: package perl-Net-HTTPS-NB-0. 14-2. noarch ZjQcmQRYFpfptBannerStart This Message Is From an External Sender This message came from outside your organization. Report Suspicious <https://us-phishalarm-ewt.proofpoint.com/EWT/v1/PjiDSg!1e-ublFzRvmadYv7uKFFzm2_TqytAmw3KWf-KOPz-P-s4pAS1aoqdT3-nxSRbmBnTFcWoddQaTvz9L7XDgHHpuP1Z8GCyN0AeQiFxSmtOdV3FJ1zp1Mpsw0p5wR_77uSxCgzU3TisCM$> ZjQcmQRYFpfptBannerEnd Running into a bit of an issue installing xcat on a machine with FIPS mode enabled. I am seeing some issues with signing on RPMs in the XCAT repos. These look to be the affected packages: Error: Transaction test error: package perl-Net-HTTPS-NB-0.14-2.noarch does not verify: no digest package xCAT-genesis-base-x86_64-2:2.14.5-snap201811190037.noarch does not verify: no digest package syslinux-xcat-3.86-2.noarch does not verify: no digest package grub2-xcat-2.02-0.76.el7.1.snap201905160255.noarch does not verify: no digest package elilo-xcat-3.14-6.noarch does not verify: no digest package yaboot-xcat-1.3.17-rc1.noarch does not verify: no digest Looks like some signatures are missing: rpm --checksig -v perl-Net-HTTPS-NB-0.14-2.noarch.rpm perl-Net-HTTPS-NB-0.14-2.noarch.rpm: Header V4 RSA/SHA1 Signature, key ID ca548a47: OK Header SHA1 digest: OK Payload SHA256 digest: NOTFOUND V4 RSA/SHA1 Signature, key ID ca548a47: OK MD5 digest: NOTFOUND Here is what we expect to see: rpm --checksig -v xCAT-openbmc-py-2.16.5-snap202303030907.noarch.rpm xCAT-openbmc-py-2.16.5-snap202303030907.noarch.rpm: Header V4 RSA/SHA256 Signature, key ID ca548a47: OK Header SHA256 digest: OK Header SHA1 digest: OK Payload SHA256 digest: OK V4 RSA/SHA256 Signature, key ID ca548a47: OK I can use some DNF flags to get around this, but I don’t believe that is the ideal solution… Could these packages be rebuilt to include the proper digests? Thanks, Scott Groel Clemson University Executive Director – Research Computing and Data Infrastructure Email: sgr...@clemson.edu<mailto:sgr...@clemson.edu> Phone: (864) 656-9235
_______________________________________________ xCAT-user mailing list xCAT-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/xcat-user