Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
The Tor Project
Applications
tor-browser-build
Commits
05455d33
Unverified
Commit
05455d33
authored
Mar 22, 2022
by
boklm
Browse files
Bug 40414: Update linux-signer-gpg-sign
Update linux-signer-gpg-sign to the version currently in use.
parent
e7f2deb0
Changes
1
Hide whitespace changes
Inline
Side-by-side
tools/signing/linux-signer-gpg-sign
View file @
05455d33
#!/bin/bash
# Copyright (c) 2019, The Tor Project, Inc.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
#
# * Neither the names of the copyright owners nor the names of its
# contributors may be used to endorse or promote products derived from
# this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
export
GNUPGHOME
=
/path/to/gpg-key
read
-sp
"Enter passphrase: "
pass
for
i
in
`
find
.
-name
"*.dmg"
-o
-name
"*.exe"
-o
-name
"*.tar.xz"
-o
-name
"*.txt"
-o
-name
"*.zip"
-o
-name
"*.tar.gz"
-o
-name
"*.apk"
`
for
i
in
`
find
.
-name
"*.dmg"
-o
-name
"*.exe"
-o
-name
"*.tar.xz"
-o
-name
"*.txt"
-o
-name
"*.zip"
-o
-name
"*.tar.gz"
-o
-name
"*.apk"
|
sort
`
do
echo
"
$pass
"
| gpg
-absu
$key
!
--passphrase-fd
0
$i
if
test
-f
"
$i
.asc"
then
echo
"Removing
$i
.asc"
rm
-f
"
$i
.asc"
fi
echo
"Signing
$i
"
echo
"
$pass
"
| gpg
-absu
0xe53d989a9e2d47bf!
--passphrase-fd
0
$i
test
$?
||
echo
"Signing
$i
failed"
done
boklm
@boklm
mentioned in issue
#40414 (closed)
·
May 10, 2022
mentioned in issue
#40414 (closed)
mentioned in issue #40414
Toggle commit list
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment