-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
app-linux-split-gpg2 v1.0.0 (r4.2) #4038
Comments
Package for vm-fc39 was built (build log). |
Package for vm-fc39 was uploaded to current-testing repository. |
-----BEGIN PGP SIGNED MESSAGE----- Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current all iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmUSK1EgHG1hcm1hcmVr |
Package for vm-centos-stream8 was uploaded to stable repository. |
Package for vm-jammy was uploaded to stable repository. |
Package for vm-bullseye was uploaded to stable repository. |
Package for vm-bookworm was uploaded to stable repository. |
-----BEGIN PGP SIGNED MESSAGE----- Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current all iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmUSNQ4gHG1hcm1hcmVr |
Package for vm-centos-stream8 was uploaded to stable repository. |
Package for vm-bullseye was uploaded to stable repository. |
Package for vm-bookworm was uploaded to stable repository. |
Package for host was uploaded to stable repository. |
Package for vm-fc37 was uploaded to stable repository. |
Package for vm-fc38 was uploaded to stable repository. |
Package for vm-fc39 was uploaded to stable repository. |
Update of app-linux-split-gpg2 to v1.0.0 for Qubes OS r4.2, see comments below for details and build status.
From commit: QubesOS/qubes-app-linux-split-gpg2@95fb34d
Changes since previous version:
QubesOS/qubes-app-linux-split-gpg2@95fb34d version 1.0.0
QubesOS/qubes-app-linux-split-gpg2@3c10ab4 README: Update references to the config location and format
QubesOS/qubes-app-linux-split-gpg2@c56ec9c tests: fix loop cleanup
QubesOS/qubes-app-linux-split-gpg2@69f47ea Assert that self.source_keyring_dir is set
QubesOS/qubes-app-linux-split-gpg2@f3b2657 Fix typo and make code more readable
QubesOS/qubes-app-linux-split-gpg2@32bf495 Document source_keyring_dir
QubesOS/qubes-app-linux-split-gpg2@33f050d typo: verbose_notifications, not verbose_notification
QubesOS/qubes-app-linux-split-gpg2@6d6a565 Expand ~ and ~user in all keyring paths
QubesOS/qubes-app-linux-split-gpg2@7063198 Log keyring generation
QubesOS/qubes-app-linux-split-gpg2@45d6a1a Update subkey generation docs
QubesOS/qubes-app-linux-split-gpg2@870e368 Document subkey vs primary key distinction
QubesOS/qubes-app-linux-split-gpg2@2f14962 Add documentation about additional working uses
QubesOS/qubes-app-linux-split-gpg2@a8795b6 Editorial fixes to README.md
QubesOS/qubes-app-linux-split-gpg2@5554af3 fix pylint warning
QubesOS/qubes-app-linux-split-gpg2@fa5e668 Make source_keyring_dir not override isolated_gnupghome_dirs
QubesOS/qubes-app-linux-split-gpg2@774a4f4 Add type hints to all attributes and uses slots
QubesOS/qubes-app-linux-split-gpg2@2d0376f fix tests in Debian packaging
QubesOS/qubes-app-linux-split-gpg2@854f76a Avoid spurious ProtocolError when command filtered
QubesOS/qubes-app-linux-split-gpg2@010f8f2 Use MyPy strict mode
QubesOS/qubes-app-linux-split-gpg2@a3a5cd0 Try to fix tests in Debian packaging
QubesOS/qubes-app-linux-split-gpg2@bbde303 fix mypy errors in tests
QubesOS/qubes-app-linux-split-gpg2@73c9769 Fix some pylint errors
QubesOS/qubes-app-linux-split-gpg2@592211d Fix some mypy errors
QubesOS/qubes-app-linux-split-gpg2@3998300 Refuse to generate keys with unknown algorithms
QubesOS/qubes-app-linux-split-gpg2@562cbff Fix importing subkeys into newly created directory
QubesOS/qubes-app-linux-split-gpg2@5e94eef Replace auto_keyring_sync by source_keyring_dir
QubesOS/qubes-app-linux-split-gpg2@6dc661d tests: Expand generate_key()
QubesOS/qubes-app-linux-split-gpg2@04845d2 Revert "Always use a non-default GnuPG home directory"
QubesOS/qubes-app-linux-split-gpg2@5ae87b5 Rename auto_sync to auto_keyring_sync
QubesOS/qubes-app-linux-split-gpg2@b1c3305 Add auto_sync config option
QubesOS/qubes-app-linux-split-gpg2@737cd6c Automatically import secret subkeys by default
QubesOS/qubes-app-linux-split-gpg2@1010829 Automatically create GnuPG home directory
QubesOS/qubes-app-linux-split-gpg2@8d4fec3 Merge remote-tracking branch 'origin/pr/10'
QubesOS/qubes-app-linux-split-gpg2@87f4ccb split-gpg2-client: Fix typo in agent socket path verification
QubesOS/qubes-app-linux-split-gpg2@0e1622b Make mypy happy
QubesOS/qubes-app-linux-split-gpg2@fcaa952 spec: add BR python3-setuptools
QubesOS/qubes-app-linux-split-gpg2@06326e4 Always use a non-default GnuPG home directory
QubesOS/qubes-app-linux-split-gpg2@e29878b Set umask to 0077
QubesOS/qubes-app-linux-split-gpg2@d9483b3 Use object-oriented approach to keygrip map
QubesOS/qubes-app-linux-split-gpg2@780dcf8 Move configuration to a subdirectory
QubesOS/qubes-app-linux-split-gpg2@d26e4e4 Merge remote-tracking branch 'origin/pr/7'
QubesOS/qubes-app-linux-split-gpg2@92a94c6 Merge remote-tracking branch 'origin/pr/3'
QubesOS/qubes-app-linux-split-gpg2@1a0d071 Add builderv2 integration
QubesOS/qubes-app-linux-split-gpg2@c61e058 Work around gpgconf error-checking bug
QubesOS/qubes-app-linux-split-gpg2@9fe54bf Allow GETINFO s2k_count
QubesOS/qubes-app-linux-split-gpg2@7ef6ac9 Ignore pinentry-mode options
QubesOS/qubes-app-linux-split-gpg2@3e9a221 Improve split-gpg2-client script
QubesOS/qubes-app-linux-split-gpg2@b678f83 Support using existing keys for key generation
QubesOS/qubes-app-linux-split-gpg2@5f73f22 ci: add mypy job
QubesOS/qubes-app-linux-split-gpg2@c6c334a Fix one more mypy issue
QubesOS/qubes-app-linux-split-gpg2@c45cc86 Merge remote-tracking branch 'origin/pr/6' into mypy
QubesOS/qubes-app-linux-split-gpg2@bc2499a Merge remote-tracking branch 'origin/pr/4'
QubesOS/qubes-app-linux-split-gpg2@ac675f7 Fix support for old Python
QubesOS/qubes-app-linux-split-gpg2@ed844ed Fix all MyPy errors
QubesOS/qubes-app-linux-split-gpg2@ac8cbe8 Warn about unsupported options - easier to spot typos
QubesOS/qubes-app-linux-split-gpg2@fedbab9 add some type annotations
QubesOS/qubes-app-linux-split-gpg2@cfb7c46 Remove unused variable
QubesOS/qubes-app-linux-split-gpg2@05331a5 Use stricter config file
QubesOS/qubes-app-linux-split-gpg2@ccb83aa Treat negative autoaccept time as "always allow"
QubesOS/qubes-app-linux-split-gpg2@a0494a5 Use new policy format and location
QubesOS/qubes-app-linux-split-gpg2@5bf50c0 Improve a comment
QubesOS/qubes-app-linux-split-gpg2@b870349 Fix an incorrect regular expression
QubesOS/qubes-app-linux-split-gpg2@4f1428f Use explicit base 10 for int()
QubesOS/qubes-app-linux-split-gpg2@ceeb8ab Allow an empty passphrase to be specified
QubesOS/qubes-app-linux-split-gpg2@190f459 Sanitize KEYPARAM sexp
QubesOS/qubes-app-linux-split-gpg2@61a36fd Use EdDSA instead of RSA in tests
QubesOS/qubes-app-linux-split-gpg2@496f7b4 Add tests for generating various types of keys
QubesOS/qubes-app-linux-split-gpg2@b683863 Sanitize CIPHERTEXT inquires.
QubesOS/qubes-app-linux-split-gpg2@0cf439a Use compound assignment
QubesOS/qubes-app-linux-split-gpg2@fd6d041 Add function to sanitize integers
QubesOS/qubes-app-linux-split-gpg2@1ce87fb Add and use a test runner script
QubesOS/qubes-app-linux-split-gpg2@1a1f35b ci: mark source dir as 'safe'
QubesOS/qubes-app-linux-split-gpg2@5898c25 tests: set own key as ultimately trusted
QubesOS/qubes-app-linux-split-gpg2@4afa28e tests: temporarily skip keygen test
QubesOS/qubes-app-linux-split-gpg2@9e99d34 tests: force 'C' locale
QubesOS/qubes-app-linux-split-gpg2@84c78e5 Handshake test fix
QubesOS/qubes-app-linux-split-gpg2@6074666 Update smartcard mock
QubesOS/qubes-app-linux-split-gpg2@ef245e6 Add support for HAVEKEY --list
QubesOS/qubes-app-linux-split-gpg2@0b79881 Make pylint happy
QubesOS/qubes-app-linux-split-gpg2@d18591c ci: add gitlab-ci config
QubesOS/qubes-app-linux-split-gpg2@1ef4623 Drop Travis CI
QubesOS/qubes-app-linux-split-gpg2@503ece3 Add integration tests
QubesOS/qubes-app-linux-split-gpg2@bd82ba1 deb: split out python3-splitgpg2
QubesOS/qubes-app-linux-split-gpg2@0766933 Include client qube name in the autoaccept flag file
QubesOS/qubes-app-linux-split-gpg2@04764dc deb: downgrade debhelper-compat level to 12
QubesOS/qubes-app-linux-split-gpg2@23660be rpm: add missing BR: make
QubesOS/qubes-app-linux-split-gpg2@712e4b5 Prevent gpg from starting local agent
QubesOS/qubes-app-linux-split-gpg2@a3d7ed7 Fix enabling service on install
QubesOS/qubes-app-linux-split-gpg2@cc62d52 client: escape the path passed to #! interpreter from arguments
QubesOS/qubes-app-linux-split-gpg2@4d290ed server: Explain why we currently don't validate sexpr content
QubesOS/qubes-app-linux-split-gpg2@68843a8 GpgServer.parse_sexpr: Refuse deeply nested sexpr
QubesOS/qubes-app-linux-split-gpg2@33929ae GpgServer.parse_sexpr: add type annotation and check
QubesOS/qubes-app-linux-split-gpg2@58ee9a3 Validate environment variable values
QubesOS/qubes-app-linux-split-gpg2@4a48231 client: Consistently use bash's [[ test command
QubesOS/qubes-app-linux-split-gpg2@da6c728 client: check exit status of gpgconf
QubesOS/qubes-app-linux-split-gpg2@2a6d455 GpgServer.serialize_sexpr: add type checks
QubesOS/qubes-app-linux-split-gpg2@89541b9 GpgServer.parse_sexpr: enforce that the sexpr top level is a list
QubesOS/qubes-app-linux-split-gpg2@f982679 systemd: Also conflict with other gpg-agent units
QubesOS/qubes-app-linux-split-gpg2@67bd5e8 split-gpg2-client conflicts with gpg-agent.socket
QubesOS/qubes-app-linux-split-gpg2@f068546 Run split-gpg2-client as a systemd session service
QubesOS/qubes-app-linux-split-gpg2@41d1785 Add a type annotation for cache_nonce_regex
QubesOS/qubes-app-linux-split-gpg2@6b9f01f server: Fix remaining calls to GpgServer.abort
QubesOS/qubes-app-linux-split-gpg2@577fe17 server: Use stdin/-out instead of bi-directional socket
QubesOS/qubes-app-linux-split-gpg2@75d9c33 client: wrap long line
QubesOS/qubes-app-linux-split-gpg2@cc2ad97 Don't try to stop an existing agent
QubesOS/qubes-app-linux-split-gpg2@471c946 Uncomment type hints
QubesOS/qubes-app-linux-split-gpg2@db1e35b client: No old shell style code and fail if socket path is empty
QubesOS/qubes-app-linux-split-gpg2@2c07f91 Warn about allowing keygen
QubesOS/qubes-app-linux-split-gpg2@e5310cf Give that old debug utility a little bit better name
QubesOS/qubes-app-linux-split-gpg2@2f3ac51 Raise debhelper compat level
QubesOS/qubes-app-linux-split-gpg2@0485ceb Allow GENKEY --timestamp=
QubesOS/qubes-app-linux-split-gpg2@e7008bc Fix typo in GENKEY --no-protection parsing
QubesOS/qubes-app-linux-split-gpg2@76ce4c5 Refuse other GENKEY options
QubesOS/qubes-app-linux-split-gpg2@c83c990 Ignore cache nonce for GENKEY
QubesOS/qubes-app-linux-split-gpg2@8845270 Fix detection of mismatching parenthesis in sexprs
QubesOS/qubes-app-linux-split-gpg2@d078861 Don't silently drop multiple top level sexpr literals
QubesOS/qubes-app-linux-split-gpg2@5e301dd Fix error type/message for sexpr with invalid end
QubesOS/qubes-app-linux-split-gpg2@02e0827 README: Fix line break in copyright notice
QubesOS/qubes-app-linux-split-gpg2@9f79f30 README: Link to qubes-builder doc instead of it's repo
QubesOS/qubes-app-linux-split-gpg2@e3df0c3 Remove ask for anyvm in qubes-rpc policy
QubesOS/qubes-app-linux-split-gpg2@a5e2dd2 README: fix typos, white space and clarify some sections
QubesOS/qubes-app-linux-split-gpg2@d40fe07 Update README and example config
QubesOS/qubes-app-linux-split-gpg2@eb21011 Makefile.builder: Remove vim modeline
QubesOS/qubes-app-linux-split-gpg2@8c558f1 Allow systemwide config and use XDG_CONFIG_HOME
QubesOS/qubes-app-linux-split-gpg2@d66d8b7 Always call it split-gpg2
QubesOS/qubes-app-linux-split-gpg2@e92ce27 Sanitize "sexpr" in D (data) inquires
QubesOS/qubes-app-linux-split-gpg2@c414eba Do not use SETKEYDESC from client
QubesOS/qubes-app-linux-split-gpg2@5c9184b rpm_spec: Depend on new enough gnupg
QubesOS/qubes-app-linux-split-gpg2@5445cea Use 'gpg' binary in tests
QubesOS/qubes-app-linux-split-gpg2@4cd1800 Fix type "lenght"
QubesOS/qubes-app-linux-split-gpg2@26a31bc Fix handling of 'OPTION display' in combination with extra-socket
QubesOS/qubes-app-linux-split-gpg2@c28b434 Don't try to kill systemd
QubesOS/qubes-app-linux-split-gpg2@df00e52 Update .gitignore
QubesOS/qubes-app-linux-split-gpg2@ea40ce3 debian/control: gnupg2 has been renamed to just gnupg
QubesOS/qubes-app-linux-split-gpg2@0cf36b0 Add env var for allowing keygen commands
QubesOS/qubes-app-linux-split-gpg2@6923569 Update split-gpg2-client.service
QubesOS/qubes-app-linux-split-gpg2@8b50aee Cleanup split-gpg2-client
QubesOS/qubes-app-linux-split-gpg2@efe8333 Set a timeout on "Do you want"-prompts
QubesOS/qubes-app-linux-split-gpg2@0088868 Use 'extra-socket' as defense in depth
QubesOS/qubes-app-linux-split-gpg2@142a6db Fake 'SCD SERIALNO openpgp' to fix search for default key
QubesOS/qubes-app-linux-split-gpg2@03f9701 Remove obsolete comment about default_options
QubesOS/qubes-app-linux-split-gpg2@98928f9 Fix path to example config in README
QubesOS/qubes-app-linux-split-gpg2@be59343 Filter HT (0x09, \t) in logged IO
QubesOS/qubes-app-linux-split-gpg2@abd35b9 Improve and clarify teardown on errors
QubesOS/qubes-app-linux-split-gpg2@30ee61a Fix main
QubesOS/qubes-app-linux-split-gpg2@83263ee Cleanup empty comment
QubesOS/qubes-app-linux-split-gpg2@db3c8f2 Debian build needs dh-python
QubesOS/qubes-app-linux-split-gpg2@872550d Add requirements to README
QubesOS/qubes-app-linux-split-gpg2@955514f travis: initial config
QubesOS/qubes-app-linux-split-gpg2@75b2589 Add pylint configuration, and few exceptions
QubesOS/qubes-app-linux-split-gpg2@d067f4d Refresh packaging, integrate with qubes-builder
QubesOS/qubes-app-linux-split-gpg2@1b1023a Add automated tests
QubesOS/qubes-app-linux-split-gpg2@ce98ea7 Make I/O logging optional
QubesOS/qubes-app-linux-split-gpg2@b11d0fe Optionally allow the client to trigger key generation
QubesOS/qubes-app-linux-split-gpg2@862473d Rewrite in Python
QubesOS/qubes-app-linux-split-gpg2@173e611 Add short explanaition of key handling to the README
QubesOS/qubes-app-linux-split-gpg2@425b30c Fix systemd service name in README
QubesOS/qubes-app-linux-split-gpg2@cd3d4b1 Fake the 'putenv' command
QubesOS/qubes-app-linux-split-gpg2@11bcce2 Order split-gpg2-client.service after qubes-misc-post.service
QubesOS/qubes-app-linux-split-gpg2@3e27c34 don't require .split-gpg2-rc in system service
Referenced issues:
QubesOS/qubes-issues#474
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current all
(available 5 days from now)Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 security-testing all
You can choose subset of distributions like:
Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: