Your message dated Mon, 26 Oct 2020 18:18:24 +0000
with message-id <[email protected]>
and subject line Bug#969936: fixed in debian-lan-config 0.27
has caused the Debian Bug report #969936,
regarding bullseye: add support, switch from /updates to -security
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
969936: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969936
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: debian-lan-config
Version: 0.26
Severity: serious
File: /usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc
User: [email protected]
Usertags: bullseye-security
The above script references $release/updates but when bullseye is
released that should be replaced by $release-security.
It looks like when a bullseye system is being installed, the setrel
function does not recognise the target release and so it won't setup
the apt sources.list at all.
Then even if the release were recognised properly, the script would
generate an incorrect sources.list using /updates instead of -security
which would cause the target system to not get security updates from
bullseye in a timely manner.
In addition, the SERVER_A sources.list references buster for the main
set of packages but uses stable/updates for security updates. This
means that after the bullseye release servers installed using the
debian-lan-config package will get packages from buster but their
security updates from bullseye, which seems incorrect.
$ grep -A100 setrel
./usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc
setrel() {
# if release is not set, try to determine it
if [ -n "$release" ]; then
return
fi
if [ ! -f $target/etc/os-release ]; then
return
fi
dists="jessie stretch buster bionic xenial trusty"
for d in $dists; do
if grep -iq $d $target/etc/os-release; then
release=$d
break
fi
done
}
# if installation was done from CD, replace useless sources.list
setrel
if [ -f $target/etc/apt/sources.list -a -n "$release" ]; then
grep -q 'file generated by fai-cd' $target/etc/apt/sources.list && cat
<<EOF > $target/etc/apt/sources.list
deb $apt_cdn/debian $release main contrib non-free
deb $apt_cdn/debian-security $release/updates main contrib non-free
#deb [trusted=yes] http://fai-project.org/download $release koeln
EOF
# if the package fai-server was installed, enable the project's
repository
if [ -f $target/var/lib/dpkg/info/fai-server.list ]; then
sed -i -e '/fai-project.org/s/^#//' $target/etc/apt/sources.list
fi
fi
# for ARM architecture, we may need the kernel and initrd to boot or flash
the device
if ifclass ARM64; then
cp -pv $target/boot/vmlinuz* $target/boot/initrd* $FAI_RUNDIR
fi
exit $error
$ cat
/usr/share/debian-lan-config/fai/config/files/etc/fai/apt/sources.list/SERVER_A
deb http://deb.debian.org/debian/ buster main
deb http://security.debian.org/ stable/updates main
deb http://deb.debian.org/debian/ buster-updates main
## Backports repository:
#deb http://deb.debian.org/debian/ buster-backports main
-- System Information:
Debian Release: bullseye/sid
APT prefers testing-debug
APT policy: (900, 'testing-debug'), (900, 'testing'), (800,
'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700,
'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 5.7.0-3-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8),
LANGUAGE=en_AU:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
debian-lan-config depends on no packages.
debian-lan-config recommends no packages.
Versions of packages debian-lan-config suggests:
pn fai-server <none>
--
bye,
pabs
https://wiki.debian.org/PaulWise
signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
Source: debian-lan-config
Source-Version: 0.27
Done: [email protected] (Andreas B. Mundt)
We believe that the bug you reported is fixed in the latest version of
debian-lan-config, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andreas B. Mundt <[email protected]> (supplier of updated debian-lan-config
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 26 Oct 2020 18:04:03 +0100
Source: debian-lan-config
Architecture: source
Version: 0.27
Distribution: unstable
Urgency: medium
Maintainer: Debian LAN Developers <[email protected]>
Changed-By: Andreas B. Mundt <[email protected]>
Closes: 969936
Changes:
debian-lan-config (0.27) unstable; urgency=medium
.
* Update 'sources.list' files for bullseye (closes: #969936).
* debian/copyright: spaces rather than tabs to start continuation lines.
* Update standards version to 4.5.0, no changes needed.
* Switch dh compat level to 13.
* Make sure some services are not started during conversion.
* Workaround and many fixes/adaptions for bullseye.
* Fixes for SSSD: Services are socket activated by now.
* Update boot parameters for diskless machines.
Checksums-Sha1:
90c021aca0a73d37b42302358b2b1b7e19c0b87f 1683 debian-lan-config_0.27.dsc
6e282e27e1fa22dd1c78f119a2ddbdf6295228b1 56868 debian-lan-config_0.27.tar.xz
efbd58534c011810ba375eda711e19ccb23c53f7 5587
debian-lan-config_0.27_amd64.buildinfo
Checksums-Sha256:
faf2d1e3883db9ff520b50138f48d865858cdf89be31f5b1e2e8e15ab0c866bd 1683
debian-lan-config_0.27.dsc
6ad23af49b8dc50bab4f53fb7f71b8f96efdf71388abd89836e6d950286fcaaa 56868
debian-lan-config_0.27.tar.xz
1f2057b95b5f144010ea93e309bc263b5d0505cc96722b22de8fe7ef1f4ba404 5587
debian-lan-config_0.27_amd64.buildinfo
Files:
8db111efeb68fa312310290146228935 1683 admin optional debian-lan-config_0.27.dsc
20e17e811cc619c00e3cbbfc5bdd5dcb 56868 admin optional
debian-lan-config_0.27.tar.xz
39d896d313c3009da994a126cabfdf88 5587 admin optional
debian-lan-config_0.27_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=uXNb
-----END PGP SIGNATURE-----
--- End Message ---