Jenkins 2.235.3: New Linux Repository Signing Keys

    The Jenkins core release automation project has been delivering Jenkins weekly releases since Jenkins 2.232, April 16, 2020. The Linux repositories that deliver the weekly release were updated with new GPG keys with the release of Jenkins 2.232.

    Beginning with Jenkins LTS release 2.235.3, stable repositories will be signed with the same GPG keys that sign the weekly repositories. Administrators of Linux systems must install the new signing keys on their Linux servers before installing Jenkins 2.235.3.

    Debian/Ubuntu

    Update Debian compatible operating systems (Debian, Ubuntu, Linux Mint Debian Edition, etc.) with the command:

    Debian/Ubuntu
    # wget -qO - https://pkg.jenkins.io/debian-stable/jenkins.io.key | apt-key add -

    Red Hat/CentOS

    Update Red Hat compatible operating systems (Red Hat Enterprise Linux, CentOS, Fedora, Oracle Linux, Scientific Linux, etc.) with the command:

    Red Hat/CentOS
    # rpm --import https://pkg.jenkins.io/redhat-stable/jenkins.io.key

    Frequently Asked Questions

    What if I don’t update the repository signing key?

    Updates will be blocked by the operating system package manager (apt, yum, dnf) on operating systems that have not installed the new repository signing key. Sample messages from the operating system may look like:

    Debian/Ubuntu
    Reading package lists... Done
    W: GPG error: https://pkg.jenkins.io/debian-stable binary/ Release:
        The following signatures couldn't be verified because the public key is not available:
            NO_PUBKEY FCEF32E745F2C3D5
    E: The repository 'https://pkg.jenkins.io/debian-stable binary/ Release' is not signed.
    N: Updating from such a repository can't be done securely, and is therefore disabled by default.
    N: See apt-secure(8) manpage for repository creation and user configuration details.
    Red Hat/CentOS
    Downloading packages:
    warning: /var/cache/yum/x86_64/7/jenkins/packages/jenkins-2.235.3-1.1.noarch.rpm:
        Header V4 RSA/SHA512 Signature, key ID 45f2c3d5: NOKEY
    Public key for jenkins-2.235.3-1.1.noarch.rpm is not installed

    Why is the repository signing key being updated?

    The original repository GPG signing key is owned by Kohsuke Kawaguchi. Rather than require that Kohsuke disclose his personal GPG signing key, the core release automation project has used a new repository signing key. The updated GPG repository signing key is used in the weekly repositories and the stable repositories.

    Which operating systems are affected?

    Operating systems that use Debian package management (apt) and operating systems that use Red Hat package management (yum and dnf) need the new repository signing key.

    Other operating systems like Windows, macOS, FreeBSD, OpenBSD, Solaris, and OpenIndiana are not affected.

    Are there other signing changes?

    Yes, there are other signing changes, though they do not need specific action from users.

    The jenkins.war file is signed with a new code signing certificate. The new code signing certificate has been used on weekly releases since April 2020.

    About the Author
    Mark Waite
    Mark Waite

    Mark is the Jenkins Documentation Officer, a long-time Jenkins user and contributor, and maintains the git plugin and the git client plugin. He is active in Jenkins special interest groups including the Docs SIG, Platform SIG, and Advocacy SIG.