Received: (at 172-done) by bugs.devuan.org; 28 Oct 2024 14:47:49 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Mon, 28 Oct 2024 14:47:49 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id GL8vEuGjH2c2dgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Mon, 28 Oct 2024 14:46:57 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 27869660; Mon, 28 Oct 2024 14:46:57 +0000 (UTC) Authentication-Results: email.devuan.org; dkim=pass header.d=anhrefn.saar.de [email protected] header.a=ed25519-sha256 header.s=1 header.b=sHxN4lh9; dkim-atps=neutral X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=5.199.139.22; helo=arnium.elogos.de; [email protected]; receiver=<UNKNOWN> Received: from arnium.elogos.de (arnium.elogos.de [5.199.139.22]) by email.devuan.org (Postfix) with ESMTPS id A48BC66D for <[email protected]>; Mon, 28 Oct 2024 14:46:56 +0000 (UTC) Received: from [192.168.3.66] (helo=anhrefn.saar.de) by arnium.elogos.de with esmtp (Exim 4.96) (envelope-from <[email protected]>) id 1t5R3A-0005Ga-1P for [email protected]; Mon, 28 Oct 2024 15:48:56 +0100 DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed; d=anhrefn.saar.de; s=1; h=Content-Type:MIME-Version:Message-ID:Subject:To: From:Date:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=dg/KisB9Zkk1f2fwwN6uZgbvGIQjBFFBVNgskyR3TAQ=; b=sHxN4lh9dKfxvKylVF2BIzvXk4 lWKbQK1PwiGJSB6zNPOoWxGKuGUsfPdo5oNWJjzq0HkT3ClTzbnub0XiBMDA==; Received: from aw by anhrefn.saar.de with local (Exim 4.98) (envelope-from <[email protected]>) id 1t5Qvu-000000004e0-20jT for [email protected]; Mon, 28 Oct 2024 15:41:26 +0100 Date: Mon, 28 Oct 2024 15:41:24 +0100 From: Arne Wichmann <[email protected]> To: [email protected] Subject: Closing old bug Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="VOvGIknYIKEZdmsm" Content-Disposition: inline X-message-flag: Outluck ist kaputt :-) Return-Receipt-To: [email protected] --VOvGIknYIKEZdmsm Content-Type: text/plain; protected-headers=v1; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Date: Mon, 28 Oct 2024 15:41:24 +0100 From: Arne Wichmann <aw> To: [email protected] Subject: Closing old bug I haven't seen this problem resurfacing for some releases, so I believe it is gone - if I am in error please reopen. cu YPl --=20 [...] If you don't want to be restricted, don't agree to it. If you are coerced, comply as much as you must to protect yourself, just don't support it. Noone can free you but yourself. (crag, on Debian Planet) Y Plentyn ([email protected]) --VOvGIknYIKEZdmsm Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEtFUkbndwdIn81UX3EIremXYA/4kFAmcfopYACgkQEIremXYA /4lIZA//QHglbr8j82v2TUaa5R3ORoyNCOFpBvMW9KhiOqqZHr56xTHcVbMaI7qp CeQUV8EL0duzCzkuNxBt5dQNsCwwhuHK0aJ1u2ypRVPyUUhZzEXrXz1zLkXnfIpw GQQ2+FEpMxcS0trjQm68V/XM8sVZwGcJQyC1OH7ppUxitfT6kIeS1VCyTwDewWRm i0evTyP33rSdHrriCgiBkrasDd7k/2gX9Uo0Eg11vF1LhiExqnBqlLiO2H7VrAMn sNYkXUzytlBoFfyyua3qr6otwuYUq0jQmqj+HrJUUR+MkCRsVFtLv7FkATImW0Xk wJtRIex43TaSH4jGde+7yabO3TW7BycoNEpUoLI5wCeFZ7M5u5VHfnIHAGTXr56C 6EAIRc+F3XmVaemb/m2ZL0FyzMjiF68ZaOAfAwmZLxuW6jMtCYLdcVG+Esqsufgj 5zGzx3inbJMszd3i8I9sCo/wugCTU7aqvgImVAjOc3ZjEfbQ4UWbVahev25Y6DPy Jz1hpa0XxQ7Xgj33YBspeybhZFRm7WSdgYVouQjAvnIxEZC50CM7xLlcSjS8BifK UPnDxHaEjkgf2/pUXzkPGrxCByjS2EmvNlHyX8sT3pnfIJEOssUZsczz0OyPdF8y IY/umZeML98yGWicGKN8xE9qGxVvfjAQW7A4oY0cEfKI+oPmIwo= =BP7R -----END PGP SIGNATURE----- --VOvGIknYIKEZdmsm--
Received: (at 172-done) by bugs.devuan.org; 28 Oct 2024 14:47:49 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Mon, 28 Oct 2024 14:47:49 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id GL8vEuGjH2c2dgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Mon, 28 Oct 2024 14:46:57 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 27869660; Mon, 28 Oct 2024 14:46:57 +0000 (UTC) Authentication-Results: email.devuan.org; dkim=pass header.d=anhrefn.saar.de [email protected] header.a=ed25519-sha256 header.s=1 header.b=sHxN4lh9; dkim-atps=neutral X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=5.199.139.22; helo=arnium.elogos.de; [email protected]; receiver=<UNKNOWN> Received: from arnium.elogos.de (arnium.elogos.de [5.199.139.22]) by email.devuan.org (Postfix) with ESMTPS id A48BC66D for <[email protected]>; Mon, 28 Oct 2024 14:46:56 +0000 (UTC) Received: from [192.168.3.66] (helo=anhrefn.saar.de) by arnium.elogos.de with esmtp (Exim 4.96) (envelope-from <[email protected]>) id 1t5R3A-0005Ga-1P for [email protected]; Mon, 28 Oct 2024 15:48:56 +0100 DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed; d=anhrefn.saar.de; s=1; h=Content-Type:MIME-Version:Message-ID:Subject:To: From:Date:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=dg/KisB9Zkk1f2fwwN6uZgbvGIQjBFFBVNgskyR3TAQ=; b=sHxN4lh9dKfxvKylVF2BIzvXk4 lWKbQK1PwiGJSB6zNPOoWxGKuGUsfPdo5oNWJjzq0HkT3ClTzbnub0XiBMDA==; Received: from aw by anhrefn.saar.de with local (Exim 4.98) (envelope-from <[email protected]>) id 1t5Qvu-000000004e0-20jT for [email protected]; Mon, 28 Oct 2024 15:41:26 +0100 Date: Mon, 28 Oct 2024 15:41:24 +0100 From: Arne Wichmann <[email protected]> To: [email protected] Subject: Closing old bug Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="VOvGIknYIKEZdmsm" Content-Disposition: inline X-message-flag: Outluck ist kaputt :-) Return-Receipt-To: [email protected] --VOvGIknYIKEZdmsm Content-Type: text/plain; protected-headers=v1; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Date: Mon, 28 Oct 2024 15:41:24 +0100 From: Arne Wichmann <aw> To: [email protected] Subject: Closing old bug I haven't seen this problem resurfacing for some releases, so I believe it is gone - if I am in error please reopen. cu YPl --=20 [...] If you don't want to be restricted, don't agree to it. If you are coerced, comply as much as you must to protect yourself, just don't support it. Noone can free you but yourself. (crag, on Debian Planet) Y Plentyn ([email protected]) --VOvGIknYIKEZdmsm Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEtFUkbndwdIn81UX3EIremXYA/4kFAmcfopYACgkQEIremXYA /4lIZA//QHglbr8j82v2TUaa5R3ORoyNCOFpBvMW9KhiOqqZHr56xTHcVbMaI7qp CeQUV8EL0duzCzkuNxBt5dQNsCwwhuHK0aJ1u2ypRVPyUUhZzEXrXz1zLkXnfIpw GQQ2+FEpMxcS0trjQm68V/XM8sVZwGcJQyC1OH7ppUxitfT6kIeS1VCyTwDewWRm i0evTyP33rSdHrriCgiBkrasDd7k/2gX9Uo0Eg11vF1LhiExqnBqlLiO2H7VrAMn sNYkXUzytlBoFfyyua3qr6otwuYUq0jQmqj+HrJUUR+MkCRsVFtLv7FkATImW0Xk wJtRIex43TaSH4jGde+7yabO3TW7BycoNEpUoLI5wCeFZ7M5u5VHfnIHAGTXr56C 6EAIRc+F3XmVaemb/m2ZL0FyzMjiF68ZaOAfAwmZLxuW6jMtCYLdcVG+Esqsufgj 5zGzx3inbJMszd3i8I9sCo/wugCTU7aqvgImVAjOc3ZjEfbQ4UWbVahev25Y6DPy Jz1hpa0XxQ7Xgj33YBspeybhZFRm7WSdgYVouQjAvnIxEZC50CM7xLlcSjS8BifK UPnDxHaEjkgf2/pUXzkPGrxCByjS2EmvNlHyX8sT3pnfIJEOssUZsczz0OyPdF8y IY/umZeML98yGWicGKN8xE9qGxVvfjAQW7A4oY0cEfKI+oPmIwo= =BP7R -----END PGP SIGNATURE----- --VOvGIknYIKEZdmsm--
OmegaPhil <[email protected]>
:Arne Wichmann <[email protected]>
:Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB; Sat, 18 Apr 2020 19:33:54 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=apollo) by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100 Received: from mark by apollo with local (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100 Date: Sat, 18 Apr 2020 18:33:45 +0100 From: Mark Hindley <[email protected]> To: Andreas Messer <[email protected]>, [email protected], devuan developers internal list <[email protected]> Cc: [email protected] Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> References: <[email protected]> <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.5.23 (2014-03-12) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote: > I believe the problem is more related to devuan > repository structure than to libapt-pkg5.0. Maybe security > updates need to be put in subfolders, such that libapt > can detect the archive/release properly. > > I prefer to close this issue since it is not directly > related to libapt and also for ascii, apt is taken unchanged > from Debian repos. I think that is fine unless it can be demonstrated it is a current issue. Mark
OmegaPhil <[email protected]>
:Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB; Sat, 18 Apr 2020 19:33:54 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=apollo) by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100 Received: from mark by apollo with local (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100 Date: Sat, 18 Apr 2020 18:33:45 +0100 From: Mark Hindley <[email protected]> To: Andreas Messer <[email protected]>, [email protected], devuan developers internal list <[email protected]> Cc: [email protected] Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> References: <[email protected]> <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.5.23 (2014-03-12) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote: > I believe the problem is more related to devuan > repository structure than to libapt-pkg5.0. Maybe security > updates need to be put in subfolders, such that libapt > can detect the archive/release properly. > > I prefer to close this issue since it is not directly > related to libapt and also for ascii, apt is taken unchanged > from Debian repos. I think that is fine unless it can be demonstrated it is a current issue. Mark
OmegaPhil <[email protected]>
:Received: (at 172) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB; Sat, 18 Apr 2020 19:33:54 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=apollo) by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100 Received: from mark by apollo with local (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100 Date: Sat, 18 Apr 2020 18:33:45 +0100 From: Mark Hindley <[email protected]> To: Andreas Messer <[email protected]>, [email protected], devuan developers internal list <[email protected]> Cc: [email protected] Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> References: <[email protected]> <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.5.23 (2014-03-12) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote: > I believe the problem is more related to devuan > repository structure than to libapt-pkg5.0. Maybe security > updates need to be put in subfolders, such that libapt > can detect the archive/release properly. > > I prefer to close this issue since it is not directly > related to libapt and also for ascii, apt is taken unchanged > from Debian repos. I think that is fine unless it can be demonstrated it is a current issue. Mark
[email protected], [email protected], Andreas Messer <[email protected]>
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at 172) by bugs.devuan.org; 18 Apr 2020 17:40:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 17:40:06 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id EA595F60DCB; Sat, 18 Apr 2020 19:33:54 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=apollo) by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLg-00034V-PP; Sat, 18 Apr 2020 18:33:49 +0100 Received: from mark by apollo with local (Exim 4.84_2) (envelope-from <[email protected]>) id 1jPrLd-0005Qz-Kg; Sat, 18 Apr 2020 18:33:45 +0100 Date: Sat, 18 Apr 2020 18:33:45 +0100 From: Mark Hindley <[email protected]> To: Andreas Messer <[email protected]>, [email protected], devuan developers internal list <[email protected]> Cc: [email protected] Subject: Re: [devuan-dev] bug#172: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> References: <[email protected]> <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.5.23 (2014-03-12) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org On Sat, Apr 18, 2020 at 06:11:04PM +0200, Andreas Messer wrote: > I believe the problem is more related to devuan > repository structure than to libapt-pkg5.0. Maybe security > updates need to be put in subfolders, such that libapt > can detect the archive/release properly. > > I prefer to close this issue since it is not directly > related to libapt and also for ascii, apt is taken unchanged > from Debian repos. I think that is fine unless it can be demonstrated it is a current issue. Mark
[email protected], [email protected], Andreas Messer <[email protected]>
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 16:20:04 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC) Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3; Sat, 18 Apr 2020 18:11:07 +0200 (CEST) Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98]) by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3; Sat, 18 Apr 2020 18:11:06 +0200 (CEST) Date: Sat, 18 Apr 2020 18:11:04 +0200 From: Andreas Messer <[email protected]> To: [email protected], [email protected] Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C, RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I believe the problem is more related to devuan=20 repository structure than to libapt-pkg5.0. Maybe security updates need to be put in subfolders, such that libapt can detect the archive/release properly. I prefer to close this issue since it is not directly related to libapt and also for ascii, apt is taken unchanged =66rom Debian repos. --vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA= =6Y4C -----END PGP SIGNATURE----- --vtzGhvizbBRQ85DL--
OmegaPhil <[email protected]>
:Received: (at 172-submitter) by bugs.devuan.org; 18 Apr 2020 16:20:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC) Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3; Sat, 18 Apr 2020 18:11:07 +0200 (CEST) Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98]) by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3; Sat, 18 Apr 2020 18:11:06 +0200 (CEST) Date: Sat, 18 Apr 2020 18:11:04 +0200 From: Andreas Messer <[email protected]> To: [email protected], [email protected] Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C, RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I believe the problem is more related to devuan=20 repository structure than to libapt-pkg5.0. Maybe security updates need to be put in subfolders, such that libapt can detect the archive/release properly. I prefer to close this issue since it is not directly related to libapt and also for ascii, apt is taken unchanged =66rom Debian repos. --vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA= =6Y4C -----END PGP SIGNATURE----- --vtzGhvizbBRQ85DL--
OmegaPhil <[email protected]>
:Andreas Messer <[email protected]>
to [email protected]
.
Full text available.Received: (at 172) by bugs.devuan.org; 18 Apr 2020 16:20:04 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC) Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3; Sat, 18 Apr 2020 18:11:07 +0200 (CEST) Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98]) by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3; Sat, 18 Apr 2020 18:11:06 +0200 (CEST) Date: Sat, 18 Apr 2020 18:11:04 +0200 From: Andreas Messer <[email protected]> To: [email protected], [email protected] Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C, RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I believe the problem is more related to devuan=20 repository structure than to libapt-pkg5.0. Maybe security updates need to be put in subfolders, such that libapt can detect the archive/release properly. I prefer to close this issue since it is not directly related to libapt and also for ascii, apt is taken unchanged =66rom Debian repos. --vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA= =6Y4C -----END PGP SIGNATURE----- --vtzGhvizbBRQ85DL--
Andreas Messer <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at 172) by bugs.devuan.org; 18 Apr 2020 16:20:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 18 Apr 2020 16:20:03 +0000 (UTC) Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CEFF0F60DC3; Sat, 18 Apr 2020 18:11:07 +0200 (CEST) Received: from iris.m.rodgau.home (p5080FC62.dip0.t-ipconnect.de [80.128.252.98]) by dd10814.kasserver.com (Postfix) with ESMTPSA id 4A0E91200CD3; Sat, 18 Apr 2020 18:11:06 +0200 (CEST) Date: Sat, 18 Apr 2020 18:11:04 +0200 From: Andreas Messer <[email protected]> To: [email protected], [email protected] Subject: Re: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.7 required=5.0 tests=FAKE_REPLY_C, RCVD_IN_DNSWL_LOW autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I believe the problem is more related to devuan=20 repository structure than to libapt-pkg5.0. Maybe security updates need to be put in subfolders, such that libapt can detect the archive/release properly. I prefer to close this issue since it is not directly related to libapt and also for ascii, apt is taken unchanged =66rom Debian repos. --vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXpsmlAAKCRCQs7qqjCuv UUFmAJ9+RD54SmmwFF4vRcQ4oq716SpYhgCfY3MwVnGa5XmlOuUk+5Knpyfo1LA= =6Y4C -----END PGP SIGNATURE----- --vtzGhvizbBRQ85DL--
Andreas Messer <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at 172) by bugs.devuan.org; 19 Feb 2018 16:50:07 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Mon, 19 Feb 2018 17:50:07 +0100 (CET) Received: from mx-out2.startmail.com (mx-out2.startmail.com [145.131.90.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 7F6CBF60903 for <[email protected]>; Mon, 19 Feb 2018 17:43:08 +0100 (CET) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="ZPkCn5Mz"; dkim-atps=neutral From: OmegaPhil <[email protected]> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com; s=2017-11; t=1519058554; bh=HmOQBllg/y5yjdFcQlQHjbJlQWaPZp8WW+fLMFowK4o=; h=From:Subject:To:Date:From; b=ZPkCn5MzLZztjR1aSGGNetR/bEjKRWZXFoQ5fnSgSt/niTs2km4piWekxGM6Y9in+ tVFTzgGCOYsxrjFxARR0UI/93wzF+2rb36Ex8ySYtPFDuSvClL/7eB0fIEgighJ0H4 JGl/Bj0Ap0meAB/J+VAAymDSydUwqQjRJGcp0Aik1JOylfvBVO9mAxi1C4hphE7l9F n/k7CoedfDMDyPiThd2X7VogiqrbeZmRXeB3hODrYSQIbKh4tVs1/MAlVQyyOIN79I wUyg4241v3dskJjLPRa4xTriOsTddq2xuZvVEsGmk3TLBCETke9CGBGTBb+HjF/jsJ DGSUr+DLeUL8w== Subject: RE: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version To: [email protected] Message-ID: <[email protected]> Date: Mon, 19 Feb 2018 16:42:19 +0000 Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO" X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO Content-Type: multipart/mixed; boundary="RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl"; protected-headers="v1" From: OmegaPhil <[email protected]> To: [email protected] Message-ID: <[email protected]> Subject: RE: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version --RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable Previous email was intended for another ticket. Confirming that this is still an issue - without pinning repository codenames 'ascii-security' and 'ascii-updates' to priority 990, they keep the default 500 priority which puts them on par with ceres - so the ceres kernel gets picked for an upgrade for the current kernel installed from ascii-security, despite default release preference set to 'ascii'. --RvMmiLmmIINKQG2kOrur9JuEQeWgtEebl-- --qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE52CV7NrNXex2U6mWF9I8ff3C848FAlqK/msACgkQF9I8ff3C 849L5xAAj4kafKP3zj88PEurYksWoise/+Cjs7/y2c1hXMcE0omPhgBbDoy7j7SY 1HSl1gXKWW34XU4aC5FXfp6FdLQfdgtg1dJ04/ZONu5e9NtNDqqQU4XafiL9pdvP aWXtBoPBGySkjqcnsgcM4hCrCOMUVm8bvlmqnMsU4vmvdaG5oILZ734k7LHIfq8G hDWRJahyv75ZzPCP/6JmVdJ5Euh/Ko5j8F415PEGrQ3zhf0BM2VndX1CXY5hgdyo pAJDs3v1ARFsYv3MpaM+F5f9g2n2KwrqYhTg0IbVKSMbVfI87l0QLbMDzL/a6FLc BL4Pfd3flLQa150QxTd54ChaLf+Ep7V4xAX8p4rph1hh1OssIJ28WZlBic2fi+Nl inm4Q+Fkn4CwCdG/NyPa77fRigOkMlVKPcPy+TaLNl77NOPm68hXheoeLSKe4td1 d04iveBgZFfkG5XECe/UGrCtFxhVpsShrgIAp8vWnubBtT6oDUXB2eJEJQ9XlBq1 OXKBcMclGtvaVWAGdBaYGbV6FzFKmxGyC2GFkOwxHqd9ZDoKGz/RBK7HrM6iyyy/ V15tnVPwBfMm6mta0QPDByzKxF/TbEVd15pDQ7NnFyvwG6QXFJmdY2eeog1N8Btl 99p+QPxBUeZw51rgSofyHtuMPtZcWQcp6SHYzvvyt1fVvnKfgOA= =cgAg -----END PGP SIGNATURE----- --qx0iQWdn5DFJ5I8ZzDwN76qE4TcFzoJZO--
OmegaPhil <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at 172) by bugs.devuan.org; 18 Feb 2018 21:20:04 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 18 Feb 2018 22:20:04 +0100 (CET) Received: from mx-out1.startmail.com (mx-out1.startmail.com [145.131.90.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 71405F6099A for <[email protected]>; Sun, 18 Feb 2018 22:19:21 +0100 (CET) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="P5JmxQU6"; dkim-atps=neutral To: [email protected] DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com; s=2017-11; t=1518988727; bh=rW4K/sl/z4dIFHgb8lay/Yv23Ro/r5Cf9hfOCLxcUUA=; h=To:From:Subject:Date:From; b=P5JmxQU6uX8N/1W6szDh12rHGyQWHIEeHtJEho7MlC9WCVKf/ERfZIkZKPnwRhoxq JA1eSCwUXzuSuGII2enJSKDy8gnJAxvEOZhFkMzYcWcbgwyZzmyB4L26IqCkjeyOdv 4oVWkqzJej2TpY01oqKTL8VtVymTztsskiHLrYPQ8k4WNatdyBAgALzN7qT3h74nk1 5uSxrd04bOAorzd4MWGZcyX0uhyuRjs5YiEEfnxBjrTd+nEBfMdpq8uZmRZ4JkCOSN x2q+ZY1Wg/HzHu+EAGk6yC0IDhkic+fe4MXmXFtv7RskYfRSfq7fwz9gg3U2Ah+XKJ JBIBZwx1kP9eg== From: OmegaPhil <[email protected]> Subject: RE: Devuan not known distribution in postgresql-common Message-ID: <[email protected]> Date: Sun, 18 Feb 2018 21:18:34 +0000 Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb" X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb Content-Type: multipart/mixed; boundary="keJHHONXHJ0YETJKnsRe2cggursecJnE4"; protected-headers="v1" From: OmegaPhil <[email protected]> To: [email protected] Message-ID: <[email protected]> Subject: RE: Devuan not known distribution in postgresql-common --keJHHONXHJ0YETJKnsRe2cggursecJnE4 Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable Just looking at this one, pgcommon.sh is fetching Devuan release information from /etc/os-release, the locale_gen function needs to be updated here to allow 'devuan' to be treated the same as 'debian'. debian/supported-versions goes further to try to determine a Debian version number, so this'll need to be updated too. Shall I make a feature request upstream? For reference I know of postgresql but I don't yet use it personally. --keJHHONXHJ0YETJKnsRe2cggursecJnE4-- --HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE52CV7NrNXex2U6mWF9I8ff3C848FAlqJ7bYACgkQF9I8ff3C 84+I6Q/9GLWGLcJE3Rr9ETcAUsxlMEXNlsKK5YJi7xt2LYnkab8SqrWATD5itwVk eBrPdd7p6n2YsB8hdymD0vhT8pPtF+sxvtYxPKBbqDcwRS1qOwGh/WtDSpmZ2FMS 3AqbNXWJ3+2Ueagxi5w5fz7npf7K8dR022z5BQZqghsIbDZ+A8JPEOiz126TAeLr xVAlSx43nHLAOAWpLPUDFCRJg6bSN5swJRFDnkZruZHyBvBbwDu1E3fyen4R222p DEgF2Z1Fzq+MrN14x5sRrtRcTuU7aiytt0hvPrRb3WRCrU+U0MFQpEzwyF2+IrNy J1uib2QDOElrEuiMdTA9v4tRyKAXapBDwRqL+Ruf/a8Sv5aN9dzBtaOx74NdObQt HzkepnrhPXTO3sRrX5KAn4D1FV18u4Cskpe5cW+eIBEuG6wq4amLQZU0LtJ52cGL lYmHy8XeXDFuquExmylPzf8/2fvCKRaWCJi62DVUg+BKnnj1MC+M2Np+cne7PEk9 xPg88pW+34PnZ6/xzmX6LIB1s2rlQ7SoKnCusIoAXzfLYpuMkjT7Hv4Ckbbdcmqu muaLThBQfrsBxLZP0M1hhB9pE2LM5Z51Kj0JLz5xZbvH65fqO2fyEeV74xJuYUGa y59iWmX1T1OfVxYpqEBLZkMb0nPmC+n0tsN8dlggJFTur3c+NSI= =+vRh -----END PGP SIGNATURE----- --HYHto6ZX7XwbKQjDOI1fsI4q17Y2LwlBb--
OmegaPhil <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.OmegaPhil <[email protected]>
to [email protected]
.
Full text available.Received: (at 172) by bugs.devuan.org; 6 Jan 2018 17:50:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sat, 06 Jan 2018 18:50:06 +0100 (CET) Received: from smx-7fb.smtp.startmail.com (smx-7fb.smtp.startmail.com [37.153.204.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id AA796F615A9 for <[email protected]>; Sat, 6 Jan 2018 18:50:09 +0100 (CET) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="wudmLkNP"; dkim-atps=neutral Received: from smx-8a9.int1.startmail.com (smx-8a9.int1.startmail.com [10.1.137.139]) by smx-7fb.smtp.startmail.com (Postfix) with ESMTPS id E975EB7A8E for <[email protected]>; Sat, 6 Jan 2018 18:49:54 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com; s=dkim; t=1515260994; bh=CiQxSL+WEgtlvikECRBLfrmojPPXEYgtuAx8tOq7+WU=; h=Subject:To:References:From:Date:In-Reply-To:From; b=wudmLkNPaEfPM3MAOwO5Q1KprKmkcvrkWLPW2Ffsk0673bwL/+vCLFNiktxF+4esN AieiK598avtCPLqX4ccnk5d5y2g7yyGGEig+3WWA+QBn/gQ0q7G6pduuJ2II1Ns0fx K2oH0TDFSC3U9MAW65E91n2/QYi6tPND/hunP9FGVyAWIPJVRi0VW8rxRUalkc4aRu FV+Sk8+HSrBRJ3zCaTLv0aZkBJ4GoiBrGSLgG8IodXgb7FiO278QK0+UieU4Id7meA ibNpVLBzIN3L+7YmX/zLKGdTVPEgCQQPFzBQWmsZHblSfok34T6xlh6oUCbE3cz8eK 8TsJsPJjDqPhw== Subject: Re: bug#172: Acknowledgement (apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version) To: [email protected] References: <[email protected]> <[email protected]> From: OmegaPhil <[email protected]> Message-ID: <[email protected]> Date: Sat, 6 Jan 2018 17:49:40 +0000 Mime-Version: 1.0 In-Reply-To: <[email protected]> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61" X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,RP_MATCHES_RCVD,SPF_PASS,WEIRD_PORT autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61 Content-Type: multipart/mixed; boundary="FHdi9wATHsEZwOeipwmIKimzb0SjijTXl"; protected-headers="v1" From: OmegaPhil <[email protected]> To: [email protected] Message-ID: <[email protected]> Subject: Re: bug#172: Acknowledgement (apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version) References: <[email protected]> <[email protected]> In-Reply-To: <[email protected]> --FHdi9wATHsEZwOeipwmIKimzb0SjijTXl Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable On 05/01/18 18:03, Devuan bug Tracking System wrote: > Thank you for the problem report you have sent regarding Devuan. > This is an automatically generated reply, to let you know your message = has > been received. It is being forwarded to the developers mailing list fo= r > their attention; they will reply in due course. >=20 > Your message has been sent to the package maintainer(s): > [email protected] >=20 > If you wish to submit further information on your problem, please send > it to [email protected] (and *not* to > [email protected]). >=20 > Please do not reply to the address at the top of this message, > unless you wish to report a problem with the bug-tracking system. >=20 > Devuan Bugs Owner > (administrator, Devuan bugs database) Right, finally figured it out. The error: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D E: The value 'ascii' is invalid for APT::Default-Release as such a release is not available in the sources =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D is a red herring that only happens after you change the URLs associated with apt repos. In libapt-pkg5.0/apt-1.4.8/apt-pkg/policy.cc:pkgPolicy::pkgPolicy, if a Default-Release has been specified, the code loops through all package cache files (cached versions of the repo release files) looking for one which has an archive (suite), codename or version that matches the Default-Release. When you change all repo URLs, these caches are invalidated and only the /var/lib/dpkg/status package cache file remains - which has archive 'now' and little else. So when you do 'aptitude update', the loop checks just this file and then says 'nope, no matching repo found'. The release files are then downloaded from the relevant repos and turned into caches, naturally the next command that needs to run (e.g. aptitude full-upgrade) finds the relevant archive/codename and is happy. The next problem, that apt was attempting to install a ceres kernel, is related to the archive/codenames being exposed - investigating an affected package: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D apt-cache policy linux-headers-amd64 linux-headers-amd64: Installed: 4.9+80+deb9u3 Candidate: 4.14+89 Version table: 4.14+89 500 500 http://pkgmaster.devuan.org/merged ceres/main amd64 Packages *** 4.9+80+deb9u3 500 500 http://pkgmaster.devuan.org/merged ascii-security/main amd64 Packages 100 /var/lib/dpkg/status 4.9+80+deb9u2 990 990 http://pkgmaster.devuan.org/merged ascii/main amd64 Packages 3.16+63 500 500 http://pkgmaster.devuan.org/merged jessie/main amd64 Packages= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Here we have the package installed from ascii-security (which is unusual for me since I'm trying to update to get away from the Spectre crap), you'll notice the pin level is only 500 on ascii-security compared to 990 on ascii. Back in policy.cc: CreatePin(pkgVersionMatch::Release,"",DefRel,990); So, apt basically thinks that the ascii-security repo 'is not ascii'. Through 'apt-cache policy': =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 500 http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii-security/non-free amd64 Packages release v=3D2.0,a=3Dtesting-security,n=3Dascii-security,l=3DDevuan-Security,c=3Dn= on-free,b=3Damd64 origin 10.1.0.3 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D a =3D archive, n =3D codename - both of these aren't 'ascii', nor 'testin= g' (for argument's sake), so this repo isn't pinned. Spinning up a Debian Stable VM, I can see that their security repo works, but their updates repo has a similar issue (perhaps on purpose?): =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 500 http://10.1.0.3:3142/ftp.uk.debian.org/debian stable-updates/main amd64 Packages release o=3DDebian,a=3Dstable-updates,n=3Dstretch-updates,l=3DDebian,c=3Dmain,b=3D= amd64 origin 10.1.0.3 990 http://10.1.0.3:3142/security.debian.org stable/updates/main amd64 Packages release v=3D9,o=3DDebian,a=3Dstable,n=3Dstretch,l=3DDebian-Security,c=3Dmain,b=3D= amd64 origin 10.1.0.3 990 http://10.1.0.3:3142/ftp.uk.debian.org/debian stable/main amd64 Packages release v=3D9.3,o=3DDebian,a=3Dstable,n=3Dstretch,l=3DDebian,c=3Dmai= n,b=3Damd64 origin 10.1.0.3 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D I have no experience here, but this suggests that Devuan's security repo should be have an archive of 'ascii' rather than 'ascii-security'. Aside from the usual way of specifying 'ascii' or 'testing' in Default-Release, I could almost use '2.0' since both ascii and ascii-security use this, but ascii-updates uses '2.0.0'... --FHdi9wATHsEZwOeipwmIKimzb0SjijTXl-- --Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE52CV7NrNXex2U6mWF9I8ff3C848FAlpRDEEACgkQF9I8ff3C 84/Xmw//UvYkQdYncEV9P5ZnOgdFX5J9XnUnKDONCUPpCEAGQPcTtrENiohGBH6P 2nQliKVoGyn99orltKHECMa45J/2/7yArLrDfZI9dxxkXMB19oPBlwRHnnns/s+u AyXwvayQnwGbXYRbuiF6Nu8p2VokjX/vWHdnoB8XdhBIZSape5PFCWQlWBs43p3T 7N7LvjiO2q0hX+s9q5FctxlO8Q3SRP2YFu5ACKXynmXFgwzfDox338IF9GpQCunB ALJkny4LLKaIptMk0uJxCEp+FJL1Jg6RbqZXplxb7wMe1cxlK6Ks3lYlOybOkZr1 MjXzvK+at/yLnqS8O2k4vZx0aRE4EyqD3LxevkgT1FaLgdZClvflweL0cfYXkaKj cdBrm3jd62QvXbOhbYHNOoCurwrA8nUlhmviwwD8DiBW0ViT3iKf6kxvE9yFKA3W BswVH6OvM85L/6jJ/SvTJYHlbmQDBBPi00N4uFacPh/wCHck5/juwiFVr1s8J2eV 8YTqgnLmF+OczBq6JBL4qQ4fOC7BWicfnz0vUmaeOWq3FX+tiUW4AULVPRR03Ppz kYFZP/DWXv18CUfjY0Uw/Kn8SE9OSiGiMu9Z3DF4tmaeVOKGAWmTsWnb9drC5AAE t5B+LqErr4KnU+RhZtpb2I3K1FcBEHHPwQ6n/88y7FbSurGcjXU= =LVCo -----END PGP SIGNATURE----- --Io7cIUtpGVU5JnCzT0xUnoY6pvAvTqY61--
OmegaPhil <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.Received: (at submit) by bugs.devuan.org; 5 Jan 2018 17:50:05 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Fri, 05 Jan 2018 18:50:05 +0100 (CET) Received: from smx-7fb.smtp.startmail.com (smx-7fb.smtp.startmail.com [37.153.204.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 3C2CAF6049F for <[email protected]>; Fri, 5 Jan 2018 18:42:31 +0100 (CET) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; unprotected) header.d=startmail.com [email protected] header.b="xHN9nCw9"; dkim-atps=neutral Received: from smx-8a9.int1.startmail.com (smx-8a9.int1.startmail.com [10.1.137.139]) by smx-7fb.smtp.startmail.com (Postfix) with ESMTPS id B9638978E4 for <[email protected]>; Fri, 5 Jan 2018 18:42:17 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=startmail.com; s=dkim; t=1515174137; bh=+i4K7nI6J5qGUQqV5YzuvyeE5FP3NnF1jhUHD1e/rOE=; h=To:From:Subject:Date:From; b=xHN9nCw9cS9HTCt+9QF7SAek9tq+lP6zrIXc6k2K7hiGIUlFMM7uxzlggpf2i3eKt zH7eZhp4QOSj4bdqbwf24Ctv0LusFd/1uKYThl92QW0kci2CroJcfKdZJSIBB6KtnD PO2gjozhuaZJJGJJs2ibJAuDwqg/5RN9PNlVEsbjvW7o3J5vS9EI6KhgUA6kT5UXPM Hs45tUxZYbDsLoU8LjfKdgX85ZIhT4+AHJKFkAwQGq0/RIuf2qme8MyQofz5rNr9li ABQV0N7E1SOIJ381t/CBF9LlqFvYS9upq2pPheNGgctIoj7ZWOIZ+Yae/k7JHG7KQs cJNp9uZ1b2BTA== To: [email protected] From: OmegaPhil <[email protected]> Subject: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version Message-ID: <[email protected]> Date: Fri, 5 Jan 2018 17:41:57 +0000 Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3" X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,RP_MATCHES_RCVD,SPF_PASS,WEIRD_PORT autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3 Content-Type: multipart/mixed; boundary="rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc"; protected-headers="v1" From: OmegaPhil <[email protected]> To: [email protected] Message-ID: <[email protected]> Subject: apt-get dist-upgrade or aptitude full-upgrade on VM with Default-Release set to ascii results in attempt to update kernel to ceres version --rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable Package: libapt-pkg5.0 Version: 1.4.8 When full-upgrading on a Devuan Ascii/Ceres VM, despite 'APT::Default-Release' set to 'ascii' in '/etc/apt/apt.conf.d/00defaultrelease', the kernel from ceres is starting to get fetched - it appears that libapt thinks there is no 'ascii' in the sources (error right at the start): =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D # sudo aptitude update E: The value 'ascii' is invalid for APT::Default-Release as such a release is not available in the sources E: The value 'ascii' is invalid for APT::Default-Release as such a release is not available in the sources Get: 1 http://pkgmaster.devuan.org/merged jessie InRelease [22.2 kB] Get: 2 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed InRelease [122 kB] Get: 3 http://pkgmaster.devuan.org/merged ascii InRelease [22.2 kB] Get: 4 http://pkgmaster.devuan.org/merged ascii-updates InRelease [22.2 kB] Get: 5 http://pkgmaster.devuan.org/merged ascii-security InRelease [21.6 kB] Get: 6 http://pkgmaster.devuan.org/merged jessie/non-free Sources [99.7 kB] Hit http://10.1.0.3:3142/pkgmaster.devuan.org/merged ceres InRelease Get: 7 http://pkgmaster.devuan.org/merged jessie/main Sources [7,053 kB] Get: 8 http://10.1.0.3:3142/packages.devuan.org/devuan experimental InRelease [129 kB] Get: 9 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed/main amd64 Packages [19.1 kB] Get: 10 http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed/main i386 Packages [19.1 kB] Get: 11 http://pkgmaster.devuan.org/merged jessie/contrib Sources [50.5 kB] Get: 12 http://pkgmaster.devuan.org/merged jessie/main amd64 Packages [6,881 kB] Get: 13 http://pkgmaster.devuan.org/merged jessie/main i386 Packages [6,877 kB] Get: 14 http://pkgmaster.devuan.org/merged jessie/contrib amd64 Packages [49.9 kB] Get: 15 http://pkgmaster.devuan.org/merged jessie/contrib i386 Packages [49.3 kB] Get: 16 http://pkgmaster.devuan.org/merged jessie/non-free i386 Packages [81.0 kB] Get: 17 http://pkgmaster.devuan.org/merged jessie/non-free amd64 Packages [84.2 kB] Get: 18 http://pkgmaster.devuan.org/merged ascii/contrib Sources [44.7 kB] Get: 19 http://pkgmaster.devuan.org/merged ascii/non-free Sources [79.8 kB] Get: 20 http://pkgmaster.devuan.org/merged ascii/main Sources [6,753 kB] Get: 21 http://pkgmaster.devuan.org/merged ascii/main amd64 Packages [7,230 kB] Get: 22 http://pkgmaster.devuan.org/merged ascii/main i386 Packages [7,209 kB] Get: 23 http://pkgmaster.devuan.org/merged ascii/contrib i386 Packages [48.0 kB] Get: 24 http://pkgmaster.devuan.org/merged ascii/contrib amd64 Packages [51.0 kB] Get: 25 http://pkgmaster.devuan.org/merged ascii/non-free amd64 Packages [78.5 kB] Get: 26 http://pkgmaster.devuan.org/merged ascii/non-free i386 Packages [69.4 kB] Get: 27 http://pkgmaster.devuan.org/merged ascii-updates/main Sources [3,572 B] Get: 28 http://pkgmaster.devuan.org/merged ascii-updates/main amd64 Packages [6,044 B] Get: 29 http://pkgmaster.devuan.org/merged ascii-updates/main i386 Packages [6,020 B] Get: 30 http://pkgmaster.devuan.org/merged ascii-security/contrib Sources [940 B] Get: 31 http://pkgmaster.devuan.org/merged ascii-security/main Sources [95.3 kB] Get: 32 http://pkgmaster.devuan.org/merged ascii-security/non-free Sources [788 B] Get: 33 http://pkgmaster.devuan.org/merged ascii-security/main i386 Packages [235 kB] Get: 34 http://pkgmaster.devuan.org/merged ascii-security/main amd64 Packages [234 kB] Get: 35 http://pkgmaster.devuan.org/merged ascii-security/contrib i386 Packages [1,372 B] Get: 36 http://pkgmaster.devuan.org/merged ascii-security/contrib amd64 Packages [1,368 B] Get: 37 http://pkgmaster.devuan.org/merged ascii-security/non-free i386 Packages [1,284 B] Get: 38 http://pkgmaster.devuan.org/merged ascii-security/non-free amd64 Packages [1,284 B] Fetched 43.8 MB in 3min 2s (240 kB/s) Current status: 4 (+4) upgradable, 84219 (+84219) new. There are 94 newly obsolete packages. omega@devuan-testing-vm:~/files/source_code/kernel$ sudo aptitude full-upgrade The following NEW packages will be installed: apparmor{a} cpp-7{a} gcc-7{ab} gcc-7-base{a} libapparmor-perl{a} libasan4{a} libgcc-7-dev{ab} linux-compiler-gcc-7-x86{a} linux-headers-4.14.0-2-amd64{a} linux-headers-4.14.0-2-common{a} linux-image-4.14.0-2-amd64{a} linux-kbuild-4.14{a} linux-source-4.14{a} The following packages will be REMOVED: linux-source-4.9{u} The following packages will be upgraded: linux-headers-amd64 linux-image-amd64 linux-source wget 4 packages upgraded, 13 newly installed, 1 to remove and 1 not upgraded. Need to get 174 MB of archives. After unpacking 328 MB will be used. The following packages have unmet dependencies: libgcc-7-dev : Depends: libgcc1 (>=3D 1:7.2.0-18) but 1:6.3.0-18 is inst= alled Depends: libgomp1 (>=3D 7.2.0-18) but 6.3.0-18 is install= ed Depends: libitm1 (>=3D 7.2.0-18) but 6.3.0-18 is installe= d Depends: libatomic1 (>=3D 7.2.0-18) but 6.3.0-18 is insta= lled Depends: liblsan0 (>=3D 7.2.0-18) but 6.3.0-18 is install= ed Depends: libtsan0 (>=3D 7.2.0-18) but 6.3.0-18 is install= ed Depends: libubsan0 (>=3D 7.2.0-18) but 6.3.0-18 is instal= led Depends: libcilkrts5 (>=3D 7.2.0-18) but 6.3.0-18 is inst= alled Depends: libmpx2 (>=3D 7.2.0-18) but 6.3.0-18 is installe= d Depends: libquadmath0 (>=3D 7.2.0-18) but 6.3.0-18 is installed gcc-7 : Depends: libcc1-0 (>=3D 7.2.0-18) but 6.3.0-18 is installed =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D '/etc/apt/sources.list' has various repos as the VM is used for testing and in general I keep an Ascii system with important stuff pulled from Ceres when it gets too out of date: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D # Jessie included for g++4.9 #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged= jessie main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged jessie main contrib non-free deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged jessie main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged jessie mai= n contrib non-free #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged= ascii main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii main contrib non-f= ree deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii main= contrib non-free #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged= ascii-updates main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii-updates main contrib non-free deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-updates main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-updates main contrib non-free #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged= ascii-security main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged ascii-security main contrib non-free deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-security= main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ascii-security main contrib non-free # Testing proposed #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan= ascii-proposed main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan ascii-proposed main contrib non-free deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan ascii-proposed= main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan ascii-proposed main contrib non-free # Unstable #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged= ceres main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/merged ceres main contrib non-f= ree deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ceres main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/merged ceres main= contrib non-free # Experimental #deb [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan= experimental main contrib non-free #deb-src [arch=3Damd64,i386] http://10.1.0.3:3142/pkgmaster.devuan.org/devuan experimental main contrib non-free deb [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan experimental main contrib non-free deb-src [arch=3Damd64,i386] http://pkgmaster.devuan.org/devuan experimental main contrib non-free =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D apt-cacher-ng is normally in use, but has been commented out here. Over the years I have seen this bug in Debian (suddenly deciding the named release isn't present in the sources), I'll see what I can find out= =2E --rqtboHUTZC3Y5x4x0CFfrkSUuLEGAUDCc-- --Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE52CV7NrNXex2U6mWF9I8ff3C848FAlpPuOUACgkQF9I8ff3C 84+sdA//XeOtTHmmW4jjglGaAo9ydHO+eol8fFzZaki6ZPAcPIHpHAA6dnsS3ACB zahGB3wdrBeUtY0ofqfms5tIu/csXTZe9t46D9HrrfsNahfr2ZDldS59ErIsHqYC km0ZqVWocoAXVNKif2pKbdKijy/VrnC7R8BXEABI/5zBdshcAKuhDQ8LisusNxNc kAlwyS5feXXoVK4lSjID3O/auARDoyanLNDvEzI7okcKnv+KudkbWKB6LzQYH8iy gW9PEBE86LPM0NIbBv4iqQkHeN1hPLcQi+Zq3KmrXhVNJyGNwNxzyLJ6oJHZHeBL dXhmOWDlbnRZA8jy3qTVOwLLu5H7rAhwA7MZgOVcbMZNlFC9mTdpV0Nn+sBqWRkv Qqn24mHsmQzEc17HSZ+cul+ZNpiTDRPeiLawGAdB5Ddbx4vC7/supLvaO7a5Rm9C /t0x/kqsVyMk6l7ghZZxpyZifNNQk+IX4usE5OHNmpnpiqKIVT+xlOQbam8vvVDe F8ubpTdH3NJTHFXUmCVcrKcTXqRLSvD4f6hkpHNik9Nz1OaOXo1500MBjtAV2Lgl B4q7KbZgTR6nB6zCno/nS2aeZnGix8XdSHPdofk78LyoUZLEgiCA7lgpNvGj7NP5 usmsgJAW3oSrb+pNVt7i0/od6qhNtIGCKyrxXMPwjUPS1VKPsh0= =S4sN -----END PGP SIGNATURE----- --Oe4QEBVUVqBQTxXIpZtBXCrR4mjE2JNq3--
OmegaPhil <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#172
; Package libapt-pkg5.0
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sat, 30 Nov 2024 22:39:01 UTC