K2LL33D SHELL

 Apache/2.4.7 (Ubuntu)
 Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64
 uid=33(www-data) gid=33(www-data) groups=33(www-data)
 safemode : OFF
 MySQL: ON | Perl: ON | cURL: OFF | WGet: ON
  >  / var / lib / dpkg / info /
server ip : 172.67.156.115

your ip : 172.70.131.141

H O M E


Filename/var/lib/dpkg/info/ubuntu-keyring.postinst
Size1.03 kb
Permissionrwxr-xr-x
Ownerroot : root
Create time27-Apr-2025 09:50
Last modified19-May-2012 09:35
Last accessed06-Jul-2025 22:17
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
#!/bin/sh

# the keyring in /var that gets fetched by apt-key net-update
# if it does not yet exist, copy it to avoid uneeded net copy
KEYRINGDIR="/var/lib/apt/keyrings"
KEYRING="${KEYRINGDIR}/ubuntu-archive-keyring.gpg"

if ! test -d $KEYRINGDIR; then
mkdir -m 755 -p $KEYRINGDIR
fi

if ! test -f $KEYRING; then
cp /usr/share/keyrings/ubuntu-archive-keyring.gpg $KEYRING
touch $KEYRING
fi

# sensible default permissions if there is no keyring yet
# (gpg will use 0600 otherwise and that will break release-upgrades later)
ETC_KEYRING="/etc/apt/trusted.gpg"
if [ ! -f $ETC_KEYRING ]; then
touch $ETC_KEYRING
chmod 0644 $ETC_KEYRING
fi

# during maverick we had keyrings created with mode 0600
# but this will break tools like update-managers release-downloader
# because it uses the trusted.gpg keyring to verify the signature (as user)
if dpkg --compare-versions "$2" lt-nl "2010.+09.30"; then
chmod 0644 $ETC_KEYRING
fi

# make sure apt knows about the new keys
if [ -x /usr/bin/apt-key ]; then
/usr/bin/apt-key update
fi