suse-build-key-12.0-150000.8.55.1<>,=g\p9|AjE]DDb>1W/&!VSh˩]TGԙAdyzvmh]FbTz%ñuoU7n laX@*'$.GVtaxyuߡG|^(aX 'کs];I#+!s#B%s<<uؤu WU0 +|6](0㞡+ S9:ilqc:SY{T^bfMz v>F4?4d $ ^"+ AQ}  P!l! ! ! t! ! !|!!!!t  i (89:=+_>+g?+o@+wB+F+G+!H,,!I,!X,Y,Z,[,\,!]-|!^0Q b1ec2d2e2f2l2u2!v30z4&484<4B4Csuse-build-key12.0150000.8.55.1The public gpg key for rpm package signature verificationThis package contains the gpg keys that are used to sign the SUSE rpm packages. The keys installed here are not actually used by directly, but need to be imported to the RPM database first. rpm/zypper use only the keys in the RPM database. The package also contains the Container signing keys in GPG and in X.509 PEM format for use by Docker Notary and Sigstore/Cosign.g\h04-ch1dSUSE Linux Enterprise 15SUSE LLC GPL-2.0+https://www.suse.com/System/Packageshttps://www.suse.com/support/security/keys/linuxnoarch if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fitouch /var/lib/suse-build-key/imported if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi test -x /usr/bin/systemctl && systemctl enable suse-build-key-import.timer && systemctl start suse-build-key-import.timer || true test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable suse-build-key-import.service suse-build-key-import.timer || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop suse-build-key-import.service suse-build-key-import.timer ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart suse-build-key-import.service suse-build-key-import.timer ) || : fi fi) 6f E AA큤A큤A큤AA큤A큤g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\g\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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsuse-build-key-12.0-150000.8.55.1.src.rpmbuild-keysuse-build-key      /bin/sh/bin/sh/bin/sh/bin/shfileutilsgpggpgmktemprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sh-utils3.0.4-14.6.0-14.0-15.2-14.14.1fffU@fffeeAeAeV@d c=@cWbaG@b<]@b8_h_5+@^@^h[ZXGX=mmeissner@suse.comeugenio.paolantonio@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comro@suse.de- extended 2048 bit SUSE SLE 12, 15 GA-SP5 key until 2028. (bsc#1229339) - gpg-pubkey-39db7c82-5f68629b.asc + gpg-pubkey-39db7c82-66c5d91a.asc- ensure key2rpmname is called using bash.- make the per-project inclusion optional, default off.- Also include the GPG key from the current build project to allow Staging testing without production keys. (bsc#1231829)- added missing ; in shell script (bsc#1227681)- Added new keys of the SLE Micro 6.0 / SLES 16 series, and auto import them. (bsc#1227429) gpg-pubkey-09d9ea69-645b99ce.asc: Main SLE Micro 6/SLES 16 key gpg-pubkey-73f03759-626bd414.asc: Backup SLE Micro 6/SLES 16 key.- Switch container key to be default RSA 4096bit. (jsc#PED-2777)- run rpm commands in import script only when libzypp is not active. bsc#1219189 bsc#1219123- run import script also in %posttrans section, but only when libzypp is not active. bsc#1219189 bsc#1219123- replace libzypp-post-script based installation with a systemd timer and service. - suse-build-key-import.service - suse-build-key-import.timer- add and run a import-suse-build-key scripts, this will be ran after installation with libzypp based installers. (jsc#PED-2777)- Establish multiple new 4096 RSA keys that we will switch to mid of 2023. (jsc#PED-2777) - gpg-pubkey-3fa1d6ce-63c9481c.asc: new 4096 RSA signing key for SLE (RPM+repos). - gpg-pubkey-d588dc46-63c939db.asc: new 4096 RSA reserver key for SLE (RPM+repos). - suse_ptf_key_4096.asc: new 4096 RSA signing key for PTF RPMs. - build-container-8fd6c337-63c94b45.asc/build-container-8fd6c337-63c94b45.pem: new RSA 4096 key for the SUSE registry registry.suse.com, installed as suse-container-key-2023.pem and suse-container-key-2023.asc - suse_ptf_containerkey_2023.asc suse_ptf_containerkey_2023.pem: New PTF container signing key for registry.suse.com/ptf/ space.- added /usr/share/pki/containers directory for container pem keys (cosign/sigstore style), put our PEM key there too (bsc#1204706)- still ship the old ptf key (was not added to documentation by mistake). (bsc#1198504)- No longer install 1024bit keys by default. (bsc#1197293) - SLE11 key moved to documentation - old PTF (pre March 2022) moved to documentation only- extended expiry of SUSE PTF key, move it to suse_ptf_key_old.asc - added new SUSE PTF key with RSA2048 bit as suse_ptf_key.asc (bsc#1196494) - extended expiry of SUSE SLES11 key (bsc#1194845) - added SUSE Contaner signing key in PEM format for use e.g. by cosign. - SUSE security key replaced with 2022 edition (E-Mail usage only). (bsc#1196495)- suse build key extended (bsc#1176759) gpg-pubkey-39db7c82-5847eb1f.asc -> gpg-pubkey-39db7c82-5f68629b.asc- actually the container key is different from the build signing key. (PM-1845 bsc#1170347)- add a /usr/share/container-keys/ directory for GPG based Container verification. - Add the SUSE build key as "suse-container-key.asc". (PM-1845 bsc#1170347)- created a new security@suse.de communication key (bsc#1166334)- include ptf key in the key directory to avoid it being stripped via %doc stripping. (bsc#1044232)- created a new security@suse.de communication key. (bsc#1082022) - extended the PTF key and the SLE10 build@suse.de key. (bsc#1085512)- extend the build@suse.de product key. (bsc#1014151) pub 2048R/39DB7C82 2013-01-31 [expires: 2020-12-06] uid SuSE Package Signing Key - use dumpsigs script from openSUSE to merge code/bin/sh/bin/sh/bin/sh/bin/shgpg-pubkey-b37b98a9h04-ch1d 1729518607  !12.0-150000.8.55.1 import-suse-build-keygnupgdumpsigskeysgpg-pubkey-09d9ea69-645b99ce.ascgpg-pubkey-39db7c82-66c5d91a.ascgpg-pubkey-3fa1d6ce-63c9481c.ascgpg-pubkey-50a3dd1c-50f35137.ascgpg-pubkey-73f03759-626bd414.ascgpg-pubkey-d588dc46-63c939db.ascsuse_ptf_key.ascsuse_ptf_key_2023.ascsuse-build-key-import.servicesuse-build-key-import.timercontainer-keyssuse-container-key-old.ascsuse-container-key-old.pemsuse-container-key.ascsuse-container-key.pemsuse-build-keysecurity_at_suse_de.ascsuse-sle11-key.ascsuse_ptf_containerkey.ascsuse_ptf_containerkey_2023.ascsuse_ptf_containerkey_2023.pemsuse_ptf_key.ascsuse_ptf_key_old.ascpkicontainerssuse-container-key-old.pemsuse-container-key.pemsuse-build-keyimported/usr/bin//usr/lib/rpm//usr/lib/rpm/gnupg//usr/lib/rpm/gnupg/keys//usr/lib/systemd/system//usr/share//usr/share/container-keys//usr/share/doc/packages//usr/share/doc/packages/suse-build-key//usr/share/pki//usr/share/pki/containers//var/lib//var/lib/suse-build-key/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:36116/SUSE_SLE-15_Update/751b8a6df3e86ca68a74c7b03a55f024-suse-build-key.SUSE_SLE-15_Updatedrpmxz5noarch-suse-linuxBourne-Again shell script, ASCII text executabledirectoryPerl script text executableASCII textcannot open `/home/abuild/rpmbuild/BUILDROOT/suse-build-key-12.0-150000.8.55.1.x86_64/var/lib/suse-build-key/imported' (No such file or directory).(utf-8a9c888caf53ecbcfd29b67eb3260d08b5859653c2d81b77be3c808ded00caa00?7zXZ !t/S]"k%bUֶܢNလi܏~ZU?زFIc6sqP %﫶H=zO`1T[=fLJ';ێ7 bTkh0(p^_ٔ3|oeq[cr]{=tJ92JȆ#W~J SiKWYezW'X1RSL)g>iz}ȸ t%T9g(n3p}Vŋ-y&JZs2oi6~tʒgf31ɵ6zXW;[*_S˥1j _jS!ꋇN'N]LuFt؅ꫝڍ HCum )IUɆ7L;(6qIN>sqFSG\d=Lɐknɒ6>a?xat\y+p@;3Ƀt^cLJRJUƾiPdaijhmle_apKCOj =, |@,_t3cT7z); W4 I6f)J 1ԙkU;߱7(6r`z`!'*:"ty@/TU 3ۓ"zɼ~H @)E~6MHc|'$? 2aOYdQ Y~ c 0+t7 n8f?m;L6&Ɲ6Q%S ЉL$ÑN#n7/{wզ&?4 8nYCcQWĀJ