This is an automated email from the git hooks/post-receive script.

guillem pushed a commit to branch main
in repository dpkg.

View the commit online:
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=b83114daa69c50d368199d00fbb67e190068b273

commit b83114daa69c50d368199d00fbb67e190068b273
Author: Guillem Jover <[email protected]>
AuthorDate: Thu Dec 15 23:45:06 2022 +0100

    Dpkg::Backend::GnuPG: Ensure future signing interop with gpg --openpgp
    
    GnuPG upstream has decided to get out of the standardizing process for
    OpenPGP, and instead is trying to push its own proprietary fork based on
    an old draft that did not have consensus within the IETF working group.
    
    This is going to be a source of interoperability problems, but we can
    mitigate them somewhat when creating signatures by requiring compliance
    with the OpenPGP RFC, even if it's going to be locked into an old version,
    as later ones are not planned to get implemented. More so, given that the
    latest releases of GnuPG have been switched to default to the proprietary
    draft.
---
 scripts/Dpkg/OpenPGP/Backend/GnuPG.pm | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scripts/Dpkg/OpenPGP/Backend/GnuPG.pm 
b/scripts/Dpkg/OpenPGP/Backend/GnuPG.pm
index 5a235b2e0..09cd54d0d 100644
--- a/scripts/Dpkg/OpenPGP/Backend/GnuPG.pm
+++ b/scripts/Dpkg/OpenPGP/Backend/GnuPG.pm
@@ -257,6 +257,7 @@ sub inline_sign {
     my @exec = ($self->{cmd});
     push @exec, _gpg_options_weak_digests();
     push @exec, qw(--utf8-strings --textmode --armor);
+    push @exec, '--openpgp';
     if ($key->type eq 'keyfile') {
         # Promote the keyfile keyhandle to a keystore, this way we share the
         # same gpg-agent and can get any password cached.

-- 
Dpkg.Org's dpkg

Reply via email to