#!/bin/sh # the keyring in /var that gets fetched by apt-key net-update # if it does not yet exist, copy it to avoid uneeded net copy KEYRINGDIR="/var/lib/apt/keyrings" KEYRING="${KEYRINGDIR}/ubuntu-archive-keyring.gpg" if ! test -d $KEYRINGDIR; then mkdir -m 755 -p $KEYRINGDIR fi if ! test -f $KEYRING; then cp /usr/share/keyrings/ubuntu-archive-keyring.gpg $KEYRING touch $KEYRING fi # sensible default permissions if there is no keyring yet # (gpg will use 0600 otherwise and that will break release-upgrades later) ETC_KEYRING="/etc/apt/trusted.gpg" if [ ! -f $ETC_KEYRING ]; then touch $ETC_KEYRING chmod 0644 $ETC_KEYRING fi # during maverick we had keyrings created with mode 0600 # but this will break tools like update-managers release-downloader # because it uses the trusted.gpg keyring to verify the signature (as user) if dpkg --compare-versions "$2" lt-nl "2010.+09.30"; then chmod 0644 $ETC_KEYRING fi #Keys LliureX LLX1306_FILE="/usr/share/keyrings/llx1306.gpg" #FILES_TO_ADD="$LLX1306_FILE" gpg --import $LLX1306_FILE || true gpg --armor --export 9A27AA33 | apt-key add - || true #LLX1306_KEY="9A27AA33" #GPG_CMD="gpg --no-options --no-default-keyring --secret-keyring /etc/apt/secring.gpg --trustdb-name /etc/apt/trustdb.gpg --quiet --batch --with-colons --list-keys --keyring /etc/apt/trusted.gpg" # make sure apt knows about the new keys if [ -x /usr/bin/apt-key ]; then /usr/bin/apt-key update fi