| Server IP : 68.183.124.220 / Your IP : 216.73.217.137 Web Server : Apache/2.4.18 (Ubuntu) System : Linux Sandbox-A 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 x86_64 User : gavin ( 1000) PHP Version : 7.0.33-0ubuntu0.16.04.16 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /var/lib/dpkg/info/ |
Upload File : |
#!/bin/sh
# the keyring in /var that gets fetched by apt-key net-update
# if it does not yet exist, copy it to avoid uneeded net copy
KEYRINGDIR="/var/lib/apt/keyrings"
KEYRING="${KEYRINGDIR}/ubuntu-archive-keyring.gpg"
if ! test -d $KEYRINGDIR; then
mkdir -m 755 -p $KEYRINGDIR
fi
if ! test -f $KEYRING; then
cp /usr/share/keyrings/ubuntu-archive-keyring.gpg $KEYRING
touch $KEYRING
fi
# sensible default permissions if there is no keyring yet
# (gpg will use 0600 otherwise and that will break release-upgrades later)
ETC_KEYRING="/etc/apt/trusted.gpg"
if [ ! -f $ETC_KEYRING ]; then
touch $ETC_KEYRING
chmod 0644 $ETC_KEYRING
fi
# during maverick we had keyrings created with mode 0600
# but this will break tools like update-managers release-downloader
# because it uses the trusted.gpg keyring to verify the signature (as user)
if dpkg --compare-versions "$2" lt-nl "2010.+09.30"; then
chmod 0644 $ETC_KEYRING
fi
# make sure apt knows about the new keys
if [ -x /usr/bin/apt-key ]; then
/usr/bin/apt-key update
fi