ubuntu-cloudimage-keyring-2013.11.11/0000755000000000000000000000000012240243343014063 5ustar ubuntu-cloudimage-keyring-2013.11.11/tools/0000755000000000000000000000000012240243343015223 5ustar ubuntu-cloudimage-keyring-2013.11.11/tools/pubkeys-to-keyring0000755000000000000000000000223412211427547020732 0ustar #!/bin/bash # Usage() { cat <&2; exit 1; } trap cleanup EXIT keyring="$1" shift; gpg_opts=( --ignore-time-conflict --no-options --no-default-keyring --homedir "$TEMP_D" "--primary-keyring=$WORKING_KEYRING" "--keyring=$WORKING_KEYRING" ) if [ -f "$keyring" ]; then cp "$keyring" "${WORKING_KEYRING}" || fail "failed cp '$keyring' to working dir" else : > "${WORKING_KEYRING}" fi for pubkey in "$@"; do case "${pubkey##*/}" in NONE|NONE.gpg) continue;; esac gpg "${gpg_opts[@]}" --import "$pubkey" || fail "failed to import '$pubkey' to '$keyring'" done mv "$WORKING_KEYRING" "$keyring" || fail "failed to move populated target keyring to '$keyring'" exit ubuntu-cloudimage-keyring-2013.11.11/pubkeys-removed/0000755000000000000000000000000012240243343017204 5ustar ubuntu-cloudimage-keyring-2013.11.11/pubkeys-removed/ubuntu-cloudimage/0000755000000000000000000000000012240243343022635 5ustar ubuntu-cloudimage-keyring-2013.11.11/pubkeys-removed/ubuntu-cloudimage/NONE.gpg0000644000000000000000000000000012211427547024071 0ustar ubuntu-cloudimage-keyring-2013.11.11/pubkeys/0000755000000000000000000000000012240243343015545 5ustar ubuntu-cloudimage-keyring-2013.11.11/pubkeys/ubuntu-cloudimage/0000755000000000000000000000000012240243343021176 5ustar ubuntu-cloudimage-keyring-2013.11.11/pubkeys/ubuntu-cloudimage/476CF100.gpg0000644000000000000000000000621212211427547022660 0ustar -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.12 (GNU/Linux) mQINBFCMc9EBEADDKn9mOi9VZhW+0cxmu3aFZWMg0p7NEKuIokkEdd6P+BRITccO ddDLaBuuamMbt/V1vrxWC5J+UXe33TwgO6KGfH+ECnXD5gYdEOyjVKkUyIzYV5RV U5BMrxTukHuh+PkcMVUy5vossCk9MivtCRIqM6eRqfeXv6IBV9MFkAbG3x96ZNI/ TqaWTlaHGszz2Axf9JccHCNfb3muLI2uVnUaojtDiZPm9SHTn6O0p7Tz7M7+P8qy vc6bdn5FYAk+Wbo+zejYVBG/HLLE4+fNZPESGVCWZtbZODBPxppTnNVm3E84CTFt pmWFBvBE/q2G9e8s5/mP2ATrzLdUKMxr3vcbNX+NY1Uyvn0Z02PjbxThiz1G+4qh 6Ct7gprtwXPOB/bCITZL9YLrchwXiNgLLKcGF0XjlpD1hfELGi0aPZaHFLAa6qq8 Ro9WSJljY/Z0g3woj6sXpM9TdWe/zaWhxBGmteJl33WBV7a1GucN0zF1dHIvev4F krp13Uej3bMWLKUWCmZ01OHStLASshTqVxIBj2rgsxIcqH66DKTSdZWyBQtgm/kC qBvuoQLFfUgIlGZihTQ96YZXqn+VfBiFbpnh1vLt24CfnVdKmzibp48KkhfqduDE Xxx/f/uZENH7t8xCuNd3p+u1zemGNnxuO8jxS6Ico3bvnJaG4DAl48vaBQARAQAB tG9VYnVudHUgQ2xvdWQgSW1hZ2UgQnVpbGRlciAoQ2Fub25pY2FsIEludGVybmFs IENsb3VkIEltYWdlIEJ1aWxkZXIpIDx1YnVudHUtY2xvdWRidWlsZGVyLW5vcmVw bHlAY2Fub25pY2FsLmNvbT6JAjgEEwECACIFAlCMc9ECGwMGCwkIBwMCBhUIAgkK CwQWAgMBAh4BAheAAAoJEH/z9AhHbPEAvRIQAMLE4ZMYiLvwSoWPAicM+3FInaqP 2rf1ZEf1k6175/G2n8cG3vK0nIFQE9Cus+ty2LrTggm79onV2KBGGScKe3ga+meO txj601Wd7zde10IWUa1wlTxPXBxLo6tpF4s4aw6xWOf4OFqYfPU4esKblFYn1eMK Dd53s3/123u8BZqzFC8WSMokY6WgBa+hvr5J3qaNT95UXo1tkMf65ZXievcQJ+Hr bp1m5pslHgd5PqzlultNWePwzqmHXXf14zI1QKtbc4UjXPQ+a59ulZLVdcpvmbjx HdZfK0NJpQX+j5PU6bMuQ3QTMscuvrH4W41/zcZPFaPkdJE5+VcYDL17DBFVzknJ eC1uzNHxRqSMRQy9fzOuZ72ARojvL3+cyPR1qrqSCceX1/Kp838P2/CbeNvJxadt liwI6rzUgK7mq1Bw5LTyBo3mLwzRJ0+eJHevNpxl6VoFyuoA3rCeoyE4on3oah1G iAJt576xXMDoa1Gdj3YtnZItEaX3jb9ZB3iz9WkzZWlZsssdyZMNmpYV30Ayj3CE KyurYF9lzIQWyYsNPBoXORNh73jkHJmL6g1sdMaxAZeQqKqznXbuhBbt8lkbEHMJ Stxc2IGZaNpQ+/3LCwbwCphVnSMq+xl3iLg6c0s4uRn6FGX+8aknmc/fepvRe+ba ntqvgz+SMPKrjeevuQINBFCMc9EBEADKGFPKBL7/pMSTKf5YH1zhFH2lr7tf5hbz ztsx6j3y+nODiaQumdG+TPMbrFlgRlJ6Ah1FTuJZqdPYObGSQ7qd/VvvYZGnDYJv Z1kPkNDmCJrWJs+6PwNARvyLw2bMtjCIOAq/k8wByKkMzegobJgWsbr2Jb5fT4cv FxYpm3l0QxQSw49rriO5HmwyiyG1ncvaFUcpxXJY8A2s7qX1jmjsqDY1fWsv5PaN ue0Fr3VXfOi9p+0CfaPY0Pl4GHzat/D+wLwnOhnjl3hFtfbhY5bPl5+cD51SbOnh 2nFv+bUK5HxiZlz0bw8hTUBN3oSbAC+2zViRD/9GaBYY1QjimOuAfpO1GZmqohVI msZKxHNIIsk5H98mN2+LB3vH+B6zrSMDm3d2Hi7ZA8wH26mLIKLbVkh7hr8RGQjf UZRxeQEf+f8F3KVoSqmfXGJfBMUtGQMTkaIeEFpMobVeHZZ3wk+Wj3dCMZ6bbt2i QBaoa7SU5ZmRShJkPJzCG3SkqN+g9ZcbFMQsybl+wLN7UnZ2MbSk7JEy6SLsyuVi 7EjLmqHmG2gkybisnTu3wjJezpG12oz//cuylOzjuPWUWowVQQiLs3oANzYdZ0Hp SuNjjtEILSRnN5FAeogs0AKH6sy3kKjxtlj764CIgn1hNidSr2Hyb4xbJ/1GE3Rk sjJi6uYIJwARAQABiQIfBBgBAgAJBQJQjHPRAhsMAAoJEH/z9AhHbPEA6IsP/3jJ DaowJcKOBhU2TXZglHM+ZRMauHRZavo+xAKmqgQc/izgtyMxsLwJQ+wcTEQT5uqE 4DoWH2T7DGiHZd/89Qe6HuRExR4p7lQwUop7kdoabqm1wQfcqr+77Znp1+KkRDyS lWfbsh9ARU6krQGryODEOpXJdqdzTgYhdbVRxq6dUopz1Gf+XDreFgnqJ+okGve2 fJGERKYynUmHxkFZJPWZg5ifeGVt+YY6vuOCg489dzx/CmULpjZeiOQmWyqUzqy2 QJ70/sC8BJYCjsESId9yPmgdDoMFd+gf3jhjpuZ0JHTeUUw+ncf+1kRf7LAALPJp 2PTSo7VXUwoEXDyUTM+dI02dIMcjTcY4yxvnpxRFFOtklvXt8Pwa9x/aCmJb9f0E 5FO0nj7l9pRd2g7UCJWETFRfSW52iktvdtDrBCft9OytmTl492wAmgbbGeoRq3ze QtzkRx9cPiyNQokjXXF+SQcq586oEd8K/JUSFPdvth3IoKlfnXSQnt/hRKv71kbZ IXmR3B/q5x2Msr+NfUxyXfUnYOZ5KertdprUfbZjudjmQ78LOvqPF8TdtHg3gD2H +G2z+IoH7qsOsc7FaJsIIa4+dljwV3QZTE7JFmsas90bRcMuM4D37p3snOpHAHY3 p7vH1ewg+vd9ySST0+OkWXYpbMOIARfBKyrGM3nu =+MFT -----END PGP PUBLIC KEY BLOCK----- ubuntu-cloudimage-keyring-2013.11.11/README0000644000000000000000000000213712211427547014756 0ustar This package delivers keyrings that contain the public keys that have been used to sign data on http://cloud-images.ubuntu.com. These keyrings should not be added to apt, as they are not intended to ever sign apt data. The Makefile basically creates keyrings from directories of public keys. pubkeys//*.gpg will be added to keyrings//*.gpg pubkeys-removed//*.gpg will be added to keyrings-removed/-removed.gpg The file 'NONE.gpg' is completely ignored, it is just used to facilitate the Makefile in creating an empty keyring. .gpg files in pubkeys// are simply exported (armored) gpg public keys. So you can easily import those into your private keyring with: gpg --import file.gpg To create a public key: gpg --armor --export KEYEMAIL > somekey.gpg To add a new keyring: add a directory to pubkeys/ and put a public key in it with extension .gpg To add a key to an existing keyring: add a file in pubkeys// with extension .gpg To move a keyring to 'removed': move pubkeys//file.gpg to keyrings-removed//file.gpg ubuntu-cloudimage-keyring-2013.11.11/debian/0000755000000000000000000000000012240243343015305 5ustar ubuntu-cloudimage-keyring-2013.11.11/debian/changelog0000644000000000000000000000070212240243334017156 0ustar ubuntu-cloudimage-keyring (2013.11.11) trusty; urgency=low * Improve packaging to include ascii armored public keys and to create the keyrings during build. -- Scott Moser Mon, 11 Nov 2013 16:06:35 -0500 ubuntu-cloudimage-keyring (2013.08.23) saucy; urgency=low * Initial release of Ubuntu Cloud Image keyring, for: - cloud-images.ubuntu.com -- Scott Moser Fri, 23 Aug 2013 13:32:39 -0400 ubuntu-cloudimage-keyring-2013.11.11/debian/bzr-builddeb.conf0000644000000000000000000000003112211427547020523 0ustar [BUILDDEB] native = True ubuntu-cloudimage-keyring-2013.11.11/debian/copyright0000644000000000000000000000235312211427547017253 0ustar This is Ubuntu GNU's GnuPG keyrings of archive keys. This package was originally put together by Scott Moser The keys in the keyrings don't fall under any copyright. Everything else in the package is covered by the GNU GPL. Ubuntu support files Copyright (C) 2010 Michael Vogt based on the debian-keyring package maintained by James Troup Ubuntu support files, Makefile, and tools/ for this source are free software; you can redistribute them and/or modify them under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. Ubuntu support files for ubuntu-keyring are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License with your Ubuntu system, in /usr/share/common-licenses/GPL, or with the Ubuntu GNU ubuntu-keyring source package as the file COPYING. If not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. ubuntu-cloudimage-keyring-2013.11.11/debian/rules0000755000000000000000000000040212211427547016371 0ustar #!/usr/bin/make -f # -*- makefile -*- #export DH_VERBOSE=1 #!/usr/bin/make -f %: dh $@ override_dh_auto_install: for f in keyrings/*.gpg keyrings-removed/*.gpg; do \ dh_install --sourcedir=. "$$f" usr/share/keyrings/; done dh_auto_install -- install ubuntu-cloudimage-keyring-2013.11.11/debian/install0000644000000000000000000000000012211427547016674 0ustar ubuntu-cloudimage-keyring-2013.11.11/debian/dirs0000644000000000000000000000002212211427547016173 0ustar usr/share/keyringsubuntu-cloudimage-keyring-2013.11.11/debian/control0000644000000000000000000000100412211427547016713 0ustar Source: ubuntu-cloudimage-keyring Section: misc Priority: optional Maintainer: Ubuntu Developers Standards-Version: 3.9.4 Build-Depends: debhelper (>= 7.0.50~), gnupg Package: ubuntu-cloudimage-keyring Priority: optional Architecture: all Depends: ${misc:Depends} Description: GnuPG keys of the Ubuntu Cloud Image builder The Ubuntu Cloud Image build process digitally signs the files it publishes. This package contains the keys used for files on cloud-images.ubuntu.com. ubuntu-cloudimage-keyring-2013.11.11/debian/compat0000644000000000000000000000000112211427547016512 0ustar 7ubuntu-cloudimage-keyring-2013.11.11/Makefile0000644000000000000000000000124312211427547015533 0ustar keyrings := $(shell cd pubkeys/ && for d in *; do \ [ -d $$d ] && echo keyrings/$$d-keyring.gpg; done) removed_keyrings := $(shell cd pubkeys/ && for d in *; do \ [ -d $$d ] && echo keyrings-removed/$$d-keyring-removed.gpg; done) all: $(keyrings) $(removed_keyrings) debug: @echo keyrings=$(keyrings) @echo removed_keyrings=$(removed_keyrings) keyrings/%-keyring.gpg: pubkeys/%/*.gpg @mkdir -p `dirname $@` @: > $@ tools/pubkeys-to-keyring $@ $^ || rm -f $@ keyrings-removed/%-keyring-removed.gpg: pubkeys-removed/%/*.gpg @mkdir -p `dirname $@` @: > $@ tools/pubkeys-to-keyring $@ $^ || rm -f $@ clean: rm -Rf keyrings keyrings-removed .PHONY: all clean