-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3.0.1 is not signed/ can not be packaged #45
Comments
I believe v3.0.0 has a different signature key, due to the same reason as provided in the linked issues. |
Thanks for the clarification! As soon as access to the signing key is established again, it would be great to add your key id as an additional valid signing key to the README in a signed commit (using the former key) to the respective repositories, so that the bus factor != 1 and downstreams can add this key as well. :) |
I will do that! And I will work with @Harmon758 on setting up CI to gain the capability of signing and deploying tags automatically. |
@dvzrv I have just released v3.0.2, which should be signed with the key you have been seeing so far. Right now I still don't have the means to establish a chain of trust, but that should become possible in May, which is when I hope we can help our CI to package valid releases automatically. CC @Harmon758 |
Never mind the above, I used the wrong key. |
Version 3.0.4 was just released and it should be signed with 2CF6E0B51AAF73F09B1C21174D1DA68C88710E60 . |
@Byron it seems your public key is invalid since last July (also the one I can get from github):
|
That's interesting - to me this looks very different. Is there confusion between creation and expiry date?
|
Argh, you are right (seems it got too late yesterday). I was fooled by the build system, which complained about an invalid key, but that was actually due to a different key from before being used for the tarball signature. I actually wanted to refer to the Currently there is no signature available, that indicates this:
Digging around further, I remembered this ticket for gitpython, where you explained the hardware failure.
While I understand the desire for automation, it is not feasible or secure to do PGP signing on a remote machine. |
Switch to current signing key in use by upstream. gitpython-developers/smmap#45 Analoguous to python-gitpython a hardware failure forced the use of a new key: gitpython-developers/GitPython#1055 git-svn-id: file:///srv/repos/svn-community/svn@829687 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Switch to current signing key in use by upstream. gitpython-developers/smmap#45 Analoguous to python-gitpython a hardware failure forced the use of a new key: gitpython-developers/GitPython#1055 git-svn-id: file:///srv/repos/svn-community/svn@829687 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Would 119cc41 suffice? |
It's not very visible but I guess it'll do. In the README it would be more accessible right away. It should be enough to specify the current (and/or previous) key ids used for tarball signing. |
I'll defer to @Byron for that then. |
Since @dvzrv is OK with this, I think it's sufficient to go with a changelog note, knowing that smmap will definitely cease to exist as standalone crate to ease future maintenance. Version v4.0 was just released on pypi: https://pypi.org/project/smmap/4.0.0/ |
Hi! I'm packaging python-smmap for Arch Linux.
When trying to build 3.0.1 I noticed that there is no detached PGP signature for the tarball on pypi.
As we have established
2CF6E0B51AAF73F09B1C21174D1DA68C88710E60
as a valid signing key (per TOFU), I can not package version 3.0.1, until this is resolved.Due to a missing USB dongle (?), both gitpython and gitdb now have a broken chain of trust for their PGP signatures as well.
It would be really great to resolve this.
The text was updated successfully, but these errors were encountered: