Closed qubesos-bot closed 1 year ago
Package for bookworm was built (build log) and uploaded to current-testing repository
Package for bullseye was built (build log) and uploaded to current-testing repository
Package for dom0 was built (build log) and uploaded to current-testing repository
Package for fc37 was built (build log) and uploaded to current-testing repository
Package for fc38 was built (build log) and uploaded to current-testing repository
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Upload app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 r4.1 current repo -----BEGIN PGP SIGNATURE-----
iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmUSNhMgHG1hcm1hcmVr QGludmlzaWJsZXRoaW5nc2xhYi5jb20ACgkQhG1rcJxuLn/ftA//TIMCE4mKVIJz xShhk2vP9oRSbDgrWchWKciCLGavy3EJZTiPICubp5o1evw/yW21tMTOnZdkeCxx 6dkFeKkopbMnFE4HJtL2qxIoLrQIIB60A3dTFE0xRYlmR8cz8Q5FNMhu9+/chNp6 ZTgMDAuPbtZjz2wYQJhhkwcWbgwZnQ8sgnCCvsYh4bo+0E30PK2myuDJJZpe9Vny QeAG8ewGZuWAlHeLLe/6aNKdRzPm4GSZLUKfIQo227+bFVpHYTstoEBFgIRiCi01 aUIl01U6VVYaXy/LkphxkpkWdPoszeGEw0up+r7d287e/aq93IVo2LhRS3C7TPKe sNvT5RdyZjk0N6VZe7emG514iYysDYrezMtwknLhahP7YfNZyqzR6Y28/xNWJasP dGkRpF7TbQw7N8v9SaPZxK9xnkg7USFtfT4ebLwdZs5MaF+KEE/kCmgbYMZHI00D 285eaTOa4+9K7qctaAhr2GBzjJKxNP1eXhwpKi+10fKMappSw036IqNPX2eF9iAa fW0bmjr20nGD/erP8rQn8n0hqiB4xjtfVL0ZLEwJnZwVxTIGrWbvG8M9cSFX2w/u dqbpGus2trV3xwio7S/7H915igQ2QTtYuUdKb/Idj9OVu9koieUD5Iq/vfiwUTVq hfUHmCLeGVPhwfrQeFm8VWQ5WJzIeHo= =XYx2 -----END PGP SIGNATURE-----
Package for bookworm was uploaded to stable repository
Package for bullseye was uploaded to stable repository
Package for fc37 was uploaded to stable repository
Package for fc38 was uploaded to stable repository
Package for dom0 was uploaded to stable repository
Package for fc39 was built (build log) and uploaded to current-testing repository
Update of app-linux-split-gpg2 to v1.0.0 for Qubes r4.1, see comments below for details.
Built from: https://github.com/QubesOS/qubes-app-linux-split-gpg2/commit/95fb34da0ccc0102d53dabd6399f93cb9e757454
Changes since previous version: QubesOS/qubes-app-linux-split-gpg2@95fb34d version 1.0.0 QubesOS/qubes-app-linux-split-gpg2@3c10ab4 README: Update references to the config location and format QubesOS/qubes-app-linux-split-gpg2@c56ec9c tests: fix loop cleanup QubesOS/qubes-app-linux-split-gpg2@69f47ea Assert that self.source_keyring_dir is set QubesOS/qubes-app-linux-split-gpg2@f3b2657 Fix typo and make code more readable QubesOS/qubes-app-linux-split-gpg2@32bf495 Document source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@33f050d typo: verbose_notifications, not verbose_notification QubesOS/qubes-app-linux-split-gpg2@6d6a565 Expand ~ and ~user in all keyring paths QubesOS/qubes-app-linux-split-gpg2@7063198 Log keyring generation QubesOS/qubes-app-linux-split-gpg2@45d6a1a Update subkey generation docs QubesOS/qubes-app-linux-split-gpg2@870e368 Document subkey vs primary key distinction QubesOS/qubes-app-linux-split-gpg2@2f14962 Add documentation about additional working uses QubesOS/qubes-app-linux-split-gpg2@a8795b6 Editorial fixes to README.md QubesOS/qubes-app-linux-split-gpg2@5554af3 fix pylint warning QubesOS/qubes-app-linux-split-gpg2@fa5e668 Make source_keyring_dir not override isolated_gnupghome_dirs QubesOS/qubes-app-linux-split-gpg2@774a4f4 Add type hints to all attributes and uses slots QubesOS/qubes-app-linux-split-gpg2@2d0376f fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@854f76a Avoid spurious ProtocolError when command filtered QubesOS/qubes-app-linux-split-gpg2@010f8f2 Use MyPy strict mode QubesOS/qubes-app-linux-split-gpg2@a3a5cd0 Try to fix tests in Debian packaging QubesOS/qubes-app-linux-split-gpg2@bbde303 fix mypy errors in tests QubesOS/qubes-app-linux-split-gpg2@73c9769 Fix some pylint errors QubesOS/qubes-app-linux-split-gpg2@592211d Fix some mypy errors QubesOS/qubes-app-linux-split-gpg2@3998300 Refuse to generate keys with unknown algorithms QubesOS/qubes-app-linux-split-gpg2@562cbff Fix importing subkeys into newly created directory QubesOS/qubes-app-linux-split-gpg2@5e94eef Replace auto_keyring_sync by source_keyring_dir QubesOS/qubes-app-linux-split-gpg2@6dc661d tests: Expand generate_key() QubesOS/qubes-app-linux-split-gpg2@04845d2 Revert "Always use a non-default GnuPG home directory" QubesOS/qubes-app-linux-split-gpg2@5ae87b5 Rename auto_sync to auto_keyring_sync QubesOS/qubes-app-linux-split-gpg2@b1c3305 Add auto_sync config option QubesOS/qubes-app-linux-split-gpg2@737cd6c Automatically import secret subkeys by default QubesOS/qubes-app-linux-split-gpg2@1010829 Automatically create GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@8d4fec3 Merge remote-tracking branch 'origin/pr/10' QubesOS/qubes-app-linux-split-gpg2@87f4ccb split-gpg2-client: Fix typo in agent socket path verification QubesOS/qubes-app-linux-split-gpg2@0e1622b Make mypy happy QubesOS/qubes-app-linux-split-gpg2@fcaa952 spec: add BR python3-setuptools QubesOS/qubes-app-linux-split-gpg2@06326e4 Always use a non-default GnuPG home directory QubesOS/qubes-app-linux-split-gpg2@e29878b Set umask to 0077 QubesOS/qubes-app-linux-split-gpg2@d9483b3 Use object-oriented approach to keygrip map QubesOS/qubes-app-linux-split-gpg2@780dcf8 Move configuration to a subdirectory QubesOS/qubes-app-linux-split-gpg2@d26e4e4 Merge remote-tracking branch 'origin/pr/7' QubesOS/qubes-app-linux-split-gpg2@92a94c6 Merge remote-tracking branch 'origin/pr/3' QubesOS/qubes-app-linux-split-gpg2@1a0d071 Add builderv2 integration QubesOS/qubes-app-linux-split-gpg2@c61e058 Work around gpgconf error-checking bug QubesOS/qubes-app-linux-split-gpg2@9fe54bf Allow GETINFO s2k_count QubesOS/qubes-app-linux-split-gpg2@7ef6ac9 Ignore pinentry-mode options QubesOS/qubes-app-linux-split-gpg2@3e9a221 Improve split-gpg2-client script QubesOS/qubes-app-linux-split-gpg2@b678f83 Support using existing keys for key generation QubesOS/qubes-app-linux-split-gpg2@5f73f22 ci: add mypy job QubesOS/qubes-app-linux-split-gpg2@c6c334a Fix one more mypy issue QubesOS/qubes-app-linux-split-gpg2@c45cc86 Merge remote-tracking branch 'origin/pr/6' into mypy QubesOS/qubes-app-linux-split-gpg2@bc2499a Merge remote-tracking branch 'origin/pr/4' QubesOS/qubes-app-linux-split-gpg2@ac675f7 Fix support for old Python QubesOS/qubes-app-linux-split-gpg2@ed844ed Fix all MyPy errors QubesOS/qubes-app-linux-split-gpg2@ac8cbe8 Warn about unsupported options - easier to spot typos QubesOS/qubes-app-linux-split-gpg2@fedbab9 add some type annotations QubesOS/qubes-app-linux-split-gpg2@cfb7c46 Remove unused variable QubesOS/qubes-app-linux-split-gpg2@05331a5 Use stricter config file QubesOS/qubes-app-linux-split-gpg2@ccb83aa Treat negative autoaccept time as "always allow" QubesOS/qubes-app-linux-split-gpg2@a0494a5 Use new policy format and location QubesOS/qubes-app-linux-split-gpg2@5bf50c0 Improve a comment QubesOS/qubes-app-linux-split-gpg2@b870349 Fix an incorrect regular expression QubesOS/qubes-app-linux-split-gpg2@4f1428f Use explicit base 10 for int() QubesOS/qubes-app-linux-split-gpg2@ceeb8ab Allow an empty passphrase to be specified QubesOS/qubes-app-linux-split-gpg2@190f459 Sanitize KEYPARAM sexp QubesOS/qubes-app-linux-split-gpg2@61a36fd Use EdDSA instead of RSA in tests QubesOS/qubes-app-linux-split-gpg2@496f7b4 Add tests for generating various types of keys QubesOS/qubes-app-linux-split-gpg2@b683863 Sanitize CIPHERTEXT inquires. QubesOS/qubes-app-linux-split-gpg2@0cf439a Use compound assignment QubesOS/qubes-app-linux-split-gpg2@fd6d041 Add function to sanitize integers QubesOS/qubes-app-linux-split-gpg2@1ce87fb Add and use a test runner script QubesOS/qubes-app-linux-split-gpg2@1a1f35b ci: mark source dir as 'safe' QubesOS/qubes-app-linux-split-gpg2@5898c25 tests: set own key as ultimately trusted QubesOS/qubes-app-linux-split-gpg2@4afa28e tests: temporarily skip keygen test QubesOS/qubes-app-linux-split-gpg2@9e99d34 tests: force 'C' locale QubesOS/qubes-app-linux-split-gpg2@84c78e5 Handshake test fix QubesOS/qubes-app-linux-split-gpg2@6074666 Update smartcard mock QubesOS/qubes-app-linux-split-gpg2@ef245e6 Add support for HAVEKEY --list QubesOS/qubes-app-linux-split-gpg2@0b79881 Make pylint happy QubesOS/qubes-app-linux-split-gpg2@d18591c ci: add gitlab-ci config QubesOS/qubes-app-linux-split-gpg2@1ef4623 Drop Travis CI QubesOS/qubes-app-linux-split-gpg2@503ece3 Add integration tests QubesOS/qubes-app-linux-split-gpg2@bd82ba1 deb: split out python3-splitgpg2 QubesOS/qubes-app-linux-split-gpg2@0766933 Include client qube name in the autoaccept flag file QubesOS/qubes-app-linux-split-gpg2@04764dc deb: downgrade debhelper-compat level to 12 QubesOS/qubes-app-linux-split-gpg2@23660be rpm: add missing BR: make QubesOS/qubes-app-linux-split-gpg2@712e4b5 Prevent gpg from starting local agent QubesOS/qubes-app-linux-split-gpg2@a3d7ed7 Fix enabling service on install QubesOS/qubes-app-linux-split-gpg2@cc62d52 client: escape the path passed to #! interpreter from arguments QubesOS/qubes-app-linux-split-gpg2@4d290ed server: Explain why we currently don't validate sexpr content QubesOS/qubes-app-linux-split-gpg2@68843a8 GpgServer.parse_sexpr: Refuse deeply nested sexpr QubesOS/qubes-app-linux-split-gpg2@33929ae GpgServer.parse_sexpr: add type annotation and check QubesOS/qubes-app-linux-split-gpg2@58ee9a3 Validate environment variable values QubesOS/qubes-app-linux-split-gpg2@4a48231 client: Consistently use bash's [[ test command QubesOS/qubes-app-linux-split-gpg2@da6c728 client: check exit status of gpgconf QubesOS/qubes-app-linux-split-gpg2@2a6d455 GpgServer.serialize_sexpr: add type checks QubesOS/qubes-app-linux-split-gpg2@89541b9 GpgServer.parse_sexpr: enforce that the sexpr top level is a list QubesOS/qubes-app-linux-split-gpg2@f982679 systemd: Also conflict with other gpg-agent units QubesOS/qubes-app-linux-split-gpg2@67bd5e8 split-gpg2-client conflicts with gpg-agent.socket QubesOS/qubes-app-linux-split-gpg2@f068546 Run split-gpg2-client as a systemd session service QubesOS/qubes-app-linux-split-gpg2@41d1785 Add a type annotation for cache_nonce_regex QubesOS/qubes-app-linux-split-gpg2@6b9f01f server: Fix remaining calls to GpgServer.abort QubesOS/qubes-app-linux-split-gpg2@577fe17 server: Use stdin/-out instead of bi-directional socket QubesOS/qubes-app-linux-split-gpg2@75d9c33 client: wrap long line QubesOS/qubes-app-linux-split-gpg2@cc2ad97 Don't try to stop an existing agent QubesOS/qubes-app-linux-split-gpg2@471c946 Uncomment type hints QubesOS/qubes-app-linux-split-gpg2@db1e35b client: No old shell style code and fail if socket path is empty QubesOS/qubes-app-linux-split-gpg2@2c07f91 Warn about allowing keygen QubesOS/qubes-app-linux-split-gpg2@e5310cf Give that old debug utility a little bit better name QubesOS/qubes-app-linux-split-gpg2@2f3ac51 Raise debhelper compat level QubesOS/qubes-app-linux-split-gpg2@0485ceb Allow GENKEY --timestamp= QubesOS/qubes-app-linux-split-gpg2@e7008bc Fix typo in GENKEY --no-protection parsing QubesOS/qubes-app-linux-split-gpg2@76ce4c5 Refuse other GENKEY options QubesOS/qubes-app-linux-split-gpg2@c83c990 Ignore cache nonce for GENKEY QubesOS/qubes-app-linux-split-gpg2@8845270 Fix detection of mismatching parenthesis in sexprs QubesOS/qubes-app-linux-split-gpg2@d078861 Don't silently drop multiple top level sexpr literals QubesOS/qubes-app-linux-split-gpg2@5e301dd Fix error type/message for sexpr with invalid end QubesOS/qubes-app-linux-split-gpg2@02e0827 README: Fix line break in copyright notice QubesOS/qubes-app-linux-split-gpg2@9f79f30 README: Link to qubes-builder doc instead of it's repo QubesOS/qubes-app-linux-split-gpg2@e3df0c3 Remove ask for anyvm in qubes-rpc policy QubesOS/qubes-app-linux-split-gpg2@a5e2dd2 README: fix typos, white space and clarify some sections QubesOS/qubes-app-linux-split-gpg2@d40fe07 Update README and example config QubesOS/qubes-app-linux-split-gpg2@eb21011 Makefile.builder: Remove vim modeline QubesOS/qubes-app-linux-split-gpg2@8c558f1 Allow systemwide config and use XDG_CONFIG_HOME QubesOS/qubes-app-linux-split-gpg2@d66d8b7 Always call it split-gpg2 QubesOS/qubes-app-linux-split-gpg2@e92ce27 Sanitize "sexpr" in D (data) inquires QubesOS/qubes-app-linux-split-gpg2@c414eba Do not use SETKEYDESC from client QubesOS/qubes-app-linux-split-gpg2@5c9184b rpm_spec: Depend on new enough gnupg QubesOS/qubes-app-linux-split-gpg2@5445cea Use 'gpg' binary in tests QubesOS/qubes-app-linux-split-gpg2@4cd1800 Fix type "lenght" QubesOS/qubes-app-linux-split-gpg2@26a31bc Fix handling of 'OPTION display' in combination with extra-socket QubesOS/qubes-app-linux-split-gpg2@c28b434 Don't try to kill systemd QubesOS/qubes-app-linux-split-gpg2@df00e52 Update .gitignore QubesOS/qubes-app-linux-split-gpg2@ea40ce3 debian/control: gnupg2 has been renamed to just gnupg QubesOS/qubes-app-linux-split-gpg2@0cf36b0 Add env var for allowing keygen commands QubesOS/qubes-app-linux-split-gpg2@6923569 Update split-gpg2-client.service QubesOS/qubes-app-linux-split-gpg2@8b50aee Cleanup split-gpg2-client QubesOS/qubes-app-linux-split-gpg2@efe8333 Set a timeout on "Do you want"-prompts QubesOS/qubes-app-linux-split-gpg2@0088868 Use 'extra-socket' as defense in depth QubesOS/qubes-app-linux-split-gpg2@142a6db Fake 'SCD SERIALNO openpgp' to fix search for default key QubesOS/qubes-app-linux-split-gpg2@03f9701 Remove obsolete comment about default_options QubesOS/qubes-app-linux-split-gpg2@98928f9 Fix path to example config in README QubesOS/qubes-app-linux-split-gpg2@be59343 Filter HT (0x09, \t) in logged IO QubesOS/qubes-app-linux-split-gpg2@abd35b9 Improve and clarify teardown on errors QubesOS/qubes-app-linux-split-gpg2@30ee61a Fix main QubesOS/qubes-app-linux-split-gpg2@83263ee Cleanup empty comment QubesOS/qubes-app-linux-split-gpg2@db3c8f2 Debian build needs dh-python QubesOS/qubes-app-linux-split-gpg2@872550d Add requirements to README QubesOS/qubes-app-linux-split-gpg2@955514f travis: initial config QubesOS/qubes-app-linux-split-gpg2@75b2589 Add pylint configuration, and few exceptions QubesOS/qubes-app-linux-split-gpg2@d067f4d Refresh packaging, integrate with qubes-builder QubesOS/qubes-app-linux-split-gpg2@1b1023a Add automated tests QubesOS/qubes-app-linux-split-gpg2@ce98ea7 Make I/O logging optional QubesOS/qubes-app-linux-split-gpg2@b11d0fe Optionally allow the client to trigger key generation QubesOS/qubes-app-linux-split-gpg2@862473d Rewrite in Python QubesOS/qubes-app-linux-split-gpg2@173e611 Add short explanaition of key handling to the README QubesOS/qubes-app-linux-split-gpg2@425b30c Fix systemd service name in README QubesOS/qubes-app-linux-split-gpg2@cd3d4b1 Fake the 'putenv' command QubesOS/qubes-app-linux-split-gpg2@11bcce2 Order split-gpg2-client.service after qubes-misc-post.service QubesOS/qubes-app-linux-split-gpg2@3e27c34 don't require .split-gpg2-rc in system service
Referenced issues: QubesOS/qubes-issues#474
If you're release manager, you can issue GPG-inline signed command:
Upload app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 r4.1 current repo
(available 7 days from now)Upload app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 r4.1 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload app-linux-split-gpg2 95fb34da0ccc0102d53dabd6399f93cb9e757454 r4.1 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).