GPG

YUM GPG keys

NOTE: If you installed fdio/1908 with our Bash script, Chef cookbook, or Puppet module the GPG key is automatically installed. There is nothing additional you need to do.

GPG signature info

fdio/1908 has its YUM metadata signed with fdio-1908-70C615953FC81D17.pub.gpg.

Important notes

There are two types of GPG keyrings used on RPM-based systems:

  1. RPM's GPG keyring. This keyring is used for verifying signatures on RPM packages.
  2. YUM's GPG keyring. This keyring is used for verifying signatures on repository metadata. There is one keyring per repository on the system.

The YUM GPG keyring (number 2 above) is the keyring that the information on this page refers to.

Import GPG key for fdio/1908

To import a GPG key to verify YUM metadata, you must create a repo config with the GPG key URL. This is done automatically with all of our install methods.

If you'd like to do this manually for fdio/1908, follow the instructions on the manual install page

Remove GPG key for fdio/1908

Unfortunately GPG key removal is not particularly user friendly.

  1. Check your /etc/yum.conf file and note the value of persistdir. If persistdir is not set, you can assume it is /var/lib/yum.
  2. Determine which CPU architecture the repo has been installed for: i386 for 32-bit systems and x86_64 for 64-bit systems.
  3. Determine the verison number of the CentOS or Red Hat you are running (5, 6, or 7).
  4. Replace x86_64 and 7 in the following command with your CPU architecture and CentOS or RedHat version:
  5. gpg --homedir /var/lib/yum/repos/x86_64/7/fdio_1908/gpgdir --delete-key 70C615953FC81D17

APT GPG keys

NOTE: If you installed fdio/1908 with our Bash script, Chef cookbook, or Puppet module the GPG key is automatically installed. There is nothing additional you need to do.

GPG signature info

fdio/1908 has its APT metadata signed with fdio-1908-70C615953FC81D17.pub.gpg.

Import GPG key for fdio/1908

  1. Ensure you have curl installed:
    sudo apt-get install curl
  2. Ensure you have GPG installed:
    sudo apt-get install gnupg
  3. Add the GPG key:
  4. For versions equivalent to or later than Debian/Raspbian Stretch, Ubuntu Xenial, Linux Mint Sarah, Elementary OS Loki:

    curl -fsSL https://packagecloud.io/fdio/1908/gpgkey | gpg --dearmor > /etc/apt/keyrings/fdio_1908-archive-keyring.gpg

    For versions equivalent to or older than Debian/Raspbian Jessie, Ubuntu Wily, Linux Mint Rosa, Elementary OS Freya:

    curl -fsSL https://packagecloud.io/fdio/1908/gpgkey | gpg --dearmor > /etc/apt/trusted.gpg.d/fdio_1908.gpg

  5. For versions equivalent to or later than Debian/Raspbian Stretch, Ubuntu Xenial, Linux Mint Sarah, Elementary OS Loki - specify the GPG key in the /etc/apt/sources.list.d entry, as below. All older versions do not require the signed-by option.
        deb [signed-by=/etc/apt/keyrings/fdio_1908-archive-keyring.gpg] https://packagecloud.io/fdio/1908/<os> <version> main
        deb-src [signed-by=/etc/apt/keyrings/fdio_1908-archive-keyring.gpg] https://packagecloud.io/fdio/1908/<os> <version> main

Remove GPG key for fdio/1908

For GPG keys stored in /etc/apt/keyrings:

  1. Remove the GPG key:
    sudo rm /etc/apt/keyrings/fdio_1908-archive-keyring.gpg

For GPG keys stored in /etc/apt/trusted.gpg.d:

  1. Remove the GPG key:
    sudo apt-key remove 70C615953FC81D17
  2. You will see the output "OK" when complete. You can verify the key has been removed by running:
    sudo apt-key list

List all GPG keys known to APT

  1. List all GPG keys known to APT:
    apt-key list

Package signing keys

This repository has no package signing keys! Repository owners and collaborators can add some below.