Bug#640122: apt-get ignores apt.conf option "Acquire::Max-ValidTime" on amd64
Package: apt
Version: 0.8.10.3+squeeze1
Severity: normal
We're using an internal mirror which is updated at a defined interval for consistency.
The 'Release' files from security.debian.org set a quite short timeout in their Vaild-Until:
header (10 days). If we're trying to update an internal system from this mirror a few days
later (apt-get update), it complains about the 'Release' file being expired and ignores it
by default.
So we've set the apt.conf option "Acquire::Max-ValidTime" to "1209600" (see apt-config output
below). While this works on i686 systems, it is ignored on amd64 systems, even though
apt-config shows it. We've worked around this bug for now by also setting
"Acquire::Check-Valid-Until" to "false" on our amd64 systems (this option is not ignored),
but this isn't a real solution.
I already tried setting it as APT::Acquire::Max-ValidTime "1209600" - but that version
is ignored on both i686 and amd64.
-- Package-specific info:
-- apt-config dump --
APT "";
APT::Architecture "amd64";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^firmware-linux.*";
APT::NeverAutoRemove:: "^linux-firmware$";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^kfreebsd-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
APT::NeverAutoRemove:: "^linux-ubuntu-modules-.*";
APT::Never-MarkAuto-Sections "";
APT::Never-MarkAuto-Sections:: "metapackages";
APT::Never-MarkAuto-Sections:: "restricted/metapackages";
APT::Never-MarkAuto-Sections:: "universe/metapackages";
APT::Never-MarkAuto-Sections:: "multiverse/metapackages";
APT::Never-MarkAuto-Sections:: "oldlibs";
APT::Never-MarkAuto-Sections:: "restricted/oldlibs";
APT::Never-MarkAuto-Sections:: "universe/oldlibs";
APT::Never-MarkAuto-Sections:: "multiverse/oldlibs";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::mirrors "mirrors/";
Dir::State::extended_states "extended_states";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::netrc "auth.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Etc::preferencesparts "preferences.d";
Dir::Etc::trusted "trusted.gpg";
Dir::Etc::trustedparts "trusted.gpg.d";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Media "";
Dir::Media::MountPath "/media/apt";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
Dir::Log::History "history.log";
Dir::Ignore-Files-Silently "";
Dir::Ignore-Files-Silently:: "~$";
Dir::Ignore-Files-Silently:: "\.disabled$";
Dir::Ignore-Files-Silently:: "\.bak$";
Dir::Ignore-Files-Silently:: "\.dpkg-[a-z]+$";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
Acquire "";
Acquire::Check-Valid-Until "false";
Acquire::Max-ValidTime "1209600";
CommandLine "";
CommandLine::AsString "apt-config dump";
-- (no /etc/apt/preferences present) --
-- /etc/apt/sources.list --
deb http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free
deb http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free
# squeeze-updates, previously known as 'volatile'
deb http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free
-- System Information:
Debian Release: 6.0.2
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages apt depends on:
ii debian-archive-keyring 2010.08.28 GnuPG archive keys of the Debian a
ii gnupg 1.4.10-4 GNU privacy guard - a free PGP rep
ii libc6 2.11.2-10 Embedded GNU C Library: Shared lib
ii libgcc1 1:4.4.5-8 GCC support library
ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3
ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime
apt recommends no packages.
Versions of packages apt suggests:
pn apt-doc <none> (no description available)
ii aptitude 0.6.3-3.2 terminal-based package manager (te
ii bzip2 1.0.5-6 high-quality block-sorting file co
ii dpkg-dev 1.15.8.11 Debian package development tools
pn lzma <none> (no description available)
ii python-apt 0.7.100.1+squeeze1 Python interface to libapt-pkg
-- no debconf information
Diese elektronische Nachricht ist vertraulich. Die Information ist
nur fuer den Adressaten bestimmt. Falls Sie nicht der Adressat
sind, informieren Sie bitte sofort den Absender und vernichten
Sie diese E-Mail sowie alle Kopien und angeschlossenen
Anlagen. Bitte beachten Sie, dass es in diesem Fall verboten und
gesetzeswidrig ist, diese Nachricht zu kopieren, weiterzuleiten
oder zu benutzen. Es wurden alle moeglichen Massnahmen
getroffen um eine Virusfreiheit der beigefuegten Dateien zu
gewaehrleisten. Wir uebernehmen jedoch keine Verantwortung
fuer Schaeden, die aufgrund von Software-Viren entstehen und
empfehlen Ihnen vor Benutzung der Dateien eine Ueberpruefung
auf Viren durchzufuehren.
This electronic message contains information that is confidential.
The information is intended for the use of the addressee only. If
you are not the addressee please inform the sender immediately
and delete this e-mail, its attachments and any copies. Please
note that any disclosure, copy, distribution or use of the contents
of this message is prohibited and may be unlawful. We have
taken every reasonable precaution to ensure that any kind of
attachment to this e-mail has been swept for viruses.
However, we cannot accept liability for any damage sustained as
a result of software viruses and would advise you to carry out your
own virus checks before opening any attachment.
Reply to: