Accepted debsig-verify 0.26 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted debsig-verify 0.26 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 04 Oct 2022 02:34:54 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: debsig-verify_0.26_amd64.changes
- Debian-source: debsig-verify
- Debian-suite: unstable
- Debian-version: 0.26
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=CCL2IOGLh1Gon4+kcLJHk0mH1bXLVb2bOjdDQbLwWlA=; b=n7SH/RYtvyoMwSOny1H6CneWY/ o8b4IQj768G0QmHQteoQZr9epC1+l4N5gBkEa9SJuDRm5jUh962N18FJ0xEyzUtWwF0vwPfayVXOP Pgj6c0JLXiMQ9XB4vXZaWwWh918xuXwvO3F/M1SQhg8Yf67P9JYKpGl8q36tFN+1bIF/1JHRHB2M8 PSRHlX6S0nTKEl9WI3JEXTZz/5QrNuFRW8gVJFJhkwZwdaSjTOYDGbovdjP9f05NkDhoF8Ijr1urP TP4CVi2ucOfU7IMRQJ5etLMDfAPfzxJrEGTtftMkf6cV63SC5731ulJ5icoDFZhzD+0qPlkXgLOwz 3FG6dI5A==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1ofXlm-0067Xw-CI@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 04 Oct 2022 04:01:26 +0200
Source: debsig-verify
Architecture: source
Version: 0.26
Distribution: unstable
Urgency: medium
Maintainer: Dpkg Developers <debian-dpkg@lists.debian.org>
Changed-By: Guillem Jover <guillem@debian.org>
Changes:
debsig-verify (0.26) unstable; urgency=medium
.
* Print the unknown option on error.
* Fix mismatched number of arguments error.
* openpgp-gpg: Always pass the gpg command in argv[0].
* openpgp-gpg: Skip field separator character when parsing --with-colons
output.
* openpgp: Do not consider a match if one of the fingerprints has zero
length.
* openpgp-gpg: When matching on getKeyID match on fingerprint.
* openpgp-gpg: Do not fallback to the match ID on fingerprint/keyID not
found.
* openpgp-gpg: Fix last field parsing.
* openpgp-gpg: Switch from internal gpg --list-packets to --verify
--status-fd. See #1001331.
* openpgp-gpg: Unset GPG_TTY.
* Check whether the origin ID is in the keyring if no match ID is specified.
* openpgp: Print the pathname for the keyring used in debug mode.
* Documentation:
- Update TODO.
- Refer to the main git repository as primary.
- Use https:// for release download URLs.
- Switch release URL from ftp.debian.org to deb.debian.org.
* Code internals:
- Avoid using an intermediate buffer in ds_printf().
- Switch from fgets() to getline().
- openpgp-gpg: Refactor get_field() out from get_colon_field().
- Refactor keyring generation.
- Pass a string instead of a struct match to getKeyID().
- Rename getSigKeyID() argument from type to name.
- Turn struct match «type» member from an int to an enum.
- openpgp-gpg: Fix cleanup_gpg_tmpdir() subprocess description.
* Test suite:
- Add new test keys with non-weak algorithms.
Checksums-Sha1:
5ee077bab591c3292db95c52468d30fc9c3cd3bf 1865 debsig-verify_0.26.dsc
9e60495bc7d29f3c402a6159a54ae30104394af9 140632 debsig-verify_0.26.tar.xz
8e2152ed6679f7b0d09f75bff134bf93ec7bfd0b 6421 debsig-verify_0.26_amd64.buildinfo
Checksums-Sha256:
91e8e98c43ed1ed5c9a7fcade5a2e7f8d662dd0b56e3586c433a9843f7d7d1ff 1865 debsig-verify_0.26.dsc
c788e06cf97feb0790ec7b359c3d118fcef6459801da3b971792ad81b9edf8e7 140632 debsig-verify_0.26.tar.xz
d0fcdd1d578d9692dfbcb144e8a1ef14226f8a17a0e78bf7c7926cd9012ad8d9 6421 debsig-verify_0.26_amd64.buildinfo
Files:
fd2b8400eec9f62fc10e5d7b0bb50f5a 1865 admin optional debsig-verify_0.26.dsc
efad40437d64851b0b0444ecb97e0a3f 140632 admin optional debsig-verify_0.26.tar.xz
66b9ef1b0df08c7581a3b5d2b62f87d5 6421 admin optional debsig-verify_0.26_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=Dxvn
-----END PGP SIGNATURE-----