Am Donnerstag, den 11.07.2013, 15:33 +0200 schrieb Bill Allombert: [use gpg but don't write to root/.gnupg] > Below is the code in /etc/cron.daily/popularity-contest > > GPG=/usr/bin/gpg > if [ "$ENCRYPT" = "yes" ] && [ -x "$GPG" ]; then > POPCONGPG="$POPCON.gpg" > rm -f "$POPCONGPG" > $GPG --no-default-keyring --keyring "$KEYRING" --trust-model=always \ > --armor -o "$POPCONGPG" -r "$POPCONKEY" --encrypt "$POPCON" > POPCON="$POPCONGPG" > fi
I suggest you add trustdb.gpg and secring.gpg to /usr/share/popularity-contest/ or (maybe even better) /etc/popularity-contest/. apt(-secure) does similar in /etc/apt. The command would then look like this: gpg --no-options --no-default-keyring --keyring [..] \ --secret-keyring /etc/popularity-contest/secring.gpg \ --trustdb-name /etc/popularity-contest/trustdb.gpg JFTR: The file secring.gpg can be avoided using --secret-keyring=/dev/null but I don't know how to suppress the creation of trustdb.gpg. Regards, Daniel -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1373555758.6487.6.ca...@haktar.debian.wgdd.de