--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: apt-get install --dry-run package displays bogus error messages
- From: Lorenzo Beretta <lory.fulgi@infinito.it>
- Date: Wed, 27 Jul 2016 16:34:07 +0200
- Message-id: <146963004717.5965.15265570843792311609.reportbug@berry.homenet.telecomitalia.it>
Package: apt
Version: 1.3~pre2
Severity: minor
Dear Maintainer,
seeing what would happen installing a new packages yields
$ apt-get install --dry-run flwm
NOTE: This is only a simulation!
apt-get needs root privileges for real execution.
Keep also in mind that locking is deactivated,
so don't depend on the relevance to the real current situation!
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
flwm (1.02+git2015.04.29-1)
0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded.
Inst flwm (1.02+git2015.04.29-1 Debian:unstable [amd64])
Conf flwm (1.02+git2015.04.29-1 Debian:unstable [amd64])
W: Problem unlinking the file /var/log/apt/eipp.log.xz - FileFd::Open (13: Permission denied)
W: Could not open file /var/log/apt/eipp.log.xz - open (17: File exists)
W: Could not open file '/var/log/apt/eipp.log.xz' - EIPP::OrderInstall (17: File exists)
Notice the last 3 lines.
No error message if the package is already installed.
That's it, bye!
-- Package-specific info:
-- /etc/apt/preferences --
#Explanation: Pinned by apt-listbugs at 2014-07-16 19:21:29 +0200
#Explanation: #748173: grub-efi-amd64: Boot failure after upgrade to 2.02~beta2-10
#Package: grub-efi-amd64
#Pin: version 2.00-22
#Pin-Priority: 1000
-- (/etc/apt/preferences.d/apt-listbugs present, but not submitted) --
-- /etc/apt/sources.list --
#
# deb [arch=amd64,i386] cdrom:[Debian GNU/Linux testing _Jessie_ - Official Snapshot amd64 NETINST Binary-1 20140519-06:33]/ jessie main
#deb [arch=amd64,i386] cdrom:[Debian GNU/Linux testing _Jessie_ - Official Snapshot amd64 NETINST Binary-1 20140519-06:33]/ jessie main
deb [arch=amd64,i386] http://ftp.debian.org/debian/ sid main
deb-src http://ftp.debian.org/debian/ sid main
# 20160511 no "Release" file
#deb [arch=amd64,i386] http://security.debian.org/ sid/updates main
#deb-src http://security.debian.org/ sid/updates main
deb [arch=amd64,i386] http://ftp.debian.org/debian/ sid contrib
deb-src http://ftp.debian.org/debian/ sid contrib
deb [arch=amd64,i386] http://ftp.debian.org/debian/ sid non-free
#deb-src http://ftp.debian.org/debian/ sid non-free
# jessie-updates, previously known as 'volatile'
#deb [arch=amd64,i386] http://ftp.debian.org/debian/ sid-updates main
#deb-src http://ftp.debian.org/debian/ sid-updates main
# jessie-backports, previously on backports.debian.org
#deb [arch=amd64,i386] http://debian.fastweb.it/debian/ jessie-backports main
#deb-src http://debian.fastweb.it/debian/ jessie-backports main
-- (/etc/apt/sources.list.d/google-chrome.list present, but not submitted) --
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.6.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages apt depends on:
ii adduser 3.115
ii debian-archive-keyring 2014.3
ii gpgv 1.4.20-6
ii init-system-helpers 1.39
ii libapt-pkg5.0 1.3~pre2
ii libc6 2.23-2
ii libgcc1 1:6.1.1-10
ii libstdc++6 6.1.1-10
Versions of packages apt recommends:
ii gnupg 1.4.20-6
ii gnupg2 2.1.11-7
Versions of packages apt suggests:
pn apt-doc <none>
ii aptitude 0.8.2-1
ii dpkg-dev 1.18.9
ii powermgmt-base 1.31+nmu1
ii python-apt 1.1.0~beta4
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: apt
Source-Version: 1.3~pre3
We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 832614@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Julian Andres Klode <jak@debian.org> (supplier of updated apt package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 04 Aug 2016 10:23:49 +0200
Source: apt
Binary: apt libapt-pkg5.0 libapt-inst2.0 apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source
Version: 1.3~pre3
Distribution: unstable
Urgency: medium
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Julian Andres Klode <jak@debian.org>
Description:
apt - commandline package manager
apt-doc - documentation for APT
apt-transport-https - https download transport for APT
apt-utils - package management related utility programs
libapt-inst2.0 - deb package format runtime library
libapt-pkg-dev - development files for APT's libapt-pkg and libapt-inst
libapt-pkg-doc - documentation for APT development
libapt-pkg5.0 - package management runtime library
Closes: 831762 832039 832044 832614
Changes:
apt (1.3~pre3) unstable; urgency=medium
.
[ Julian Andres Klode ]
* ExecGPGV: Fork in all cases
* ExecGPGV: Pass current config state to apt-key via temp file (LP: #1607283)
.
[ David Kalnischkies ]
* tests: activate dpkg multi-arch even if test is single arch
* ensure Cnf::FindFile doesn't return files below /dev/null
* don't hardcode /var/lib/dpkg/status as dir::state::status
* allow arch=all to override No-Support-for-Architecture-all
* support "install ./foo.changes"
* clean up default-stanzas from extended_states on write
* report warnings&errors consistently in edit-sources
* create non-existent files in edit-sources with 644 instead of 640
* report progress for removing while purging pkgs
* use a configurable location for apport report storage
* report progress for triggered actions
* call flush on the wrapped writebuffered FileFd
* verify hash of input file in rred
* use proper warning for automatic pipeline disable
* http: skip requesting if pipeline is full
* rred: truncate result file before writing to it (Closes: #831762)
* eipp: avoid producing file warnings in simulation (Closes: 832614)
* if the FileFd failed already following calls should fail, too
* edsp: try to read responses even if writing failed
* prevent C++ locale number formatting in text APIs (try 2) (Closes: 832044)
* apt-key: kill gpg-agent explicitly in cleanup
.
[ Mert Dirik ]
* Turkish program translation update (Closes: 832039)
Checksums-Sha1:
f4d5314486ce5d72260cbab738e2a7673a7cb29f 2506 apt_1.3~pre3.dsc
4882fb4adc2fed9779166e727eb3e498e1708090 2085564 apt_1.3~pre3.tar.xz
Checksums-Sha256:
11dd9715c36088a4a3dc07b6c34f76559a7ce124384e82b941b52fa646342874 2506 apt_1.3~pre3.dsc
65e2baba8056761f7030f5afcc00c5575490594c87e706fe79adb7d06d0b7e8c 2085564 apt_1.3~pre3.tar.xz
Files:
ca705250ae1f4c3acddbc4cc18663684 2506 admin important apt_1.3~pre3.dsc
37c910daf3d500d9fe4b70594ff11b44 2085564 admin important apt_1.3~pre3.tar.xz
-----BEGIN PGP SIGNATURE-----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=NI3Y
-----END PGP SIGNATURE-----
--- End Message ---