413a24a6465bfa4503758e1df2fa186198ae2ed4
[fsf-keyring.git] / fsf-keyring.sh
1 #!/bin/bash
2
3 # Usage: $0 [-r]
4 # -r means dont refresh keys from keyservers
5 #
6 # See https://gluestick.office.fsf.org/checklists/person/crypto-keys/ for
7 # upload command.
8
9 shopt -s inherit_errexit 2>/dev/null ||: # ignore fail in bash < 4.4
10 set -eE -o pipefail
11 trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
12
13 dos_attack_bytes=1000000
14
15 refresh-gpg-key() {
16
17 key=$1
18
19 error=999
20 for keyserver in keyring.debian.org keyserver.ubuntu.com pgp.mit.edu; do
21 echo "Trying $keyserver..."
22 set +e
23 cmd="gpg --keyserver $keyserver --recv-keys $key"
24 # Keyservers are not very reliable, so retry a few times.
25 for x in {1..3}; do
26 $cmd &>/dev/null
27 ret=$?
28 if (( ret == 0 )); then
29 break; fi
30 sleep 1
31 done
32 set -e
33 error=$(( ret < error ? ret : error )) # use lowest return
34 done
35
36 return $error
37 }
38
39 refresh=true
40 if [[ $1 == -r ]]; then
41 refresh=false
42 fi
43
44 KEYS+="67819B343B2AB70DED9320872C6464AF2A8E4C02 " #rms
45 KEYS+="A4626CBAFF376039D2D7554497BA9CE761A0963B " #johns
46 KEYS+="759C0A4A39A02A079712FB5061B826E87A80C8D6 " #johnh
47 KEYS+="1487E002421112A3B6C76B545FA66D3CA7518DBF " #andrew
48 KEYS+="8556112E9B88B1A8B3E3631B58A39239D50484E8 " #jeanne
49 KEYS+="B125F60B7B287FF6A2B7DF8F170AF0E2954295DF " #ian
50 KEYS+="36C9950D2F68254ED89C7C03F9C13A10581AB853 " #craigt
51 KEYS+="2C31130BF7D5A459AFF2A3F3C9DFFE4A33AA52D9 " #knauth
52 KEYS+="43372794C8ADD5CA8FCFFA6CD03759DAB600E3C0 " #michael
53 KEYS+="B102017CCF698F79423EF9CC069C04D206A59505 " #zoe
54 KEYS+="7CCC7ECD3D78EB384F6C02C8966951617A149C73 " #gregf
55 KEYS+="5BE81180271798C6B4866C54598E4925C518D5DC " #davis
56 KEYS+="2E0ECE75F8162B407D666767879738E6D6440D57 " #devinu
57 KEYS+="D86097B5E291BA771FA64D357014A6BE08494155" #odile
58
59 rm -f /tmp/keys.asc ./fsf-keyring.gpg
60
61 for KEY in $KEYS ; do
62 if $refresh; then
63 echo "Key: $KEY"
64 refresh-gpg-key $KEY
65 fi
66 done
67
68 gpg --armor --export $KEYS > key-export
69
70 (( "$(stat -c %s key-export)" > "${dos_attack_bytes}" )) && echo -e "\n\nerror: keyring is very large. did we get a signature DoS attack?\n\n" && exit 1
71
72 mv key-export fsf-keyring.gpg
73
74 gpg --armor --sign ./fsf-keyring.gpg
75 mv fsf-keyring.gpg.asc fsf-keyring.gpg
76 rm -f fsf-keyring.gpg~