tycho-gpg-bump:sign-p2-artifacts

Full name:

org.eclipse.tycho:tycho-gpg-plugin:5.0.0-SNAPSHOT:sign-p2-artifacts

Description:

Modifies the p2 metadata (artifacts.xml) to add a PGP signature to each included artifact. A signature is added as a pgp.signatures property on the artifact metadata, in armored form; and the public key of the signer is optionally added as a pgp.publicKeys property on the repository metadata, in armored form, and/or optionally added as a pgp.publicKeys property on the artifact metadata, in armored form.
See also: Using PGP signatures in p2

Attributes:

  • Requires a Maven project to be executed.
  • The goal is not marked as thread-safe and thus does not support parallel builds.
  • Binds by default to the lifecycle phase: prepare-package.

Optional Parameters

Name Type Since Description
<addPublicKeyToArtifacts> boolean - Configure to true to add the public key of the signature to each signed artifact's metadata.
Default: true
Alias: addPublicKeysToArtifacts
<addPublicKeyToRepo> boolean - Configure to true to add the public key of each signature to the repository's metadata.
Default: true
<agentSocketLocations> String 3.2.0 BC Signer only: The comma separate list of Unix Domain Socket paths, to use to communicate with GnuPG agent. If relative, they are resolved against user home directory.
Default: .gnupg/S.gpg-agent
User Property: gpg.agentSocketLocations
<bestPractices> boolean 3.2.0 Switch to improve plugin enforcement of "best practices". If set to false, plugin retains all the backward compatibility regarding getting secrets (but will warn). If set to true, plugin will fail if any "bad practices" regarding sensitive data handling are detected. By default, plugin remains backward compatible (this flag is false). Somewhere in the future, when this parameter enabling transitioning from older plugin versions is removed, the logic using this flag will be modified like it is set to true. It is warmly advised to configure this parameter to true and migrate project and user environment regarding how sensitive information is stored.
Default: false
User Property: gpg.bestPractices
<defaultKeyring> boolean 1.2 GPG Signer only: Whether to add the default keyrings from gpg's home directory to the list of used keyrings.
Default: true
User Property: gpg.defaultKeyring
<executable> String 1.1 GPG Signer only: The path to the GnuPG executable to use for artifact signing. Defaults to either "gpg" or "gpg.exe" depending on the operating system.
User Property: gpg.executable
<forceSignature> List<String> - Configured to specify artifacts that should be signed independently of other settings, e.g., skipIfJarsigned, skipIfJarsignedAndAnchored, and skipBinaries.
<gpgArguments> List<String> 1.5 GPG Signer only: Sets the arguments to be passed to gpg. Example:
<gpgArguments>
  <arg>--no-random-seed-file</arg>
  <arg>--no-permission-warning</arg>
</gpgArguments>
<homedir> File 1.0 GPG Signer only: The directory from which gpg will load keyrings. If not specified, gpg will use the value configured for its installation, e.g. ~/.gnupg or %APPDATA%/gnupg.
User Property: gpg.homedir
<keyEnvName> String 3.2.0 BC Signer only: The env variable name where the GnuPG key is set. To use BC Signer you must provide GnuPG key, as it does not use GnuPG home directory to extract/find the key (while it does use GnuPG Agent to ask for password in interactive mode). The key should be in TSK format and may be passphrase protected.
Default: MAVEN_GPG_KEY
User Property: gpg.keyEnvName
<keyFilePath> String 3.2.0 BC Signer only: The path of the exported key in TSK format, and may be passphrase protected. If relative, the file is resolved against user home directory.

Note: it is not recommended to have sensitive files checked into SCM repository. Key file should reside on developer workstation, outside of SCM tracked repository. For CI-like use cases you should set the key material as env variable instead.


Default: maven-signing-key.key
User Property: gpg.keyFilePath
<keyFingerprint> String 3.2.0 BC Signer only: The fingerprint of the key to use for signing. If not given, first key in keyring will be used.
User Property: gpg.keyFingerprint
<keyFingerprintEnvName> String 3.2.0 BC Signer only: The env variable name where the GnuPG key fingerprint is set, if the provided keyring contains multiple keys.
Default: MAVEN_GPG_KEY_FINGERPRINT
User Property: gpg.keyFingerprintEnvName
<keyname> String - GPG Signer only: The "name" of the key to sign with. Passed to gpg as --local-user.
User Property: gpg.keyname
<lockMode> String 1.5 GPG Signer only: The lock mode to use when invoking gpg. By default no lock mode will be specified. Valid values are once, multiple and never. The lock mode gets translated into the corresponding --lock-___ command line argument. Improper usage of this option may lead to data and key corruption.
See also: the --lock-options
User Property: gpg.lockMode
<passphrase> String -
Deprecated.
Do not use this configuration, it may leak sensitive information. Rely on gpg-agent or env variables instead.

The passphrase to use when signing. If not given, look up the value under Maven settings using server id at 'passphraseServerKey' configuration. Do not use this parameter, it leaks sensitive data. Passphrase should be provided only via gpg-agent or via env variable. If parameter bestPractices set to true, plugin fails when this parameter is configured.
User Property: gpg.passphrase
<passphraseEnvName> String 3.2.0 The env variable name where the GnuPG passphrase is set. This is the recommended way to pass passphrase for signing in batch mode execution of Maven.
Default: MAVEN_GPG_PASSPHRASE
User Property: gpg.passphraseEnvName
<passphraseServerId> String 1.6
Deprecated.
Do not use this configuration, it may leak sensitive information. Rely on gpg-agent or env variables instead.

Server id to lookup the passphrase under Maven settings. Do not use this parameter, it leaks sensitive data. Passphrase should be provided only via gpg-agent or via env variable. If parameter bestPractices set to true, plugin fails when this parameter is configured. Is programatically defaulted to GPG_PASSPHRASE.
User Property: gpg.passphraseServerId
<pgpKeyBehavior> SignRepositoryArtifactsMojo$PGPKeyBehavior - Configures how to generate PGP signatures for artifacts that already have one or more PGP signatures, skip to generate no new PGP signature, replace to replace the existing signature(s) with a new signature, and merge to add a new signature to any existing signature(s).
Default: skip
<publicKeyring> String 1.2
Deprecated.
Obsolete option since GnuPG 2.1 version.

GPG Signer only: The path to a public keyring to add to the list of keyrings. By default, only the pubring.gpg from gpg's home directory is considered. Use this option (and defaultKeyring if required) to use a different public key. Note: Relative paths are resolved against gpg's home directory, not the project base directory.

NOTE: As of gpg 2.1 this is an obsolete option and ignored. All public keys are stored in the ‘pubring.kbx’ file below the GnuPG home directory.


User Property: gpg.publicKeyring
<repository> File - The repository location.
Default: ${project.build.directory}/repository
<secretKeyring> String 1.2
Deprecated.
Obsolete option since GnuPG 2.1 version.

GPG Signer only: The path to a secret keyring to add to the list of keyrings. By default, only the secring.gpg from gpg's home directory is considered. Use this option (in combination with publicKeyring and defaultKeyring if required) to use a different secret key. Note: Relative paths are resolved against gpg's home directory, not the project base directory.

NOTE: As of gpg 2.1 this is an obsolete option and ignored. All secret keys are stored in the ‘private-keys-v1.d’ directory below the GnuPG home directory.


User Property: gpg.secretKeyring
<secretKeys> File - Configure the Bouncy Castle signer to load the secret keys, stored in armored from, from the specified file. This avoids needing to import the keys into GnuPG's keybox.
User Property: tycho.pgp.signer.bc.secretKeys
<signer> String - Configure the signer used for PGP signing. Currently supported are gpg for launching the native gpg executable, and bc for using Bouncy Castle libraries. The latter is much faster and it can sign in parallel, so is very much faster.
Default: gpg
User Property: tycho.pgp.signer
<skip> boolean - Skip doing the gpg signing.
Default: false
User Property: gpg.skip
<skipBinaries> boolean - Configure to true to generate a PGP signature for binary artifacts.
Default: true
<skipIfJarsigned> boolean - Configure to true to generate PGP signature only for artifacts that are not signed by a jarsigner.
Default: true
<skipIfJarsignedAndAnchored> boolean - Configure to true to generate a PGP signature only for artifacts that do not contain a signature that's anchored in Java's trust store, i.e., anchored in the JDK's cacerts. A JCA certificate, for example, is never anchored.
Default: true
<terminatePassphrase> boolean 3.2.7 Whether to terminate the passphrase with LF character or not, as on some systems and some GPG executable combinations lack of trailing LF may cause GPG to not detect passphrase on STDIN. Since 3.2.0 it was always appended, unless passphrase itself ended with it. Note: before 3.2.7 the "line separator" was used for termination, that on other hand caused issues on Windows, where line separator is CRLF while GPG handles LF only. This parameter affects ONLY the GPG signer, not the BC signer.

By default, this parameter is true.


See also: MGPG-99, MGPG-136
Default: true
User Property: gpg.terminatePassphrase
<useAgent> boolean - All signers: whether gpg-agent is allowed to be used or not. If enabled, passphrase is optional, as agent may provide it. Have to be noted, that in "batch" mode, gpg-agent will be prevented to pop up pinentry dialogue, hence best is to "prime" the agent caches beforehand.

GPG Signer: Passes --use-agent or --no-use-agent option to gpg if it is version 2.1 or older. Otherwise, will use an agent. In non-interactive mode gpg options are appended with --pinentry-mode error, preventing gpg agent to pop up pinentry dialogue. Agent will be able to hand over only cached passwords.

BC Signer: Allows signer to communicate with gpg agent. In non-interactive mode it uses --no-ask option with the GET_PASSPHRASE function. Agent will be able to hand over only cached passwords.


Default: true
User Property: gpg.useagent

Parameter Details

<addPublicKeyToArtifacts>

Configure to true to add the public key of the signature to each signed artifact's metadata.
  • Type: boolean
  • Required: No
  • Default: true
  • Alias: addPublicKeysToArtifacts

<addPublicKeyToRepo>

Configure to true to add the public key of each signature to the repository's metadata.
  • Type: boolean
  • Required: No
  • Default: true

<agentSocketLocations>

BC Signer only: The comma separate list of Unix Domain Socket paths, to use to communicate with GnuPG agent. If relative, they are resolved against user home directory.
  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.agentSocketLocations
  • Default: .gnupg/S.gpg-agent

<bestPractices>

Switch to improve plugin enforcement of "best practices". If set to false, plugin retains all the backward compatibility regarding getting secrets (but will warn). If set to true, plugin will fail if any "bad practices" regarding sensitive data handling are detected. By default, plugin remains backward compatible (this flag is false). Somewhere in the future, when this parameter enabling transitioning from older plugin versions is removed, the logic using this flag will be modified like it is set to true. It is warmly advised to configure this parameter to true and migrate project and user environment regarding how sensitive information is stored.
  • Type: boolean
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.bestPractices
  • Default: false

<defaultKeyring>

GPG Signer only: Whether to add the default keyrings from gpg's home directory to the list of used keyrings.
  • Type: boolean
  • Since: 1.2
  • Required: No
  • User Property: gpg.defaultKeyring
  • Default: true

<executable>

GPG Signer only: The path to the GnuPG executable to use for artifact signing. Defaults to either "gpg" or "gpg.exe" depending on the operating system.
  • Type: java.lang.String
  • Since: 1.1
  • Required: No
  • User Property: gpg.executable

<forceSignature>

Configured to specify artifacts that should be signed independently of other settings, e.g., skipIfJarsigned, skipIfJarsignedAndAnchored, and skipBinaries.
  • Type: java.util.List<java.lang.String>
  • Required: No

<gpgArguments>

GPG Signer only: Sets the arguments to be passed to gpg. Example:
<gpgArguments>
  <arg>--no-random-seed-file</arg>
  <arg>--no-permission-warning</arg>
</gpgArguments>
  • Type: java.util.List<java.lang.String>
  • Since: 1.5
  • Required: No

<homedir>

GPG Signer only: The directory from which gpg will load keyrings. If not specified, gpg will use the value configured for its installation, e.g. ~/.gnupg or %APPDATA%/gnupg.
  • Type: java.io.File
  • Since: 1.0
  • Required: No
  • User Property: gpg.homedir

<keyEnvName>

BC Signer only: The env variable name where the GnuPG key is set. To use BC Signer you must provide GnuPG key, as it does not use GnuPG home directory to extract/find the key (while it does use GnuPG Agent to ask for password in interactive mode). The key should be in TSK format and may be passphrase protected.
  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.keyEnvName
  • Default: MAVEN_GPG_KEY

<keyFilePath>

BC Signer only: The path of the exported key in TSK format, and may be passphrase protected. If relative, the file is resolved against user home directory.

Note: it is not recommended to have sensitive files checked into SCM repository. Key file should reside on developer workstation, outside of SCM tracked repository. For CI-like use cases you should set the key material as env variable instead.

  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.keyFilePath
  • Default: maven-signing-key.key

<keyFingerprint>

BC Signer only: The fingerprint of the key to use for signing. If not given, first key in keyring will be used.
  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.keyFingerprint

<keyFingerprintEnvName>

BC Signer only: The env variable name where the GnuPG key fingerprint is set, if the provided keyring contains multiple keys.
  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.keyFingerprintEnvName
  • Default: MAVEN_GPG_KEY_FINGERPRINT

<keyname>

GPG Signer only: The "name" of the key to sign with. Passed to gpg as --local-user.
  • Type: java.lang.String
  • Required: No
  • User Property: gpg.keyname

<lockMode>

GPG Signer only: The lock mode to use when invoking gpg. By default no lock mode will be specified. Valid values are once, multiple and never. The lock mode gets translated into the corresponding --lock-___ command line argument. Improper usage of this option may lead to data and key corruption.
See also: the --lock-options
  • Type: java.lang.String
  • Since: 1.5
  • Required: No
  • User Property: gpg.lockMode

<passphrase>

Deprecated.
Do not use this configuration, it may leak sensitive information. Rely on gpg-agent or env variables instead.

The passphrase to use when signing. If not given, look up the value under Maven settings using server id at 'passphraseServerKey' configuration. Do not use this parameter, it leaks sensitive data. Passphrase should be provided only via gpg-agent or via env variable. If parameter bestPractices set to true, plugin fails when this parameter is configured.
  • Type: java.lang.String
  • Required: No
  • User Property: gpg.passphrase

<passphraseEnvName>

The env variable name where the GnuPG passphrase is set. This is the recommended way to pass passphrase for signing in batch mode execution of Maven.
  • Type: java.lang.String
  • Since: 3.2.0
  • Required: No
  • User Property: gpg.passphraseEnvName
  • Default: MAVEN_GPG_PASSPHRASE

<passphraseServerId>

Deprecated.
Do not use this configuration, it may leak sensitive information. Rely on gpg-agent or env variables instead.

Server id to lookup the passphrase under Maven settings. Do not use this parameter, it leaks sensitive data. Passphrase should be provided only via gpg-agent or via env variable. If parameter bestPractices set to true, plugin fails when this parameter is configured. Is programatically defaulted to GPG_PASSPHRASE.
  • Type: java.lang.String
  • Since: 1.6
  • Required: No
  • User Property: gpg.passphraseServerId

<pgpKeyBehavior>

Configures how to generate PGP signatures for artifacts that already have one or more PGP signatures, skip to generate no new PGP signature, replace to replace the existing signature(s) with a new signature, and merge to add a new signature to any existing signature(s).
  • Type: org.eclipse.tycho.gpg.SignRepositoryArtifactsMojo$PGPKeyBehavior
  • Required: No
  • Default: skip

<publicKeyring>

Deprecated.
Obsolete option since GnuPG 2.1 version.

GPG Signer only: The path to a public keyring to add to the list of keyrings. By default, only the pubring.gpg from gpg's home directory is considered. Use this option (and defaultKeyring if required) to use a different public key. Note: Relative paths are resolved against gpg's home directory, not the project base directory.

NOTE: As of gpg 2.1 this is an obsolete option and ignored. All public keys are stored in the ‘pubring.kbx’ file below the GnuPG home directory.

  • Type: java.lang.String
  • Since: 1.2
  • Required: No
  • User Property: gpg.publicKeyring

<repository>

The repository location.
  • Type: java.io.File
  • Required: No
  • Default: ${project.build.directory}/repository

<secretKeyring>

Deprecated.
Obsolete option since GnuPG 2.1 version.

GPG Signer only: The path to a secret keyring to add to the list of keyrings. By default, only the secring.gpg from gpg's home directory is considered. Use this option (in combination with publicKeyring and defaultKeyring if required) to use a different secret key. Note: Relative paths are resolved against gpg's home directory, not the project base directory.

NOTE: As of gpg 2.1 this is an obsolete option and ignored. All secret keys are stored in the ‘private-keys-v1.d’ directory below the GnuPG home directory.

  • Type: java.lang.String
  • Since: 1.2
  • Required: No
  • User Property: gpg.secretKeyring

<secretKeys>

Configure the Bouncy Castle signer to load the secret keys, stored in armored from, from the specified file. This avoids needing to import the keys into GnuPG's keybox.
  • Type: java.io.File
  • Required: No
  • User Property: tycho.pgp.signer.bc.secretKeys

<signer>

Configure the signer used for PGP signing. Currently supported are gpg for launching the native gpg executable, and bc for using Bouncy Castle libraries. The latter is much faster and it can sign in parallel, so is very much faster.
  • Type: java.lang.String
  • Required: No
  • User Property: tycho.pgp.signer
  • Default: gpg

<skip>

Skip doing the gpg signing.
  • Type: boolean
  • Required: No
  • User Property: gpg.skip
  • Default: false

<skipBinaries>

Configure to true to generate a PGP signature for binary artifacts.
  • Type: boolean
  • Required: No
  • Default: true

<skipIfJarsigned>

Configure to true to generate PGP signature only for artifacts that are not signed by a jarsigner.
  • Type: boolean
  • Required: No
  • Default: true

<skipIfJarsignedAndAnchored>

Configure to true to generate a PGP signature only for artifacts that do not contain a signature that's anchored in Java's trust store, i.e., anchored in the JDK's cacerts. A JCA certificate, for example, is never anchored.
  • Type: boolean
  • Required: No
  • Default: true

<terminatePassphrase>

Whether to terminate the passphrase with LF character or not, as on some systems and some GPG executable combinations lack of trailing LF may cause GPG to not detect passphrase on STDIN. Since 3.2.0 it was always appended, unless passphrase itself ended with it. Note: before 3.2.7 the "line separator" was used for termination, that on other hand caused issues on Windows, where line separator is CRLF while GPG handles LF only. This parameter affects ONLY the GPG signer, not the BC signer.

By default, this parameter is true.


See also: MGPG-99, MGPG-136
  • Type: boolean
  • Since: 3.2.7
  • Required: No
  • User Property: gpg.terminatePassphrase
  • Default: true

<useAgent>

All signers: whether gpg-agent is allowed to be used or not. If enabled, passphrase is optional, as agent may provide it. Have to be noted, that in "batch" mode, gpg-agent will be prevented to pop up pinentry dialogue, hence best is to "prime" the agent caches beforehand.

GPG Signer: Passes --use-agent or --no-use-agent option to gpg if it is version 2.1 or older. Otherwise, will use an agent. In non-interactive mode gpg options are appended with --pinentry-mode error, preventing gpg agent to pop up pinentry dialogue. Agent will be able to hand over only cached passwords.

BC Signer: Allows signer to communicate with gpg agent. In non-interactive mode it uses --no-ask option with the GET_PASSPHRASE function. Agent will be able to hand over only cached passwords.

  • Type: boolean
  • Required: No
  • User Property: gpg.useagent
  • Default: true