system-config/playbooks/roles/reprepro/files/debian-security/config/updates
Clark Boylan 6997f84bb6 Cleanup debian jessie and stretch keys
This started as an effort to clean up our mirroring of stretch packages.
It appears that the stretch content in our mirrors isn't actively
mirrored at this point and needs to be manually cleaned up. But while I
was looking in the config management i noticed that we still configure
jessie and stretch gpg keys which I don't think are necessary either.
Remove them.

Note the key fingerprint values were swapped around in our _keys dicts,
but the file content appears to have been correct for each of the keys.
We swap the key fingerprints around so that everything makes sense
again.

To confirm the key file content is correct:
  $ gpg --show-keys playbooks/roles/reprepro/files/keys/debian-bullseye-security.asc
  gpg: directory '/home/clark/.gnupg' created
  gpg: keybox '/home/clark/.gnupg/pubring.kbx' created
  pub   rsa4096 2021-01-17 [SC] [expires: 2029-01-15]
        AC530D520F2F3269F5E98313A48449044AAD5C5D
  uid                      Debian Security Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
  sub   rsa4096 2021-01-17 [S] [expires: 2029-01-15]

  $ gpg --show-keys playbooks/roles/reprepro/files/keys/debian-bullseye.asc
  pub   rsa4096 2021-01-17 [SC] [expires: 2029-01-15]
        1F89983E0081FDE018F3CC9673A4F27B8DD47936
  uid                      Debian Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
  sub   rsa4096 2021-01-17 [S] [expires: 2029-01-15]

And compare to the values published by debian:
  https://ftp-master.debian.org/keys.html

Change-Id: If5d710051b03024512667a8cb9498320b88f5b33
2022-04-20 16:36:47 -07:00

7 lines
170 B
Plaintext
Executable File

Name: debian-security
Method: http://security.debian.org/
Suite: */updates
Architectures: amd64 arm64
GetInRelease: no
VerifyRelease: 4DFAB270CAA96DFA+|A48449044AAD5C5D+