Skip to content
This repository has been archived by the owner on Aug 15, 2018. It is now read-only.

Test and fix egpg 2.2 #9

Closed
8 tasks done
diveshuttam opened this issue May 18, 2018 · 5 comments
Closed
8 tasks done

Test and fix egpg 2.2 #9

diveshuttam opened this issue May 18, 2018 · 5 comments
Assignees
Labels
GSoC Preparations Small tasks done for GSoC Preparations

Comments

@diveshuttam
Copy link
Contributor

diveshuttam commented May 18, 2018

from EasyGnuPG/egpg#27
Follow these steps:

@diveshuttam diveshuttam added the GSoC Preparations Small tasks done for GSoC Preparations label May 18, 2018
@diveshuttam diveshuttam added this to the GSoC Bonding Period milestone May 18, 2018
@diveshuttam diveshuttam self-assigned this May 18, 2018
@diveshuttam
Copy link
Contributor Author

bionic simple example output:

egpg-bionic root@egpg-bionic:/host/egpg
==> # gpg --version
gpg (GnuPG) 2.2.4
libgcrypt 1.8.1
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: /root/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

egpg-bionic root@egpg-bionic:/host/egpg
==> # rm -rf ~/.egpg/

egpg-bionic root@egpg-bionic:/host/egpg
==> # killall -u $USER gpg-agent
Cannot find user gpg-agent

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg
No directory '/root/.egpg'
Try first: egpg init

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg init
mkdir: created directory '/root/.egpg'

Appended the following lines to '/root/.bashrc':
---------------8<---------------
### start egpg config
export GPG_TTY=$(tty)
export EGPG_DIR="/root/.egpg"
#export GNUPGHOME="/root/.egpg/.gnupg"
### end egpg config
--------------->8---------------
Please reload it to enable the new config:
    source "/root/.bashrc"


egpg-bionic root@egpg-bionic:/host/egpg
==> # source "/root/.bashrc" 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg

EasyGnuPG 2.2-1.0    ( https://github.com/easygnupg/egpg )

EGPG_DIR="/root/.egpg"
GNUPGHOME="/root/.egpg/.gnupg"
DONGLE=""
KEYSERVER="hkp://keys.gnupg.net"
GPG_TTY="/dev/pts/1"
SHARE=no
DEBUG=no

No valid key found.

Try first:  egpg key gen
       or:  egpg key fetch
       or:  egpg key restore
       or:  egpg key recover

-x-
egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key gen test@example.org "Test User"

Creating a new key.

Enter passphrase for the new key: 
Retype the passphrase of the key: 

Starting haveged which will greatly improve the speed of creating
a new key, by improving the entropy generation of the system.
/usr/lib/egpg/platform.sh: line 25: sudo: command not found

/usr/lib/egpg/platform.sh: line 31: sudo: command not found
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 528193E0865713FE,
created 2018-05-20.

Passphrase: 

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2018-06-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2018-06-20 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg info

EasyGnuPG 2.2-1.0    ( https://github.com/easygnupg/egpg )

EGPG_DIR="/root/.egpg"
GNUPGHOME="/root/.egpg/.gnupg"
DONGLE=""
KEYSERVER="hkp://keys.gnupg.net"
GPG_TTY="/dev/pts/1"
SHARE=no
DEBUG=no

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2018-06-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2018-06-20 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2018-06-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2018-06-20 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key fpr 
4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE

-x-
egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key renew 1 year

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2019-05-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2019-05-20 

egpg-bionic root@egpg-bionic:/host/egpg
==> # echo "This is a test message." > test.txt

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg seal test.txt 
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 528193E0865713FE,
created 2018-05-20.

Passphrase: 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg open test.txt.sealed 
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 1DE1BD2DE2B50771,
created 2018-05-20 (main key ID 528193E0865713FE).

Passphrase: 
gpg: Signature made Sun May 20 07:25:15 2018 UTC
gpg:                using RSA key 4526644B68040919CB30AA14528193E0865713FE
gpg: Good signature from "Test User <test@example.org>" [ultimate]

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg sign test.txt
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 528193E0865713FE,
created 2018-05-20.

Passphrase: 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg verify test.txt.signature 
gpg: Signature made Sun May 20 07:26:15 2018 UTC
gpg:                using RSA key 4526644B68040919CB30AA14528193E0865713FE
gpg: Good signature from "Test User <test@example.org>" [ultimate]

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact search Dashamir
gpg: data source: http://51.15.53.138:11371
(1)	Dashamir Hoxha <dashohoxha@gmail.com>
	Dashamir Hoxha <dashohoxha@keybase.io>
	  4096 bit RSA key 775FB44C0C6AD08D, created: 2018-01-24, expires: 2034-01-20
(2)	Dashamir Hoxha <dashohoxha@gmail.com>
	  4096 bit RSA key 9229692B9A5D205A, created: 2018-01-24, expires: 2023-01-24
(3)	Dashamir Hoxha <dashohoxha@gmail.com>
	  2048 bit RSA key 562AC309C01D2DBD, created: 2015-12-27, expires: 2020-12-31
(4)	Dashamir Hoxha <dashohoxha@gmail.com>
	keybase.io/dashohoxha <dashohoxha@keybase.io>
	  4096 bit RSA key 0967FD258D6414F9, created: 2015-05-27, expires: 2020-12-25
(5)	Dashamir Hoxha <dashohoxha@gmail.com>
	Dashamir Hoxha <d_hoxha@dogana.gov.al>
	  2048 bit RSA key FD06AA8E55D59B28, created: 2010-12-12, expires: 2015-12-13 (expired)
Enter number(s), N)ext, or Q)uit > 1


egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact ls

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2019-05-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2019-05-20 


id: 775FB44C0C6AD08D
uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
fpr: 1893 1AB4 720C 1EA3 C28B 95B3 775F B44C 0C6A D08D 
27E6 BD99 460B 579F 89E2 FA9B 2C61 8EAA CEE1 7BD9 
sign: 775FB44C0C6AD08D 2018-01-24 2034-01-20 
decr: 2C618EAACEE17BD9 2018-01-24 2034-01-20 

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact certify Dashamir
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 528193E0865713FE,
created 2018-05-20.

Passphrase: 

pub  rsa4096/775FB44C0C6AD08D
     created: 2018-01-24  expires: 2034-01-20  usage: SC  
     trust: unknown       validity: unknown
 Primary key fingerprint: 1893 1AB4 720C 1EA3 C28B  95B3 775F B44C 0C6A D08D

     Dashamir Hoxha <dashohoxha@gmail.com>
     Dashamir Hoxha <dashohoxha@keybase.io>

This key is due to expire on 2034-01-20.

I have checked this key casually.

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact trust Dashamir

uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
trust: marginal

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact ls Dashamir

id: 775FB44C0C6AD08D
uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
fpr: 1893 1AB4 720C 1EA3 C28B 95B3 775F B44C 0C6A D08D 
27E6 BD99 460B 579F 89E2 FA9B 2C61 8EAA CEE1 7BD9 
trust: marginal
sign: 775FB44C0C6AD08D 2018-01-24 2034-01-20 
decr: 2C618EAACEE17BD9 2018-01-24 2034-01-20 
certified by: Test User <test@example.org> (528193E0865713FE)

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg contact rm Dashamir
gpg (GnuPG) 2.2.4; Copyright (C) 2017 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

pub  rsa4096/775FB44C0C6AD08D 2018-01-24 Dashamir Hoxha <dashohoxha@gmail.com>

Delete this key from the keyring? (y/N) y

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key revoke
Revocation certificate not found: /root/.egpg/.gnupg/openpgp-revocs.d/4526644B68040919CB30AA14528193E0865713FE
9C835E086A6025175E43B5F01DE1BD2DE2B50771.rev

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key ls

id: 528193E0865713FE
uid: Test User <test@example.org>
fpr: 4526 644B 6804 0919 CB30 AA14 5281 93E0 8657 13FE 
9C83 5E08 6A60 2517 5E43 B5F0 1DE1 BD2D E2B5 0771 
trust: ultimate
sign: 528193E0865713FE 2018-05-20 2019-05-20 
decr: 1DE1BD2DE2B50771 2018-05-20 2019-05-20 

issues: revocation certificate was not generated on key gen

@diveshuttam
Copy link
Contributor Author

diveshuttam commented May 20, 2018

buster simple example output:

egpg-buster root@egpg-buster:/host/egpg
==> # gpg --version
gpg (GnuPG) 2.2.5
libgcrypt 1.8.2
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: /root/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2


egpg-buster root@egpg-buster:/host/egpg
==> # rm -rf ~/.egpg

gpg-buster root@egpg-buster:/host/egpg
==> # killall -u $USER gpg-agent
Cannot find user gpg-agent

egpg-buster root@egpg-buster:/host/egpg
==> # egpg
No directory '/root/.egpg'
Try first: egpg init

egpg-buster root@egpg-buster:/host/egpg
==> # egpg init
mkdir: created directory '/root/.egpg'

Appended the following lines to '/root/.bashrc':
---------------8<---------------
### start egpg config
export GPG_TTY=$(tty)
export EGPG_DIR="/root/.egpg"
#export GNUPGHOME="/root/.egpg/.gnupg"
### end egpg config
--------------->8---------------
Please reload it to enable the new config:
    source "/root/.bashrc"


egpg-buster root@egpg-buster:/host/egpg
==> # egpg

EasyGnuPG 2.2-1.0    ( https://github.com/easygnupg/egpg )

EGPG_DIR="/root/.egpg"
GNUPGHOME="/root/.egpg/.gnupg"
DONGLE=""
KEYSERVER="hkp://keys.gnupg.net"
GPG_TTY="/dev/pts/0"
SHARE=no
DEBUG=no

No valid key found.

Try first:  egpg key gen
       or:  egpg key fetch
       or:  egpg key restore
       or:  egpg key recover


egpg-buster root@egpg-buster:/host/egpg
==> # egpg key gen test@example.org "Test User"

Creating a new key.

Enter passphrase for the new key: 
Retype the passphrase of the key: 

Starting haveged which will greatly improve the speed of creating
a new key, by improving the entropy generation of the system.
/usr/lib/egpg/platform.sh: line 25: sudo: command not found

/usr/lib/egpg/platform.sh: line 31: sudo: command not found
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID D5FC457A358D73DF,
created 2018-05-20.

Passphrase: 

id: D5FC457A358D73DF
uid: Test User <test@example.org>
fpr: D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF 
DC64 D127 5F71 7A9C 8BED FEC6 58A7 C9A3 A76F 9295 
trust: ultimate
sign: D5FC457A358D73DF 2018-05-20 2018-06-20 
decr: 58A7C9A3A76F9295 2018-05-20 2018-06-20 

egpg-buster root@egpg-buster:/host/egpg
==> # egpg info

EasyGnuPG 2.2-1.0    ( https://github.com/easygnupg/egpg )

EGPG_DIR="/root/.egpg"
GNUPGHOME="/root/.egpg/.gnupg"
DONGLE=""
KEYSERVER="hkp://keys.gnupg.net"
GPG_TTY="/dev/pts/0"
SHARE=no
DEBUG=no

id: D5FC457A358D73DF
uid: Test User <test@example.org>
fpr: D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF 
DC64 D127 5F71 7A9C 8BED FEC6 58A7 C9A3 A76F 9295 
trust: ultimate
sign: D5FC457A358D73DF 2018-05-20 2018-06-20 
decr: 58A7C9A3A76F9295 2018-05-20 2018-06-20 


egpg-buster root@egpg-buster:/host/egpg
==> # egpg key

id: D5FC457A358D73DF
uid: Test User <test@example.org>
fpr: D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF 
DC64 D127 5F71 7A9C 8BED FEC6 58A7 C9A3 A76F 9295 
trust: ultimate
sign: D5FC457A358D73DF 2018-05-20 2018-06-20 
decr: 58A7C9A3A76F9295 2018-05-20 2018-06-20 

egpg-buster root@egpg-buster:/host/egpg
==> # egpg key fpr
D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF

egpg-buster root@egpg-buster:/host/egpg
==> # egpg key fpr
D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF

egpg-buster root@egpg-buster:/host/egpg
==> # egpg key renew 1 year

id: D5FC457A358D73DF
uid: Test User <test@example.org>
fpr: D23C DAA5 D23C 97F1 1E44 B98D D5FC 457A 358D 73DF 
DC64 D127 5F71 7A9C 8BED FEC6 58A7 C9A3 A76F 9295 
trust: ultimate
sign: D5FC457A358D73DF 2018-05-20 2019-05-20 
decr: 58A7C9A3A76F9295 2018-05-20 2019-05-20 

egpg-buster root@egpg-buster:/host/egpg
==> # echo "This is a test message." > test.txt

egpg-buster root@egpg-buster:/host/egpg
==> # egpg seal test.txt 
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID D5FC457A358D73DF,
created 2018-05-20.

Passphrase: 

egpg-buster root@egpg-buster:/host/egpg
==> # egpg open test.txt.sealed 
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID 58A7C9A3A76F9295,
created 2018-05-20 (main key ID D5FC457A358D73DF).

Passphrase: 
gpg: Signature made Sun May 20 07:52:06 2018 UTC
gpg:                using RSA key D23CDAA5D23C97F11E44B98DD5FC457A358D73DF
gpg: Good signature from "Test User <test@example.org>" [ultimate]

egpg-buster root@egpg-buster:/host/egpg
==> # egpg sign test.txt
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID D5FC457A358D73DF,
created 2018-05-20.

Passphrase: 

egpg-buster root@egpg-buster:/host/egpg
==> # egpg verify test.txt.signature
gpg: Signature made Sun May 20 07:52:56 2018 UTC
gpg:                using RSA key D23CDAA5D23C97F11E44B98DD5FC457A358D73DF
gpg: Good signature from "Test User <test@example.org>" [ultimate]

egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact search Dashamir
gpg: data source: http://92.43.111.21:11371
(1)	Dashamir Hoxha <dashohoxha@gmail.com>
	Dashamir Hoxha <dashohoxha@keybase.io>
	  4096 bit RSA key 775FB44C0C6AD08D, created: 2018-01-24, expires: 2034-01-20
(2)	Dashamir Hoxha <dashohoxha@gmail.com>
	  4096 bit RSA key 9229692B9A5D205A, created: 2018-01-24, expires: 2023-01-24
(3)	Dashamir Hoxha <dashohoxha@gmail.com>
	  2048 bit RSA key 562AC309C01D2DBD, created: 2015-12-27, expires: 2020-12-31
(4)	Dashamir Hoxha <dashohoxha@gmail.com>
	keybase.io/dashohoxha <dashohoxha@keybase.io>
	  4096 bit RSA key 0967FD258D6414F9, created: 2015-05-27, expires: 2020-12-25
(5)	Dashamir Hoxha <dashohoxha@gmail.com>
	Dashamir Hoxha <d_hoxha@dogana.gov.al>
	  2048 bit RSA key FD06AA8E55D59B28, created: 2010-12-12, expires: 2015-12-13 (expired)
Keys 1-5 of 5 for "Dashamir".  Enter number(s), N)ext, or Q)uit > 1

egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact ls

id: F47E9F902B6C85E8
uid: Test User <test@example.org>
fpr: B156 FB91 8789 6FEB E1BA 5FC6 F47E 9F90 2B6C 85E8 
C629 7E75 851F 2B7E 41C0 994F DD88 F0B2 3533 B77A 
trust: ultimate
sign: F47E9F902B6C85E8 2018-05-20 2018-06-20 
decr: DD88F0B23533B77A 2018-05-20 2018-06-20 


id: 775FB44C0C6AD08D
uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
fpr: 1893 1AB4 720C 1EA3 C28B 95B3 775F B44C 0C6A D08D 
27E6 BD99 460B 579F 89E2 FA9B 2C61 8EAA CEE1 7BD9 
sign: 775FB44C0C6AD08D 2018-01-24 2034-01-20 
decr: 2C618EAACEE17BD9 2018-01-24 2034-01-20 

egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact certify Dashamir
Please enter the passphrase to unlock the OpenPGP secret key:
"Test User <test@example.org>"
4096-bit RSA key, ID F47E9F902B6C85E8,
created 2018-05-20.

Passphrase: 

pub  rsa4096/775FB44C0C6AD08D
     created: 2018-01-24  expires: 2034-01-20  usage: SC  
     trust: unknown       validity: unknown
 Primary key fingerprint: 1893 1AB4 720C 1EA3 C28B  95B3 775F B44C 0C6A D08D

     Dashamir Hoxha <dashohoxha@gmail.com>
     Dashamir Hoxha <dashohoxha@keybase.io>

This key is due to expire on 2034-01-20.

I have checked this key casually.

egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact trust Dashamir

uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
trust: marginal


egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact ls Dashamir

id: 775FB44C0C6AD08D
uid: Dashamir Hoxha <dashohoxha@gmail.com>
uid: Dashamir Hoxha <dashohoxha@keybase.io>
fpr: 1893 1AB4 720C 1EA3 C28B 95B3 775F B44C 0C6A D08D 
27E6 BD99 460B 579F 89E2 FA9B 2C61 8EAA CEE1 7BD9 
trust: marginal
sign: 775FB44C0C6AD08D 2018-01-24 2034-01-20 
decr: 2C618EAACEE17BD9 2018-01-24 2034-01-20 
certified by: Test User <test@example.org> (F47E9F902B6C85E8)

egpg-buster root@egpg-buster:/host/egpg
==> # egpg contact rm Dashamir
gpg (GnuPG) 2.2.5; Copyright (C) 2018 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

pub  rsa4096/775FB44C0C6AD08D 2018-01-24 Dashamir Hoxha <dashohoxha@gmail.com>

Delete this key from the keyring? (y/N) y

egpg-buster root@egpg-buster:/host/egpg
==> # egpg key revoke
Revocation certificate not found: /root/.egpg/.gnupg/openpgp-revocs.d/D23CDAA5D23C97F11E44B98DD5FC457A358D73DF
DC64D1275F717A9C8BEDFEC658A7C9A3A76F9295.

issues:

  • not able to search the contacts form the server (though I have internet accessible inside the container)
  • revocation certificate not generated on egpg key gen

@diveshuttam
Copy link
Contributor Author

diveshuttam commented May 20, 2018

The possible cause is the naming of the revocation certificate.

egpg-bionic root@egpg-bionic:/host/egpg
==> # egpg key revoke
Revocation certificate not found: /root/.egpg/.gnupg/openpgp-revocs.d/8B7B00E068C20CC4D3F87C27CF75608A3A78D9C1
F64DA34AD9C8ED6C1DBE2156E0D8AAB67F250EAC.rev

egpg-bionic root@egpg-bionic:/host/egpg
==> # ls /root/.egpg/.gnupg/openpgp-revocs.d/
8B7B00E068C20CC4D3F87C27CF75608A3A78D9C1.rev

@dashohoxha
Copy link
Member

Sorry for not being able to respond. But I see that you are doing a great job so far. Let me know if you need my help for fixing the problems.

@dashohoxha
Copy link
Member

This is almost done.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
GSoC Preparations Small tasks done for GSoC Preparations
Projects
None yet
Development

No branches or pull requests

2 participants