Now GPG keys could be verified by cron job without problems (did not for me without this fix)

This commit is contained in:
fkrone 2015-01-18 15:45:14 +01:00
parent 64db1a6bc0
commit 8eebbbb3fd

View file

@ -64,12 +64,12 @@ if __name__ == "__main__":
send_msg(msg, cfg['smime']['register_email'], [from_addr])
sys.exit(0)
raw_sig = sign_part.get_payload().replace("\n","")
# re-wrap signature so that it fits base64 standards
cooked_sig = '\n'.join(raw_sig[pos:pos+76] for pos in xrange(0, len(raw_sig), 76))
if sign_type == 'smime':
raw_sig = sign_part.get_payload().replace("\n","")
# re-wrap signature so that it fits base64 standards
cooked_sig = '\n'.join(raw_sig[pos:pos+76] for pos in xrange(0, len(raw_sig), 76))
# now, wrap the signature in a PKCS7 block
sig = """
-----BEGIN PKCS7-----
@ -89,7 +89,7 @@ if __name__ == "__main__":
elif sign_type == 'pgp':
# send POST to localost on port 11371 which points to our HTTP registration page
sig = cooked_sig
sig = sign_part.get_payload()
payload = {'email': from_addr, 'key': sig}
r = requests.post("http://127.0.0.1:11371", data=payload)