[CentOS-devel] virusscan a RPM file?

Wed Jun 12 19:03:39 UTC 2019
Brian Reichert <reichert at numachi.com>

On Wed, Jun 12, 2019 at 02:16:27AM +0000, Young, Gregory wrote:
> I would suggest, after the build is completed, have clamav scan the sources, as part of the build section of the RPM spec. Once the RPM is built, make sure to GPG sign it and also publish your public key so GPG signature checking can be enabled. In this way, you satisfy the AV scan requirement on the package contents before packaging, and you sign the package during build to help ensure it hasn't been tampered with post build.

You can use 'cpio' to extract the payload of an RPM; e.g.:

  rpm2cpio commons-lang3-3.3.2-1.x86_64.rpm | cpio -idmv

That won't dump out scriptlets, triggers, etc.  That's an additional
set of steps:

  rpm -q --scripts -p commons-lang3-3.3.2-1.x86_64.rpm
  rpm -q --triggers -p commons-lang3-3.3.2-1.x86_64.rpm
  rpm -q --queryformat "%{PRETRANS}" -p commons-lang3-3.3.2-1.x86_64.rpm
  rpm -q --queryformat "%{POSTTRANS}" -p commons-lang3-3.3.2-1.x86_64.rpm

> _______________________________________________
> CentOS-devel mailing list
> CentOS-devel at centos.org
> https://lists.centos.org/mailman/listinfo/centos-devel

-- 
Brian Reichert				<reichert at numachi.com>
BSD admin/developer at large