Hello community,

here is the log from the commit of package signing-party for openSUSE:Factory 
checked in at 2012-03-23 12:10:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/signing-party (Old)
 and      /work/SRC/openSUSE:Factory/.signing-party.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "signing-party", Maintainer is ""

Changes:
--------
--- /work/SRC/openSUSE:Factory/signing-party/signing-party.changes      
2011-10-13 00:02:32.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.signing-party.new/signing-party.changes 
2012-03-23 12:11:00.000000000 +0100
@@ -1,0 +2,37 @@
+Thu Mar 22 14:42:18 UTC 2012 - cfarr...@suse.com
+
+- license update: GPL-2.0+
+  Various Open Source Licenses is not acceptable as a spec file license.
+  For this package, GPL-2.0+ seems to be the most accurate license choice
+
+-------------------------------------------------------------------
+Wed Mar 14 16:56:24 UTC 2012 - joop.boo...@opensuse.org
+
+- Build version 1.1.4
+   * gpg-key2ps:
+     + Apply patch from Uwe Kleine-König to deal with latin1 characters
+   * gpg-mailkeys:
+     + Correct path of ~/.gpg-mailkeysrc and ~/.signature in manpage.
+     + Add new environment variable SENDMAIL_ARGS to allow user to pass
+       arguments to sendmail
+   * caff:
+     + Correct path of ~/.caffrc in informational messages
+     + Be more verbose on unexpected key ID
+     + Refactor import of own key and import for keys to sign from keyrings.
+     + Also automatically import keys to sign from the user's normal gpg
+       keyrings.
+     + Use --no-auto-check-trustdb when importing keys from files or
+       the user's normal gpg keyrings
+      + manpage: Refer to all of /usr/share/doc/signing-party/caff/ and not
+       just to /usr/share/doc/signing-party/caff/caffrc.sample
+     + Fix horrible &function calls used because of broken prototypes.
+     + Even if all keys to sign were found in the user's normal gpg
+       keyrings we still need to import them (again) from any keyrings
+       passed with --key-files - the keys there might be newer, containing
+       new subkeys (for encryption), uids (for signing) or revocations.
+     + Make importing of keys to be signed from the normal gpg optional
+       (--keys-from-gnupg).
+     + refactor copying of command line options into global config variable.
+     + Create the mail files in ~/.caff/keys even if mail is not sent
+
+-------------------------------------------------------------------

Old:
----
  signing-party_1.1.3.orig.tar.gz

New:
----
  signing-party_1.1.4.orig.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ signing-party.spec ++++++
--- /var/tmp/diff_new_pack.4mBI5p/_old  2012-03-23 12:11:01.000000000 +0100
+++ /var/tmp/diff_new_pack.4mBI5p/_new  2012-03-23 12:11:01.000000000 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package signing-party
 #
-# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,14 +16,15 @@
 #
 
 
-
 Name:           signing-party
-License:        Various Open Source Licenses
-Group:          Productivity/Security
+Version:        1.1.4
+Release:        0
 Summary:        GPG Tools
-Version:        1.1.3
-Release:        1
+License:        GPL-2.0+
+Group:          Productivity/Security
+Url:            http://packages.debian.org/sid/signing-party
 Source:         
http://ftp.debian.org/debian/pool/main/s/signing-party/signing-party_%{version}.orig.tar.gz
+# PATCH-FIX-OPENSUSE caff-manpage.patch [bnc#722626]
 Patch1:         caff-manpage.patch
 Requires:       /usr/sbin/sendmail
 Requires:       gpg

++++++ caff-manpage.patch ++++++
--- /var/tmp/diff_new_pack.4mBI5p/_old  2012-03-23 12:11:01.000000000 +0100
+++ /var/tmp/diff_new_pack.4mBI5p/_new  2012-03-23 12:11:01.000000000 +0100
@@ -1,13 +1,12 @@
-Index: signing-party-1.1.3/caff/caff
-===================================================================
---- signing-party-1.1.3.orig/caff/caff
-+++ signing-party-1.1.3/caff/caff
-@@ -305,7 +305,7 @@ http://pgp-tools.alioth.debian.org/
+diff -Naur signing-party-1.1.4.orig/caff/caff signing-party-1.1.4/caff/caff
+--- signing-party-1.1.4.orig/caff/caff 2011-11-01 20:01:39.000000000 +0100
++++ signing-party-1.1.4/caff/caff      2012-03-14 18:06:02.000000000 +0100
+@@ -309,7 +309,7 @@
  
  =head1 SEE ALSO
  
--gpg(1), pgp-clean(1), /usr/share/doc/signing-party/caff/caffrc.sample.
-+gpg(1), pgp-clean(1), /usr/share/doc/signing-party/caffrc.sample.
+-gpg(1), pgp-clean(1), /usr/share/doc/signing-party/caff/
++gpg(1), pgp-clean(1), /usr/share/doc/signing-party/
  
  =cut
  

++++++ signing-party_1.1.3.orig.tar.gz -> signing-party_1.1.4.orig.tar.gz ++++++
++++ 1768 lines of diff (skipped)
++++    retrying with extended exclude list
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/caff/caff new/signing-party-1.1.4/caff/caff
--- old/signing-party-1.1.3/caff/caff   2010-02-11 19:26:29.000000000 +0100
+++ new/signing-party-1.1.4/caff/caff   2011-11-01 20:01:39.000000000 +0100
@@ -1,7 +1,7 @@
 #!/usr/bin/perl -w
 
 # caff  --  CA - Fire and Forget
-# $Id: caff 452 2010-01-24 19:13:35Z franck $
+# $Id: caff 484 2011-11-01 18:54:31Z thijs $
 #
 # Copyright (c) 2004, 2005, 2006 Peter Palfrader <pe...@palfrader.org>
 # Copyright (c) 2005, 2006 Christoph Berg <c...@df7cb.de>
@@ -90,6 +90,10 @@
 
 Import keys from file. Can be supplied more than once.
 
+=item B<--keys-from-gnupg> I<file>
+
+Try to import keys from your standard GnuPG keyrings.
+
 =back
 
 =head1 FILES
@@ -305,7 +309,7 @@
 
 =head1 SEE ALSO
 
-gpg(1), pgp-clean(1), /usr/share/doc/signing-party/caff/caffrc.sample.
+gpg(1), pgp-clean(1), /usr/share/doc/signing-party/caff/
 
 =cut
 
@@ -323,10 +327,14 @@
 use GnuPG::Interface;
 
 my %CONFIG;
-my $REVISION = '$Rev: 452 $';
+my $REVISION = '$Rev: 484 $';
 my ($REVISION_NUMER) = $REVISION =~ /(\d+)/;
+$REVISION_NUMER = 'unknown' unless defined $REVISION_NUMER;
 my $VERSION = "0.0.0.$REVISION_NUMER";
 
+# Global variables
+my @KEYIDS;
+my $params;
 
 ##
 # Display an error message on STDERR and then exit.
@@ -367,7 +375,7 @@
 
 
 sub generate_config() {
-       notice("Error: \$LOGNAME is not set.\n") unless defined $ENV{'LOGNAME'};
+       notice("Error: \$LOGNAME is not set.") unless defined $ENV{'LOGNAME'};
        my $gecos = defined $ENV{'LOGNAME'} ? (getpwnam($ENV{LOGNAME}))[6] : 
undef;
        my $email;
        my @keys;
@@ -748,13 +756,13 @@
 
 
 ######
-# Send an email to $address.  If $can_encrypt is true then the mail
+# Create an email to $address.  If $can_encrypt is true then the mail
 # will be PGP/MIME encrypted to $longkeyid.
 #
 # $longkeyid, $uid, and @attached will be used in the email and the template.
 ######
-#send_mail($address, $can_encrypt, $longkeyid, $uid, @attached);
-sub send_mail($$$@) {
+# create_mail($address, $can_encrypt, $longkeyid, $uid, @attached);
+sub create_mail($$$@) {
        my ($address, $can_encrypt, $key_id, @keys) = @_;
 
        my $template = Text::Template->new(TYPE => 'STRING', SOURCE => 
$CONFIG{'mail-template'})
@@ -847,9 +855,21 @@
        $message_entity->head->add("Reply-To", $CONFIG{'reply-to'}) if defined 
$CONFIG{'reply-to'};
        $message_entity->head->add("Bcc", $CONFIG{'bcc'}) if defined 
$CONFIG{'bcc'};
        $message_entity->head->add("User-Agent", $USER_AGENT);
-       mywarn("You have set arguments to pass to Mail::Mailer.  Better fix 
your MTA.  (Also, Mail::Mailer's error reporting is non existant, so it won't 
tell you when it doesn't work.)") if (scalar @{$CONFIG{'mailer-send'}} > 0);
+       return $message_entity;
+};
+
+######
+# send a mail message (MIME::Entity)
+######
+my $warned_about_broken_mailer_send = 0;
+sub send_message($) {
+       my ($message_entity) = @_;
+
+       if ( (scalar @{$CONFIG{'mailer-send'}} > 0) && 
!$warned_about_broken_mailer_send) {
+               mywarn("You have set arguments to pass to Mail::Mailer.  Better 
fix your MTA.  (Also, Mail::Mailer's error reporting is non existant, so it 
won't tell you when it doesn't work.)");
+               $warned_about_broken_mailer_send = 1;
+       };
        $message_entity->send(@{$CONFIG{'mailer-send'}});
-       $message_entity->stringify();
 };
 
 ######
@@ -907,15 +927,13 @@
 # Check the local user keys.
 #
 # This function checks if the keyids defined through the --local-user
-# command line option or set in .caffrc are valid and known to be one of the
-# keyids listed in ./caffrc. The last check ensure we have those keyids
-# available in the caff's gnupghome directory.
+# command line option or set in ~/.caffrc are valid and known to be one of the
+# keyids listed in ~/.caffrc.
 #
 # @return an array containing the local user keys\n
-#         (undef) if no key has been specified
+#         (undef) if no valid key has been found
 #
-sub get_local_user_keys()
-{
+sub get_local_user_keys() {
        my @local_user = ();
        my @key_list;
        
@@ -945,7 +963,7 @@
                }
                
                unless (grep (/$user_key$/, @{$CONFIG{'keyid'}})) {
-                       mywarn "Local-user $user_key is not defined as one of 
your keyid in ./caffrc (it will not be used).";
+                       mywarn "Local-user $user_key is not defined as one of 
your keyid in ~/.caffrc (it will not be used).";
                        next;
                }
                
@@ -954,40 +972,130 @@
 
        # If no local-user key are valid, there is no need to go further
        unless (defined $local_user[0]) {
-               myerror (1, "None of the local-user keys seem to be known as a 
keyid listed in ./caffrc.");
+               myerror (1, "None of the local-user keys seem to be known as a 
keyid listed in ~/.caffrc.");
        }
 
        return @local_user;
 }
 
+##
+# Import a key from the user gnupghome into a specified gnupghome.
+#
+# @param asciikey      ascii format of the gpg key to import
+# @param dst_gnupghome gnupghome directory where to import the key
+#
+# @return 0 if successful\n
+#         1 if the key could not be exported.\n
+#         2 if the key could not be imported.
+#
+sub import_key_from_user_gnupghome($$) {
+       my $err;
+       my ($asciikey, $dst_gpghome) = @_;
+
+       trace("Exporting key $asciikey from your normal GnuPGHOME.");
+       my $key = export_key(undef, $asciikey);
+       if (defined $key && $key ne '') {
+               trace("Importing key $asciikey into $GNUPGHOME.");
+               if (import_key($GNUPGHOME, $key)) {
+                       $err = 0;
+               } else {
+                       warn("Could not import $asciikey into caff's 
gnupghome.");
+                       $err = 2;
+               }
+       } else {
+               $err = 1;
+       }
+
+       return $err;
+}
+
+##
+# Import a key file into a specified gnupghome.
+#
+# @param keyfile       file containing the keys to import
+# @param dst_gnupghome gnupghome directory where to import the key
+#
+# @return 0 if successful\n
+#         1 if an error occured.
+#
+sub import_key_files($$) {
+       my $err;
+       my ($keyfile, $dst_gpghome) = @_;
+
+       my $gpg = GnuPG::Interface->new();
+       $gpg->call( $CONFIG{'gpg'} );
+       $gpg->options->hash_init(
+               'homedir' => $dst_gpghome,
+               'extra_args' => [ qw{ --no-auto-check-trustdb 
--trust-model=always } ] );
+       $gpg->options->meta_interactive( 0 );
+       my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = 
make_gpg_fds();
+       my $pid = $gpg->import_keys(handles => $handles, command_args => 
$keyfile);
+       my ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, 
$stderrfd, $statusfd);
+       info("Importing keys from file $keyfile");
+       waitpid $pid, 0;
+
+       if ($status !~ /^\[GNUPG:\] IMPORT_OK/m) {
+               warn $stderr;
+               $err = 1;
+       } else {
+               $err = 0;
+       }
+
+       return $err;
+}
+
+##
+# Import keys to be signed into caff gnupghome directory.
+#
+# This function imports the keys the user wants to sign into the caff gnupghome
+# directory. We looks for the keys in the the user gnupghome directory first,
+# and in the key files specified by the user if not all of the keys have been
+# found.
+#
+sub import_keys_to_sign() {
+       # Check if we can find the gpg key from our normal gnupghome, and then
+       # try to import it into our working gnupghome directory
+       if ($CONFIG{'keys-from-gnupg'}) {
+               foreach my $keyid (@KEYIDS) {
+                       if (!import_key_from_user_gnupghome($keyid, 
$GNUPGHOME)) {
+                               info("Key $keyid imported from your normal 
GnuPGHOME.");
+                       }
+               }
+       };
+
+       # Import user specified key files
+       foreach my $keyfile (@{$CONFIG{'key-files'}}) {
+               import_key_files($keyfile, $GNUPGHOME);
+       }
+
+       return 0;
+}
 
 ###################
 # argument handling
 ###################
-my @KEYIDS;
-my $params;
-
 Getopt::Long::config('bundling');
 if (!GetOptions (
-       '-h'              =>  \$params->{'help'},
-       '--help'          =>  \$params->{'help'},
-       '--version'       =>  \$params->{'version'},
-       '-V'              =>  \$params->{'version'},
-       '-u=s'            =>  \$params->{'local-user'},
-       '--local-user=s'  =>  \$params->{'local-user'},
-       '-e'              =>  \$params->{'export-old'},
-       '--export-old'    =>  \$params->{'export-old'},
-       '-E'              =>  \$params->{'no-export-old'},
-       '--no-export-old' =>  \$params->{'no-export-old'},
+       '-h'                =>  \$params->{'help'},
+       '--help'            =>  \$params->{'help'},
+       '--version'         =>  \$params->{'version'},
+       '-V'                =>  \$params->{'version'},
+       '-u=s'              =>  \$params->{'local-user'},
+       '--local-user=s'    =>  \$params->{'local-user'},
+       '-e'                =>  \$params->{'export-old'},
+       '--export-old'      =>  \$params->{'export-old'},
+       '-E'                =>  \$params->{'no-export-old'},
+       '--no-export-old'   =>  \$params->{'no-export-old'},
        '-m:s'              =>  \$params->{'mail'},
        '--mail:s'          =>  \$params->{'mail'},
-       '-M'              =>  \$params->{'no-mail'},
-       '--no-mail'       =>  \$params->{'no-mail'},
-       '-R'              =>  \$params->{'no-download'},
-       '--no-download'   =>  \$params->{'no-download'},
-       '-S'              =>  \$params->{'no-sign'},
-       '--no-sign'       =>  \$params->{'no-sign'},
-       '--key-file=s@'   =>  \$params->{'key-files'},
+       '-M'                =>  \$params->{'no-mail'},
+       '--no-mail'         =>  \$params->{'no-mail'},
+       '-R'                =>  \$params->{'no-download'},
+       '--no-download'     =>  \$params->{'no-download'},
+       '-S'                =>  \$params->{'no-sign'},
+       '--no-sign'         =>  \$params->{'no-sign'},
+       '--key-file=s@'     =>  \$params->{'key-files'},
+       '--keys-from-gnupg' =>  \$params->{'keys-from-gnupg'},
        )) {
        usage(\*STDERR, 1);
 };
@@ -1000,13 +1108,9 @@
 };
 usage(\*STDERR, 1) unless scalar @ARGV >= 1;
 
-$CONFIG{'local-user'}  = $params->{'local-user'}  if defined 
$params->{'local-user'};
-$CONFIG{'no-download'} = $params->{'no-download'} if defined 
$params->{'no-download'};
-$CONFIG{'no-sign'}     = $params->{'no-sign'}     if defined 
$params->{'no-sign'};
-
-$CONFIG{'no-mail'}     = $params->{'no-mail'}     if defined 
$params->{'no-mail'};
-$CONFIG{'mail'}        = $params->{'mail'}        if defined $params->{'mail'};
-
+for my $hashkey (qw{local-user no-download no-sign no-mail mail 
keys-from-gnupg}) {
+       $CONFIG{$hashkey} = $params->{$hashkey}  if defined $params->{$hashkey};
+};
 # If old 'no-mail' parameter, or if the 'mail' parameter is set to 'no'
 if ( defined $CONFIG{'no-mail'} || 
      ( defined $CONFIG{'mail'} && $CONFIG{'mail'}  eq 'no' ) ) {
@@ -1036,36 +1140,13 @@
 # import own keys
 #################
 for my $keyid (@{$CONFIG{'keyid'}}) {
-               info("Importing key $keyid from your normal GnuPGHome.");
-               my $key = export_key(undef, $keyid);
-               if (!defined $key || $key eq '') {
-                       warn ("Did not get key $keyid from your normal 
GnuPGHome\n");
-                       next;
-               };
-               my $result = import_key($GNUPGHOME, $key);
-               unless ($result) {
-                       warn ("Could not import $keyid into caff's 
gnupghome.\n");
-                       next;
-               };
+       info("Importing key $keyid from your normal GnuPGHome.");
+       if (import_key_from_user_gnupghome($keyid, $GNUPGHOME)) {
+               mywarn("Key $keyid not found.");
+       }
 }
 
-########################
-# import keys from files
-########################
-foreach my $keyfile (@{$CONFIG{'key-files'}}) {
-    my $gpg = GnuPG::Interface->new();
-    $gpg->call( $CONFIG{'gpg'} );
-    $gpg->options->hash_init('homedir' => $GNUPGHOME);
-    $gpg->options->meta_interactive( 0 );
-    my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds();
-    my $pid = $gpg->import_keys(handles => $handles, command_args => $keyfile);
-    my ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, 
$stderrfd, $statusfd);
-    info ("Importing keys from $keyfile");
-    waitpid $pid, 0;
-    if ($status !~ /^\[GNUPG:\] IMPORT_OK/m) {
-       warn $stderr;
-    }
-}
+&import_keys_to_sign();
 
 #############################
 # receive keys from keyserver
@@ -1104,7 +1185,7 @@
                                $speced_key = $spec if $local_keyids{$spec};
                        };
                        unless ($speced_key) {
-                           notice ("Imported unexpected key; got: 
$imported_key\n");
+                           notice ("Imported unexpected key; got: 
$imported_key\nAre you trying to work on a subkey?");
                            next;
                        };
                        debug ("Imported $imported_key for $speced_key");
@@ -1143,9 +1224,8 @@
        $CONFIG{'no-sign'} = ! ask("Continue with signing?", 1);
 }
        
-unless ($CONFIG{'no-sign'})
-{
-       my @local_user = &get_local_user_keys();
+unless ($CONFIG{'no-sign'}) {
+       my @local_user = get_local_user_keys();
 
        info("Sign the following keys according to your policy, then exit gpg 
with 'save' after signing each key");
        for my $keyid (@keyids_ok) {
@@ -1383,17 +1463,18 @@
                        if (!$uid->{'is_uat'} && ($uid->{'text'} =~ /@/)) {
                                my $address = $uid->{'text'};
                                $address =~ s/.*<(.*)>.*/$1/;
-                               if (ask("Mail signature for $uid->{'text'} to 
'$address'?", $CONFIG{'mail'} ne 'ask-no', $CONFIG{'mail'} eq 'yes')) {
-                                       my $mail = send_mail($address, 
$can_encrypt, $longkeyid, $uid, @attached);
-                                       if (defined $mail) {
-                                               my $keydir = 
"$KEYSBASE/$DATE_STRING";
-                                               my $mailfile = 
"$keydir/$longkeyid.mail.".$uid->{'serial'}.".".sanitize_uid($uid->{'text'});
-                                               open (KEY, ">$mailfile") or die 
("Cannot open $mailfile: $!\n");
-                                               print KEY $mail;
-                                               close KEY;
-                                       } else {
-                                               warn "Generating mail 
failed.\n";
-                                       };
+                               my $mail = create_mail($address, $can_encrypt, 
$longkeyid, $uid, @attached);
+                               if (defined $mail) {
+                                       my $should_send_mail = ask("Mail 
signature for $uid->{'text'} to '$address'?", $CONFIG{'mail'} ne 'ask-no', 
$CONFIG{'mail'} eq 'yes');
+                                       send_message($mail) if 
$should_send_mail;
+
+                                       my $keydir = "$KEYSBASE/$DATE_STRING";
+                                       my $mailfile = 
"$keydir/$longkeyid.mail.".($should_send_mail ? '' : 
'unsent.').$uid->{'serial'}.".".sanitize_uid($uid->{'text'});
+                                       open (MAILFILE, ">$mailfile") or die 
("Cannot open $mailfile: $!\n");
+                                       print MAILFILE $mail->stringify();
+                                       close MAILFILE;
+                               } else {
+                                       warn "Generating mail failed.\n";
                                };
                        };
                };
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/gpg-key2ps/gpg-key2ps 
new/signing-party-1.1.4/gpg-key2ps/gpg-key2ps
--- old/signing-party-1.1.3/gpg-key2ps/gpg-key2ps       2010-02-11 
19:26:29.000000000 +0100
+++ new/signing-party-1.1.4/gpg-key2ps/gpg-key2ps       2011-11-03 
22:02:46.000000000 +0100
@@ -7,12 +7,12 @@
 # Licenced under the GNU General Public License,
 # version 2 or later.
 #
-# $Id: gpg-key2ps 421 2009-03-10 16:19:07Z myon $
+# $Id: gpg-key2ps 489 2011-11-02 17:18:35Z thijs $
 
 use strict;
 use Getopt::Long;
 
-my $version = '$Rev: 421 $';
+my $version = '$Rev: 489 $';
 $version =~ s/\$Rev:\s*(\d+)\s*\$/$1/;
 my $showsubkeys = 0;
 my $revokestyle = "hide";
@@ -121,7 +121,21 @@
 /w $w def
 /h $h def
 
-/Times-Roman findfont 9 scalefont setfont 
+/reencode {
+       exch findfont
+       dup length dict
+       begin {
+               1 index /FID eq
+               { pop pop }
+               { def } ifelse
+       } forall
+       /Encoding ISOLatin1Encoding def
+       currentdict
+       end
+       definefont
+} bind def
+
+/Times-Roman /trlatin1 reencode 9 scalefont setfont
 
 /newline {
        /y y 10 sub def
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/gpg-mailkeys/example.gpg-mailkeysrc 
new/signing-party-1.1.4/gpg-mailkeys/example.gpg-mailkeysrc
--- old/signing-party-1.1.3/gpg-mailkeys/example.gpg-mailkeysrc 2010-02-11 
19:26:30.000000000 +0100
+++ new/signing-party-1.1.4/gpg-mailkeys/example.gpg-mailkeysrc 2011-11-01 
20:01:40.000000000 +0100
@@ -15,3 +15,10 @@
 
 See you!
 "
+
+# You can add here whatever arguments you want to pass to sendmail.
+# For example, if you use ssmtp, you may want to set your credentials this way
+#     SENDMAIL_ARGS="-au myusername -aps3cr3t"
+# to authenticate to the smtp server with username myusername and password
+# s3cr3t.
+SENDMAIL_ARGS=""
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/gpg-mailkeys/gpg-mailkeys 
new/signing-party-1.1.4/gpg-mailkeys/gpg-mailkeys
--- old/signing-party-1.1.3/gpg-mailkeys/gpg-mailkeys   2010-02-11 
19:26:30.000000000 +0100
+++ new/signing-party-1.1.4/gpg-mailkeys/gpg-mailkeys   2011-11-01 
20:01:40.000000000 +0100
@@ -2,11 +2,11 @@
 #
 # gpg-mailkeys: mail out just signed keys to their owners
 #
-# $Id: gpg-mailkeys 444 2009-09-10 22:19:28Z thialme-guest $
+# $Id: gpg-mailkeys 481 2010-11-23 20:57:58Z franck $
 
 set -e
 
-VERSION='$Rev: 444 $'
+VERSION='$Rev: 481 $'
 
 # Define the charset used in the text message of the mail
 LOCAL_CHARSET=""
@@ -61,6 +61,9 @@
 Enjoy,
 $NAME"
 fi
+if [ -z "$SENDMAIL_ARGS" ]; then
+       SENDMAIL_ARGS=""
+fi
 
 get_local_charset
 
@@ -120,7 +123,7 @@
 --$BOUNDARY--
 EOM
        printf " sending"
-       /usr/sbin/sendmail -ti <$TEMPFILE
+       /usr/sbin/sendmail $SENDMAIL_ARGS -ti <$TEMPFILE
        rm $TEMPFILE
        printf " done.\n"
        shift 1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/gpg-mailkeys/gpg-mailkeys.1 
new/signing-party-1.1.4/gpg-mailkeys/gpg-mailkeys.1
--- old/signing-party-1.1.3/gpg-mailkeys/gpg-mailkeys.1 2010-02-11 
19:26:30.000000000 +0100
+++ new/signing-party-1.1.4/gpg-mailkeys/gpg-mailkeys.1 2011-11-01 
20:01:40.000000000 +0100
@@ -1,5 +1,5 @@
 .\"
-.TH GPG-MAILKEYS 1 "September 11, 2009"
+.TH GPG-MAILKEYS 1 "Nov 23, 2010"
 .SH NAME
 .B gpg\-mailkeys
 \- sends emails containing keys to their owners
@@ -31,6 +31,11 @@
 .TP 13
 .I TEXT
 Set the body text of the messages
+.TP 13
+.I SENDMAIL_ARGS
+Set arguments to pass to /usr/sbin/sendmail. This can be useful to set
+credentials in order to authenticate to an smtp server when using ssmtp
+for example.
 
 .SH FILES
 The behavior of
@@ -38,10 +43,10 @@
 can be updated through some files available in the user home directory.
 
 Thus,
-.B .gpg-mailkeysrc
+.B ~/.gpg-mailkeysrc
 allows the user to overwrite the default value for the above environment
 variables, and any text in
-.B .signature
+.B ~/.signature
 will be appended to the end of the body text of the message.
 
 .SH SEE ALSO
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/gpgsigs/gpgsigs new/signing-party-1.1.4/gpgsigs/gpgsigs
--- old/signing-party-1.1.3/gpgsigs/gpgsigs     2010-02-11 19:26:29.000000000 
+0100
+++ new/signing-party-1.1.4/gpgsigs/gpgsigs     2011-11-01 20:01:39.000000000 
+0100
@@ -1,6 +1,6 @@
 #!/usr/bin/perl
 
-# $Id: gpgsigs 440 2009-08-30 16:56:26Z thialme-guest $
+# $Id: gpgsigs 482 2011-08-19 10:02:51Z tokkee $
 
 # See the pod documentation at the end of this file for author,
 # copyright, and licence information.
@@ -19,7 +19,7 @@
 #   * pod documentation
 # see the Debian changelog for further changes.
 
-my $VERSION = qq$Rev: 440 $;
+my $VERSION = qq$Rev: 482 $;
 $ENV{PATH} .= ":/usr/share/signing-party";
 
 use strict;
@@ -297,6 +297,7 @@
 $key = undef;
 $uid = undef;
 my $line = 0;
+my $keys = 0;
 print STDERR "Annotating $keytxt, writing into $outfile\n";
 open (TXT, $keytxt) or die ("Cannot open $keytxt\n");
 open (WRITE, '>'.$outfile) or die ("Cannot open $outfile for writing\n");
@@ -328,6 +329,19 @@
        if (/^RIPEMD160 Checksum:/ && defined $RIPEMD160) {
                s/[_[:xdigit:]][_ [:xdigit:]]+_/$RIPEMD160/;
        }
+
+       if ( m/^[0-9]+\s+\[ \] Fingerprint OK/ ){
+               if ($latex) {
+                       if ($keys > 0) {
+                               print WRITE "\\end{samepage}\n";
+                       }
+                       print WRITE "\\begin{samepage}\n";
+                       ++$keys;
+               }
+               print WRITE;
+               next;
+       }
+
        if ( m/^pub  +(?:\d+)[DR]\/([0-9A-F]{8}) [0-9]{4}-[0-9]{2}-[0-9]{2} 
*(.*)/ ) {
                $key = $1;
                $uid = $2;
@@ -377,6 +391,10 @@
        print WRITE;
 }
 
+if ($latex && ($keys > 0)) {
+       print WRITE "\\end{samepage}\n";
+}
+
 print WRITE "Legend:\n";
 my $num_myuids = 0;
 foreach my $i (0 .. @mykeys - 1) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' --exclude Makefile.in --exclude configure --exclude 
config.guess --exclude '*.pot' --exclude mkinstalldirs --exclude aclocal.m4 
--exclude config.sub --exclude depcomp --exclude install-sh --exclude ltmain.sh 
old/signing-party-1.1.3/keyanalyze/pgpring/stamp-h 
new/signing-party-1.1.4/keyanalyze/pgpring/stamp-h
--- old/signing-party-1.1.3/keyanalyze/pgpring/stamp-h  1970-01-01 
01:00:00.000000000 +0100
+++ new/signing-party-1.1.4/keyanalyze/pgpring/stamp-h  2011-11-01 
20:38:38.000000000 +0100
@@ -0,0 +1 @@
+timestamp

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to