[15:55:11] <Wooble> https://www.davidfischer.name/2012/05/signing-and-verifying-python-packages-with-pgp/ seems to imply your key should be registered with some key server. (I don't bother signing packages; probably no one verifies the signatures before installing anyway)
[15:57:16] <timlegrand> you're right that most users don't care, but that not a reason to surrender :)
[15:58:04] <timlegrand> this article is the best lecture i've found yet. but no technical steps about after upload
[15:58:24] <timlegrand> and this may explain why people don't care :)
[15:58:37] <Wooble> I can't even find an example signed package on pypi. Even the GPG packages don't seem to be signed.
[16:11:26] <Wooble> I don't want to think too much about the README not being the same one that's in the sdist because that would be impossible. :)
[16:11:38] <timlegrand> 3. (as an enduser) I download and install the package with pip install <signedpackage>
[16:12:32] <timlegrand> 4. I either use the package without consideration about package trust
[16:12:45] <timlegrand> or I check authenticity with... ?
[16:12:49] <Wooble> I think if the end users actually care about verifying, they need to download the .tgz, verify it, untar it, and pip install from the directory.
[16:17:59] <timlegrand> 6. (as an enduser) do: package + public key = downloaded_checksum
[16:18:23] <Wooble> the gpg tool does those 2 things for you...
[16:18:25] <timlegrand> 7. match <downloaded_checksum> against <checksum>
[16:20:36] <timlegrand> hum, what two things exactly?
[16:21:21] <Wooble> the generating a signature and verifying one.
[16:23:51] <timlegrand> what is the command line for:
[16:23:59] <timlegrand> 6. (as an enduser) do: package + public key = downloaded_checksum
[16:24:18] <timlegrand> the "verify" step you're talking about
[16:26:44] <Wooble> gpg --verify signature.asc file.tgz or something.
[16:27:25] <shibly> What's the latest version of pip ?
[16:27:29] <Wooble> https://www.davidfischer.name/2012/05/signing-and-verifying-python-packages-with-pgp/ covers the verification step pretty well. And notes that you probably don't trust the person who signed it anyway.
[16:35:01] <timlegrand> thanks for your time and your good explanations
[16:36:57] <Wooble> Well, when you run setup.py install there's no expected location for a signature for one thing. For another, at that poijt you've already run arbitrary code from the internet, having that arbitrary code report that it's verified itself doesn't really help you.
[16:41:21] <shibly> python get-pip.py , where does it download pip ?
[16:41:38] <agronholm> shibly: peeking inside the script would probably answer that question