Apache/2.4.7 (Ubuntu) Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64 uid=33(www-data) gid=33(www-data) groups=33(www-data) safemode : OFF MySQL: ON | Perl: ON | cURL: OFF | WGet: ON > / var / lib / dpkg / info / | server ip : 172.67.156.115 your ip : 172.70.131.141 H O M E |
Filename | /var/lib/dpkg/info/ubuntu-keyring.postinst |
Size | 1.03 kb |
Permission | rwxr-xr-x |
Owner | root : root |
Create time | 27-Apr-2025 09:50 |
Last modified | 19-May-2012 09:35 |
Last accessed | 06-Jul-2025 22:17 |
Actions | edit | rename | delete | download (gzip) |
View | text | code | image |
#!/bin/sh
# the keyring in /var that gets fetched by apt-key net-update
# if it does not yet exist, copy it to avoid uneeded net copy
KEYRINGDIR="/var/lib/apt/keyrings"
KEYRING="${KEYRINGDIR}/ubuntu-archive-keyring.gpg"
if ! test -d $KEYRINGDIR; then
mkdir -m 755 -p $KEYRINGDIR
fi
if ! test -f $KEYRING; then
cp /usr/share/keyrings/ubuntu-archive-keyring.gpg $KEYRING
touch $KEYRING
fi
# sensible default permissions if there is no keyring yet
# (gpg will use 0600 otherwise and that will break release-upgrades later)
ETC_KEYRING="/etc/apt/trusted.gpg"
if [ ! -f $ETC_KEYRING ]; then
touch $ETC_KEYRING
chmod 0644 $ETC_KEYRING
fi
# during maverick we had keyrings created with mode 0600
# but this will break tools like update-managers release-downloader
# because it uses the trusted.gpg keyring to verify the signature (as user)
if dpkg --compare-versions "$2" lt-nl "2010.+09.30"; then
chmod 0644 $ETC_KEYRING
fi
# make sure apt knows about the new keys
if [ -x /usr/bin/apt-key ]; then
/usr/bin/apt-key update
fi
# the keyring in /var that gets fetched by apt-key net-update
# if it does not yet exist, copy it to avoid uneeded net copy
KEYRINGDIR="/var/lib/apt/keyrings"
KEYRING="${KEYRINGDIR}/ubuntu-archive-keyring.gpg"
if ! test -d $KEYRINGDIR; then
mkdir -m 755 -p $KEYRINGDIR
fi
if ! test -f $KEYRING; then
cp /usr/share/keyrings/ubuntu-archive-keyring.gpg $KEYRING
touch $KEYRING
fi
# sensible default permissions if there is no keyring yet
# (gpg will use 0600 otherwise and that will break release-upgrades later)
ETC_KEYRING="/etc/apt/trusted.gpg"
if [ ! -f $ETC_KEYRING ]; then
touch $ETC_KEYRING
chmod 0644 $ETC_KEYRING
fi
# during maverick we had keyrings created with mode 0600
# but this will break tools like update-managers release-downloader
# because it uses the trusted.gpg keyring to verify the signature (as user)
if dpkg --compare-versions "$2" lt-nl "2010.+09.30"; then
chmod 0644 $ETC_KEYRING
fi
# make sure apt knows about the new keys
if [ -x /usr/bin/apt-key ]; then
/usr/bin/apt-key update
fi