<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/cmdline/apt-key.in, branch 2.3.14</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.3.14</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.3.14'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2021-11-26T14:33:06Z</updated>
<entry>
<title>Use short options for cmp</title>
<updated>2021-11-26T14:33:06Z</updated>
<author>
<name>Walter Lozano</name>
<email>walter.lozano@collabora.com</email>
</author>
<published>2021-11-26T14:33:06Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=e7511e1955c250e3e59b2a32b0c29374816b47dd'/>
<id>urn:sha1:e7511e1955c250e3e59b2a32b0c29374816b47dd</id>
<content type='text'>
In order to be consistent with other uses of cmp and to improve compatiblity
with other implementations, like busybox one, change long options to short
ones.

Signed-off-by: Walter Lozano &lt;walter.lozano@collabora.com&gt;
</content>
</entry>
<entry>
<title>Use `command -v` instead of `which`</title>
<updated>2021-11-03T22:02:41Z</updated>
<author>
<name>Ville Skyttä</name>
<email>ville.skytta@iki.fi</email>
</author>
<published>2021-11-03T22:02:41Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=48d4b06013ae3d80b95cf72efaf9a5e7468de965'/>
<id>urn:sha1:48d4b06013ae3d80b95cf72efaf9a5e7468de965</id>
<content type='text'>
`which` has been deprecated in debianutils 5.0+. The recommended
replacement, `command -v`, is mandated by Debian policy these days, in
addition to being required by POSIX and its predecessor specs at least
since 1994.

Not found commands cause no output from `command -v` per POSIX, so
remove the redundant 2&gt;&amp;1's while at it.
</content>
</entry>
<entry>
<title>apt-key: Allow depending on gpg instead of gnupg</title>
<updated>2020-05-06T10:52:57Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-05-06T10:52:57Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=f9f0ae2bbb2d0bfeccddecbf8b9ec07ccd54cd9a'/>
<id>urn:sha1:f9f0ae2bbb2d0bfeccddecbf8b9ec07ccd54cd9a</id>
<content type='text'>
Maintainer scripts that need to use apt-key del might as well
depend on gpg, they don't need the full gnupg suite.
</content>
</entry>
<entry>
<title>Fully deprecate apt-key, schedule removal for Q2/2022</title>
<updated>2020-05-06T10:33:39Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-05-06T10:33:39Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ee284d5917d09649b68ff1632d44e892f290c52f'/>
<id>urn:sha1:ee284d5917d09649b68ff1632d44e892f290c52f</id>
<content type='text'>
People are still using apt-key add and friends, despite that not
being guaranteed to work. Let's tell them to stop doing so.

We might still want a list command at a future point, but this
needs deciding, and a blanket ban atm seems like a sensible step
until we figured that out.
</content>
</entry>
<entry>
<title>Support multiple keyrings in sources.list Signed-By</title>
<updated>2018-09-11T11:16:11Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2018-08-17T14:33:41Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8375d5b58038fc026098dcccc3de87cd9d740334'/>
<id>urn:sha1:8375d5b58038fc026098dcccc3de87cd9d740334</id>
<content type='text'>
A user can specify multiple fingerprints for a while now, so its seems
counter-intuitive to support only one keyring, especially if this isn't
really checked or enforced and while unlikely mixtures of both should
work properly, too, instead of a kinda random behaviour.
</content>
</entry>
<entry>
<title>apt-key: Pass all instead of gpg-agent to gpgconf --kill</title>
<updated>2018-05-29T15:57:35Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2018-05-29T15:57:35Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=819426013c6ca6310bb469440702b6295dba4498'/>
<id>urn:sha1:819426013c6ca6310bb469440702b6295dba4498</id>
<content type='text'>
We want to kill everything using our temporary directory.

LP: #1773992
</content>
</entry>
<entry>
<title>Fix various typos reported by spellcheckers</title>
<updated>2018-05-04T22:34:27Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2018-05-04T17:56:41Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b12bdeaf8acd050c5526ecc05526db70df5fd485'/>
<id>urn:sha1:b12bdeaf8acd050c5526ecc05526db70df5fd485</id>
<content type='text'>
Reported-By: codespell &amp; spellintian
Gbp-Dch: Ignore
</content>
</entry>
<entry>
<title>ignore unsupported key formats in apt-key</title>
<updated>2017-10-05T15:30:25Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2017-08-01T13:22:09Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=012932793ba0ea9398a9acd80593bed8e77cfbfc'/>
<id>urn:sha1:012932793ba0ea9398a9acd80593bed8e77cfbfc</id>
<content type='text'>
gpg2 generates keyboxes by default and users end up putting either those
or armored files into the trusted.gpg.d directory which apt tools
neither expect nor can really work with without fortifying backward
compatibility (at least under the ".gpg" extension).

A (short) discussion about how to deal with keyboxes happened in
https://lists.debian.org/deity/2017/07/msg00083.html
As the last message in that thread is this changeset lets go ahead
with it and see how it turns out.

The idea is here simply that we check the first octal of a gpg file to
have one of three accepted values. Testing on my machines has always
produced just one of these, but running into those values on invalid
files is reasonabily unlikely to not worry too much.

Closes: #876508
</content>
</entry>
<entry>
<title>apt-key: ignore gpg1 already imported secret key import failure</title>
<updated>2016-12-31T02:50:06Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-12-31T02:50:06Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9544398fce600fb62762c05a8a84231fd1a365b4'/>
<id>urn:sha1:9544398fce600fb62762c05a8a84231fd1a365b4</id>
<content type='text'>
On Travis and co the default gpg implementation is gpg1 which for some
reason fails if a secret key which was already imported is imported
again. We would prefer it to be a NOP like gpg2 handles it so we crudely
check the error message. apt-key usually doesn't deal with secret keys –
it only learned to do it for manual testing and the integration
framework usage, so no public interface is effected.

Triggered-By: 4ce2f35248123ff2366c8c365ad6a94945578d66
Gbp-Dch: Ignore
</content>
</entry>
<entry>
<title>tests: cache the apt-key homedir used for Release signing</title>
<updated>2016-12-21T18:36:10Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-12-18T16:42:17Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=4ce2f35248123ff2366c8c365ad6a94945578d66'/>
<id>urn:sha1:4ce2f35248123ff2366c8c365ad6a94945578d66</id>
<content type='text'>
Importing a new secret key into gpg(2) can be increadibly slow which
prolongs the test runs significantly – by caching the homedir we gain a
significant speedbonus as reimporting already present keys seems like a
far less costly operation.

Git-Dch: Ignore
</content>
</entry>
</feed>
