updated fsf keyring
[fsf-keyring.git] / fsf-keyring.sh
CommitLineData
3fc145d4 1#!/bin/bash
3e4c32c3 2
725b460c
IK
3# Usage: $0 [-r]
4# -r means dont refresh keys from keyservers
d27f8055
IK
5#
6# See https://gluestick.office.fsf.org/checklists/person/crypto-keys/ for
7# upload command.
725b460c 8
e9702c48
IK
9shopt -s inherit_errexit 2>/dev/null ||: # ignore fail in bash < 4.4
10set -eE -o pipefail
11trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
3e4c32c3 12
098d6762
AE
13dos_attack_bytes=1000000
14
227fa583
IK
15refresh-gpg-key() {
16
17 key=$1
18
19 error=999
1e2b0c22
MM
20 for keyserver in keyring.debian.org keyserver.ubuntu.com pgp.mit.edu; do
21 echo "Trying $keyserver..."
227fa583
IK
22 set +e
23 cmd="gpg --keyserver $keyserver --recv-keys $key"
1e2b0c22 24 # Keyservers are not very reliable, so retry a few times.
227fa583
IK
25 for x in {1..3}; do
26 $cmd &>/dev/null
27 ret=$?
55a1be4b
IK
28 if (( ret == 0 )); then
29 break; fi
227fa583
IK
30 sleep 1
31 done
32 set -e
33 error=$(( ret < error ? ret : error )) # use lowest return
34 done
35
36 return $error
37}
3e4c32c3 38
1f9413db 39check-sig-dos() {
daa8fa96
AE
40 if (( "$(stat -c %s "$1")" > "$dos_attack_bytes" )) ; then
41 echo -e "\n\nerror: keyring is very large. did we get a signature DoS attack?\n\n"
42 exit 1
43 fi
1f9413db
AE
44}
45
e72d434b
IK
46refresh=true
47if [[ $1 == -r ]]; then
48 refresh=false
49fi
50
11077deb 51KEYS+="67819B343B2AB70DED9320872C6464AF2A8E4C02 " #rms
3e4c32c3
IK
52KEYS+="A4626CBAFF376039D2D7554497BA9CE761A0963B " #johns
53KEYS+="759C0A4A39A02A079712FB5061B826E87A80C8D6 " #johnh
cb5e2f5a 54KEYS+="1487E002421112A3B6C76B545FA66D3CA7518DBF " #andrew
403f4f95 55KEYS+="8556112E9B88B1A8B3E3631B58A39239D50484E8 " #jeanne
3e4c32c3 56KEYS+="B125F60B7B287FF6A2B7DF8F170AF0E2954295DF " #ian
f4caeebe 57KEYS+="36C9950D2F68254ED89C7C03F9C13A10581AB853 " #craigt
3e4c32c3 58KEYS+="2C31130BF7D5A459AFF2A3F3C9DFFE4A33AA52D9 " #knauth
06ea525c 59KEYS+="43372794C8ADD5CA8FCFFA6CD03759DAB600E3C0 " #michael
47309b71 60KEYS+="B102017CCF698F79423EF9CC069C04D206A59505 " #zoe
7c4333a9 61KEYS+="7CCC7ECD3D78EB384F6C02C8966951617A149C73 " #gregf
fa8bbf6b 62KEYS+="3D53198D2A8341B291BDD42893C0CF451883524B " #davis
7eb9830e 63KEYS+="2E0ECE75F8162B407D666767879738E6D6440D57 " #devinu
bedfe658 64KEYS+="005D03724A11C08A5A353D2C906DB6E398AA6CF6 " #miriam
3f491138 65KEYS+="2D1304056F4F061DADEAE299A2C76C5425EF14E8 " #dawn
f8faa2d3 66KEYS+="D86097B5E291BA771FA64D357014A6BE08494155" #odile
7c4333a9 67
f05e6c9d
AE
68if [[ -e fsf-keyring.gpg ]] ; then
69 check-sig-dos fsf-keyring.gpg
70 gpg --import fsf-keyring.gpg
71else
72 gpg --armor --export $KEYS > fsf-keyring.gpg
73fi
3e4c32c3
IK
74
75for KEY in $KEYS ; do
e72d434b 76 if $refresh; then
1e2b0c22 77 echo "Key: $KEY"
f70fa6cd 78 refresh-gpg-key $KEY || (echo "unable to download $KEY" >&2 ; exit 1)
e72d434b 79 fi
3e4c32c3
IK
80done
81
2394c187 82gpg --export $KEYS > key-export
1f9413db 83check-sig-dos key-export
098d6762 84mv key-export fsf-keyring.gpg
55a1be4b 85
cc77691c 86rm -f fsf-keyring.gpg.asc ./fsf-keyring.gpg~ key-export
5f942ca3 87gpg --armor --detach-sign ./fsf-keyring.gpg