- 26 Apr, 2021 1 commit
-
-
David Runge authored
update-keys: Add SPDX license identifier for GPL-3.0-or-later.
-
- 29 Jun, 2020 1 commit
-
-
Christian Hesse authored
We need web of trust to download the master key signatures... So enable it.
-
- 11 Oct, 2019 1 commit
-
-
Christian Hesse authored
-
- 07 Oct, 2019 2 commits
-
-
Christian Hesse authored
... containing username and keyid
-
Christian Hesse authored
-
- 06 Aug, 2019 6 commits
-
-
Christian Hesse authored
-
Using popd at the very end of a shell script is unnecessary, because, as the very last command, there is nothing to restore state for. Immediately after, the shell subprocess is ended, and processes don't control the cwd of the parent process. Changing the cwd for the last microsecond of the shell process, during which no commands are run, is a mildly expensive no-op. By the same measure, if popd is never used, pushd is not needed to record the old cwd. So simply use 'cd'. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
This option only affects --export, and we always use armored keys. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
This has the same effect, but causes only the exported version of the key to be cleaned. Cleaning the internal copy doesn't matter. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
It is easier than passing around a dozen options on the command line. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
Embedding quotes in a string doesn't work, it just causes KEYSERVER to not be quoted at all. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
- 23 Jan, 2019 3 commits
-
-
Christian Hesse authored
-
Christian Hesse authored
* use --refresh-keys if key is available, not --recv-keys * refresh/receive in one go
-
Christian Hesse authored
This makes sure we do not loose signatures depending on key server used.
-
- 19 Oct, 2017 1 commit
-
-
Christian Hesse authored
Intermittent errors (due to broker network connectivity, key server failure, whatever ...) could result in an incomplete keyring. So exit immediately on error.
-
- 17 Oct, 2017 3 commits
-
-
Christian Hesse authored
-
Christian Hesse authored
We need the key and most recent self signature. Signed-off-by:
Christian Hesse <mail@eworm.de>
-
Christian Hesse authored
There's no need to have images in pacman keyring... Signed-off-by:
Christian Hesse <mail@eworm.de>
-
- 20 Mar, 2017 1 commit
-
-
Bartłomiej Piotrowski authored
- add keys of new Trusted Users: zorin, shibumi, archangegabriel - revoke keys of ex-TUs: flexiondotorg, dicebot - revoke Dan's master key Signed-off-by:
Bartłomiej Piotrowski <bpiotrowski@archlinux.org>
-
- 07 Feb, 2015 1 commit
-
-
Pierre Schmitz authored
-
- 26 Sep, 2013 1 commit
-
-
Pierre Schmitz authored
-
- 10 Jun, 2013 1 commit
-
-
Pierre Schmitz authored
-
- 25 May, 2013 1 commit
-
-
Pierre Schmitz authored
Use the file packager-revoked-keyids to revoke certain keys.
-
- 07 Apr, 2012 2 commits
-
-
Pierre Schmitz authored
-
Pierre Schmitz authored
-
- 31 Mar, 2012 1 commit
-
-
Pierre Schmitz authored
-
- 21 Mar, 2012 1 commit
-
-
Pierre Schmitz authored
This reverts commit 9f3a1ace. Keep signatures until pacman 4.0.3 hits [core].
-
- 09 Mar, 2012 1 commit
-
-
Pierre Schmitz authored
-
- 04 Mar, 2012 1 commit
-
-
Pierre Schmitz authored
-
- 03 Mar, 2012 2 commits
-
-
Pierre Schmitz authored
-
Pierre Schmitz authored
We also remove unused signatures from the keys to keep the history more readable
-
- 27 Feb, 2012 1 commit
-
-
Pierre Schmitz authored
-
- 20 Feb, 2012 1 commit
-
-
Pierre Schmitz authored
-
- 12 Feb, 2012 2 commits
-
-
Pierre Schmitz authored
The update script creates key files for master keys and all developers with fully trusted keys.
-
Pierre Schmitz authored
* The keyid lists are retreived from archweb * The update script can be run to refresh all keys
-