/usr/lib/live/build/bootstrap_archive-keys is in open-infrastructure-system-build 20161101-lts2-2.
This file is owned by root:root, with mode 0o755.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77  | #!/bin/sh
## live-build(7) - System Build Scripts
## Copyright (C) 2006-2015 Daniel Baumann <mail@daniel-baumann.ch>
##
## This program comes with ABSOLUTELY NO WARRANTY; for details see COPYING.
## This is free software, and you are welcome to redistribute it
## under certain conditions; see COPYING for details.
set -e
# Including common functions
[ -e "${LIVE_BUILD}/scripts/build.sh" ] && . "${LIVE_BUILD}/scripts/build.sh" || . /usr/lib/live/build.sh
# Setting static variables
DESCRIPTION="$(Echo 'bootstrap non-Debian archive-signing-keys')"
HELP=""
USAGE="${PROGRAM} [--force]"
Arguments "${@}"
# Reading configuration files
Read_conffiles config/all config/common config/bootstrap config/chroot config/binary config/source
Set_defaults
# TODO: allow verification against user-specified keyring
# For now, we'll only validate against debian-keyring
# TODO2: use chrooted validation rather than host system based one
case "${LB_MODE}" in
	progress-linux)
		case "${LB_DISTRIBUTION}" in
			artax*)
				_KEYS="artax artax-backports"
				;;
			baureo*)
				_KEYS="baureo baureo-backports"
				;;
			cairon*)
				_KEYS="cairon cairon-backports"
				;;
		esac
		_URL="${LB_MIRROR_CHROOT}/project/pgp"
		;;
esac
for _KEY in ${_KEYS}
do
	Echo_message "Fetching archive-key ${_KEY}..."
	wget -q "${_URL}/archive-key-${_KEY}.asc" -O chroot/key.asc
	wget -q "${_URL}/archive-key-${_KEY}.asc.sig" -O chroot/key.asc.sig
	if [ -e /usr/bin/gpgv ] && [ -e /usr/share/keyrings/debian-keyring.gpg ]
	then
		Echo_message "Verifying archive-key ${_KEY} against debian-keyring..."
		/usr/bin/gpgv --quiet --keyring /usr/share/keyrings/debian-keyring.gpg chroot/key.asc.sig chroot/key.asc > /dev/null 2>&1 || { Echo_error "archive-key ${_KEY} has invalid signature."; return 1;}
	else
		Echo_warning "Skipping archive-key ${_KEY} verification, either gpgv or debian-keyring not available on host system..."
	fi
	Echo_message "Importing archive-key ${_KEY}..."
	Chroot chroot "apt-key add key.asc"
	rm -f chroot/key.asc chroot/key.asc.sig
done
Chroot chroot "apt-get update"
# Creating stage file
Create_stagefile .build/bootstrap_archive-keys
 |