Hi. Thanks for continuing to provide helpful info. I have some replies and hope for your confirmation that we're taking the right approach.
Gunnar Wolf writes ("Re: Bug#1102125: debian-keyring: Please add tag2upload oracle service key"): > I do think including the t2u key could be in place in the role-keys > keyring. Not so much because of the generated package (again, I see very > little value in it), but because it enables Debian infrastructure to check > it via rsync. I don't think debian-role-keys.gpg is a good way to make the key available to programs, because of the need to further identify the specific key, as I wrote. The right approach is a separate keyring. That separate keyring needs to be made available to: 1. Debian infrastructure systems (git.dgit.debian.org, dak, etc.) 2. User systems (for programs like dscverify). To achieve 2, we need it in a binary package. The sensible options for that are: 1. The debian-keyring package 2. A bespoke binary package As I understand Noodles, he's saying he thinks it should be 2. I don't understand all the constraints and reasons for that (Noodles has explained them a bit) but I respect the decision. And AFAICT Noodles doesn't think that new .deb ought to come from the keyring source package, either. So we will make a bespoke binary package. The Debian infrastructure system which has this key already is git.dgit.d.o, and it has the key through us having committed it to the service's configuration git repo. Other services could do likewise. I think it's just queued and dak. It's possible that distributing this key to infrastructure systems via the .deb is a good way, but that's not how it's done for debian-keyring.gpg which makes me think it may not be a good way for this key either. If we're putting it in a separate .deb I don't think it makes much sense to put it in debian-role-keys.gpg too. > But ultimately, I am not familiar with the processing that will be done > once the other involved teams do the necessary footing to get t2u > working. I'm going to explain this because I hope it will improve the quality of the advice you'll give me in response to what I wrote above: As far as computers go: Most systems need to treat this key the same way they would a key in debian-keyring.gpg. (That's because most systems that use debian-keyring.gpg are verifying source packages, or maybe developer git tags.) Systems in this category include git.dgit.debian.org, the ftp upload queue daemon, dscverify(1) and similar programs on on user syustems, and possibly dak on fasolo[1]. Systems that should definitely *not* treat it that way are, I think, just vote.debian.org. Systems where it would be better not to treat it like a DD key, but it doesn't matter very much, are things like the PGP-signature based list moderation, and the the tag2upload service itself. Humans should also be able to find the key, obviously, but publishing it in a .deb for use by software achieves that purpose too. > Again, my stance is not to stand in your way, but to resolve > things as they are made available. Right. Thanks, Ian. [1] Precisely how dak should handle this key is contested, but both my idea of the best design, and our 2024 agreement with ftpmaster, would have it in its own category. Treating it like a DD key is the way to deploy it without code changes to dak; everyone except ftpmaster thinks this would be OK, but I would also regard it as less than iodeal - for example, there is no reason for dak to accept binaries signed by tag2upload, so in a perfect world, it wouldl not. -- Ian Jackson <ijack...@chiark.greenend.org.uk> These opinions are my own. Pronouns: they/he. If I emailed you from @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.