From ef88f3d5ef696b71a65a81f143b13ae27175a1c5 Mon Sep 17 00:00:00 2001 From: Dan McGee Date: Thu, 29 Mar 2012 11:37:07 -0500 Subject: Add developer status table to master keys page This shows the cross-product of each master key with each developer key so you can see who has been signed, where signatures are missing, etc. Signed-off-by: Dan McGee --- templates/public/keys.html | 56 ++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 47 insertions(+), 9 deletions(-) (limited to 'templates') diff --git a/templates/public/keys.html b/templates/public/keys.html index 6b06cc3..a7c91c4 100644 --- a/templates/public/keys.html +++ b/templates/public/keys.html @@ -15,15 +15,6 @@

The {{ keys|length }} key{{ keys|pluralize }} listed below should be regarded as the current set of master keys. They are available on public keyservers and should be signed by the owner of the key.

-

All official Arch Linux developers and trusted users should have their - key signed by at least three of these master keys. This is in accordance - with the PGP web of trust concept. If a user is willing to - marginally trust all of the master keys, three signatures from different - master keys will consider a given developer's key as valid. For more - information on trust, please consult the - GNU Privacy Handbook - and Using trust to - validate keys.

@@ -55,5 +46,52 @@ {% endfor %}
+ +

The following table shows all active developers and trusted users along + with the status of their personal signing key. A 'Yes' indicates that the + personal key of the developer is signed by the given master key. A 'No' + indicates it has not been signed; however, this does not necessarily mean + the key should not be trusted.

+

All official Arch Linux developers and trusted users should have their + key signed by at least three master keys if they are responsible for + packaging software in the repositories. This is in accordance with the PGP + web of trust concept. If a user is willing to marginally trust all + of the master keys, three signatures from different master keys will + consider a given developer's key as valid. For more information on trust, + please consult the + GNU Privacy Handbook + and Using trust to + validate keys.

+ + + + + + + {% for key in keys %} + + {% endfor %} + + + + + {% for key in keys %} + + {% endfor %} + + + + {% for user in active_users %} + + + + {% spaceless %}{% for key in keys %} + {% signature_exists signatures key.pgp_key user.userprofile.pgp_key as signed %} + + {% endfor %}{% endspaceless %} + + {% endfor %} + +
PGP Key{{ key.owner.get_full_name }}
{% pgp_key_link key.pgp_key %}
{{ user.get_full_name }}{% pgp_key_link user.userprofile.pgp_key %}{{ signed|yesno|capfirst }}
{% endblock %} -- cgit v1.2.3-24-g4f1b