Devuan bug report logs - #172
apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version

Package: libapt-pkg5.0; Reported by: OmegaPhil <[email protected]>; Owned by: Andreas Messer <[email protected]>; Keywords: ascii; Done: Arne Wichmann <[email protected]>; Maintainer for libapt-pkg5.0 is (unknown).

Message received at [email protected]:


Received: (at 172-done) by bugs.devuan.org; 28 Oct 2024 14:47:49 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Mon, 28 Oct 2024 14:47:49 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id GL8vEuGjH2c2dgAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Mon, 28 Oct 2024 14:46:57 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 27869660; Mon, 28 Oct 2024 14:46:57 +0000 (UTC)
Authentication-Results: email.devuan.org;
	dkim=pass header.d=anhrefn.saar.de [email protected] header.a=ed25519-sha256 header.s=1 header.b=sHxN4lh9;
	dkim-atps=neutral
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED,
	SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no
	version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=5.199.139.22; helo=arnium.elogos.de; [email protected]; receiver=<UNKNOWN> 
Received: from arnium.elogos.de (arnium.elogos.de [5.199.139.22])
	by email.devuan.org (Postfix) with ESMTPS id A48BC66D
	for <[email protected]>; Mon, 28 Oct 2024 14:46:56 +0000 (UTC)
Received: from [192.168.3.66] (helo=anhrefn.saar.de)
	by arnium.elogos.de with esmtp (Exim 4.96)
	(envelope-from <[email protected]>)
	id 1t5R3A-0005Ga-1P
	for [email protected];
	Mon, 28 Oct 2024 15:48:56 +0100
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed;
	d=anhrefn.saar.de; s=1; h=Content-Type:MIME-Version:Message-ID:Subject:To:
	From:Date:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:
	Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
	:Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
	List-Subscribe:List-Post:List-Owner:List-Archive;
	bh=dg/KisB9Zkk1f2fwwN6uZgbvGIQjBFFBVNgskyR3TAQ=; b=sHxN4lh9dKfxvKylVF2BIzvXk4
	lWKbQK1PwiGJSB6zNPOoWxGKuGUsfPdo5oNWJjzq0HkT3ClTzbnub0XiBMDA==;
Received: from aw by anhrefn.saar.de with local (Exim 4.98)
	(envelope-from <[email protected]>)
	id 1t5Qvu-000000004e0-20jT
	for [email protected];
	Mon, 28 Oct 2024 15:41:26 +0100
Date: Mon, 28 Oct 2024 15:41:24 +0100
From: Arne Wichmann <[email protected]>
To: [email protected]
Subject: Closing old bug
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="VOvGIknYIKEZdmsm"
Content-Disposition: inline
X-message-flag: Outluck ist kaputt :-)
Return-Receipt-To: [email protected]


--VOvGIknYIKEZdmsm
Content-Type: text/plain; protected-headers=v1; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 28 Oct 2024 15:41:24 +0100
From: Arne Wichmann <aw>
To: [email protected]
Subject: Closing old bug

I haven't seen this problem resurfacing for some releases, so I believe it
is gone - if I am in error please reopen.

cu

YPl
--=20
[...] If you don't want to be restricted, don't agree to it. If you are
coerced, comply as much as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Y Plentyn ([email protected])

--VOvGIknYIKEZdmsm
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=BP7R
-----END PGP SIGNATURE-----

--VOvGIknYIKEZdmsm--

Message received at [email protected]:


Received: (at 172-done) by bugs.devuan.org; 28 Oct 2024 14:47:49 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Mon, 28 Oct 2024 14:47:49 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id GL8vEuGjH2c2dgAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Mon, 28 Oct 2024 14:46:57 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 27869660; Mon, 28 Oct 2024 14:46:57 +0000 (UTC)
Authentication-Results: email.devuan.org;
	dkim=pass header.d=anhrefn.saar.de [email protected] header.a=ed25519-sha256 header.s=1 header.b=sHxN4lh9;
	dkim-atps=neutral
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED,
	SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no
	version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=5.199.139.22; helo=arnium.elogos.de; [email protected]; receiver=<UNKNOWN> 
Received: from arnium.elogos.de (arnium.elogos.de [5.199.139.22])
	by email.devuan.org (Postfix) with ESMTPS id A48BC66D
	for <[email protected]>; Mon, 28 Oct 2024 14:46:56 +0000 (UTC)
Received: from [192.168.3.66] (helo=anhrefn.saar.de)
	by arnium.elogos.de with esmtp (Exim 4.96)
	(envelope-from <[email protected]>)
	id 1t5R3A-0005Ga-1P
	for [email protected];
	Mon, 28 Oct 2024 15:48:56 +0100
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed;
	d=anhrefn.saar.de; s=1; h=Content-Type:MIME-Version:Message-ID:Subject:To:
	From:Date:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:
	Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
	:Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
	List-Subscribe:List-Post:List-Owner:List-Archive;
	bh=dg/KisB9Zkk1f2fwwN6uZgbvGIQjBFFBVNgskyR3TAQ=; b=sHxN4lh9dKfxvKylVF2BIzvXk4
	lWKbQK1PwiGJSB6zNPOoWxGKuGUsfPdo5oNWJjzq0HkT3ClTzbnub0XiBMDA==;
Received: from aw by anhrefn.saar.de with local (Exim 4.98)
	(envelope-from <[email protected]>)
	id 1t5Qvu-000000004e0-20jT
	for [email protected];
	Mon, 28 Oct 2024 15:41:26 +0100
Date: Mon, 28 Oct 2024 15:41:24 +0100
From: Arne Wichmann <[email protected]>
To: [email protected]
Subject: Closing old bug
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="VOvGIknYIKEZdmsm"
Content-Disposition: inline
X-message-flag: Outluck ist kaputt :-)
Return-Receipt-To: [email protected]


--VOvGIknYIKEZdmsm
Content-Type: text/plain; protected-headers=v1; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 28 Oct 2024 15:41:24 +0100
From: Arne Wichmann <aw>
To: [email protected]
Subject: Closing old bug

I haven't seen this problem resurfacing for some releases, so I believe it
is gone - if I am in error please reopen.

cu

YPl
--=20
[...] If you don't want to be restricted, don't agree to it. If you are
coerced, comply as much as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Y Plentyn ([email protected])

--VOvGIknYIKEZdmsm
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIzBAABCAAdFiEEtFUkbndwdIn81UX3EIremXYA/4kFAmcfopYACgkQEIremXYA
/4lIZA//QHglbr8j82v2TUaa5R3ORoyNCOFpBvMW9KhiOqqZHr56xTHcVbMaI7qp
CeQUV8EL0duzCzkuNxBt5dQNsCwwhuHK0aJ1u2ypRVPyUUhZzEXrXz1zLkXnfIpw
GQQ2+FEpMxcS0trjQm68V/XM8sVZwGcJQyC1OH7ppUxitfT6kIeS1VCyTwDewWRm
i0evTyP33rSdHrriCgiBkrasDd7k/2gX9Uo0Eg11vF1LhiExqnBqlLiO2H7VrAMn
sNYkXUzytlBoFfyyua3qr6otwuYUq0jQmqj+HrJUUR+MkCRsVFtLv7FkATImW0Xk
wJtRIex43TaSH4jGde+7yabO3TW7BycoNEpUoLI5wCeFZ7M5u5VHfnIHAGTXr56C
6EAIRc+F3XmVaemb/m2ZL0FyzMjiF68ZaOAfAwmZLxuW6jMtCYLdcVG+Esqsufgj
5zGzx3inbJMszd3i8I9sCo/wugCTU7aqvgImVAjOc3ZjEfbQ4UWbVahev25Y6DPy
Jz1hpa0XxQ7Xgj33YBspeybhZFRm7WSdgYVouQjAvnIxEZC50CM7xLlcSjS8BifK
UPnDxHaEjkgf2/pUXzkPGrxCByjS2EmvNlHyX8sT3pnfIJEOssUZsczz0OyPdF8y
IY/umZeML98yGWicGKN8xE9qGxVvfjAQW7A4oY0cEfKI+oPmIwo=
=BP7R
-----END PGP SIGNATURE-----

--VOvGIknYIKEZdmsm--

Notification sent to OmegaPhil <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Arne Wichmann <[email protected]>:
You have taken responsibility. Full text available.

Message received at [email protected]:


Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB;
	Sat, 18 Apr 2020 19:33:54 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=apollo)
	by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
	(Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100
Received: from mark by apollo with local (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100
Date: Sat, 18 Apr 2020 18:33:45 +0100
From: Mark Hindley <[email protected]>
To: Andreas Messer <[email protected]>, [email protected],
	devuan developers internal list <[email protected]>
Cc: [email protected]
Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote:
> I believe the problem is more related to devuan 
> repository structure than to libapt-pkg5.0. Maybe security
> updates need to be put in subfolders, such that libapt
> can detect the archive/release properly.
> 
> I prefer to close this issue since it is not directly
> related to libapt and also for ascii, apt is taken unchanged
> from Debian repos.

I think that is fine unless it can be demonstrated it is a current issue.

Mark

Message sent on to OmegaPhil <[email protected]>:
bug#172. Full text available.

Message received at [email protected]:


Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB;
	Sat, 18 Apr 2020 19:33:54 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=apollo)
	by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
	(Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100
Received: from mark by apollo with local (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100
Date: Sat, 18 Apr 2020 18:33:45 +0100
From: Mark Hindley <[email protected]>
To: Andreas Messer <[email protected]>, [email protected],
	devuan developers internal list <[email protected]>
Cc: [email protected]
Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote:
> I believe the problem is more related to devuan 
> repository structure than to libapt-pkg5.0. Maybe security
> updates need to be put in subfolders, such that libapt
> can detect the archive/release properly.
> 
> I prefer to close this issue since it is not directly
> related to libapt and also for ascii, apt is taken unchanged
> from Debian repos.

I think that is fine unless it can be demonstrated it is a current issue.

Mark

Message sent on to OmegaPhil <[email protected]>:
bug#172. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB;
	Sat, 18 Apr 2020 19:33:54 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=apollo)
	by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
	(Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100
Received: from mark by apollo with local (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100
Date: Sat, 18 Apr 2020 18:33:45 +0100
From: Mark Hindley <[email protected]>
To: Andreas Messer <[email protected]>, [email protected],
	devuan developers internal list <[email protected]>
Cc: [email protected]
Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote:
> I believe the problem is more related to devuan 
> repository structure than to libapt-pkg5.0. Maybe security
> updates need to be put in subfolders, such that libapt
> can detect the archive/release properly.
> 
> I prefer to close this issue since it is not directly
> related to libapt and also for ascii, apt is taken unchanged
> from Debian repos.

I think that is fine unless it can be demonstrated it is a current issue.

Mark

Information forwarded to [email protected], [email protected], Andreas Messer <[email protected]>:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB;
	Sat, 18 Apr 2020 19:33:54 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=apollo)
	by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
	(Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100
Received: from mark by apollo with local (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100
Date: Sat, 18 Apr 2020 18:33:45 +0100
From: Mark Hindley <[email protected]>
To: Andreas Messer <[email protected]>, [email protected],
	devuan developers internal list <[email protected]>
Cc: [email protected]
Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote:
> I believe the problem is more related to devuan 
> repository structure than to libapt-pkg5.0. Maybe security
> updates need to be put in subfolders, such that libapt
> can detect the archive/release properly.
> 
> I prefer to close this issue since it is not directly
> related to libapt and also for ascii, apt is taken unchanged
> from Debian repos.

I think that is fine unless it can be demonstrated it is a current issue.

Mark

Information forwarded to [email protected], [email protected], Andreas Messer <[email protected]>:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 16:20:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3;
	Sat, 18 Apr 2020 18:11:07 +0200 (CEST)
Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3;
	Sat, 18 Apr 2020 18:11:06 +0200 (CEST)
Date: Sat, 18 Apr 2020 18:11:04 +0200
From: Andreas Messer <[email protected]>
To: [email protected], [email protected]
Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL"
Content-Disposition: inline
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C,
	RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I believe the problem is more related to devuan=20
repository structure than to libapt-pkg5.0. Maybe security
updates need to be put in subfolders, such that libapt
can detect the archive/release properly.

I prefer to close this issue since it is not directly
related to libapt and also for ascii, apt is taken unchanged
=66rom Debian repos.

--vtzGhvizbBRQ85DL
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv
UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA=
=6Y4C
-----END PGP SIGNATURE-----

--vtzGhvizbBRQ85DL--

Message sent on to OmegaPhil <[email protected]>:
bug#172. Full text available.

Message received at [email protected]:


Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 16:20:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3;
	Sat, 18 Apr 2020 18:11:07 +0200 (CEST)
Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3;
	Sat, 18 Apr 2020 18:11:06 +0200 (CEST)
Date: Sat, 18 Apr 2020 18:11:04 +0200
From: Andreas Messer <[email protected]>
To: [email protected], [email protected]
Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL"
Content-Disposition: inline
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C,
	RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I believe the problem is more related to devuan=20
repository structure than to libapt-pkg5.0. Maybe security
updates need to be put in subfolders, such that libapt
can detect the archive/release properly.

I prefer to close this issue since it is not directly
related to libapt and also for ascii, apt is taken unchanged
=66rom Debian repos.

--vtzGhvizbBRQ85DL
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv
UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA=
=6Y4C
-----END PGP SIGNATURE-----

--vtzGhvizbBRQ85DL--

Message sent on to OmegaPhil <[email protected]>:
bug#172. Full text available.
Owner recorded as Andreas Messer <[email protected]>. Request was from Andreas Messer <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 18 Apr 2020 16:20:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3;
	Sat, 18 Apr 2020 18:11:07 +0200 (CEST)
Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3;
	Sat, 18 Apr 2020 18:11:06 +0200 (CEST)
Date: Sat, 18 Apr 2020 18:11:04 +0200
From: Andreas Messer <[email protected]>
To: [email protected], [email protected]
Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL"
Content-Disposition: inline
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C,
	RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I believe the problem is more related to devuan=20
repository structure than to libapt-pkg5.0. Maybe security
updates need to be put in subfolders, such that libapt
can detect the archive/release properly.

I prefer to close this issue since it is not directly
related to libapt and also for ascii, apt is taken unchanged
=66rom Debian repos.

--vtzGhvizbBRQ85DL
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv
UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA=
=6Y4C
-----END PGP SIGNATURE-----

--vtzGhvizbBRQ85DL--

Acknowledgement sent to Andreas Messer <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 18 Apr 2020 16:20:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3;
	Sat, 18 Apr 2020 18:11:07 +0200 (CEST)
Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3;
	Sat, 18 Apr 2020 18:11:06 +0200 (CEST)
Date: Sat, 18 Apr 2020 18:11:04 +0200
From: Andreas Messer <[email protected]>
To: [email protected], [email protected]
Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL"
Content-Disposition: inline
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C,
	RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I believe the problem is more related to devuan=20
repository structure than to libapt-pkg5.0. Maybe security
updates need to be put in subfolders, such that libapt
can detect the archive/release properly.

I prefer to close this issue since it is not directly
related to libapt and also for ascii, apt is taken unchanged
=66rom Debian repos.

--vtzGhvizbBRQ85DL
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv
UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA=
=6Y4C
-----END PGP SIGNATURE-----

--vtzGhvizbBRQ85DL--

Acknowledgement sent to Andreas Messer <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 19 Feb 2018 16:50:07 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Mon, 19 Feb 2018 17:50:07 +0100 (CET)
Received: from mx-out2.startmail.com (mx-out2.startmail.com [145.131.90.155])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 7F6CBF60903
	for <[email protected]>; Mon, 19 Feb 2018 17:43:08 +0100 (CET)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="ZPkCn5Mz";
	dkim-atps=neutral
From: OmegaPhil <[email protected]>
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com;
	s=2017-11; t=1519058554;
	bh=HmOQBllg/y5yjdFcQlQHjbJlQWaPZp8WW+fLMFowK4o=;
	h=From:Subject:To:Date:From;
	b=ZPkCn5MzLZztjR1aSGGNetR/bEjKRWZXFoQ5fnSgSt/niTs2km4piWekxGM6Y9in+
	 tVFTzgGCOYsxrjFxARR0UI/93wzF+2rb36Ex8ySYtPFDuSvClL/7eB0fIEgighJ0H4
	 JGl/Bj0Ap0meAB/J+VAAymDSydUwqQjRJGcp0Aik1JOylfvBVO9mAxi1C4hphE7l9F
	 n/k7CoedfDMDyPiThd2X7VogiqrbeZmRXeB3hODrYSQIbKh4tVs1/MAlVQyyOIN79I
	 wUyg4241v3dskJjLPRa4xTriOsTddq2xuZvVEsGmk3TLBCETke9CGBGTBb+HjF/jsJ
	 DGSUr+DLeUL8w==
Subject: RE: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
To: [email protected]
Message-ID: <[email protected]>
Date: Mon, 19 Feb 2018 16:42:19 +0000
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO"
X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO
Content-Type: multipart/mixed; boundary="RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl";
 protected-headers="v1"
From: OmegaPhil <[email protected]>
To: [email protected]
Message-ID: <[email protected]>
Subject: RE: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version

--RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl
Content-Type: text/plain; charset=utf-8
Content-Language: en-GB
Content-Transfer-Encoding: quoted-printable

Previous email was intended for another ticket.

Confirming that this is still an issue - without pinning repository
codenames 'ascii-security' and 'ascii-updates' to priority 990, they
keep the default 500 priority which puts them on par with ceres - so the
ceres kernel gets picked for an upgrade for the current kernel installed
from ascii-security, despite default release preference set to 'ascii'.


--RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl--

--qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=cgAg
-----END PGP SIGNATURE-----

--qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO--


Acknowledgement sent to OmegaPhil <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 18 Feb 2018 21:20:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Sun, 18 Feb 2018 22:20:04 +0100 (CET)
Received: from mx-out1.startmail.com (mx-out1.startmail.com [145.131.90.139])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 71405F6099A
	for <[email protected]>; Sun, 18 Feb 2018 22:19:21 +0100 (CET)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="P5JmxQU6";
	dkim-atps=neutral
To: [email protected]
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com;
	s=2017-11; t=1518988727;
	bh=rW4K/sl/z4dIFHgb8lay/Yv23Ro/r5Cf9hfOCLxcUUA=;
	h=To:From:Subject:Date:From;
	b=P5JmxQU6uX8N/1W6szDh12rHGyQWHIEeHtJEho7MlC9WCVKf/ERfZIkZKPnwRhoxq
	 JA1eSCwUXzuSuGII2enJSKDy8gnJAxvEOZhFkMzYcWcbgwyZzmyB4L26IqCkjeyOdv
	 4oVWkqzJej2TpY01oqKTL8VtVymTztsskiHLrYPQ8k4WNatdyBAgALzN7qT3h74nk1
	 5uSxrd04bOAorzd4MWGZcyX0uhyuRjs5YiEEfnxBjrTd+nEBfMdpq8uZmRZ4JkCOSN
	 x2q+ZY1Wg/HzHu+EAGk6yC0IDhkic+fe4MXmXFtv7RskYfRSfq7fwz9gg3U2Ah+XKJ
	 JBIBZwx1kP9eg==
From: OmegaPhil <[email protected]>
Subject: RE: Devuan not known distribution in postgresql-common
Message-ID: <[email protected]>
Date: Sun, 18 Feb 2018 21:18:34 +0000
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb"
X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb
Content-Type: multipart/mixed; boundary="keJHHONXHJ0YETJKnsRe2cggursecJnE4";
 protected-headers="v1"
From: OmegaPhil <[email protected]>
To: [email protected]
Message-ID: <[email protected]>
Subject: RE: Devuan not known distribution in postgresql-common

--keJHHONXHJ0YETJKnsRe2cggursecJnE4
Content-Type: text/plain; charset=utf-8
Content-Language: en-GB
Content-Transfer-Encoding: quoted-printable

Just looking at this one, pgcommon.sh is fetching Devuan release
information from /etc/os-release, the locale_gen function needs to be
updated here to allow 'devuan' to be treated the same as 'debian'.

debian/supported-versions goes further to try to determine a Debian
version number, so this'll need to be updated too. Shall I make a
feature request upstream?

For reference I know of postgresql but I don't yet use it personally.


--keJHHONXHJ0YETJKnsRe2cggursecJnE4--

--HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=+vRh
-----END PGP SIGNATURE-----

--HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb--


Acknowledgement sent to OmegaPhil <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.
Tags added: ascii Request was from OmegaPhil <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 172) by bugs.devuan.org; 6 Jan 2018 17:50:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Sat, 06 Jan 2018 18:50:06 +0100 (CET)
Received: from smx-7fb.smtp.startmail.com (smx-7fb.smtp.startmail.com [37.153.204.247])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id AA796F615A9
	for <[email protected]>; Sat,  6 Jan 2018 18:50:09 +0100 (CET)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="wudmLkNP";
	dkim-atps=neutral
Received: from smx-8a9.int1.startmail.com (smx-8a9.int1.startmail.com [10.1.137.139])
	by smx-7fb.smtp.startmail.com (Postfix) with ESMTPS id E975EB7A8E
	for <[email protected]>; Sat,  6 Jan 2018 18:49:54 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com;
	s=dkim; t=1515260994;
	bh=CiQxSL+WEgtlvikECRBLfrmojPPXEYgtuAx8tOq7+WU=;
	h=Subject:To:References:From:Date:In-Reply-To:From;
	b=wudmLkNPaEfPM3MAOwO5Q1KprKmkcvrkWLPW2Ffsk0673bwL/+vCLFNiktxF+4esN
	 AieiK598avtCPLqX4ccnk5d5y2g7yyGGEig+3WWA+QBn/gQ0q7G6pduuJ2II1Ns0fx
	 K2oH0TDFSC3U9MAW65E91n2/QYi6tPND/hunP9FGVyAWIPJVRi0VW8rxRUalkc4aRu
	 FV+Sk8+HSrBRJ3zCaTLv0aZkBJ4GoiBrGSLgG8IodXgb7FiO278QK0+UieU4Id7meA
	 ibNpVLBzIN3L+7YmX/zLKGdTVPEgCQQPFzBQWmsZHblSfok34T6xlh6oUCbE3cz8eK
	 8TsJsPJjDqPhw==
Subject: Re: bug#172: Acknowledgement (apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version)
To: [email protected]
References: <[email protected]>
 <[email protected]>
From: OmegaPhil <[email protected]>
Message-ID: <[email protected]>
Date: Sat, 6 Jan 2018 17:49:40 +0000
Mime-Version: 1.0
In-Reply-To: <[email protected]>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61"
X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,RP_MATCHES_RCVD,SPF_PASS,WEIRD_PORT
	autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61
Content-Type: multipart/mixed; boundary="FHdi9wATHsEZwOeipwmIKimzb0SjijTXl";
 protected-headers="v1"
From: OmegaPhil <[email protected]>
To: [email protected]
Message-ID: <[email protected]>
Subject: Re: bug#172: Acknowledgement (apt-get dist-upgrade or aptitude
 full-upgrade on VM with Default-Release set to ascii results in attempt to
 update kernel to ceres version)
References: <[email protected]>
 <[email protected]>
In-Reply-To: <[email protected]>

--FHdi9wATHsEZwOeipwmIKimzb0SjijTXl
Content-Type: text/plain; charset=utf-8
Content-Language: en-GB
Content-Transfer-Encoding: quoted-printable

On 05/01/18 18:03, Devuan bug Tracking System wrote:
> Thank you for the problem report you have sent regarding Devuan.
> This is an automatically generated reply, to let you know your message =
has
> been received.  It is being forwarded to the developers mailing list fo=
r
> their attention; they will reply in due course.
>=20
> Your message has been sent to the package maintainer(s):
>  [email protected]
>=20
> If you wish to submit further information on your problem, please send
> it to [email protected] (and *not* to
> [email protected]).
>=20
> Please do not reply to the address at the top of this message,
> unless you wish to report a problem with the bug-tracking system.
>=20
> Devuan Bugs Owner
> (administrator, Devuan bugs database)


Right, finally figured it out. The error:

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

E: The value 'ascii' is invalid for APT::Default-Release as such a
release is not available in the sources

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

is a red herring that only happens after you change the URLs associated
with apt repos.

In libapt-pkg5.0/apt-1.4.8/apt-pkg/policy.cc:pkgPolicy::pkgPolicy, if a
Default-Release has been specified, the code loops through all package
cache files (cached versions of the repo release files) looking for one
which has an archive (suite), codename or version that matches the
Default-Release.

When you change all repo URLs, these caches are invalidated and only the
/var/lib/dpkg/status package cache file remains - which has archive
'now' and little else. So when you do 'aptitude update', the loop checks
just this file and then says 'nope, no matching repo found'. The release
files are then downloaded from the relevant repos and turned into
caches, naturally the next command that needs to run (e.g. aptitude
full-upgrade) finds the relevant archive/codename and is happy.

The next problem, that apt was attempting to install a ceres kernel, is
related to the archive/codenames being exposed - investigating an
affected package:

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

apt-cache policy linux-headers-amd64
linux-headers-amd64:
  Installed: 4.9+80+deb9u3
  Candidate: 4.14+89
  Version table:
     4.14+89 500
        500 http://pkgmaster.devuan.org/merged ceres/main amd64 Packages
 *** 4.9+80+deb9u3 500
        500 http://pkgmaster.devuan.org/merged ascii-security/main amd64
Packages
        100 /var/lib/dpkg/status
     4.9+80+deb9u2 990
        990 http://pkgmaster.devuan.org/merged ascii/main amd64 Packages
     3.16+63 500
        500 http://pkgmaster.devuan.org/merged jessie/main amd64 Packages=


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Here we have the package installed from ascii-security (which is unusual
for me since I'm trying to update to get away from the Spectre crap),
you'll notice the pin level is only 500 on ascii-security compared to
990 on ascii.

Back in policy.cc:

CreatePin(pkgVersionMatch::Release,"",DefRel,990);

So, apt basically thinks that the ascii-security repo 'is not ascii'.

Through 'apt-cache policy':

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

 500 http://10.1.0.3:3142/pkgmaster.devuan.org/merged
ascii-security/non-free amd64 Packages
     release
v=3D2.0,a=3Dtesting-security,n=3Dascii-security,l=3DDevuan-Security,c=3Dn=
on-free,b=3Damd64
     origin 10.1.0.3

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

a =3D archive, n =3D codename - both of these aren't 'ascii', nor 'testin=
g'
(for argument's sake), so this repo isn't pinned.

Spinning up a Debian Stable VM, I can see that their security repo
works, but their updates repo has a similar issue (perhaps on purpose?):

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

 500 http://10.1.0.3:3142/ftp.uk.debian.org/debian stable-updates/main
amd64 Packages
     release
o=3DDebian,a=3Dstable-updates,n=3Dstretch-updates,l=3DDebian,c=3Dmain,b=3D=
amd64
     origin 10.1.0.3
 990 http://10.1.0.3:3142/security.debian.org stable/updates/main amd64
Packages
     release
v=3D9,o=3DDebian,a=3Dstable,n=3Dstretch,l=3DDebian-Security,c=3Dmain,b=3D=
amd64
     origin 10.1.0.3
 990 http://10.1.0.3:3142/ftp.uk.debian.org/debian stable/main amd64
Packages
     release v=3D9.3,o=3DDebian,a=3Dstable,n=3Dstretch,l=3DDebian,c=3Dmai=
n,b=3Damd64
     origin 10.1.0.3

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

I have no experience here, but this suggests that Devuan's security repo
should be have an archive of 'ascii' rather than 'ascii-security'.

Aside from the usual way of specifying 'ascii' or 'testing' in
Default-Release, I could almost use '2.0' since both ascii and
ascii-security use this, but ascii-updates uses '2.0.0'...


--FHdi9wATHsEZwOeipwmIKimzb0SjijTXl--

--Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=LVCo
-----END PGP SIGNATURE-----

--Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61--


Acknowledgement sent to OmegaPhil <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 5 Jan 2018 17:50:05 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Fri, 05 Jan 2018 18:50:05 +0100 (CET)
Received: from smx-7fb.smtp.startmail.com (smx-7fb.smtp.startmail.com [37.153.204.247])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 3C2CAF6049F
	for <[email protected]>; Fri,  5 Jan 2018 18:42:31 +0100 (CET)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="xHN9nCw9";
	dkim-atps=neutral
Received: from smx-8a9.int1.startmail.com (smx-8a9.int1.startmail.com [10.1.137.139])
	by smx-7fb.smtp.startmail.com (Postfix) with ESMTPS id B9638978E4
	for <[email protected]>; Fri,  5 Jan 2018 18:42:17 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com;
	s=dkim; t=1515174137;
	bh=+i4K7nI6J5qGUQqV5YzuvyeE5FP3NnF1jhUHD1e/rOE=;
	h=To:From:Subject:Date:From;
	b=xHN9nCw9cS9HTCt+9QF7SAek9tq+lP6zrIXc6k2K7hiGIUlFMM7uxzlggpf2i3eKt
	 zH7eZhp4QOSj4bdqbwf24Ctv0LusFd/1uKYThl92QW0kci2CroJcfKdZJSIBB6KtnD
	 PO2gjozhuaZJJGJJs2ibJAuDwqg/5RN9PNlVEsbjvW7o3J5vS9EI6KhgUA6kT5UXPM
	 Hs45tUxZYbDsLoU8LjfKdgX85ZIhT4+AHJKFkAwQGq0/RIuf2qme8MyQofz5rNr9li
	 ABQV0N7E1SOIJ381t/CBF9LlqFvYS9upq2pPheNGgctIoj7ZWOIZ+Yae/k7JHG7KQs
	 cJNp9uZ1b2BTA==
To: [email protected]
From: OmegaPhil <[email protected]>
Subject: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version
Message-ID: <[email protected]>
Date: Fri, 5 Jan 2018 17:41:57 +0000
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3"
X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,RP_MATCHES_RCVD,SPF_PASS,WEIRD_PORT
	autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3
Content-Type: multipart/mixed; boundary="rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc";
 protected-headers="v1"
From: OmegaPhil <[email protected]>
To: [email protected]
Message-ID: <[email protected]>
Subject: apt-get dist-upgrade or aptitude full-upgrade on VM with
 Default-Release set to ascii results in attempt to update kernel to ceres
 version

--rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc
Content-Type: text/plain; charset=utf-8
Content-Language: en-GB
Content-Transfer-Encoding: quoted-printable

Package: libapt-pkg5.0
Version: 1.4.8

When full-upgrading on a Devuan Ascii/Ceres VM, despite
'APT::Default-Release' set to 'ascii' in
'/etc/apt/apt.conf.d/00defaultrelease', the kernel from ceres is
starting to get fetched - it appears that libapt thinks there is no
'ascii' in the sources (error right at the start):

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

# sudo aptitude update
E: The value 'ascii' is invalid for APT::Default-Release as such a
release is not available in the sources
E: The value 'ascii' is invalid for APT::Default-Release as such a
release is not available in the sources
Get: 1 http://pkgmaster.devuan.org/merged jessie InRelease [22.2 kB]
Get: 2 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed
InRelease [122 kB]
Get: 3 http://pkgmaster.devuan.org/merged ascii InRelease [22.2 kB]
Get: 4 http://pkgmaster.devuan.org/merged ascii-updates InRelease [22.2
kB]
Get: 5 http://pkgmaster.devuan.org/merged ascii-security InRelease [21.6
kB]
Get: 6 http://pkgmaster.devuan.org/merged jessie/non-free Sources [99.7
kB]
Hit http://10.1.0.3:3142/pkgmaster.devuan.org/merged ceres InRelease

Get: 7 http://pkgmaster.devuan.org/merged jessie/main Sources [7,053 kB]
Get: 8 http://10.1.0.3:3142/packages.devuan.org/devuan experimental
InRelease [129 kB]
Get: 9 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan
ascii-proposed/main amd64 Packages [19.1 kB]
Get: 10 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan
ascii-proposed/main i386 Packages [19.1 kB]
Get: 11 http://pkgmaster.devuan.org/merged jessie/contrib Sources [50.5
kB]

Get: 12 http://pkgmaster.devuan.org/merged jessie/main amd64 Packages
[6,881 kB]

Get: 13 http://pkgmaster.devuan.org/merged jessie/main i386 Packages
[6,877 kB]

Get: 14 http://pkgmaster.devuan.org/merged jessie/contrib amd64 Packages
[49.9 kB]

Get: 15 http://pkgmaster.devuan.org/merged jessie/contrib i386 Packages
[49.3 kB]

Get: 16 http://pkgmaster.devuan.org/merged jessie/non-free i386 Packages
[81.0 kB]

Get: 17 http://pkgmaster.devuan.org/merged jessie/non-free amd64
Packages [84.2 kB]

Get: 18 http://pkgmaster.devuan.org/merged ascii/contrib Sources [44.7
kB]

Get: 19 http://pkgmaster.devuan.org/merged ascii/non-free Sources [79.8
kB]

Get: 20 http://pkgmaster.devuan.org/merged ascii/main Sources [6,753 kB]


Get: 21 http://pkgmaster.devuan.org/merged ascii/main amd64 Packages
[7,230 kB]

Get: 22 http://pkgmaster.devuan.org/merged ascii/main i386 Packages
[7,209 kB]

Get: 23 http://pkgmaster.devuan.org/merged ascii/contrib i386 Packages
[48.0 kB]

Get: 24 http://pkgmaster.devuan.org/merged ascii/contrib amd64 Packages
[51.0 kB]

Get: 25 http://pkgmaster.devuan.org/merged ascii/non-free amd64 Packages
[78.5 kB]

Get: 26 http://pkgmaster.devuan.org/merged ascii/non-free i386 Packages
[69.4 kB]

Get: 27 http://pkgmaster.devuan.org/merged ascii-updates/main Sources
[3,572 B]

Get: 28 http://pkgmaster.devuan.org/merged ascii-updates/main amd64
Packages [6,044 B]

Get: 29 http://pkgmaster.devuan.org/merged ascii-updates/main i386
Packages [6,020 B]

Get: 30 http://pkgmaster.devuan.org/merged ascii-security/contrib
Sources [940 B]
Get: 31 http://pkgmaster.devuan.org/merged ascii-security/main Sources
[95.3 kB]

Get: 32 http://pkgmaster.devuan.org/merged ascii-security/non-free
Sources [788 B]

Get: 33 http://pkgmaster.devuan.org/merged ascii-security/main i386
Packages [235 kB]

Get: 34 http://pkgmaster.devuan.org/merged ascii-security/main amd64
Packages [234 kB]

Get: 35 http://pkgmaster.devuan.org/merged ascii-security/contrib i386
Packages [1,372 B]

Get: 36 http://pkgmaster.devuan.org/merged ascii-security/contrib amd64
Packages [1,368 B]

Get: 37 http://pkgmaster.devuan.org/merged ascii-security/non-free i386
Packages [1,284 B]

Get: 38 http://pkgmaster.devuan.org/merged ascii-security/non-free amd64
Packages [1,284 B]

Fetched 43.8 MB in 3min 2s (240 kB/s)



Current status: 4 (+4) upgradable, 84219 (+84219) new.
There are 94 newly obsolete packages.
omega@devuan-testing-vm:~/files/source_code/kernel$ sudo aptitude
full-upgrade
The following NEW packages will be installed:
  apparmor{a} cpp-7{a} gcc-7{ab} gcc-7-base{a} libapparmor-perl{a}
libasan4{a} libgcc-7-dev{ab} linux-compiler-gcc-7-x86{a}
linux-headers-4.14.0-2-amd64{a}
  linux-headers-4.14.0-2-common{a} linux-image-4.14.0-2-amd64{a}
linux-kbuild-4.14{a} linux-source-4.14{a}
The following packages will be REMOVED:
  linux-source-4.9{u}
The following packages will be upgraded:
  linux-headers-amd64 linux-image-amd64 linux-source wget
4 packages upgraded, 13 newly installed, 1 to remove and 1 not upgraded.
Need to get 174 MB of archives. After unpacking 328 MB will be used.
The following packages have unmet dependencies:
 libgcc-7-dev : Depends: libgcc1 (>=3D 1:7.2.0-18) but 1:6.3.0-18 is inst=
alled
                Depends: libgomp1 (>=3D 7.2.0-18) but 6.3.0-18 is install=
ed
                Depends: libitm1 (>=3D 7.2.0-18) but 6.3.0-18 is installe=
d
                Depends: libatomic1 (>=3D 7.2.0-18) but 6.3.0-18 is insta=
lled
                Depends: liblsan0 (>=3D 7.2.0-18) but 6.3.0-18 is install=
ed
                Depends: libtsan0 (>=3D 7.2.0-18) but 6.3.0-18 is install=
ed
                Depends: libubsan0 (>=3D 7.2.0-18) but 6.3.0-18 is instal=
led
                Depends: libcilkrts5 (>=3D 7.2.0-18) but 6.3.0-18 is inst=
alled
                Depends: libmpx2 (>=3D 7.2.0-18) but 6.3.0-18 is installe=
d
                Depends: libquadmath0 (>=3D 7.2.0-18) but 6.3.0-18 is
installed
 gcc-7 : Depends: libcc1-0 (>=3D 7.2.0-18) but 6.3.0-18 is installed

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

'/etc/apt/sources.list' has various repos as the VM is used for testing
and in general I keep an Ascii system with important stuff pulled from
Ceres when it gets too out of date:

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

# Jessie included for g++4.9
#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged=

jessie main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/merged jessie main contrib
non-free
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged jessie main
contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged jessie mai=
n
contrib non-free

#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged=

ascii main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii main contrib non-f=
ree
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii main
contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii main=

contrib non-free

#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged=

ascii-updates main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii-updates main
contrib non-free
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-updates
main contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged
ascii-updates main contrib non-free

#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged=

ascii-security main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii-security main
contrib non-free
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-security=

main contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged
ascii-security main contrib non-free

# Testing proposed
#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan=

ascii-proposed main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed main
contrib non-free
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan ascii-proposed=

main contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan
ascii-proposed main contrib non-free

# Unstable
#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged=

ceres main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/merged ceres main contrib non-f=
ree
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ceres main
contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ceres main=

contrib non-free

# Experimental
#deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan=

experimental main contrib non-free
#deb-src [arch=3Damd64,i386]
http://10.1.0.3:3142/pkgmaster.devuan.org/devuan experimental main
contrib non-free
deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan experimental
main contrib non-free
deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan
experimental main contrib non-free

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

apt-cacher-ng is normally in use, but has been commented out here.

Over the years I have seen this bug in Debian (suddenly deciding the
named release isn't present in the sources), I'll see what I can find out=
=2E


--rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc--

--Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=S4sN
-----END PGP SIGNATURE-----

--Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3--


Acknowledgement sent to OmegaPhil <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#172; Package libapt-pkg5.0. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 30 Nov 2024 22:39:01 UTC