Your message dated Sun, 30 Apr 2023 08:23:52 +0200
with message-id <[email protected]>
and subject line Re: Bug#1035087: unblock: debian-archive-keyring/2023.3
has caused the Debian Bug report #1035087,
regarding unblock: debian-archive-keyring/2023.3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1035087: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035087
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock
X-Debbugs-Cc: [email protected], [email protected]
Control: affects -1 + src:debian-archive-keyring
Please unblock package debian-archive-keyring
[ Reason ]
Users who upgrade from bullseye to bookworm
(debian-archive-keyring_2021.1.1 -> 2023.2) will have leftover keyrings
in /etc/apt/trusted.gpg.d as well as the new ASCII fragements. In
contrast, users who have followed bookworm for some time do not because
an intermediate version did the right things. The jump in version for
normal upgraders reveals the issue.
This is bug #1033153.
[ Impact ]
Misleading listings of keys from apt, and the danger that user changes
don't take effect because of the duplication.
[ Tests ]
Thorough manual testing with a range of upgrade paths.
[ Risks ]
Trivial change to clean up obsolete files - the risk is low.
Source debdiff attached.
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock debian-archive-keyring/2023.3
diff -Nru debian-archive-keyring-2023.2/debian/changelog
debian-archive-keyring-2023.3/debian/changelog
--- debian-archive-keyring-2023.2/debian/changelog 2023-03-17
17:03:56.000000000 +0000
+++ debian-archive-keyring-2023.3/debian/changelog 2023-03-28
21:31:07.000000000 +0100
@@ -1,3 +1,9 @@
+debian-archive-keyring (2023.3) unstable; urgency=medium
+
+ * Reinstate cleanup of the APT keyrings for buster (Closes: #1033153)
+
+ -- Jonathan Wiltshire <[email protected]> Tue, 28 Mar 2023 21:31:07 +0100
+
debian-archive-keyring (2023.2) unstable; urgency=medium
* Reinstate buster keys for apt as fragments (Closes: #1033077)
diff -Nru
debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript
debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript
--- debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript
2023-03-17 17:03:56.000000000 +0000
+++ debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript
2023-03-28 21:23:44.000000000 +0100
@@ -9,6 +9,9 @@
rm_conffile
/etc/apt/trusted.gpg.d/debian-archive-stretch-security-automatic.gpg 2022.1~~
rm_conffile /etc/apt/trusted.gpg.d/debian-archive-stretch-stable.gpg 2022.1~~
# These ones are replaced by asc fragments
+rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-automatic.gpg 2023.3~~
+rm_conffile
/etc/apt/trusted.gpg.d/debian-archive-buster-security-automatic.gpg 2023.3~~
+rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-stable.gpg 2023.3~~
rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-automatic.gpg
2022.1~~
rm_conffile
/etc/apt/trusted.gpg.d/debian-archive-bullseye-security-automatic.gpg 2022.1~~
rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-stable.gpg 2022.1~~
--- End Message ---
--- Begin Message ---
Hi,
On 29-04-2023 13:28, Jonathan Wiltshire wrote:
unblock debian-archive-keyring/2023.3
Done, thanks.
Paul
OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---