Your message dated Fri, 08 Jan 2021 22:03:26 +0000 with message-id <E1kxzqw-0003Mi-RC@fasolo.debian.org> and subject line Bug#969932: fixed in apt 2.1.16 has caused the Debian Bug report #969932, regarding apt: bullseye: breakage in example sources.list file and manual page: /updates -> -security to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 969932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969932 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: apt: bullseye: breakage in example sources.list file and manual page: /updates -> -security
- From: Paul Wise <pabs@debian.org>
- Date: Wed, 09 Sep 2020 12:39:03 +0800
- Message-id: <5c575ad042d48669fc3c0355e5ab68b40cc5c05b.camel@debian.org>
Package: apt Version: 2.1.10 Severity: minor File: /usr/share/man/man5/sources.list.5.gz File: /usr/share/doc/apt/examples/sources.list The above two files contain references to buster/updates. In the source code this appears as &debian-stable-codename;/updates but when bullseye is released as stable, these will need to be corrected to use the form &debian-stable-codename;-security instead. Presumably you will upload apt after the freeze setting debian-stable-codename to bullseye, at that point the change to use -security should also be made. This issue is present in several other packages: https://lists.debian.org/msgid-search/4f31193c69f5976a2922d5736576d060570baa42.camel@debian.org -- System Information: Debian Release: bullseye/sid APT prefers testing-debug APT policy: (900, 'testing-debug'), (900, 'testing'), (800, 'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.7.0-3-amd64 (SMP w/4 CPU threads) Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages apt depends on: ii adduser 3.118 ii debian-archive-keyring 2019.1 ii gpgv 2.2.20-1 ii libapt-pkg6.0 2.1.10 ii libc6 2.31-3 ii libgcc-s1 10.2.0-6 ii libgnutls30 3.6.15-1 ii libseccomp2 2.4.3-1+b1 ii libstdc++6 10.2.0-6 ii libsystemd0 246.4-1 Versions of packages apt recommends: ii ca-certificates 20200601 Versions of packages apt suggests: ii apt-doc 2.1.10 ii aptitude 0.8.13-2 ii dpkg-dev 1.20.5 ii gnupg 2.2.20-1 ii gnupg1 1.4.23-1+b1 ii gnupg2 2.2.20-1 ii powermgmt-base 1.36 ii synaptic 0.90+nmu1 -- no debconf information -- bye, pabs https://wiki.debian.org/PaulWiseAttachment: signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
- To: 969932-close@bugs.debian.org
- Subject: Bug#969932: fixed in apt 2.1.16
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 08 Jan 2021 22:03:26 +0000
- Message-id: <E1kxzqw-0003Mi-RC@fasolo.debian.org>
- Reply-to: Julian Andres Klode <jak@debian.org>
Source: apt Source-Version: 2.1.16 Done: Julian Andres Klode <jak@debian.org> We believe that the bug you reported is fixed in the latest version of apt, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 969932@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julian Andres Klode <jak@debian.org> (supplier of updated apt package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 08 Jan 2021 21:49:15 +0100 Source: apt Architecture: source Version: 2.1.16 Distribution: unstable Urgency: medium Maintainer: APT Development Team <deity@lists.debian.org> Changed-By: Julian Andres Klode <jak@debian.org> Closes: 188161 211075 594813 649588 969932 973305 Changes: apt (2.1.16) unstable; urgency=medium . [ Faidon Liambotis ] * Various fixes to http and connect method - basehttp: also consider Access when a Server's URI - connect: convert a C-style string to std::string - connect: use ServiceNameOrPort, not Port, as the cache key . [ Julian Andres Klode ] * patterns: Add dependency patterns ?depends, ?conflicts, etc. Note that the -broken- variants are not implemented yet. * Rewrite of the kernel autoremoval code: - Determine autoremovable kernels at run-time (LP: #1615381), this fixes the issue where apt could consider a running kernel autoremovable - Automatically remove unused kernels on apt {full,dist}-upgrade. This helps ensuring that we don't run out of /boot space. - Only keep up to 3 (not 4) kernels. Ubuntu boot partitions were sized for 3 kernels, not 4. * Bump codenames to bullseye/hirsute and adjust -security codename for bullseye (Closes: #969932) * Ignore failures from immediate configuration. This does not change the actual installation ordering - we never passed the return code to the caller and installation went underway anyway if it could be ordered at a later stage, this just removes spurious after-the-fact errors. (Closes: #973305, #188161, #211075, #649588) (LP: #1871268) * Add support for Phased-Update-Percentage, previously used only by update-manager. * Implement update --error-on=any so that scripts can reliably check for transient failures as well. (Closes: #594813) . [ Demi M. Obenour ] * test/integration/framework: Be compatible with Bash . [ Vangelis Skarmoutsos ] * Greek program translation update Checksums-Sha1: 36c442af8f390f912d5708a7bc160b1ed8caef0d 2784 apt_2.1.16.dsc 75b426e31453b8af90a9557b0f9c9c3e03e1fdf5 2191892 apt_2.1.16.tar.xz 409320f90a5e88b25f108aecfba553cff020f703 7500 apt_2.1.16_source.buildinfo Checksums-Sha256: bfd7131905a3037a6283e44046ff995cd8a29f27ebd64b24022c23ee5db9a658 2784 apt_2.1.16.dsc 32ab26926b05dd15ed09b5b844eb7c780ae5c9c62e6bf7cf8e4333f5e25fb4a8 2191892 apt_2.1.16.tar.xz 7f12ff6faffade64be0779fc946159389241f4f5f85f4bcff176d6a94faedbdc 7500 apt_2.1.16_source.buildinfo Files: c1d0b94a337d210841e2483183410c3e 2784 admin important apt_2.1.16.dsc aa52ed26ee2e74b823fd8e2825b9e76d 2191892 admin important apt_2.1.16.tar.xz 68fab02971bb43edcb7422391421160e 7500 admin important apt_2.1.16_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJDBAEBCgAtFiEET7WIqEwt3nmnTHeHb6RY3R2wP3EFAl/4z44PHGpha0BkZWJp YW4ub3JnAAoJEG+kWN0dsD9xqqMP/1zfNKKDO/zhs0VATzCM6PIy7btd8ZhSyTCI Eo4bPcA5S3vSvb6arr+qvE8Hiox3FiGPzkd1zL3m9VaCol0dR5OBEMgr/l5gzX6s 8MXMEoeCkALK3UN9b456/+RH1Av/GJWnEqrFQoJQaeHRisJFjPxFP2yjkYI2ixOM yOzKIVjRdkV5euDhA/TpTHKtKl63q0yQE5yfIoGwnIKb9vcCzZ+MrdLep6hCSRc9 hXjy/+5OyAWDktlP9odYgSrTefocjSoD9OrNEZut/h+0Xz2lhVyh0kA+ubeH5s7j nue0uKc4QssZz15yZGVyup0ZxGenUZf0AUwSegXKu3Ui0GY6vt+4fh1wtxeLVJiP gwja2F63SDQDYWNf08Y2FC20x1xpf1ogC5dNDtP6+jbw/XHtk0CZj+ES9ky5qUdL o0iq1IdpdY+Kxi6koL2vfT70jwL7ZW+QTbnKdYL2MGhZMgK8YdFK28x98BYrP+oY RD23tUum57RSOkokKJPqRaoHkiqcnrXwQ1lYdRLHkmfFwRTc9f2QJEhQTREsCFbq IUrnagYZB+Pi9T7wEzqcdw3to1AowU9hzkYqGimRqKNqxC0ZiHkFF7HmIDdVBJbQ 3OSCFcnDbxwlFxp0l7HfI3u+aZSFUNS3vIMsI9GuCybmvydmkEI8ry+vjwfGtmfN TtWcmhk/ =dOI/ -----END PGP SIGNATURE-----
--- End Message ---