<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/apt-pkg/contrib/gpgv.cc, branch 1.2.4</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.2.4</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.2.4'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2015-08-10T15:25:26Z</updated>
<entry>
<title>implement Signed-By option for sources.list</title>
<updated>2015-08-10T15:25:26Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2015-06-24T17:31:22Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b0d408547734100bf86781615f546487ecf390d9'/>
<id>urn:sha1:b0d408547734100bf86781615f546487ecf390d9</id>
<content type='text'>
Limits which key(s) can be used to sign a repository. Not immensely useful
from a security perspective all by itself, but if the user has
additional measures in place to confine a repository (like pinning) an
attacker who gets the key for such a repository is limited to its
potential and can't use the key to sign its attacks for an other (maybe
less limited) repository… (yes, this is as weak as it sounds, but having
the capability might come in handy for implementing other stuff later).
</content>
</entry>
<entry>
<title>fix memory leaks reported by -fsanitize</title>
<updated>2015-08-10T15:25:25Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2015-06-18T15:33:15Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3d8232bf97ce11818fb07813a71136484ea1a44a'/>
<id>urn:sha1:3d8232bf97ce11818fb07813a71136484ea1a44a</id>
<content type='text'>
Various small leaks here and there. Nothing particularily big, but still
good to fix. Found by the sanitizers while running our testcases.

Reported-By: gcc -fsanitize
Git-Dch: Ignore
</content>
</entry>
<entry>
<title>add and use 'apt-key verify' which prefers gpgv over gpg</title>
<updated>2014-09-26T22:12:14Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-04-14T16:24:17Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c46a36adaf51fc28464ea1a0e826c754ee60672b'/>
<id>urn:sha1:c46a36adaf51fc28464ea1a0e826c754ee60672b</id>
<content type='text'>
gnupg/gnupg2 can do verify just fine of course, so we don't need to use
gpgv here, but it is what we always used in the past, so there might be
scripts expecting a certain output and more importantly the output of
apt-cdrom contains messages from gpg and even with all the settings we
activate to prevent it, it still shows (in some versions) a quiet scary:
"gpg: WARNING: Using untrusted key!" message. Keeping the use of gpgv is
the simplest way to prevent it.

We are increasing also the "Breaks: apt" version from libapt as it
requires a newer apt-key than might be installed in partial upgrades.
</content>
</entry>
<entry>
<title>add --readonly option for apt-key adv</title>
<updated>2014-09-26T22:12:14Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-02-06T16:56:28Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=33a2267214eed2a11281c9f93b8cf10b4c436d94'/>
<id>urn:sha1:33a2267214eed2a11281c9f93b8cf10b4c436d94</id>
<content type='text'>
Some advanced commands can be executed without the keyring being
modified like --verify, so this adds an option to disable the mergeback
and uses it for our gpg calling code.

Git-Dch: Ignore
</content>
</entry>
<entry>
<title>use apt-key adv (+ gnupg) instead of gpgv for verify</title>
<updated>2014-09-26T22:12:14Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-01-24T22:48:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=12841e8320aa499554ac50b102b222900bb1b879'/>
<id>urn:sha1:12841e8320aa499554ac50b102b222900bb1b879</id>
<content type='text'>
apt-key does the keyring merge as we need it, so we just call it instead
of reimplementing it to do the merging before gpgv. This means we don't
use gpgv anymore (we never depended on it explicitly - bad style), but
it also means that the message in apt-cdrom add is a bit less friendly
as it says loudly "untrusted key", but for a one-time command its okay.
</content>
</entry>
<entry>
<title>cleanup headers and especially #includes everywhere</title>
<updated>2014-03-13T12:58:45Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-03-05T21:11:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=453b82a388013e522b3a1b9fcd6ed0810dab1f4f'/>
<id>urn:sha1:453b82a388013e522b3a1b9fcd6ed0810dab1f4f</id>
<content type='text'>
Beside being a bit cleaner it hopefully also resolves oddball problems
I have with high levels of parallel jobs.

Git-Dch: Ignore
Reported-By: iwyu (include-what-you-use)
</content>
</entry>
<entry>
<title>correct some style/performance/warnings from cppcheck</title>
<updated>2014-01-16T21:19:49Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-01-16T21:19:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9ce3cfc9309c55cc01018c88c1ca82779fd74431'/>
<id>urn:sha1:9ce3cfc9309c55cc01018c88c1ca82779fd74431</id>
<content type='text'>
The most "visible" change is from utime to utimensat/futimens
as the first one isn't part of POSIX anymore.

Reported-By: cppcheck
Git-Dch: Ignore
</content>
</entry>
<entry>
<title>rework some code to fix some scan-build warnings</title>
<updated>2014-01-16T18:51:23Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-01-16T18:51:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=62d8a765b9b37354efab6ca838cbdb7f347f7cac'/>
<id>urn:sha1:62d8a765b9b37354efab6ca838cbdb7f347f7cac</id>
<content type='text'>
No visible functional changes, just code moved around and additional
checks to eliminate impossible branches

Reported-By: scan-build
Git-Dch: Ignore
</content>
</entry>
<entry>
<title>factor GetTempDir out</title>
<updated>2013-12-22T21:15:52Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2013-12-22T21:15:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=68e0172140872d8044b3c768a6bea3ac58d426c4'/>
<id>urn:sha1:68e0172140872d8044b3c768a6bea3ac58d426c4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>apt-pkg/contrib/gpgv.cc: use /tmp as fallback dir</title>
<updated>2013-12-22T13:50:37Z</updated>
<author>
<name>Thomas Bechtold</name>
<email>thomasbechtold@jpberlin.de</email>
</author>
<published>2013-12-22T10:40:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=38beb8b5936e9d85a5bb99bf3860f082bbe34439'/>
<id>urn:sha1:38beb8b5936e9d85a5bb99bf3860f082bbe34439</id>
<content type='text'>
if the directory given by $TMPDIR is not available, use /tmp as fallback.
</content>
</entry>
</feed>
