Skip to content

Fix apt-key deprecation #412

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
Normo opened this issue Apr 7, 2025 · 0 comments
Open

Fix apt-key deprecation #412

Normo opened this issue Apr 7, 2025 · 0 comments
Assignees
Labels
gitlab Related to hifis.gitlab role zammad Related to role hifis.zammad

Comments

@Normo
Copy link
Member

Normo commented Apr 7, 2025

Using apt-key add is deprecated.

See apt update warning:

W: https://packages.gitlab.com/gitlab/gitlab-ce/ubuntu/dists/noble/InRelease: Key is stored in legacy trusted.gpg keyring (/etc/apt/trusted.gpg), see the DEPRECATION section in apt-key(8) for details.

W: https://dl.packager.io/srv/deb/zammad/zammad/stable-6.4/ubuntu/dists/24.04/InRelease: Key is stored in legacy trusted.gpg keyring (/etc/apt/trusted.gpg), see the DEPRECATION section in apt-key(8) for details.

DEPRECATION section in apt-key(8)

DEPRECATION
       Except for using apt-key del in maintainer scripts, the use of apt-key is deprecated. This section shows how to replace existing use of apt-key.

       If your existing use of apt-key add looks like this:

       wget -qO- https://myrepo.example/myrepo.asc | sudo apt-key add -

       Then you can directly replace this with (though note the recommendation below):

       wget -qO- https://myrepo.example/myrepo.asc | sudo tee /etc/apt/trusted.gpg.d/myrepo.asc

       Make sure to use the "asc" extension for ASCII armored keys and the "gpg" extension for the binary OpenPGP format (also known as "GPG key public ring"). The binary OpenPGP format works for all apt versions, while the ASCII armored format works for apt
       version >= 1.4.

       Recommended: Instead of placing keys into the /etc/apt/trusted.gpg.d directory, you can place them anywhere on your filesystem by using the Signed-By option in your sources.list and pointing to the filename of the key. See sources.list(5) for details.
       Since APT 2.4, /etc/apt/keyrings is provided as the recommended location for keys not managed by packages. When using a deb822-style sources.list, and with apt version >= 2.4, the Signed-By option can also be used to include the full ASCII armored keyring
       directly in the sources.list without an additional file.
@Normo Normo added gitlab Related to hifis.gitlab role zammad Related to role hifis.zammad labels Apr 7, 2025
@Normo Normo self-assigned this Apr 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
gitlab Related to hifis.gitlab role zammad Related to role hifis.zammad
Projects
None yet
Development

No branches or pull requests

1 participant