| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
It's already his version, so patch is not needed.
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
|
|
|
|
| |
Keyrings managed with gpg2 can contain secret keys whose public part is
unavailable to classic gpg; on the other hand, gpg2 won't see keys
created in gpg after an initial import.
Situations in which error messages like "gpg: error reading key: public
key not found" pop up can now be circumvented by setting the gpg.program
git configuration entry to gpg2.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When a gcrypt remote is not available, for any reason
(network being down, the drive containing it not being
mounted, etc), pushing to the remote causes a new repository
ID to be created.
Instead, we now fail loudly when a remote is unavailable and
when the remote ID is already set.
https://github.com/bluss/git-remote-gcrypt/issues/20
(cherry picked from commit b46d48af15e0f8b89f2666aff2c045c9306305d6)
|
|
|
|
| |
Fixes https://github.com/blake2-ppc/git-remote-gcrypt/issues/9
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
set -e causes the xecho to not run if the xgrep fails. At least with OSX's
/bin/sh, which is:
GNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13)
This didn't happen on Linux with:
GNU bash, version 4.3.11(1)-release (x86_64-pc-linux-gnu)
Possibly a bug in bash, or an OSX-specific bug. However, disabling set -e
in the subshell seems a good idea anyway.
fixes https://github.com/blake2-ppc/git-remote-gcrypt/issues/15
|
|
|
|
|
|
|
| |
set. Pass --no-tty to gpg in this situation. This is needed to interoperate with the git-annex assistant, which often runs without a controlling terminal, and will in a new version always do so.
Conflicts:
debian/changelog
|
|
|
|
| |
The gcrypt-id is cached to there when running --check
|
|
|
|
|
| |
For unknown reasons, it makes --list-keys sometimes not show fingerprints
of certian keys.
|
|\
| |
| |
| | |
https://github.com/jburnham/git-remote-gcrypt
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| | |
This is to allow programs to determine if a repo uses gcrypt, per #6.
Since this program already knows the name of the manifest file and how to
download it and decrypt it, it makes sense to do the check here rather than
in, eg, git-annex.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This is needed by git-annex assistant when it sets up a gcrypt repository,
to ensure that the gpg key it was asked to use to encrypt the repo is the
same key used to sign it. If it's not, pulling from the repo won't work,
due to git-remote-gcrypt's "Only accepting signatories" check.
The user may have a global user.signingkey setting (I do), but be setting
up a different special-purpose key for encrypting their git repo. The
git-annex assistant cannot mess with the global value, so needs this to
override it.
|
|/
|
|
|
|
|
|
| |
Otherwise gpg may prompt to verify if we want to encrypt to users who
do not have a defined trust level. But, the participants setting
explicitly listed them, so we know we want to encrypt to them.
closes #3
|
| |
|
| |
|
|
|
|
|
| |
We need to remove this since git handles ssh:// URLs already. With this
change, we now use the git backend for these.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Using a standard directory for temporaries buys us performance when the
user wants it (has configured tmpfs for /tmp) and configurability
(accepts TMPDIR=).
Moving /pack to a temporary directory gives safe concurrent remote
repacks.
|
| |
|
|
|
|
|
|
| |
There should be no difference if we use 32 random bytes or more, since
GPG's longest symmetric key is 32 bytes, but to just remove any doubt we
use a longer random passphrase.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Use echo_kill for when echo_die is not enough.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
If found a bug in mksh, where it would not split "$@" if IFS is null
(reported).
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|