From 8b449e91d4c27666a77ecba9baae384670705fbb Mon Sep 17 00:00:00 2001 From: Omer Preminger Date: Mon, 31 Jul 2023 09:56:41 -0400 Subject: [PATCH] changed email domains to "@example.com" --- definition_files.rst | 8 ++++---- key_commands.rst | 10 +++++----- signNverify.rst | 40 ++++++++++++++++++++-------------------- 3 files changed, 29 insertions(+), 29 deletions(-) diff --git a/definition_files.rst b/definition_files.rst index 476b4890..f8b8f217 100755 --- a/definition_files.rst +++ b/definition_files.rst @@ -215,7 +215,7 @@ to one another during the build process. fi %labels - Author alice + Author myuser@example.com Version v0.0.1 %help @@ -691,7 +691,7 @@ Consider the ``%labels`` section from the example definition file above: .. code:: {command} %labels - Author d@sylabs.io + Author myuser@example.com Version v0.0.1 MyLabel Hello World @@ -701,7 +701,7 @@ first space will be taken as the label's name, and the portion following it will be taken as the label's value. In the previous example, the first label name is ``Author`` with a -value of ``alice``. The second label name is ``Version`` with a +value of ``myuser@example.com``. The second label name is ``Version`` with a value of ``v0.0.1``. Finally, the third label name is ``MyLabel`` with a value of ``Hello World``. @@ -712,7 +712,7 @@ following command: $ {command} inspect my_container.sif - Author: alice + Author: myuser@example.com Version: v0.0.1 MyLabel: Hello World org.label-schema.build-arch: amd64 diff --git a/key_commands.rst b/key_commands.rst index 621bc417..581ce936 100644 --- a/key_commands.rst +++ b/key_commands.rst @@ -53,12 +53,12 @@ The output will look as it follows: Private key listing (/home/joana/.{command}/keys/pgp-secret): - 0) User: Johnny Cash (none) + 0) User: Johnny Cash (none) Creation time: 2019-04-11 22:22:28 +0200 CEST Fingerprint: 47282BDC661F58FA4BEBEF47CA576CBD8EF1A2B4 Length (in bits): 3072 - 1) User: John Green (none) + 1) User: John Green (none) Creation time: 2019-04-11 13:08:45 +0200 CEST Fingerprint: 5720799FE7B048CF36FAB8445EE1E2BD7B6342C5 Length (in bits): 1024 @@ -101,17 +101,17 @@ keystore by running ``{command} key list -s`` command: Private key listing (/home/joana/.{command}/keys/pgp-secret): - 1) User: Johnny Cash (none) + 1) User: Johnny Cash (none) Creation time: 2019-04-11 22:22:28 +0200 CEST Fingerprint: 47282BDC661F58FA4BEBEF47CA576CBD8EF1A2B4 Length (in bits): 3072 - 2) User: John Green (none) + 2) User: John Green (none) Creation time: 2019-04-11 13:08:45 +0200 CEST Fingerprint: 5720799FE7B048CF36FAB8445EE1E2BD7B6342C5 Length (in bits): 1024 - 3) User: Pinkie Pie (Eternal chaos comes with chocolate rain!) + 3) User: Pinkie Pie (Eternal chaos comes with chocolate rain!) Creation time: 2019-04-26 12:07:07 +0200 CEST Fingerprint: 8C10B902F438E4D504C3ACF689FCFFAED5F34A77 Length (in bits): 1024 diff --git a/signNverify.rst b/signNverify.rst index 63b66f15..0df5205c 100644 --- a/signNverify.rst +++ b/signNverify.rst @@ -90,9 +90,9 @@ You can use the ``newpair`` subcommand in the ``key`` command group like so: $ {command} key newpair - Enter your name (e.g., John Doe) : Ian Kaneshiro - Enter your email address (e.g., john.doe@example.com) : ikaneshiro@apptainer.org - Enter optional comment (e.g., development keys) : example key + Enter your name (e.g., John Doe) : Joe User + Enter your email address (e.g., john.doe@example.com) : myuser@example.com + Enter optional comment (e.g., development keys) : demo Enter a passphrase : Retype your passphrase : Generating Entity and OpenPGP Key Pair... done @@ -106,9 +106,9 @@ or saved locally. Public key listing (/home/ian/.{command}/keys/pgp-public): - 0) User: Ian Kaneshiro (example key) - Creation time: 2022-02-23 15:12:19 -0800 PST - Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + 0) User: Joe User (demo) + Creation time: 2019-11-15 09:54:54 -0600 CST + Fingerprint: E5F780B2C22F59DF748524B435C3844412EE233B Length (in bits): 4096 If you would like others in the community to easily be able to fetch your @@ -166,8 +166,8 @@ download it again like so. Showing 1 results - FINGERPRINT ALGORITHM BITS CREATION DATE EXPIRATION DATE STATUS NAME/EMAIL - 8232570480B868E1473AEEB03DBCBA1EE9D661E5 RSA 4096 2022-02-23 15:12:19 -0800 PST [enabled] Ian Kaneshiro (example key) + KEY ID BITS NAME/EMAIL + 12EE233B 4096 Joe User (demo) $ {command} key pull 8232570480B868E1473AEEB03DBCBA1EE9D661E5 1 key(s) added to keyring of trust /home/ian/.{command}/keys/pgp-public @@ -221,8 +221,8 @@ without needing to contact the key server. $ {command} verify my_container.sif Verifying image: my_container.sif - [LOCAL] Signing entity: Ian Kaneshiro (example key) - [LOCAL] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [LOCAL] Signing entity: Joe User (Demo keys) + [LOCAL] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Objects verified: ID |GROUP |LINK |TYPE ------------------------------------------------ @@ -244,8 +244,8 @@ command again. $ {command} verify my_container.sif Verifying image: my_container.sif - [REMOTE] Signing entity: Ian Kaneshiro (example key) - [REMOTE] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [REMOTE] Signing entity: Joe User (Demo keys) + [REMOTE] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Objects verified: ID |GROUP |LINK |TYPE ------------------------------------------------ @@ -307,8 +307,8 @@ option to ``sign`` and ``verify``. $ {command} verify --sif-id 1 my_container.sif Verifying image: my_container.sif - [LOCAL] Signing entity: Ian Kaneshiro (example key) - [LOCAL] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [LOCAL] Signing entity: Joe User (Demo keys) + [LOCAL] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Objects verified: ID |GROUP |LINK |TYPE ------------------------------------------------ @@ -325,8 +325,8 @@ knowledge. $ {command} verify my_container.sif Verifying image: my_container.sif - [LOCAL] Signing entity: Ian Kaneshiro (example key) - [LOCAL] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [LOCAL] Signing entity: Joe User (Demo keys) + [LOCAL] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Error encountered during signature verification: object 2: object not signed FATAL: Failed to verify container: integrity: object 2: object not signed @@ -350,8 +350,8 @@ the same ``--group-id`` option. $ {command} verify --group-id 1 my_container.sif Verifying image: my_container.sif - [LOCAL] Signing entity: Ian Kaneshiro (example key) - [LOCAL] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [LOCAL] Signing entity: Joe User (Demo keys) + [LOCAL] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Objects verified: ID |GROUP |LINK |TYPE ------------------------------------------------ @@ -370,8 +370,8 @@ specifying ``--group-id`` can also verify the container: $ {command} verify my_container.sif Verifying image: my_container.sif - [LOCAL] Signing entity: Ian Kaneshiro (example key) - [LOCAL] Fingerprint: 8232570480B868E1473AEEB03DBCBA1EE9D661E5 + [LOCAL] Signing entity: Joe User (Demo keys) + [LOCAL] Fingerprint: 65833F473098C6215E750B3BDFD69E5CEE85D448 Objects verified: ID |GROUP |LINK |TYPE ------------------------------------------------