On Wed, 30 Aug 2023 11:54, Andrew Ammerlaan said:

> Signing /dev/null feels like more of a hack then an actual solution to
> keeping the key unlocked until portage finishes. Therefore I would
> like to ask you if you have any better ideas to do this?

Don't use a passphrase or better use remote signing from your desktop
and not on a server.  See wiki.gnupg.org on how to use a remobe
gpg-agent.

Another option is to use gpg-preset-passphrase (installed to
libexec). Use

  gpg -K --with-keygrip YOURSIGNINGKEY

to find the keygrip; then use

  gpg-preset-passphrase --preset KEYGRIP

and enter the passphrase followed by a LF (or provide to stdin).  This
puts the passphrase into gpg-agent's cache with no timeout.  The --forget
option might not work right now, thus you better use

  gpgconf --reload gpg-agent

to flush gpg-agent's cache.


Salam-Shalom,

   Werner

-- 
The pioneers of a warless world are the youth that
refuse military service.             - A. Einstein

Attachment: openpgp-digital-signature.asc
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
[email protected]
https://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to