summaryrefslogtreecommitdiff
path: root/cmdline/apt-key.in
Commit message (Collapse)AuthorAgeFilesLines
* test if TMPDIR is accessible before usingDavid Kalnischkies2014-10-201-2/+6
| | | | | | | | | | Private temporary directories as created by e.g. libpam-tmpdir are nice, but they are also very effective in preventing our priviledge dropping to work as TMPDIR will be set to a directory only root has access to, so working with it as _apt will fail. We circumvent this by extending our check for a usable TMPDIR setting by checking access rights. Closes: 765951
* Test if TMPDIR is a directory in apt-key and if not unset itMichael Vogt2014-09-291-0/+3
| | | | | This prevents a failure in mktemp -d - it will blindly trust TMPDIR and not use something else if the dir is not there.
* add and use 'apt-key verify' which prefers gpgv over gpgDavid Kalnischkies2014-09-271-0/+8
| | | | | | | | | | | | | gnupg/gnupg2 can do verify just fine of course, so we don't need to use gpgv here, but it is what we always used in the past, so there might be scripts expecting a certain output and more importantly the output of apt-cdrom contains messages from gpg and even with all the settings we activate to prevent it, it still shows (in some versions) a quiet scary: "gpg: WARNING: Using untrusted key!" message. Keeping the use of gpgv is the simplest way to prevent it. We are increasing also the "Breaks: apt" version from libapt as it requires a newer apt-key than might be installed in partial upgrades.
* miscellaneous small cleanups in apt-keyDavid Kalnischkies2014-09-271-17/+7
| | | | Git-Dch: Ignore
* add --readonly option for apt-key advDavid Kalnischkies2014-09-271-5/+4
| | | | | | | | Some advanced commands can be executed without the keyring being modified like --verify, so this adds an option to disable the mergeback and uses it for our gpg calling code. Git-Dch: Ignore
* use only one --keyring in gpg interactionsDavid Kalnischkies2014-09-271-28/+77
| | | | | | | | | We were down to at most two keyrings before, but gnupg upstream plans dropping support for multiple keyrings in the longrun, so with a single keyring we hope to be future proof – and 'apt-key adv' isn't a problem anymore as every change to the keys is merged back, so we have now the same behavior as before, but support an unlimited amount of trusted.gpg.d keyrings.
* add --secret-keyring option for apt-keyDavid Kalnischkies2014-09-271-0/+11
| | | | | | | | | For some advanced usecases it might be handy to specify the secret keyring to be used (e.g. as it is used in the testcases), but specifying it via a normal option for gnupg might not be available forever: http://lists.gnupg.org/pipermail/gnupg-users/2013-August/047180.html Git-Dch: Ignore
* allow to specify fingerprints in 'apt-key del'David Kalnischkies2014-09-271-4/+17
|
* add a test for apt-key export{,all}David Kalnischkies2014-09-271-2/+2
| | | | Git-Dch: Ignore
* respect --keyring also in merged keyring commandsDavid Kalnischkies2014-09-271-8/+10
| | | | Git-Dch: Ignore
* support gnupg2 as drop-in replacement for gnupgDavid Kalnischkies2014-09-271-4/+13
| | | | | | If both are available APT will still prefer gpg over gpg2 as it is a bit more lightweight, but it shouldn't be a problem to use one or the other (at least at the moment, who knows what will happen in the future).
* delay gnupg setup in apt-key until it is neededDavid Kalnischkies2014-09-271-22/+22
| | | | | | 'apt-key help' and incorrect usage do not need a functioning gnupg setup, as well as we shouldn't try to setup gnupg before we actually test if it is available (and print a message if it is not).
* merge fragment keyrings in apt-key to avoid hitting gpg limitsDavid Kalnischkies2014-09-271-57/+77
| | | | | | | | | | | | | | gnupg has a hardlimit of 40 (at the moment) keyrings per invocation, which can be exceeded with (many) repositories. That is rather misfortune as the longrun goal was to drop gnupg dependency at some point in the future, but this can now be considered missed and dropped. It also means that 'apt-key adv' commands might not have the behaviour one would expect it to have as it mainly operates on a big temporary keyring, so commands modifying keys will break. Doing this was never a good idea anyway through, so lets just hope nothing break too badly. Closes: 733028
* refactor key removal code to reuse it in next stepDavid Kalnischkies2014-09-271-48/+55
| | | | Git-Dch: Ignore
* set a primary-keyring only if we have access to itDavid Kalnischkies2014-09-271-1/+3
|
* support (multiple) arguments properly in apt-keyDavid Kalnischkies2014-09-271-27/+27
|
* only create new trusted.gpg if directory is writeableDavid Kalnischkies2014-09-271-23/+14
|
* all errors should be printed to stderrDavid Kalnischkies2014-09-271-5/+5
| | | | Git-Dch: Ignore
* add a (hidden) --quiet option for apt-keyDavid Kalnischkies2014-09-271-4/+10
|
* remove leftover debug output from multikey softlinkDavid Kalnischkies2014-09-271-1/+0
| | | | Git-Dch: Ignore
* Fix typos in documentation (codespell)Michael Vogt2014-02-221-2/+2
|
* use gpg --homedir instead of explicit file placementDavid Kalnischkies2014-01-161-13/+14
| | | | | | Avoids that gpg gets the idea it could use files from the user which weren't overridden specifically like secret keyring and trustdb as before.
* fix apt-key net-update test to use the buildin webserverMichael Vogt2013-12-191-1/+1
|
* make apt-key net-update actually testableMichael Vogt2013-12-131-6/+13
|
* generate apt-key script with vendor info about keysDavid Kalnischkies2013-12-011-0/+354
The apt-key script uses quiet a few keyring files for operation which are specific to the distribution it is build on and is hence one of the most patched parts – even if it is not that often used anymore now that a fragment directory for trusted.gpg exists.