New in version 2016.3.0.
Raised when a data source does not contain a requested key
Ensure a GPG public key is absent from the keychain.
The key ID of the GPG public key.
The key ID or key IDs to remove from the GPG keychain.
Remove GPG keys from the specified user's keychain.
Override GnuPG home directory.
Limit the operation to this specific keyring, specified as a local filesystem path.
New in version 3007.0.
Make sure to not leave behind an empty keyring file
if keyring
was specified. Defaults to false.
New in version 3007.0.
Ensure a GPG public key is present in the GPG keychain and that it is not expired.
The key ID of the GPG public key.
The key ID or key IDs to add to the GPG keychain.
Add GPG keys to the specified user's keychain.
The keyserver to retrieve the keys from.
Override GnuPG home directory.
Trust level for the key in the keychain, ignored by default. Valid trust levels: expired, unknown, not_trusted, marginally, fully, ultimately
Limit the operation to this specific keyring, specified as a local filesystem path.
New in version 3007.0.
A (list of) path(s)/URI to retrieve the key(s) from. By default, this works as a backup option in case retrieving a key from the keyserver fails.
Note
All listed sources will be iterated over in order until the first one found to contain the requested key. If multiple keys are managed in a single state, the effective sources are allowed to differ between keys.
Important
Internally, this uses gpg.read_key
to list keys in the sources. If a source is not a keyring, on GnuPG <2.1,
this can lead to unintentional decryption.
New in version 3008.0.
Do not attempt to retrieve the key from the keyserver, only use source
.
Irrelevant when text
is passed. Defaults to false.
New in version 3008.0.
Instead of retrieving the key(s) to import from a keyserver/URI, import them from this (armored) string.
Note
name
or keys
must still specify the expected key ID(s),
so this cannot be used to indiscriminately import a keyring.
Requires python-gnupg v0.5.1.
New in version 3008.0.