Package: apt
Version: 0.8.10.3+squeeze1
Severity: normal

We're using an internal mirror which is updated at a defined interval for 
consistency.
The 'Release' files from security.debian.org set a quite short timeout in their 
Vaild-Until:
header (10 days). If we're trying to update an internal system from this mirror 
a few days
later (apt-get update), it complains about the 'Release' file being expired and 
ignores it
by default.

So we've set the apt.conf option "Acquire::Max-ValidTime" to "1209600" (see 
apt-config output
below). While this works on i686 systems, it is ignored on amd64 systems, even 
though
apt-config shows it. We've worked around this bug for now  by also setting
"Acquire::Check-Valid-Until" to "false" on our amd64 systems (this option is 
not ignored),
but this isn't a real solution.

I already tried setting it as APT::Acquire::Max-ValidTime "1209600" - but that 
version
is ignored on both i686 and amd64.

-- Package-specific info:

-- apt-config dump --

APT "";
APT::Architecture "amd64";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^firmware-linux.*";
APT::NeverAutoRemove:: "^linux-firmware$";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^kfreebsd-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
APT::NeverAutoRemove:: "^linux-ubuntu-modules-.*";
APT::Never-MarkAuto-Sections "";
APT::Never-MarkAuto-Sections:: "metapackages";
APT::Never-MarkAuto-Sections:: "restricted/metapackages";
APT::Never-MarkAuto-Sections:: "universe/metapackages";
APT::Never-MarkAuto-Sections:: "multiverse/metapackages";
APT::Never-MarkAuto-Sections:: "oldlibs";
APT::Never-MarkAuto-Sections:: "restricted/oldlibs";
APT::Never-MarkAuto-Sections:: "universe/oldlibs";
APT::Never-MarkAuto-Sections:: "multiverse/oldlibs";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::mirrors "mirrors/";
Dir::State::extended_states "extended_states";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::netrc "auth.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Etc::preferencesparts "preferences.d";
Dir::Etc::trusted "trusted.gpg";
Dir::Etc::trustedparts "trusted.gpg.d";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Media "";
Dir::Media::MountPath "/media/apt";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
Dir::Log::History "history.log";
Dir::Ignore-Files-Silently "";
Dir::Ignore-Files-Silently:: "~$";
Dir::Ignore-Files-Silently:: "\.disabled$";
Dir::Ignore-Files-Silently:: "\.bak$";
Dir::Ignore-Files-Silently:: "\.dpkg-[a-z]+$";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
Acquire "";
Acquire::Check-Valid-Until "false";
Acquire::Max-ValidTime "1209600";
CommandLine "";
CommandLine::AsString "apt-config dump";

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --

deb http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free

deb http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib 
non-free
deb-src http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main 
contrib non-free

# squeeze-updates, previously known as 'volatile'
deb http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib 
non-free

-- System Information:
Debian Release: 6.0.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apt depends on:
ii  debian-archive-keyring  2010.08.28       GnuPG archive keys of the Debian a
ii  gnupg                   1.4.10-4         GNU privacy guard - a free PGP rep
ii  libc6                   2.11.2-10        Embedded GNU C Library: Shared lib
ii  libgcc1                 1:4.4.5-8        GCC support library
ii  libstdc++6              4.4.5-8          The GNU Standard C++ Library v3
ii  zlib1g                  1:1.2.3.4.dfsg-3 compression library - runtime

apt recommends no packages.

Versions of packages apt suggests:
pn  apt-doc               <none>             (no description available)
ii  aptitude              0.6.3-3.2          terminal-based package manager (te
ii  bzip2                 1.0.5-6            high-quality block-sorting file co
ii  dpkg-dev              1.15.8.11          Debian package development tools
pn  lzma                  <none>             (no description available)
ii  python-apt            0.7.100.1+squeeze1 Python interface to libapt-pkg

-- no debconf information

Diese elektronische Nachricht ist vertraulich. Die Information ist 
nur fuer den Adressaten bestimmt. Falls Sie nicht der Adressat 
sind, informieren Sie bitte sofort den Absender und vernichten 
Sie diese E-Mail sowie alle Kopien und angeschlossenen 
Anlagen. Bitte beachten Sie, dass es in diesem Fall verboten und 
gesetzeswidrig ist, diese Nachricht zu kopieren, weiterzuleiten 
oder zu benutzen. Es wurden alle moeglichen Massnahmen 
getroffen um eine Virusfreiheit der beigefuegten Dateien zu 
gewaehrleisten. Wir uebernehmen jedoch keine Verantwortung
fuer Schaeden, die aufgrund von Software-Viren entstehen und 
empfehlen Ihnen vor Benutzung der Dateien eine Ueberpruefung 
auf Viren durchzufuehren.

This electronic message contains information that is confidential. 
The information is intended for the use of the addressee only. If 
you are not the addressee please inform the sender immediately 
and delete this e-mail, its attachments and any copies. Please 
note that any disclosure, copy, distribution or use of the contents 
of this message is prohibited and may be unlawful. We have 
taken every reasonable precaution to ensure that any kind of 
attachment to this e-mail has been swept for viruses.
However, we cannot accept liability for any damage sustained as 
a result of software viruses and would advise you to carry out your 
own virus checks before opening any attachment.



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to