Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gpg-agent socket #2301

Open
fiaxh opened this issue Nov 11, 2018 · 9 comments · May be fixed by #4958
Open

gpg-agent socket #2301

fiaxh opened this issue Nov 11, 2018 · 9 comments · May be fixed by #4958
Labels
enhancement sandbox

Comments

@fiaxh
Copy link

fiaxh commented Nov 11, 2018

Currently, the gpg-agent can't be properly used out of the sandbox. An --socket=gpg-agent option would be helpful.

@matthiasclasen matthiasclasen added enhancement sandbox labels Nov 14, 2018
BrainBlasted added a commit to BrainBlasted/flatpak that referenced this issue Mar 13, 2019
Creates a --socket flag that allows access to the host
gpg-agent.

Related to flatpak#2301
@SISheogorath
Copy link

SISheogorath commented May 27, 2019

@BrainBlasted any plans to bring your changes towards upstream?

@BrainBlasted
Copy link

BrainBlasted commented Jul 22, 2019

@SISheogorath eventually. IIRC I didn't finish the work to get things working there, and time hasn't been very permitting.

@apapsch
Copy link

apapsch commented Oct 11, 2019

I took a look at the commit and it seems to be a matter of removing a prefix from grep output. If the socket bind is all that is required, getting things done should be quite in reach :-)

@rugk
Copy link

rugk commented Nov 7, 2019

This is needed for dino/dino#343, i.e. a release of the Dino XMPP client as a flatpak, because the Dino devs insist on having the feature of PGP-encrypting your chats.

@SISheogorath
Copy link

SISheogorath commented Nov 7, 2019

@rugk as a quick solution you might want to have a peek into evolution's build instructions. They get GnuPG support by mounting the keyring directory. (Of course not perfect, but at least workable and not less secure than running it outside of Flatpak on an average distro.)

@bochecha
Copy link
Contributor

bochecha commented Nov 7, 2019

Hi, I'm the person who wrote the Flatpak manifest for Dino. 👋

@rugk as a quick solution you might want to have a peek into evolution's build instructions. They get GnuPG support by mounting the keyring directory. (Of course not perfect, but at least workable and not less secure than running it outside of Flatpak on an average distro.)

We know, that's all explained behind the link provided by @rugk, including the decision not to do that.

@rugk dino/dino#343 had already been linked to this issue previously by the OP, who in fact is the Dino maintainer. We know Dino needs this. 😉

(please do not respond here if you want to add something to the topic of Dino; this ticket is about the gpg-agent socket for Flatpak, let's not pollute it with side conversations)

cmollekopf pushed a commit to cmollekopf/flatpak that referenced this issue Mar 5, 2020
Creates a --socket flag that allows access to the host
gpg-agent.

Related to flatpak#2301
grdryn added a commit to grdryn/org.gnu.emacs that referenced this issue Apr 11, 2020
This is my first time modifying a flatpka, and I don't know if this is
the best way to do this, but it seems to work! :) I got inspiration
from the org.gnome.Evolution flatpak. If it looks like something you
want, but would like me to change it in some way first, let me know.

I found the following issues which may allow this to be done better in
future:

Portal for GPG encryption/decryption
flatpak/xdg-desktop-portal#178

gpg-agent socket
flatpak/flatpak#2301

To make use of this modification, you can install the "pinentry" emacs
package (https://elpa.gnu.org/packages/pinentry.html), and add the
following to your `.emacs` configuration:

```elisp
(pinentry-start)
```
grdryn added a commit to grdryn/org.gnu.emacs that referenced this issue Apr 11, 2020
This is my first time modifying a flatpak, and I don't know if this is
the best way to do this, but it seems to work! :) I got inspiration
from the org.gnome.Evolution flatpak. If it looks like something you
want, but would like me to change it in some way first, let me know.

I found the following issues which may allow this to be done better in
future:

Portal for GPG encryption/decryption
flatpak/xdg-desktop-portal#178

gpg-agent socket
flatpak/flatpak#2301

To make use of this modification, you can install the "pinentry" emacs
package (https://elpa.gnu.org/packages/pinentry.html), and add the
following to your `.emacs` configuration:

```elisp
(pinentry-start)
```
@AsciiWolf
Copy link
Contributor

AsciiWolf commented Sep 11, 2020

Any update regarding this issue?

hluk added a commit to hluk/com.github.hluk.copyq that referenced this issue Mar 5, 2022
This reverts commit f7dda86.

GPG is still not working properly. Some support from flatpak side is
needed. See: flatpak/flatpak#2301
hluk added a commit to hluk/com.github.hluk.copyq that referenced this issue Mar 5, 2022
This reverts commit f7dda86.

GPG is still not working properly. Some support from flatpak side is
needed. See: flatpak/flatpak#2301
@RomanRiabenko
Copy link

RomanRiabenko commented Jun 10, 2022

Hello. I would like to attract more attention to this issue. Would it be appropriate to open a bounty for it at bountysource? I ask in case there is any objection or advice against it. If not, I will proceed with opening a bounty by the next week. I looked though the project and didn't find anything against this.

@RomanRiabenko
Copy link

RomanRiabenko commented Jun 15, 2022

A bounty was opened for implementing this. It is currently at USD 254.
https://app.bountysource.com/issues/65648873-gpg-agent-socket

@bl00mber bl00mber linked a pull request Jun 20, 2022 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement sandbox
Projects
None yet
Development

Successfully merging a pull request may close this issue.

9 participants