<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/cmdline/apt-key.in, branch 1.3_pre2</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.3_pre2</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.3_pre2'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2016-07-01T22:03:20Z</updated>
<entry>
<title>deprecate 'apt-key update' and no-op it in Debian</title>
<updated>2016-07-01T22:03:20Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-07-01T21:44:37Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=f4dcab0504a68595d9e95c953ce66f46f9ad30aa'/>
<id>urn:sha1:f4dcab0504a68595d9e95c953ce66f46f9ad30aa</id>
<content type='text'>
Debian isn't using 'update' anymore for years and the command is in
direct conflict with our goal of not requiring gnupg anymore, so it
is high time to officially declare this command as deprecated.
</content>
</entry>
<entry>
<title>warn if apt-key is used in scripts/its output parsed</title>
<updated>2016-07-01T20:00:52Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-07-01T20:00:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=08fcf9628806af202e555bd02b3611e4e9a3d757'/>
<id>urn:sha1:08fcf9628806af202e555bd02b3611e4e9a3d757</id>
<content type='text'>
apt-key needs gnupg for most of its operations, but depending on it
isn't very efficient as apt-key is hardly used by users – and scripts
shouldn't use it to begin with as it is just a silly wrapper. To draw
more attention on the fact that e.g. 'apt-key add' should not be used in
favor of "just" dropping a keyring file into the trusted.gpg.d
directory this commit implements the display of warnings.
</content>
</entry>
<entry>
<title>alias apt-key list to finger</title>
<updated>2016-07-01T14:40:36Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-07-01T14:40:36Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=a5f9b45e4a67246f7af2c6fc62de9c531cd314a4'/>
<id>urn:sha1:a5f9b45e4a67246f7af2c6fc62de9c531cd314a4</id>
<content type='text'>
There is no real point in having two commands which roughly do the same
thing, especially if the difference is just in the display of the
fingerprint and hence security sensitive information.

Closes: 829232
</content>
</entry>
<entry>
<title>apt-key: don't search PATH if command is a path already</title>
<updated>2016-06-14T11:55:33Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-06-14T11:55:33Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ee385a36fe753272cadac0afd7f19b123a0c3d54'/>
<id>urn:sha1:ee385a36fe753272cadac0afd7f19b123a0c3d54</id>
<content type='text'>
</content>
</entry>
<entry>
<title>apt-key: change to / before find to satisfy its CWD needs</title>
<updated>2016-06-02T11:35:28Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-06-02T09:12:39Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=0cfec3ab589c6309bf284438d2148c7742cdaf10'/>
<id>urn:sha1:0cfec3ab589c6309bf284438d2148c7742cdaf10</id>
<content type='text'>
First seen on hurd, but easily reproducible on all systems by removing
the 'execution' bit from the current working directory and watching some
tests (mostly the no-output expecting tests) fail due to find printing:
"find: Failed to restore initial working directory: …"

Samuel Thibault says in the bugreport:
| To do its work, find first records the $PWD, then goes to
| /etc/apt/trusted.gpg.d/ to find the files, and then goes back to $PWD.
|
| On Linux, getting $PWD from the 700 directory happens to work by luck
| (POSIX says that getcwd can return [EACCES]: Search permission was denied
| for the current directory, or read or search permission was denied for a
| directory above the current directory in the file hierarchy). And going
| back to $PWD fails, and thus find returns 1, but at least it emitted its
| output.
|
| On Hurd, getting $PWD from the 700 directory fails, and find thus aborts
| immediately, without emitting any output, and thus no keyring is found.
|
| So, to summarize, the issue is that since apt-get update runs find as a
| non-root user, running it from a 700 directory breaks find.

Solved as suggested by changing to '/' before running find, with some
paranoia extra care taking to ensure the paths we give to find are really
absolute paths first (they really should, but TMPDIR=. or a similar
Dir::Etc::trustedparts setting could exist somewhere in the wild).

The commit takes also the opportunity to make these lines slightly less
error ignoring and the two find calls using (mostly) the same parameters.

Thanks: Samuel Thibault for 'finding' the culprit!
Closes: 826043
</content>
</entry>
<entry>
<title>apt-key: add \n to dpkg-query --show --showformat</title>
<updated>2016-05-01T15:17:18Z</updated>
<author>
<name>Carsten Hey</name>
<email>carsten@debian.org</email>
</author>
<published>2016-05-01T15:06:29Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=2e49f51915d07a6ad85c7ee4380a1e51afaa3a17'/>
<id>urn:sha1:2e49f51915d07a6ad85c7ee4380a1e51afaa3a17</id>
<content type='text'>
Guarding against 'broken' greps not dealing with non-text inputs
"just in case" by making the input text with a proper newline.

[commit message by David Kalnischkies]

Reported-On: IRC
Git-Dch: Ignore
</content>
</entry>
<entry>
<title>warn if apt-key is run unconditionally in maintainerscript</title>
<updated>2016-05-01T13:50:04Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-05-01T12:43:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5f17b19f8f99eb6f80a10846d5891f53c16178dc'/>
<id>urn:sha1:5f17b19f8f99eb6f80a10846d5891f53c16178dc</id>
<content type='text'>
We want to stop hard-depending on gnupg and for this it is essential
that apt-key isn't used in any critical execution path, which
maintainerscript are. Especially as it is likely that these script call
apt-key either only for (potentially now outdated cleanup) or still not
use the much simpler trusted.gpg.d infrastructure.
</content>
</entry>
<entry>
<title>add test for apt-key 0xKEY and use parameter expansion</title>
<updated>2016-03-06T09:16:59Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-03-06T09:16:59Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=031a3f254a2a73b2843ead28a2481b63ec1d7244'/>
<id>urn:sha1:031a3f254a2a73b2843ead28a2481b63ec1d7244</id>
<content type='text'>
Fixed in f7bd44bae0d7cb7f9838490b5eece075da83899e already, but the
commit misses the Closes tag and while we are at it we can add a simple
regression test and micro-optimize it a bit.

Thanks: James McCoy for the suggestion.
Closes: 816691
</content>
</entry>
<entry>
<title>apt-key del should correctly handle keyids prefixed with 0x</title>
<updated>2016-03-04T22:26:11Z</updated>
<author>
<name>Daniel Kahn Gillmor</name>
<email>dkg@fifthhorseman.net</email>
</author>
<published>2016-03-04T09:23:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=f7bd44bae0d7cb7f9838490b5eece075da83899e'/>
<id>urn:sha1:f7bd44bae0d7cb7f9838490b5eece075da83899e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>avoid triggering gpg2 migration in apt-key</title>
<updated>2015-12-19T22:04:34Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2015-12-18T11:35:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=803491dc568d2994745c3c4359f68053f7261658'/>
<id>urn:sha1:803491dc568d2994745c3c4359f68053f7261658</id>
<content type='text'>
The presents (even of an empty) secring.gpg is indication enough for
gpg2 to tigger the migration code which not only produces a bunch of
output on each apt-key call, but also takes a while to complete as an
agent needs to be started and all that.

We workaround the first part by forcing the migration to happen always
in a call we forced into silence, but that leaves us with an agent to
start all the time – with a bit of reordering we can make it so that we
do not explicitly create the secring, but let gpg create it if needed,
which prevents the migration from being triggered and we have at least a
bit less of a need for an agent. Changes - even to public only keyrings
- still require one, but such actions are infrequent in comparison to
verification calls, so that should be a net improvement.
</content>
</entry>
</feed>
