Changes since previous version:
QubesOS/qubes-app-linux-split-gpg2@95fb34d version 1.0.0
QubesOS/qubes-app-linux-split-gpg2@3c10ab4 README: Update references to the config location and format
QubesOS/qubes-app-linux-split-gpg2@c56ec9c tests: fix loop cleanup
QubesOS/qubes-app-linux-split-gpg2@69f47ea Assert that self.source_keyring_dir is set
QubesOS/qubes-app-linux-split-gpg2@f3b2657 Fix typo and make code more readable
QubesOS/qubes-app-linux-split-gpg2@32bf495 Document source_keyring_dir
QubesOS/qubes-app-linux-split-gpg2@33f050d typo: verbose_notifications, not verbose_notification
QubesOS/qubes-app-linux-split-gpg2@6d6a565 Expand ~ and ~user in all keyring paths
QubesOS/qubes-app-linux-split-gpg2@7063198 Log keyring generation
QubesOS/qubes-app-linux-split-gpg2@45d6a1a Update subkey generation docs
QubesOS/qubes-app-linux-split-gpg2@870e368 Document subkey vs primary key distinction
QubesOS/qubes-app-linux-split-gpg2@2f14962 Add documentation about additional working uses
QubesOS/qubes-app-linux-split-gpg2@a8795b6 Editorial fixes to README.md
QubesOS/qubes-app-linux-split-gpg2@5554af3 fix pylint warning
QubesOS/qubes-app-linux-split-gpg2@fa5e668 Make source_keyring_dir not override isolated_gnupghome_dirs
QubesOS/qubes-app-linux-split-gpg2@774a4f4 Add type hints to all attributes and uses slots
QubesOS/qubes-app-linux-split-gpg2@2d0376f fix tests in Debian packaging
QubesOS/qubes-app-linux-split-gpg2@854f76a Avoid spurious ProtocolError when command filtered
QubesOS/qubes-app-linux-split-gpg2@010f8f2 Use MyPy strict mode
QubesOS/qubes-app-linux-split-gpg2@a3a5cd0 Try to fix tests in Debian packaging
QubesOS/qubes-app-linux-split-gpg2@bbde303 fix mypy errors in tests
QubesOS/qubes-app-linux-split-gpg2@73c9769 Fix some pylint errors
QubesOS/qubes-app-linux-split-gpg2@592211d Fix some mypy errors
QubesOS/qubes-app-linux-split-gpg2@3998300 Refuse to generate keys with unknown algorithms
QubesOS/qubes-app-linux-split-gpg2@562cbff Fix importing subkeys into newly created directory
QubesOS/qubes-app-linux-split-gpg2@5e94eef Replace auto_keyring_sync by source_keyring_dir
QubesOS/qubes-app-linux-split-gpg2@6dc661d tests: Expand generate_key()
QubesOS/qubes-app-linux-split-gpg2@04845d2 Revert "Always use a non-default GnuPG home directory"
QubesOS/qubes-app-linux-split-gpg2@5ae87b5 Rename auto_sync to auto_keyring_sync
QubesOS/qubes-app-linux-split-gpg2@b1c3305 Add auto_sync config option
QubesOS/qubes-app-linux-split-gpg2@737cd6c Automatically import secret subkeys by default
QubesOS/qubes-app-linux-split-gpg2@1010829 Automatically create GnuPG home directory
QubesOS/qubes-app-linux-split-gpg2@8d4fec3 Merge remote-tracking branch 'origin/pr/10'
QubesOS/qubes-app-linux-split-gpg2@87f4ccb split-gpg2-client: Fix typo in agent socket path verification
QubesOS/qubes-app-linux-split-gpg2@0e1622b Make mypy happy
QubesOS/qubes-app-linux-split-gpg2@fcaa952 spec: add BR python3-setuptools
QubesOS/qubes-app-linux-split-gpg2@06326e4 Always use a non-default GnuPG home directory
QubesOS/qubes-app-linux-split-gpg2@e29878b Set umask to 0077
QubesOS/qubes-app-linux-split-gpg2@d9483b3 Use object-oriented approach to keygrip map
QubesOS/qubes-app-linux-split-gpg2@780dcf8 Move configuration to a subdirectory
QubesOS/qubes-app-linux-split-gpg2@d26e4e4 Merge remote-tracking branch 'origin/pr/7'
QubesOS/qubes-app-linux-split-gpg2@92a94c6 Merge remote-tracking branch 'origin/pr/3'
QubesOS/qubes-app-linux-split-gpg2@1a0d071 Add builderv2 integration
QubesOS/qubes-app-linux-split-gpg2@c61e058 Work around gpgconf error-checking bug
QubesOS/qubes-app-linux-split-gpg2@9fe54bf Allow GETINFO s2k_count
QubesOS/qubes-app-linux-split-gpg2@7ef6ac9 Ignore pinentry-mode options
QubesOS/qubes-app-linux-split-gpg2@3e9a221 Improve split-gpg2-client script
QubesOS/qubes-app-linux-split-gpg2@b678f83 Support using existing keys for key generation
QubesOS/qubes-app-linux-split-gpg2@5f73f22 ci: add mypy job
QubesOS/qubes-app-linux-split-gpg2@c6c334a Fix one more mypy issue
QubesOS/qubes-app-linux-split-gpg2@c45cc86 Merge remote-tracking branch 'origin/pr/6' into mypy
QubesOS/qubes-app-linux-split-gpg2@bc2499a Merge remote-tracking branch 'origin/pr/4'
QubesOS/qubes-app-linux-split-gpg2@ac675f7 Fix support for old Python
QubesOS/qubes-app-linux-split-gpg2@ed844ed Fix all MyPy errors
QubesOS/qubes-app-linux-split-gpg2@ac8cbe8 Warn about unsupported options - easier to spot typos
QubesOS/qubes-app-linux-split-gpg2@fedbab9 add some type annotations
QubesOS/qubes-app-linux-split-gpg2@cfb7c46 Remove unused variable
QubesOS/qubes-app-linux-split-gpg2@05331a5 Use stricter config file
QubesOS/qubes-app-linux-split-gpg2@ccb83aa Treat negative autoaccept time as "always allow"
QubesOS/qubes-app-linux-split-gpg2@a0494a5 Use new policy format and location
QubesOS/qubes-app-linux-split-gpg2@5bf50c0 Improve a comment
QubesOS/qubes-app-linux-split-gpg2@b870349 Fix an incorrect regular expression
QubesOS/qubes-app-linux-split-gpg2@4f1428f Use explicit base 10 for int()
QubesOS/qubes-app-linux-split-gpg2@ceeb8ab Allow an empty passphrase to be specified
QubesOS/qubes-app-linux-split-gpg2@190f459 Sanitize KEYPARAM sexp
QubesOS/qubes-app-linux-split-gpg2@61a36fd Use EdDSA instead of RSA in tests
QubesOS/qubes-app-linux-split-gpg2@496f7b4 Add tests for generating various types of keys
QubesOS/qubes-app-linux-split-gpg2@b683863 Sanitize CIPHERTEXT inquires.
QubesOS/qubes-app-linux-split-gpg2@0cf439a Use compound assignment
QubesOS/qubes-app-linux-split-gpg2@fd6d041 Add function to sanitize integers
QubesOS/qubes-app-linux-split-gpg2@1ce87fb Add and use a test runner script
QubesOS/qubes-app-linux-split-gpg2@1a1f35b ci: mark source dir as 'safe'
QubesOS/qubes-app-linux-split-gpg2@5898c25 tests: set own key as ultimately trusted
QubesOS/qubes-app-linux-split-gpg2@4afa28e tests: temporarily skip keygen test
QubesOS/qubes-app-linux-split-gpg2@9e99d34 tests: force 'C' locale
QubesOS/qubes-app-linux-split-gpg2@84c78e5 Handshake test fix
QubesOS/qubes-app-linux-split-gpg2@6074666 Update smartcard mock
QubesOS/qubes-app-linux-split-gpg2@ef245e6 Add support for HAVEKEY --list
QubesOS/qubes-app-linux-split-gpg2@0b79881 Make pylint happy
QubesOS/qubes-app-linux-split-gpg2@d18591c ci: add gitlab-ci config
QubesOS/qubes-app-linux-split-gpg2@1ef4623 Drop Travis CI
QubesOS/qubes-app-linux-split-gpg2@503ece3 Add integration tests
QubesOS/qubes-app-linux-split-gpg2@bd82ba1 deb: split out python3-splitgpg2
QubesOS/qubes-app-linux-split-gpg2@0766933 Include client qube name in the autoaccept flag file
QubesOS/qubes-app-linux-split-gpg2@04764dc deb: downgrade debhelper-compat level to 12
QubesOS/qubes-app-linux-split-gpg2@23660be rpm: add missing BR: make
QubesOS/qubes-app-linux-split-gpg2@712e4b5 Prevent gpg from starting local agent
QubesOS/qubes-app-linux-split-gpg2@a3d7ed7 Fix enabling service on install
QubesOS/qubes-app-linux-split-gpg2@cc62d52 client: escape the path passed to #! interpreter from arguments
QubesOS/qubes-app-linux-split-gpg2@4d290ed server: Explain why we currently don't validate sexpr content
QubesOS/qubes-app-linux-split-gpg2@68843a8 GpgServer.parse_sexpr: Refuse deeply nested sexpr
QubesOS/qubes-app-linux-split-gpg2@33929ae GpgServer.parse_sexpr: add type annotation and check
QubesOS/qubes-app-linux-split-gpg2@58ee9a3 Validate environment variable values
QubesOS/qubes-app-linux-split-gpg2@4a48231 client: Consistently use bash's [[ test command
QubesOS/qubes-app-linux-split-gpg2@da6c728 client: check exit status of gpgconf
QubesOS/qubes-app-linux-split-gpg2@2a6d455 GpgServer.serialize_sexpr: add type checks
QubesOS/qubes-app-linux-split-gpg2@89541b9 GpgServer.parse_sexpr: enforce that the sexpr top level is a list
QubesOS/qubes-app-linux-split-gpg2@f982679 systemd: Also conflict with other gpg-agent units
QubesOS/qubes-app-linux-split-gpg2@67bd5e8 split-gpg2-client conflicts with gpg-agent.socket
QubesOS/qubes-app-linux-split-gpg2@f068546 Run split-gpg2-client as a systemd session service
QubesOS/qubes-app-linux-split-gpg2@41d1785 Add a type annotation for cache_nonce_regex
QubesOS/qubes-app-linux-split-gpg2@6b9f01f server: Fix remaining calls to GpgServer.abort
QubesOS/qubes-app-linux-split-gpg2@577fe17 server: Use stdin/-out instead of bi-directional socket
QubesOS/qubes-app-linux-split-gpg2@75d9c33 client: wrap long line
QubesOS/qubes-app-linux-split-gpg2@cc2ad97 Don't try to stop an existing agent
QubesOS/qubes-app-linux-split-gpg2@471c946 Uncomment type hints
QubesOS/qubes-app-linux-split-gpg2@db1e35b client: No old shell style code and fail if socket path is empty
QubesOS/qubes-app-linux-split-gpg2@2c07f91 Warn about allowing keygen
QubesOS/qubes-app-linux-split-gpg2@e5310cf Give that old debug utility a little bit better name
QubesOS/qubes-app-linux-split-gpg2@2f3ac51 Raise debhelper compat level
QubesOS/qubes-app-linux-split-gpg2@0485ceb Allow GENKEY --timestamp=
QubesOS/qubes-app-linux-split-gpg2@e7008bc Fix typo in GENKEY --no-protection parsing
QubesOS/qubes-app-linux-split-gpg2@76ce4c5 Refuse other GENKEY options
QubesOS/qubes-app-linux-split-gpg2@c83c990 Ignore cache nonce for GENKEY
QubesOS/qubes-app-linux-split-gpg2@8845270 Fix detection of mismatching parenthesis in sexprs
QubesOS/qubes-app-linux-split-gpg2@d078861 Don't silently drop multiple top level sexpr literals
QubesOS/qubes-app-linux-split-gpg2@5e301dd Fix error type/message for sexpr with invalid end
QubesOS/qubes-app-linux-split-gpg2@02e0827 README: Fix line break in copyright notice
QubesOS/qubes-app-linux-split-gpg2@9f79f30 README: Link to qubes-builder doc instead of it's repo
QubesOS/qubes-app-linux-split-gpg2@e3df0c3 Remove ask for anyvm in qubes-rpc policy
QubesOS/qubes-app-linux-split-gpg2@a5e2dd2 README: fix typos, white space and clarify some sections
QubesOS/qubes-app-linux-split-gpg2@d40fe07 Update README and example config
QubesOS/qubes-app-linux-split-gpg2@eb21011 Makefile.builder: Remove vim modeline
QubesOS/qubes-app-linux-split-gpg2@8c558f1 Allow systemwide config and use XDG_CONFIG_HOME
QubesOS/qubes-app-linux-split-gpg2@d66d8b7 Always call it split-gpg2
QubesOS/qubes-app-linux-split-gpg2@e92ce27 Sanitize "sexpr" in D (data) inquires
QubesOS/qubes-app-linux-split-gpg2@c414eba Do not use SETKEYDESC from client
QubesOS/qubes-app-linux-split-gpg2@5c9184b rpm_spec: Depend on new enough gnupg
QubesOS/qubes-app-linux-split-gpg2@5445cea Use 'gpg' binary in tests
QubesOS/qubes-app-linux-split-gpg2@4cd1800 Fix type "lenght"
QubesOS/qubes-app-linux-split-gpg2@26a31bc Fix handling of 'OPTION display' in combination with extra-socket
QubesOS/qubes-app-linux-split-gpg2@c28b434 Don't try to kill systemd
QubesOS/qubes-app-linux-split-gpg2@df00e52 Update .gitignore
QubesOS/qubes-app-linux-split-gpg2@ea40ce3 debian/control: gnupg2 has been renamed to just gnupg
QubesOS/qubes-app-linux-split-gpg2@0cf36b0 Add env var for allowing keygen commands
QubesOS/qubes-app-linux-split-gpg2@6923569 Update split-gpg2-client.service
QubesOS/qubes-app-linux-split-gpg2@8b50aee Cleanup split-gpg2-client
QubesOS/qubes-app-linux-split-gpg2@efe8333 Set a timeout on "Do you want"-prompts
QubesOS/qubes-app-linux-split-gpg2@0088868 Use 'extra-socket' as defense in depth
QubesOS/qubes-app-linux-split-gpg2@142a6db Fake 'SCD SERIALNO openpgp' to fix search for default key
QubesOS/qubes-app-linux-split-gpg2@03f9701 Remove obsolete comment about default_options
QubesOS/qubes-app-linux-split-gpg2@98928f9 Fix path to example config in README
QubesOS/qubes-app-linux-split-gpg2@be59343 Filter HT (0x09, \t) in logged IO
QubesOS/qubes-app-linux-split-gpg2@abd35b9 Improve and clarify teardown on errors
QubesOS/qubes-app-linux-split-gpg2@30ee61a Fix main
QubesOS/qubes-app-linux-split-gpg2@83263ee Cleanup empty comment
QubesOS/qubes-app-linux-split-gpg2@db3c8f2 Debian build needs dh-python
QubesOS/qubes-app-linux-split-gpg2@872550d Add requirements to README
QubesOS/qubes-app-linux-split-gpg2@955514f travis: initial config
QubesOS/qubes-app-linux-split-gpg2@75b2589 Add pylint configuration, and few exceptions
QubesOS/qubes-app-linux-split-gpg2@d067f4d Refresh packaging, integrate with qubes-builder
QubesOS/qubes-app-linux-split-gpg2@1b1023a Add automated tests
QubesOS/qubes-app-linux-split-gpg2@ce98ea7 Make I/O logging optional
QubesOS/qubes-app-linux-split-gpg2@b11d0fe Optionally allow the client to trigger key generation
QubesOS/qubes-app-linux-split-gpg2@862473d Rewrite in Python
QubesOS/qubes-app-linux-split-gpg2@173e611 Add short explanaition of key handling to the README
QubesOS/qubes-app-linux-split-gpg2@425b30c Fix systemd service name in README
QubesOS/qubes-app-linux-split-gpg2@cd3d4b1 Fake the 'putenv' command
QubesOS/qubes-app-linux-split-gpg2@11bcce2 Order split-gpg2-client.service after qubes-misc-post.service
QubesOS/qubes-app-linux-split-gpg2@3e27c34 don't require .split-gpg2-rc in system service
Referenced issues:
QubesOS/qubes-issues#474
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current all (available 5 days from now)
Update of app-linux-split-gpg2 to v1.0.0 for Qubes r4.2, see comments below for details and build status.
From commit: https://github.com/QubesOS/qubes-app-linux-split-gpg2/commit/95fb34da0ccc0102d53dabd6399f93cb9e757454
Changes since previous version: QubesOS/qubes-app-linux-split-gpg2@95fb34d version 1.0.0 QubesOS/qubes-app-linux-split-gpg2@3c10ab4 README: Update references to the config location and format QubesOS/qubes-app-linux-split-gpg2@c56ec9c tests: fix loop cleanup QubesOS/qubes-app-linux-split-gpg2@69f47ea Assert that self.source_keyring_dir is set QubesOS/qubes-app-linux-split-gpg2@f3b2657 Fix typo and make code more readable QubesOS/qubes-app-linux-split-gpg2@32bf495 Document source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@33f050d typo: verbose_notifications, not verbose_notification QubesOS/qubes-app-linux-split-gpg2@6d6a565 Expand ~ and ~user in all keyring paths QubesOS/qubes-app-linux-split-gpg2@7063198 Log keyring generation QubesOS/qubes-app-linux-split-gpg2@45d6a1a Update subkey generation docs QubesOS/qubes-app-linux-split-gpg2@870e368 Document subkey vs primary key distinction QubesOS/qubes-app-linux-split-gpg2@2f14962 Add documentation about additional working uses QubesOS/qubes-app-linux-split-gpg2@a8795b6 Editorial fixes to README.md QubesOS/qubes-app-linux-split-gpg2@5554af3 fix pylint warning QubesOS/qubes-app-linux-split-gpg2@fa5e668 Make source_keyring_dir not override isolated_gnupghome_dirs QubesOS/qubes-app-linux-split-gpg2@774a4f4 Add type hints to all attributes and uses slots QubesOS/qubes-app-linux-split-gpg2@2d0376f fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@854f76a Avoid spurious ProtocolError when command filtered QubesOS/qubes-app-linux-split-gpg2@010f8f2 Use MyPy strict mode QubesOS/qubes-app-linux-split-gpg2@a3a5cd0 Try to fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@bbde303 fix mypy errors in tests QubesOS/qubes-app-linux-split-gpg2@73c9769 Fix some pylint errors QubesOS/qubes-app-linux-split-gpg2@592211d Fix some mypy errors QubesOS/qubes-app-linux-split-gpg2@3998300 Refuse to generate keys with unknown algorithms QubesOS/qubes-app-linux-split-gpg2@562cbff Fix importing subkeys into newly created directory QubesOS/qubes-app-linux-split-gpg2@5e94eef Replace auto_keyring_sync by source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@6dc661d tests: Expand generate_key() QubesOS/qubes-app-linux-split-gpg2@04845d2 Revert "Always use a non-default GnuPG home directory" QubesOS/qubes-app-linux-split-gpg2@5ae87b5 Rename auto_sync to auto_keyring_sync QubesOS/qubes-app-linux-split-gpg2@b1c3305 Add auto_sync config option QubesOS/qubes-app-linux-split-gpg2@737cd6c Automatically import secret subkeys by default QubesOS/qubes-app-linux-split-gpg2@1010829 Automatically create GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@8d4fec3 Merge remote-tracking branch 'origin/pr/10' QubesOS/qubes-app-linux-split-gpg2@87f4ccb split-gpg2-client: Fix typo in agent socket path verification QubesOS/qubes-app-linux-split-gpg2@0e1622b Make mypy happy QubesOS/qubes-app-linux-split-gpg2@fcaa952 spec: add BR python3-setuptools QubesOS/qubes-app-linux-split-gpg2@06326e4 Always use a non-default GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@e29878b Set umask to 0077 QubesOS/qubes-app-linux-split-gpg2@d9483b3 Use object-oriented approach to keygrip map QubesOS/qubes-app-linux-split-gpg2@780dcf8 Move configuration to a subdirectory QubesOS/qubes-app-linux-split-gpg2@d26e4e4 Merge remote-tracking branch 'origin/pr/7' QubesOS/qubes-app-linux-split-gpg2@92a94c6 Merge remote-tracking branch 'origin/pr/3' QubesOS/qubes-app-linux-split-gpg2@1a0d071 Add builderv2 integration QubesOS/qubes-app-linux-split-gpg2@c61e058 Work around gpgconf error-checking bug QubesOS/qubes-app-linux-split-gpg2@9fe54bf Allow GETINFO s2k_count QubesOS/qubes-app-linux-split-gpg2@7ef6ac9 Ignore pinentry-mode options QubesOS/qubes-app-linux-split-gpg2@3e9a221 Improve split-gpg2-client script QubesOS/qubes-app-linux-split-gpg2@b678f83 Support using existing keys for key generation QubesOS/qubes-app-linux-split-gpg2@5f73f22 ci: add mypy job QubesOS/qubes-app-linux-split-gpg2@c6c334a Fix one more mypy issue QubesOS/qubes-app-linux-split-gpg2@c45cc86 Merge remote-tracking branch 'origin/pr/6' into mypy QubesOS/qubes-app-linux-split-gpg2@bc2499a Merge remote-tracking branch 'origin/pr/4' QubesOS/qubes-app-linux-split-gpg2@ac675f7 Fix support for old Python QubesOS/qubes-app-linux-split-gpg2@ed844ed Fix all MyPy errors QubesOS/qubes-app-linux-split-gpg2@ac8cbe8 Warn about unsupported options - easier to spot typos QubesOS/qubes-app-linux-split-gpg2@fedbab9 add some type annotations QubesOS/qubes-app-linux-split-gpg2@cfb7c46 Remove unused variable QubesOS/qubes-app-linux-split-gpg2@05331a5 Use stricter config file QubesOS/qubes-app-linux-split-gpg2@ccb83aa Treat negative autoaccept time as "always allow" QubesOS/qubes-app-linux-split-gpg2@a0494a5 Use new policy format and location QubesOS/qubes-app-linux-split-gpg2@5bf50c0 Improve a comment QubesOS/qubes-app-linux-split-gpg2@b870349 Fix an incorrect regular expression QubesOS/qubes-app-linux-split-gpg2@4f1428f Use explicit base 10 for int() QubesOS/qubes-app-linux-split-gpg2@ceeb8ab Allow an empty passphrase to be specified QubesOS/qubes-app-linux-split-gpg2@190f459 Sanitize KEYPARAM sexp QubesOS/qubes-app-linux-split-gpg2@61a36fd Use EdDSA instead of RSA in tests QubesOS/qubes-app-linux-split-gpg2@496f7b4 Add tests for generating various types of keys QubesOS/qubes-app-linux-split-gpg2@b683863 Sanitize CIPHERTEXT inquires. QubesOS/qubes-app-linux-split-gpg2@0cf439a Use compound assignment QubesOS/qubes-app-linux-split-gpg2@fd6d041 Add function to sanitize integers QubesOS/qubes-app-linux-split-gpg2@1ce87fb Add and use a test runner script QubesOS/qubes-app-linux-split-gpg2@1a1f35b ci: mark source dir as 'safe' QubesOS/qubes-app-linux-split-gpg2@5898c25 tests: set own key as ultimately trusted QubesOS/qubes-app-linux-split-gpg2@4afa28e tests: temporarily skip keygen test QubesOS/qubes-app-linux-split-gpg2@9e99d34 tests: force 'C' locale QubesOS/qubes-app-linux-split-gpg2@84c78e5 Handshake test fix QubesOS/qubes-app-linux-split-gpg2@6074666 Update smartcard mock QubesOS/qubes-app-linux-split-gpg2@ef245e6 Add support for HAVEKEY --list QubesOS/qubes-app-linux-split-gpg2@0b79881 Make pylint happy QubesOS/qubes-app-linux-split-gpg2@d18591c ci: add gitlab-ci config QubesOS/qubes-app-linux-split-gpg2@1ef4623 Drop Travis CI QubesOS/qubes-app-linux-split-gpg2@503ece3 Add integration tests QubesOS/qubes-app-linux-split-gpg2@bd82ba1 deb: split out python3-splitgpg2 QubesOS/qubes-app-linux-split-gpg2@0766933 Include client qube name in the autoaccept flag file QubesOS/qubes-app-linux-split-gpg2@04764dc deb: downgrade debhelper-compat level to 12 QubesOS/qubes-app-linux-split-gpg2@23660be rpm: add missing BR: make QubesOS/qubes-app-linux-split-gpg2@712e4b5 Prevent gpg from starting local agent QubesOS/qubes-app-linux-split-gpg2@a3d7ed7 Fix enabling service on install QubesOS/qubes-app-linux-split-gpg2@cc62d52 client: escape the path passed to #! interpreter from arguments QubesOS/qubes-app-linux-split-gpg2@4d290ed server: Explain why we currently don't validate sexpr content QubesOS/qubes-app-linux-split-gpg2@68843a8 GpgServer.parse_sexpr: Refuse deeply nested sexpr QubesOS/qubes-app-linux-split-gpg2@33929ae GpgServer.parse_sexpr: add type annotation and check QubesOS/qubes-app-linux-split-gpg2@58ee9a3 Validate environment variable values QubesOS/qubes-app-linux-split-gpg2@4a48231 client: Consistently use bash's [[ test command QubesOS/qubes-app-linux-split-gpg2@da6c728 client: check exit status of gpgconf QubesOS/qubes-app-linux-split-gpg2@2a6d455 GpgServer.serialize_sexpr: add type checks QubesOS/qubes-app-linux-split-gpg2@89541b9 GpgServer.parse_sexpr: enforce that the sexpr top level is a list QubesOS/qubes-app-linux-split-gpg2@f982679 systemd: Also conflict with other gpg-agent units QubesOS/qubes-app-linux-split-gpg2@67bd5e8 split-gpg2-client conflicts with gpg-agent.socket QubesOS/qubes-app-linux-split-gpg2@f068546 Run split-gpg2-client as a systemd session service QubesOS/qubes-app-linux-split-gpg2@41d1785 Add a type annotation for cache_nonce_regex QubesOS/qubes-app-linux-split-gpg2@6b9f01f server: Fix remaining calls to GpgServer.abort QubesOS/qubes-app-linux-split-gpg2@577fe17 server: Use stdin/-out instead of bi-directional socket QubesOS/qubes-app-linux-split-gpg2@75d9c33 client: wrap long line QubesOS/qubes-app-linux-split-gpg2@cc2ad97 Don't try to stop an existing agent QubesOS/qubes-app-linux-split-gpg2@471c946 Uncomment type hints QubesOS/qubes-app-linux-split-gpg2@db1e35b client: No old shell style code and fail if socket path is empty QubesOS/qubes-app-linux-split-gpg2@2c07f91 Warn about allowing keygen QubesOS/qubes-app-linux-split-gpg2@e5310cf Give that old debug utility a little bit better name QubesOS/qubes-app-linux-split-gpg2@2f3ac51 Raise debhelper compat level QubesOS/qubes-app-linux-split-gpg2@0485ceb Allow GENKEY --timestamp= QubesOS/qubes-app-linux-split-gpg2@e7008bc Fix typo in GENKEY --no-protection parsing QubesOS/qubes-app-linux-split-gpg2@76ce4c5 Refuse other GENKEY options QubesOS/qubes-app-linux-split-gpg2@c83c990 Ignore cache nonce for GENKEY QubesOS/qubes-app-linux-split-gpg2@8845270 Fix detection of mismatching parenthesis in sexprs QubesOS/qubes-app-linux-split-gpg2@d078861 Don't silently drop multiple top level sexpr literals QubesOS/qubes-app-linux-split-gpg2@5e301dd Fix error type/message for sexpr with invalid end QubesOS/qubes-app-linux-split-gpg2@02e0827 README: Fix line break in copyright notice QubesOS/qubes-app-linux-split-gpg2@9f79f30 README: Link to qubes-builder doc instead of it's repo QubesOS/qubes-app-linux-split-gpg2@e3df0c3 Remove ask for anyvm in qubes-rpc policy QubesOS/qubes-app-linux-split-gpg2@a5e2dd2 README: fix typos, white space and clarify some sections QubesOS/qubes-app-linux-split-gpg2@d40fe07 Update README and example config QubesOS/qubes-app-linux-split-gpg2@eb21011 Makefile.builder: Remove vim modeline QubesOS/qubes-app-linux-split-gpg2@8c558f1 Allow systemwide config and use XDG_CONFIG_HOME QubesOS/qubes-app-linux-split-gpg2@d66d8b7 Always call it split-gpg2 QubesOS/qubes-app-linux-split-gpg2@e92ce27 Sanitize "sexpr" in D (data) inquires QubesOS/qubes-app-linux-split-gpg2@c414eba Do not use SETKEYDESC from client QubesOS/qubes-app-linux-split-gpg2@5c9184b rpm_spec: Depend on new enough gnupg QubesOS/qubes-app-linux-split-gpg2@5445cea Use 'gpg' binary in tests QubesOS/qubes-app-linux-split-gpg2@4cd1800 Fix type "lenght" QubesOS/qubes-app-linux-split-gpg2@26a31bc Fix handling of 'OPTION display' in combination with extra-socket QubesOS/qubes-app-linux-split-gpg2@c28b434 Don't try to kill systemd QubesOS/qubes-app-linux-split-gpg2@df00e52 Update .gitignore QubesOS/qubes-app-linux-split-gpg2@ea40ce3 debian/control: gnupg2 has been renamed to just gnupg QubesOS/qubes-app-linux-split-gpg2@0cf36b0 Add env var for allowing keygen commands QubesOS/qubes-app-linux-split-gpg2@6923569 Update split-gpg2-client.service QubesOS/qubes-app-linux-split-gpg2@8b50aee Cleanup split-gpg2-client QubesOS/qubes-app-linux-split-gpg2@efe8333 Set a timeout on "Do you want"-prompts QubesOS/qubes-app-linux-split-gpg2@0088868 Use 'extra-socket' as defense in depth QubesOS/qubes-app-linux-split-gpg2@142a6db Fake 'SCD SERIALNO openpgp' to fix search for default key QubesOS/qubes-app-linux-split-gpg2@03f9701 Remove obsolete comment about default_options QubesOS/qubes-app-linux-split-gpg2@98928f9 Fix path to example config in README QubesOS/qubes-app-linux-split-gpg2@be59343 Filter HT (0x09, \t) in logged IO QubesOS/qubes-app-linux-split-gpg2@abd35b9 Improve and clarify teardown on errors QubesOS/qubes-app-linux-split-gpg2@30ee61a Fix main QubesOS/qubes-app-linux-split-gpg2@83263ee Cleanup empty comment QubesOS/qubes-app-linux-split-gpg2@db3c8f2 Debian build needs dh-python QubesOS/qubes-app-linux-split-gpg2@872550d Add requirements to README QubesOS/qubes-app-linux-split-gpg2@955514f travis: initial config QubesOS/qubes-app-linux-split-gpg2@75b2589 Add pylint configuration, and few exceptions QubesOS/qubes-app-linux-split-gpg2@d067f4d Refresh packaging, integrate with qubes-builder QubesOS/qubes-app-linux-split-gpg2@1b1023a Add automated tests QubesOS/qubes-app-linux-split-gpg2@ce98ea7 Make I/O logging optional QubesOS/qubes-app-linux-split-gpg2@b11d0fe Optionally allow the client to trigger key generation QubesOS/qubes-app-linux-split-gpg2@862473d Rewrite in Python QubesOS/qubes-app-linux-split-gpg2@173e611 Add short explanaition of key handling to the README QubesOS/qubes-app-linux-split-gpg2@425b30c Fix systemd service name in README QubesOS/qubes-app-linux-split-gpg2@cd3d4b1 Fake the 'putenv' command QubesOS/qubes-app-linux-split-gpg2@11bcce2 Order split-gpg2-client.service after qubes-misc-post.service QubesOS/qubes-app-linux-split-gpg2@3e27c34 don't require .split-gpg2-rc in system service
Referenced issues: QubesOS/qubes-issues#474
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current all
(available 5 days from now)Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 security-testing
You can choose subset of distributions like:
Upload-component r4.2 app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.