Trac and SVN are configured to co-operate in this repository.
So if you are committing a change which corresponds to a Trac Ticket, use the magic words "fixes" or "references" in the SVN commit message.
This will automatically append a change notice against the Trac Ticket, and close the ticket (if you used the magic word "fixed").
From the author's documentation for trac-post-commit-hook:
# It searches commit messages for text in the form of: # command #1 # command #1, #2 # command #1 & #2 # command #1 and #2 # # You can have more then one command in a message. The following commands # are supported. There is more then one spelling for each command, to make # this as user-friendly as possible. # # closes, fixes # The specified issue numbers are closed with the contents of this # commit message being added to it. # references, refs, addresses, re # The specified issue numbers are left in their current status, but # the contents of this commit message are added to their notes. # # A fairly complicated example of what you can do is with a commit message # of: # # Changed blah and foo to do this or that. Fixes #10 and #12, and refs #12. # # This will close #10 and #12, and add a note to #12.
In the PGP world, "keyrings" are usually files that hold a set of keys. Often, these turn out to just be all the known keys in standard OpenPGP format concatenated together.
OpenPGP:SDK does not have a keyring disk format of its own. Instead it has the concept of an in-memory keyring. This is a data structure holding whatever keys you currently want to use.
The easiest (and, currently, only) way to construct a keyring is to use ops_parse_and_accumulate(). Simply parse the file or files containing the keys of interest. Note that you can call ops_parse_and_accumulate() multiple times on the same keyring and it will append new keys.
Unlike many OpenPGP applications, OpenPGP:SDK rarely operates on whole keyrings. So, for example, to verify a signature you must first extract the appropriate key from the keyring (using, for example, ops_keyring_find_by_key_id()). This means you have very fine-grained control over trust models even if you keep all your keys in a single keyring.
It is worth mentioning that OpenPGP:SDK can quite happily read a GnuPG keyring file.