suse-build-key-12.0-150000.8.37.1<>,:teZp9|(&ڎNy*BP^75~ؖ#.Rw;_eTHS=f[% -$tteM$,;wQc]=H,Or:jGO(U}bqOmSh35#.,U3DZeW8)=sH 2Yj09t.VD*QTY'IU HD ]C=Ρȭj`^ ,Y2KBCsk4J} j  0"8y`;PU 6>F/?/d $ ^"+ AQ}  Pd   \ ; \s8   (89:=&:>&B?&J@&RB&ZF&nG&H'I'|X'Y'Z'['\'](<^* b+c,d-e-f-l-u-,v-z.....Csuse-build-key12.0150000.8.37.1The public gpg key for rpm package signature verificationThis package contains the gpg keys that are used to sign the SUSE rpm packages. The keys installed here are not actually used by directly, but need to be imported to the RPM database first. rpm/zypper use only the keys in the RPM database. The package also contains the Container signing keys in GPG and in X.509 PEM format for use by Docker Notary and Sigstore/Cosign.eZh04-ch2avfSUSE Linux Enterprise 15SUSE LLC GPL-2.0+https://www.suse.com/System/Packageshttps://www.suse.com/support/security/keys/linuxnoarch if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fitouch /var/lib/suse-build-key/imported if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi test -x /usr/bin/systemctl && systemctl enable suse-build-key-import.timer && systemctl start suse-build-key-import.timer || true test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable suse-build-key-import.service suse-build-key-import.timer || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop suse-build-key-import.service suse-build-key-import.timer ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in suse-build-key-import.service suse-build-key-import.timer ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart suse-build-key-import.service suse-build-key-import.timer ) || : fi fi) 6f E AA큤A큤A큤AA큤A큤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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsuse-build-key-12.0-150000.8.37.1.src.rpmbuild-keysuse-build-key      /bin/sh/bin/sh/bin/sh/bin/shfileutilsgpggpgmktemprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sh-utils3.0.4-14.6.0-14.0-15.2-14.14.1eV@d c=@cWbaG@b<]@b8_h_5+@^@^h[ZXGX=mmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comro@suse.de- replace libzypp-post-script based installation with a systemd timer and service. - suse-build-key-import.service - suse-build-key-import.timer- add and run a import-suse-build-key scripts, this will be ran after installation with libzypp based installers. (jsc#PED-2777)- Establish multiple new 4096 RSA keys that we will switch to mid of 2023. (jsc#PED-2777) - gpg-pubkey-3fa1d6ce-63c9481c.asc: new 4096 RSA signing key for SLE (RPM+repos). - gpg-pubkey-d588dc46-63c939db.asc: new 4096 RSA reserver key for SLE (RPM+repos). - suse_ptf_key_4096.asc: new 4096 RSA signing key for PTF RPMs. - build-container-8fd6c337-63c94b45.asc/build-container-8fd6c337-63c94b45.pem: new RSA 4096 key for the SUSE registry registry.suse.com, installed as suse-container-key-2023.pem and suse-container-key-2023.asc - suse_ptf_containerkey_2023.asc suse_ptf_containerkey_2023.pem: New PTF container signing key for registry.suse.com/ptf/ space.- added /usr/share/pki/containers directory for container pem keys (cosign/sigstore style), put our PEM key there too (bsc#1204706)- still ship the old ptf key (was not added to documentation by mistake). (bsc#1198504)- No longer install 1024bit keys by default. (bsc#1197293) - SLE11 key moved to documentation - old PTF (pre March 2022) moved to documentation only- extended expiry of SUSE PTF key, move it to suse_ptf_key_old.asc - added new SUSE PTF key with RSA2048 bit as suse_ptf_key.asc (bsc#1196494) - extended expiry of SUSE SLES11 key (bsc#1194845) - added SUSE Contaner signing key in PEM format for use e.g. by cosign. - SUSE security key replaced with 2022 edition (E-Mail usage only). (bsc#1196495)- suse build key extended (bsc#1176759) gpg-pubkey-39db7c82-5847eb1f.asc -> gpg-pubkey-39db7c82-5f68629b.asc- actually the container key is different from the build signing key. (PM-1845 bsc#1170347)- add a /usr/share/container-keys/ directory for GPG based Container verification. - Add the SUSE build key as "suse-container-key.asc". (PM-1845 bsc#1170347)- created a new security@suse.de communication key (bsc#1166334)- include ptf key in the key directory to avoid it being stripped via %doc stripping. (bsc#1044232)- created a new security@suse.de communication key. (bsc#1082022) - extended the PTF key and the SLE10 build@suse.de key. (bsc#1085512)- extend the build@suse.de product key. (bsc#1014151) pub 2048R/39DB7C82 2013-01-31 [expires: 2020-12-06] uid SuSE Package Signing Key - use dumpsigs script from openSUSE to merge code/bin/sh/bin/sh/bin/sh/bin/shgpg-pubkey-b37b98a9h04-ch2a 1700404634 12.0-150000.8.37.1 import-suse-build-keygnupgdumpsigskeysgpg-pubkey-39db7c82-5f68629b.ascgpg-pubkey-3fa1d6ce-63c9481c.ascgpg-pubkey-50a3dd1c-50f35137.ascgpg-pubkey-d588dc46-63c939db.ascsuse_ptf_key.ascsuse_ptf_key_2023.ascsuse-build-key-import.servicesuse-build-key-import.timercontainer-keyssuse-container-key-2023.ascsuse-container-key-2023.pemsuse-container-key.ascsuse-container-key.pemsuse-build-keysecurity_at_suse_de.ascsuse-sle11-key.ascsuse_ptf_containerkey.ascsuse_ptf_containerkey_2023.ascsuse_ptf_containerkey_2023.pemsuse_ptf_key.ascsuse_ptf_key_old.ascpkicontainerssuse-container-key-2023.pemsuse-container-key.pemsuse-build-keyimported/usr/bin//usr/lib/rpm//usr/lib/rpm/gnupg//usr/lib/rpm/gnupg/keys//usr/lib/systemd/system//usr/share//usr/share/container-keys//usr/share/doc/packages//usr/share/doc/packages/suse-build-key//usr/share/pki//usr/share/pki/containers//var/lib//var/lib/suse-build-key/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31513/SUSE_SLE-15_Update/817a98498bbfaf555813250dfade3b02-suse-build-key.SUSE_SLE-15_Updatedrpmxz5noarch-suse-linuxBourne-Again shell script, ASCII text executabledirectoryPerl script text executableASCII textcannot open `/home/abuild/rpmbuild/BUILDROOT/suse-build-key-12.0-150000.8.37.1.x86_64/var/lib/suse-build-key/imported' (No such file or directory)0D8{f@FpNutf-8464fe3e31db55bc77da16abfc4a32d3068fbe502c5d467cacac61b3a45ae7c47?7zXZ !t/]"k%bUֶܢNလiڻ%l.,?ֲP(U^H4Ac +0|"mb0G eToWl dlYJ kzUXJ[3>u kP> r6 ).長XScC秼"cDp sl/+WG5ZR65/)0zE a9o>H}]%i5=p=>I6#ybc?gZ*Α gµlsW݉?~Lsh^#3lpE{ߨF)Y<~ 6C;2dߠ]m]w!I#X0|3?PD%Z(@`6(WY7 Ϳ`sFOoTs@jYcE(lH2O*Z9a" WH_3msNP} 1~zh 䆿'gי@򹦀Tb0ڠ͡}py6Tȸ9a۪o4 C\ Z'ġ|q!9. A4lh8Wo= 4޹"=b[x[ZR5B&,G})sz% 9T!Ǵ@utkڀydBBw%NO1\O?f̹/8yw>[oqYRv{8"n GW#yp#Z] "IJT@r=aIfR+©8|D"$u<;&Ӎy5B/.7f|aIߗA0GЊ@:ɾP̕40Ey9LI]ٷo(΋Oo ~owgMS3B wB/JpgWMjЗ't!O5֋Bàg]6B.N]̉-&1#j;(Gl|7(<\&/á,eu\ў

RE Cߣ=[GV ׮J@Ag?W:Dz1"EaCo9ڠYo O͕r _P B+梆Mݯ(Q{4 3 YZ