From e9335f3bc3aa4a44cf1edfa0500012912fd2c1e5 Mon Sep 17 00:00:00 2001 From: David Runge Date: Mon, 21 Jun 2021 00:16:15 +0200 Subject: caff: Add additional key .caffrc: Update configuration to be compatible with latest caff. Add key 2AC0A42EFB0B5CBC7A0402ED4DC95B6D7BE9892E --- .caffrc | 98 ++++++++++++++++++++++++++++++++++++++--------------------------- 1 file changed, 57 insertions(+), 41 deletions(-) diff --git a/.caffrc b/.caffrc index ae3876c..6fd2db1 100644 --- a/.caffrc +++ b/.caffrc @@ -1,50 +1,66 @@ -# .caffrc -- vim:ft=perl: -# This file is in perl(1) format - see caff(1) for details. +# vim:ft=perl: +$ENV{'PERL_MAILERS'} = 'sendmail:/usr/bin/msmtp'; $CONFIG{'owner'} = 'David Runge'; -$CONFIG{'email'} = 'dvzrv@archlinux.org'; -$CONFIG{'reply-to'} = 'dvzrv@archlinux.org'; +$CONFIG{'email'} = 'dvzrv@master.key-archlinux.org'; -# You can get your long keyid from -# gpg --keyid-format long --list-key +# you can get your long keyid from +# gpg --with-colons --list-key # -# If you have a v4 key, it will simply be the last 16 digits of +# if you have a v4 key, it will simply be the last 16 digits of # your fingerprint. -# -# Example: -# $CONFIG{'keyid'} = [ qw{FEDCBA9876543210} ]; -# or, if you have more than one key: -# $CONFIG{'keyid'} = [ qw{0123456789ABCDEF 89ABCDEF76543210} ]; -$CONFIG{'keyid'} = [ qw{C7E7849466FE2358343588377258734B41C31549 91BD8815FE0040FA7FF5D68754C28F4FF5A1A949} ]; -# Select this/these keys to sign with -#$CONFIG{'local-user'} = [ qw{0123456789ABCDEF 89ABCDEF76543210} ]; +# This is the list of keys whose signatures you want to mail around. Usually +# you would list all your keys here. To specify which keys to sign with, set +# local-user. See the manpage for further details. +$CONFIG{'keyid'} = [ qw{C7E7849466FE2358343588377258734B41C31549 91BD8815FE0040FA7FF5D68754C28F4FF5A1A949 2AC0A42EFB0B5CBC7A0402ED4DC95B6D7BE9892E} ]; +# $CONFIG{'also-encrypt-to'} = [ qw{C7E7849466FE2358343588377258734B41C31549} ]; +$CONFIG{'caffhome'} = $ENV{'HOME'}.'/.caff'; -# Additionally encrypt messages for these keyids -#$CONFIG{'also-encrypt-to'} = [ qw{0123456789ABCDEF 89ABCDEF76543210} ]; +# The options below need not be changed for normal operation. -# Mail template to use for the encrypted part -#$CONFIG{'mail-template'} = << 'EOM'; -#Hi, -# -#please find attached the user id{(scalar @uids >= 2 ? 's' : '')} -#{foreach $uid (@uids) { -# $OUT .= "\t".$uid."\n"; -#};}of your key {$key} signed by me. -# -#If you have multiple user ids, I sent the signature for each user id -#separately to that user id's associated email address. You can import -#the signatures by running each through `gpg --import`. -# -#Note that I did not upload your key to any keyservers. If you want this -#new signature to be available to others, please upload it yourself. -#With GnuPG this can be done using -# gpg --keyserver hkp://pool.sks-keyservers.net --send-key {$key} -# -#If you have any questions, don't hesitate to ask. +# Paths to GnuPG binaries: +# $CONFIG{'gpg'} = 'gpg'; +# $CONFIG{'gpg-sign'} = $CONFIG{'gpg'}; +# $CONFIG{'gpg-delsig'} = '/home/weasel/tmp/gpg/gnupg-1.3.92/g10/gpg'; + +# defaults to ~/.gnupg/secring.gpg +# $CONFIG{'secret-keyring'} = '/tmp/gpg/secring.gpg'; + +# Don't export UIDs by default, on which your latest signature is older than this age. +# $CONFIG{'export-sig-age'} = 24*60*60; + +# Keyserver to download keys from. Default: pool.sks-keyservers.net. +# $CONFIG{'keyserver'} = 'pgp.surfnet.nl'; + +# Boolean options, all default to false (0). # -#Regards, -#-- -#{$owner} -#EOM -$ENV{'PERL_MAILERS'} = 'sendmail:/usr/bin/msmtp'; +# Skip fetching the keys from the keyserver. +# $CONFIG{'no-download'} = 1; +# Skip signing the keys. +# $CONFIG{'no-sign'} = 1; +# Ask to continue before starting the signing (for offline signing). +# $CONFIG{'ask-sign'} = 1; + +# $CONFIG{'mail-template'} = <<'EOM' +# Hi, +# +# please find attached the user id{(scalar @uids >= 2 ? 's' : '')} +# {foreach $uid (@uids) { +# $OUT .= "\t".$uid."\n"; +# };}of your key {$key} signed by me. +# +# Note that I did not upload your key to any keyservers. +# If you have multiple user ids, I sent the signature for each user id +# separately to that user id's associated email address. You can import +# the signatures by running each through `gpg --import`. +# +# If you want this new signature to be available to others, please upload +# it yourself. With GnuPG this can be done using +# gpg --keyserver pool.sks-keyservers.net --send-key {$key} +# +# If you have any questions, don't hesitate to ask. +# +# Regards, +# {$owner} +# EOM -- cgit v1.2.3-70-g09d2