QubesOS / updates-status

Track packages in testing repository
38 stars 5 forks source link

app-linux-split-gpg2 v1.0.0 (r4.2) #3568

Closed qubesos-bot closed 1 year ago

qubesos-bot commented 1 year ago

Update of app-linux-split-gpg2 to v1.0.0 for Qubes r4.2, see comments below for details and build status.

From commit: https://github.com/QubesOS/qubes-app-linux-split-gpg2/commit/95fb34da0ccc0102d53dabd6399f93cb9e757454

Changes since previous version: QubesOS/qubes-app-linux-split-gpg2@95fb34d version 1.0.0 QubesOS/qubes-app-linux-split-gpg2@3c10ab4 README: Update references to the config location and format QubesOS/qubes-app-linux-split-gpg2@c56ec9c tests: fix loop cleanup QubesOS/qubes-app-linux-split-gpg2@69f47ea Assert that self.source_keyring_dir is set QubesOS/qubes-app-linux-split-gpg2@f3b2657 Fix typo and make code more readable QubesOS/qubes-app-linux-split-gpg2@32bf495 Document source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@33f050d typo: verbose_notifications, not verbose_notification QubesOS/qubes-app-linux-split-gpg2@6d6a565 Expand ~ and ~user in all keyring paths QubesOS/qubes-app-linux-split-gpg2@7063198 Log keyring generation QubesOS/qubes-app-linux-split-gpg2@45d6a1a Update subkey generation docs QubesOS/qubes-app-linux-split-gpg2@870e368 Document subkey vs primary key distinction QubesOS/qubes-app-linux-split-gpg2@2f14962 Add documentation about additional working uses QubesOS/qubes-app-linux-split-gpg2@a8795b6 Editorial fixes to README.md QubesOS/qubes-app-linux-split-gpg2@5554af3 fix pylint warning QubesOS/qubes-app-linux-split-gpg2@fa5e668 Make source_keyring_dir not override isolated_gnupghome_dirs QubesOS/qubes-app-linux-split-gpg2@774a4f4 Add type hints to all attributes and uses slots QubesOS/qubes-app-linux-split-gpg2@2d0376f fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@854f76a Avoid spurious ProtocolError when command filtered QubesOS/qubes-app-linux-split-gpg2@010f8f2 Use MyPy strict mode QubesOS/qubes-app-linux-split-gpg2@a3a5cd0 Try to fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@bbde303 fix mypy errors in tests QubesOS/qubes-app-linux-split-gpg2@73c9769 Fix some pylint errors QubesOS/qubes-app-linux-split-gpg2@592211d Fix some mypy errors QubesOS/qubes-app-linux-split-gpg2@3998300 Refuse to generate keys with unknown algorithms QubesOS/qubes-app-linux-split-gpg2@562cbff Fix importing subkeys into newly created directory QubesOS/qubes-app-linux-split-gpg2@5e94eef Replace auto_keyring_sync by source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@6dc661d tests: Expand generate_key() QubesOS/qubes-app-linux-split-gpg2@04845d2 Revert "Always use a non-default GnuPG home directory" QubesOS/qubes-app-linux-split-gpg2@5ae87b5 Rename auto_sync to auto_keyring_sync QubesOS/qubes-app-linux-split-gpg2@b1c3305 Add auto_sync config option QubesOS/qubes-app-linux-split-gpg2@737cd6c Automatically import secret subkeys by default QubesOS/qubes-app-linux-split-gpg2@1010829 Automatically create GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@8d4fec3 Merge remote-tracking branch 'origin/pr/10' QubesOS/qubes-app-linux-split-gpg2@87f4ccb split-gpg2-client: Fix typo in agent socket path verification QubesOS/qubes-app-linux-split-gpg2@0e1622b Make mypy happy QubesOS/qubes-app-linux-split-gpg2@fcaa952 spec: add BR python3-setuptools QubesOS/qubes-app-linux-split-gpg2@06326e4 Always use a non-default GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@e29878b Set umask to 0077 QubesOS/qubes-app-linux-split-gpg2@d9483b3 Use object-oriented approach to keygrip map QubesOS/qubes-app-linux-split-gpg2@780dcf8 Move configuration to a subdirectory QubesOS/qubes-app-linux-split-gpg2@d26e4e4 Merge remote-tracking branch 'origin/pr/7' QubesOS/qubes-app-linux-split-gpg2@92a94c6 Merge remote-tracking branch 'origin/pr/3' QubesOS/qubes-app-linux-split-gpg2@1a0d071 Add builderv2 integration QubesOS/qubes-app-linux-split-gpg2@c61e058 Work around gpgconf error-checking bug QubesOS/qubes-app-linux-split-gpg2@9fe54bf Allow GETINFO s2k_count QubesOS/qubes-app-linux-split-gpg2@7ef6ac9 Ignore pinentry-mode options QubesOS/qubes-app-linux-split-gpg2@3e9a221 Improve split-gpg2-client script QubesOS/qubes-app-linux-split-gpg2@b678f83 Support using existing keys for key generation QubesOS/qubes-app-linux-split-gpg2@5f73f22 ci: add mypy job QubesOS/qubes-app-linux-split-gpg2@c6c334a Fix one more mypy issue QubesOS/qubes-app-linux-split-gpg2@c45cc86 Merge remote-tracking branch 'origin/pr/6' into mypy QubesOS/qubes-app-linux-split-gpg2@bc2499a Merge remote-tracking branch 'origin/pr/4' QubesOS/qubes-app-linux-split-gpg2@ac675f7 Fix support for old Python QubesOS/qubes-app-linux-split-gpg2@ed844ed Fix all MyPy errors QubesOS/qubes-app-linux-split-gpg2@ac8cbe8 Warn about unsupported options - easier to spot typos QubesOS/qubes-app-linux-split-gpg2@fedbab9 add some type annotations QubesOS/qubes-app-linux-split-gpg2@cfb7c46 Remove unused variable QubesOS/qubes-app-linux-split-gpg2@05331a5 Use stricter config file QubesOS/qubes-app-linux-split-gpg2@ccb83aa Treat negative autoaccept time as "always allow" QubesOS/qubes-app-linux-split-gpg2@a0494a5 Use new policy format and location QubesOS/qubes-app-linux-split-gpg2@5bf50c0 Improve a comment QubesOS/qubes-app-linux-split-gpg2@b870349 Fix an incorrect regular expression QubesOS/qubes-app-linux-split-gpg2@4f1428f Use explicit base 10 for int() QubesOS/qubes-app-linux-split-gpg2@ceeb8ab Allow an empty passphrase to be specified QubesOS/qubes-app-linux-split-gpg2@190f459 Sanitize KEYPARAM sexp QubesOS/qubes-app-linux-split-gpg2@61a36fd Use EdDSA instead of RSA in tests QubesOS/qubes-app-linux-split-gpg2@496f7b4 Add tests for generating various types of keys QubesOS/qubes-app-linux-split-gpg2@b683863 Sanitize CIPHERTEXT inquires. QubesOS/qubes-app-linux-split-gpg2@0cf439a Use compound assignment QubesOS/qubes-app-linux-split-gpg2@fd6d041 Add function to sanitize integers QubesOS/qubes-app-linux-split-gpg2@1ce87fb Add and use a test runner script QubesOS/qubes-app-linux-split-gpg2@1a1f35b ci: mark source dir as 'safe' QubesOS/qubes-app-linux-split-gpg2@5898c25 tests: set own key as ultimately trusted QubesOS/qubes-app-linux-split-gpg2@4afa28e tests: temporarily skip keygen test QubesOS/qubes-app-linux-split-gpg2@9e99d34 tests: force 'C' locale QubesOS/qubes-app-linux-split-gpg2@84c78e5 Handshake test fix QubesOS/qubes-app-linux-split-gpg2@6074666 Update smartcard mock QubesOS/qubes-app-linux-split-gpg2@ef245e6 Add support for HAVEKEY --list QubesOS/qubes-app-linux-split-gpg2@0b79881 Make pylint happy QubesOS/qubes-app-linux-split-gpg2@d18591c ci: add gitlab-ci config QubesOS/qubes-app-linux-split-gpg2@1ef4623 Drop Travis CI QubesOS/qubes-app-linux-split-gpg2@503ece3 Add integration tests QubesOS/qubes-app-linux-split-gpg2@bd82ba1 deb: split out python3-splitgpg2 QubesOS/qubes-app-linux-split-gpg2@0766933 Include client qube name in the autoaccept flag file QubesOS/qubes-app-linux-split-gpg2@04764dc deb: downgrade debhelper-compat level to 12 QubesOS/qubes-app-linux-split-gpg2@23660be rpm: add missing BR: make QubesOS/qubes-app-linux-split-gpg2@712e4b5 Prevent gpg from starting local agent QubesOS/qubes-app-linux-split-gpg2@a3d7ed7 Fix enabling service on install QubesOS/qubes-app-linux-split-gpg2@cc62d52 client: escape the path passed to #! interpreter from arguments QubesOS/qubes-app-linux-split-gpg2@4d290ed server: Explain why we currently don't validate sexpr content QubesOS/qubes-app-linux-split-gpg2@68843a8 GpgServer.parse_sexpr: Refuse deeply nested sexpr QubesOS/qubes-app-linux-split-gpg2@33929ae GpgServer.parse_sexpr: add type annotation and check QubesOS/qubes-app-linux-split-gpg2@58ee9a3 Validate environment variable values QubesOS/qubes-app-linux-split-gpg2@4a48231 client: Consistently use bash's [[ test command QubesOS/qubes-app-linux-split-gpg2@da6c728 client: check exit status of gpgconf QubesOS/qubes-app-linux-split-gpg2@2a6d455 GpgServer.serialize_sexpr: add type checks QubesOS/qubes-app-linux-split-gpg2@89541b9 GpgServer.parse_sexpr: enforce that the sexpr top level is a list QubesOS/qubes-app-linux-split-gpg2@f982679 systemd: Also conflict with other gpg-agent units QubesOS/qubes-app-linux-split-gpg2@67bd5e8 split-gpg2-client conflicts with gpg-agent.socket QubesOS/qubes-app-linux-split-gpg2@f068546 Run split-gpg2-client as a systemd session service QubesOS/qubes-app-linux-split-gpg2@41d1785 Add a type annotation for cache_nonce_regex QubesOS/qubes-app-linux-split-gpg2@6b9f01f server: Fix remaining calls to GpgServer.abort QubesOS/qubes-app-linux-split-gpg2@577fe17 server: Use stdin/-out instead of bi-directional socket QubesOS/qubes-app-linux-split-gpg2@75d9c33 client: wrap long line QubesOS/qubes-app-linux-split-gpg2@cc2ad97 Don't try to stop an existing agent QubesOS/qubes-app-linux-split-gpg2@471c946 Uncomment type hints QubesOS/qubes-app-linux-split-gpg2@db1e35b client: No old shell style code and fail if socket path is empty QubesOS/qubes-app-linux-split-gpg2@2c07f91 Warn about allowing keygen QubesOS/qubes-app-linux-split-gpg2@e5310cf Give that old debug utility a little bit better name QubesOS/qubes-app-linux-split-gpg2@2f3ac51 Raise debhelper compat level QubesOS/qubes-app-linux-split-gpg2@0485ceb Allow GENKEY --timestamp= QubesOS/qubes-app-linux-split-gpg2@e7008bc Fix typo in GENKEY --no-protection parsing QubesOS/qubes-app-linux-split-gpg2@76ce4c5 Refuse other GENKEY options QubesOS/qubes-app-linux-split-gpg2@c83c990 Ignore cache nonce for GENKEY QubesOS/qubes-app-linux-split-gpg2@8845270 Fix detection of mismatching parenthesis in sexprs QubesOS/qubes-app-linux-split-gpg2@d078861 Don't silently drop multiple top level sexpr literals QubesOS/qubes-app-linux-split-gpg2@5e301dd Fix error type/message for sexpr with invalid end QubesOS/qubes-app-linux-split-gpg2@02e0827 README: Fix line break in copyright notice QubesOS/qubes-app-linux-split-gpg2@9f79f30 README: Link to qubes-builder doc instead of it's repo QubesOS/qubes-app-linux-split-gpg2@e3df0c3 Remove ask for anyvm in qubes-rpc policy QubesOS/qubes-app-linux-split-gpg2@a5e2dd2 README: fix typos, white space and clarify some sections QubesOS/qubes-app-linux-split-gpg2@d40fe07 Update README and example config QubesOS/qubes-app-linux-split-gpg2@eb21011 Makefile.builder: Remove vim modeline QubesOS/qubes-app-linux-split-gpg2@8c558f1 Allow systemwide config and use XDG_CONFIG_HOME QubesOS/qubes-app-linux-split-gpg2@d66d8b7 Always call it split-gpg2 QubesOS/qubes-app-linux-split-gpg2@e92ce27 Sanitize "sexpr" in D (data) inquires QubesOS/qubes-app-linux-split-gpg2@c414eba Do not use SETKEYDESC from client QubesOS/qubes-app-linux-split-gpg2@5c9184b rpm_spec: Depend on new enough gnupg QubesOS/qubes-app-linux-split-gpg2@5445cea Use 'gpg' binary in tests QubesOS/qubes-app-linux-split-gpg2@4cd1800 Fix type "lenght" QubesOS/qubes-app-linux-split-gpg2@26a31bc Fix handling of 'OPTION display' in combination with extra-socket QubesOS/qubes-app-linux-split-gpg2@c28b434 Don't try to kill systemd QubesOS/qubes-app-linux-split-gpg2@df00e52 Update .gitignore QubesOS/qubes-app-linux-split-gpg2@ea40ce3 debian/control: gnupg2 has been renamed to just gnupg QubesOS/qubes-app-linux-split-gpg2@0cf36b0 Add env var for allowing keygen commands QubesOS/qubes-app-linux-split-gpg2@6923569 Update split-gpg2-client.service QubesOS/qubes-app-linux-split-gpg2@8b50aee Cleanup split-gpg2-client QubesOS/qubes-app-linux-split-gpg2@efe8333 Set a timeout on "Do you want"-prompts QubesOS/qubes-app-linux-split-gpg2@0088868 Use 'extra-socket' as defense in depth QubesOS/qubes-app-linux-split-gpg2@142a6db Fake 'SCD SERIALNO openpgp' to fix search for default key QubesOS/qubes-app-linux-split-gpg2@03f9701 Remove obsolete comment about default_options QubesOS/qubes-app-linux-split-gpg2@98928f9 Fix path to example config in README QubesOS/qubes-app-linux-split-gpg2@be59343 Filter HT (0x09, \t) in logged IO QubesOS/qubes-app-linux-split-gpg2@abd35b9 Improve and clarify teardown on errors QubesOS/qubes-app-linux-split-gpg2@30ee61a Fix main QubesOS/qubes-app-linux-split-gpg2@83263ee Cleanup empty comment QubesOS/qubes-app-linux-split-gpg2@db3c8f2 Debian build needs dh-python QubesOS/qubes-app-linux-split-gpg2@872550d Add requirements to README QubesOS/qubes-app-linux-split-gpg2@955514f travis: initial config QubesOS/qubes-app-linux-split-gpg2@75b2589 Add pylint configuration, and few exceptions QubesOS/qubes-app-linux-split-gpg2@d067f4d Refresh packaging, integrate with qubes-builder QubesOS/qubes-app-linux-split-gpg2@1b1023a Add automated tests QubesOS/qubes-app-linux-split-gpg2@ce98ea7 Make I/O logging optional QubesOS/qubes-app-linux-split-gpg2@b11d0fe Optionally allow the client to trigger key generation QubesOS/qubes-app-linux-split-gpg2@862473d Rewrite in Python QubesOS/qubes-app-linux-split-gpg2@173e611 Add short explanaition of key handling to the README QubesOS/qubes-app-linux-split-gpg2@425b30c Fix systemd service name in README QubesOS/qubes-app-linux-split-gpg2@cd3d4b1 Fake the 'putenv' command QubesOS/qubes-app-linux-split-gpg2@11bcce2 Order split-gpg2-client.service after qubes-misc-post.service QubesOS/qubes-app-linux-split-gpg2@3e27c34 don't require .split-gpg2-rc in system service

Referenced issues: QubesOS/qubes-issues#474

If you're release manager, you can issue GPG-inline signed command:

You can choose subset of distributions like:

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.

marmarek commented 1 year ago

Superseded by #3569