Control: retitle -1 [pre-approval] unblock: apt-cacher-ng/3.2.1-1

Hallo,
* Niels Thykier [Wed, May 15 2019, 07:53:00PM]:
> Control: tags -1 moreinfo

Sure, see attachments. As explained before, just a one-liner which uses
existing functionality (same content as before, now from a real package
build and git compare between tag/branch). If the meaning of the change
is not understandable, please check the effect of forgiveDlErrors member
in
https://salsa.debian.org/blade/apt-cacher-ng/blob/upstream/sid/source/cacheman.cc
and maybe related uses in
https://salsa.debian.org/blade/apt-cacher-ng/blob/upstream/sid/source/expiration.cc
 .

BTW, maybe I was not precise enough before: this is a request for
pre-approval, the package is not uploaded yet.

Best Regards,
Eduard.
File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)
------------------------------------------------
Depends: libbz2-1.0, libc6 (>= [-2.22),-] {+2.28),+} libgcc1 (>= 1:3.3.1), 
liblzma5 (>= 5.1.1alpha+20120614), libssl1.1 (>= 1.1.0), libstdc++6 (>= 5.2), 
libsystemd0 (>= 210), libwrap0 (>= 7.6-4~), zlib1g (>= 1:1.2.0), debconf (>= 
0.5) | debconf-2.0, adduser, lsb-base (>= 3.0-6)
Installed-Size: [-1421-] {+1425+}
Version: [-3.2-1-] {+3.2-2+}
diff --git a/debian/changelog b/debian/changelog
index f33e8f1..b2d9d94 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+apt-cacher-ng (3.2-2) unstable; urgency=medium
+
+  *  For incorrect assumption of some existing SHA256SUMS files in Debian
+     repositories which makes the expiration task fail without a proper way
+     for the end user to recover from it. Now ignore a download error in this
+     case (similar handling as for other guesses), assuming that permanent
+     404ing for other reasons than removal of remote content can be considered
+     unlikely (closes: #928957)
+
+ -- Eduard Bloch <bl...@debian.org>  Fri, 17 May 2019 22:59:21 +0200
+
 apt-cacher-ng (3.2-1) unstable; urgency=low

   * New upstream version
diff --git a/source/expiration.cc b/source/expiration.cc
index 2125521..625a7be 100644
--- a/source/expiration.cc
+++ b/source/expiration.cc
@@ -806,6 +806,13 @@ bool expiration::ProcessRegular(const string & sPathAbs, const struct stat &stin
 			flags.eIdxType = EIDX_SHA256DILIST;
 			flags.vfile_ondisk = true;
 			flags.uptodate = false;
+
+			// the original source context will probably provide a viable source for
+			// this URL - it might go 404 if the whole folder is missing but then the
+			// referenced content would also be outdated/gone and not worth keeping
+			// in the cache anyway
+
+			flags.forgiveDlErrors = true;
 		}
 		// and last but not least - care only about the modern version of that index
 		m_metaFilesRel.erase(idir + "MD5SUMS");

Reply via email to