s made from a machine (running Debian stable)
which isn't the machine the bug was observed on (as the report claims
to be against a Debian testing/unstable verion).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
e.g. all styled with the '.inherit' css class which just
sets 'display:none'. Not setting it via css but doing something like
$('.inherit').hide(0) would be nicer in case of bugs like this one and
also for users who have javascript disabled by default.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
of this version, which is "-" if there is no version, and a field showing
> the MultiArch type "same", foreign", "allowed" or "none".»
Added.
> I hope I am not wasting your time.
Of course you aren't. These silly mistakes shouldn't be in fil
ighlight what
is wrong and maybe even give a suggestion for an improvement?
But if you think 'apt' is a typo… we have a present for you. :)
Happy holidays to you, too & best regards
David Kalnischkies
signature.asc
Description: PGP signature
d be nice… but its also
work to implement such a system. Can I assume you are volunteering?
Happy "package managment" days and best regards
David Kalnischkies
signature.asc
Description: PGP signature
ing
shell at some point finds at least something in it to explode… (which,
frankly, is an appropriate response for such a "psycho-path"), which is
why this report ends up here at doxygen rather than at dot (as it looks
for me like it is dot which is exploding with this path, but I haven't
tried).
ve) confirmation bias after talking again and again in
defense of pdiff in fact]
So, yeah, problem well understood – no need to further debug/check that.
"Just" needs some heavy code juggling now to make it fly again…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
d in
your package – or don't set it et all. On our end, I will have to dig
into the parser: I remember changing whitespace parsing "recently", so
that could be a 1.1 regression and I wanted to look into it for other
reasons as well…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
higher up
the chain [which was probably very technical like this one] – with the
"most likely" cause added in a few layman terms as we do it in a few
other error messages as well.)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
you meant /etc/hosts)
My money is on Nils's suggestion, but if that isn't it the only recent
changes to resolving are IDN support (disable it via -o
Acquire::Connect::IDN=false) and support for SRV records (disable it via
-o Acquire::EnableSrvRecords=false). Neither should be responsible
through…
couple of
other places as well and is a more common tool (packaged in findutils
– also essential, so no explicit dependency either, but that tends to be
available on all other systems via their essential equivalent.)
Hope that helps.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Sun, Dec 06, 2015 at 03:32:02PM +0100, Jakub Wilk wrote:
> * David Kalnischkies <da...@kalnischkies.de>, 2015-12-06, 14:55:
> >I changed various places to use "command -v" anyhow as we indeed use it
> >for no good reason, so why not…
>
> Well, Policy says t
is a target release and it matches the release of the package,
> * or there is no target release
> and the version is higher than the last best hit.
>
> Attached is a patch fixing this and another one adding above two
> testcases.
And as a testrun doesn't show regress
ity purposes as it can be considered
broken. Note that SHA1 is on its (long) way out as that is close to be
broken, too, so SHA256 (or SHA512) is currently best practice (given
that this is what gpg is using for signatures, so more wouldn't have an
effect).
Best regards
David Kalnischkies
s
) gid. A proper patch would likely
involve saving in setgroups as well, so not marking as +patch – also as
the wrapping of initgroups somehow suggests you don't want to deal with
this at all.
Best regards
David Kalnischkies
--- a/libfakeroot.c
+++ b/libfakeroot.c
@@ -1554,6 +1554,16 @@
return 0
ated for a very small gain as essentials are usually not exclusive
by design and the "workaround" is easy enough: pinning.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Fri, Nov 27, 2015 at 05:18:13PM +0100, Thorsten Glaser wrote:
> On Fri, 27 Nov 2015, David Kalnischkies wrote:
>
> > Essentials have to be installed, so you just can't have mutually-
> > exclusive essentials in any supportable capacity.
>
> Of course Essentials have t
ege dropping for the moment.
Best regards
David Kalnischkies
diff --git a/apt-pkg/contrib/fileutl.cc b/apt-pkg/contrib/fileutl.cc
index 46de634..f754b31 100644
--- a/apt-pkg/contrib/fileutl.cc
+++ b/apt-pkg/contrib/fileutl.cc
@@ -2322,12 +2322,17 @@ bool DropPrivileges() /*{{{*/
return _
" to reinstall all
> packages I've built seems to fix the issue.
As mentioned briefly schroot copies users & groups from your host
system, so if your host system has no _apt user, the _apt user in your
schroot will "disappear" next time it is copied over.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
, which
I initially intended anyhow, but part forgot and part found useful while
working on this change.
¹ if "-private" wasn't enough of a hint, headers aren't available, no
symbols/shlibs file and exactly nobody cares about ABI/API in there.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Sat, Nov 21, 2015 at 06:39:03PM +0100, Alexandre Detiste wrote:
> Le samedi 21 novembre 2015, 10:27:29 David Kalnischkies a écrit :
> > On Fri, Nov 20, 2015 at 01:42:34PM +0100, Alexandre Detiste wrote:
> > That is most likely of no real concern to the user hence its on
shown before the user is asked to
confirm the installation/download, but one bug at the time. ;)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
t I hope to find some time to move them through
d-l10n-english before bugging translators for updates, so that is just
a heads up in case you might wonder.
> > You might want to check your PO files with i18nspector, which is how
> > I found this bug. :)
Thanks from me to Jak
hat it results in a crash instead of not
detecting a file as RAW in most other applications ;) )
Anyway, upstream should probably look for more instances as the attached
patch is likely incomplete. It just got the NEF previews working again
for me.
Best regards
David Kalnischkies
diff --git a/sr
codesearch suggests there aren't
an awful lot of users and I doubt it would turn out worse for them,
instead of officially breaking the API lets just deprecate 2 and have
4 (which looks like 2) be a wrapper for 3. Yeah for API design!
Best regards
David Kalnischkies
P.S.: Based on codesea
lues).
Oh, and for the record: I have no clear opinion on what should be done about
it – I will leave that for the "history digging timelords" to decide.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
erstand what the problem is…
maybe you can give us an idea how and why you are trying to sent bytes
instead of characters in our textinterface here?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ce if you could provide a complete set of steps to
reproduce this, preferably starting with the setup of the chroot itself.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
far as I know) need some help – you might wanna join…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
bug here for someone to check aptitude – feel free to
close if there is no such issue.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
oducible if its really this issue.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
r with faster, packages from
third-party repositories … but nobody can help if all you tell us is
"254" and "121".
I am inclined to close as 'notabug', but I will give you a second chance
at giving us some details so that it is actually possible to figure out
what is the problem.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
On Wed, Sep 09, 2015 at 11:23:49AM +0100, Manuel A. Fernandez Montecelo wrote:
> 2015-09-09 7:07 GMT+01:00 David Kalnischkies <da...@kalnischkies.de>:
> > On Tue, Sep 08, 2015 at 03:40:20PM +0100, Manuel A. Fernandez Montecelo
> > wrote:
> >> Is this with multi
On Sat, Sep 05, 2015 at 06:43:54AM -0400, James McCoy wrote:
> On Sep 5, 2015 5:17 AM, "David Kalnischkies" <da...@kalnischkies.de> wrote:
> > The gcc-5 transition causes many libraries libfoov5 to conflict with
> > installed libfoo packages and the resolver dislikes
apt-get update -o Debug::Acquire::http=1
might reveal something interesting.
Also, what version of apt and libapt is used here?
Any configuration derivation you might want to tell us about?
But as Julian said, this is likely a temporary problem of the involved
server and not of the client.
r
right) truncate the changelog file they ship in the package, so for
these distros there should at least be an option to get the complete
file from the online source instead of from disk.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
e next experimental upload.
There will hopefully be a 'proper' call for updates later in this
release cycle, but we are always happy to receive updates at any point
in time. :)
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
ope it doesn't need an emergency to see you again on
mailinglists and DebConfs alike, so "break a leg" with your running and
Best regards
David Kalnischkies
[0]
https://lists.alioth.debian.org/pipermail/soc-coordination/2010-April/000772.html
signature.asc
Description: Digital signature
regards
David Kalnischkies
signature.asc
Description: Digital signature
.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
away with a lua hook system mainly as rpm
already needs it – and this is certainly interesting to look at, but
very likely at most as an inspiration rather than a patch source…
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
for your contributions – and just
open another report at the time the next update is ready. :)
Thanks again best regards
David Kalnischkies
signature.asc
Description: Digital signature
instances in the meantime…
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
currently) and a bunch of other nifty stuff. See also the
test/integration/test-apt-update-* tests for details on what it can do
(and prevents attackers from doing).
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
will become 1.1 eventually already autorecreates and/or chowns
(among other things) the partial/ directories as needed all by itself.
So, your sneakernet should work out-of-the-box.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
the whole week and doing that
makes you slightly crazy – also because there are actually reports
requesting the strangest things so you start reading the worst into
them… ;)
So, again thanks for the report and for bearing with me, too!
Best regards
David Kalnischkies
signature.asc
Description
Control: severity -1 minor
Control: tags -1 + newcomer
Control: found -1 0.8.16~exp2
On Sat, Aug 15, 2015 at 05:34:20PM +0200, Jakub Wilk wrote:
Package: apt
Version: 1.0.10.1
Tags: security
* David Kalnischkies da...@kalnischkies.de, 2015-08-14, 10:14:
For the record: /usr/lib/apt/solvers
newcomer… *hint hint*
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
for me like the submitter gets a mail automatically…
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
. Thanks for reporting this oversight now!
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
it (I have no idea why):
https://alioth.debian.org/tracker/index.php?func=detailaid=314652group_id=100114atid=413095
There are more apt related patches in there as well. Seems like the
maintainers of bash-completion need some help…
Best regards
David Kalnischkies
signature.asc
Description
this myself) setting Dir and DPkg:Run-Directory to the same
directory aka your chroot.
Good luck best regards
David Kalnischkies
signature.asc
Description: Digital signature
that aptitude runs the autoremover by
default for all actions while it is an extra command in apt-get.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
Version: 0.9.10
On Wed, Mar 30, 2011 at 10:27:57PM +0200, David Kalnischkies wrote:
On Sun, Mar 27, 2011 at 03:13, Josh Triplett j...@joshtriplett.org wrote:
On Sat, Mar 26, 2011 at 10:33:17AM +0100, David Kalnischkies wrote:
I think this is very similar to --secrect-keyring which isn't
On Tue, Aug 11, 2015 at 10:46:32AM -0400, Antoine Beaupré wrote:
On 2015-08-11 04:33:31, David Kalnischkies wrote:
Hi,
On Sun, Jul 17, 2011 at 12:06:37PM -0400, Antoine Beaupré wrote:
Now, those keys are (or can be) published on the keyservers. Why don't
we have a cronjob in APT
.
+ If you want to prefix only relative paths, set literalDir/literal
instead.
/para
para
In other words: You probably want to set Dir, not RootDir.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
).
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
, that should be enough to reproduce it.
Usual disclaimer: dpkg/status contains information about all packages
you have installed on your system and in which version. If you don't
want to expose this information in public, feel free to sent it
privately to me.
Best regards
David Kalnischkies
getCommandArgs to do something clever
on a Cmd == NULL as the FIXME in the code suggests, its just that this
needs to keep support for stuff like apt-get -h, which is why there is
a FIXME and not an error message in its place already.
Best regards
David Kalnischkies
signature.asc
Description
of code…
Best regards
David Kalnischkies
commit d32010483fed74681bf9035a1c81adbcecbf1146
Author: David Kalnischkies da...@kalnischkies.de
Date: Mon Aug 3 07:00:33 2015 +0200
mark again deps of pkgs in APT::Never-MarkAuto-Sections as manual
In 50ef3344c3afaaf9943142906b2f976a0337d264
it overriding user configuration…
(just for the record: The bug here will be recycled for the breakage
of Never-Mark-Auto and be closed around next week, depending a bit on
Michaels return and the gcc5 transition)
Best regards see you at DebConf :)
David Kalnischkies
signature.asc
Description: Digital
tag.
As usual no patch attached as the po-rebuilds kill it.
Feel free to drop me a line by mail/irc if there is more I can/should do.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
regards
David Kalnischkies
signature.asc
Description: Digital signature
On Mon, Jul 06, 2015 at 03:19:04PM -0400, Daniel Kahn Gillmor wrote:
On Sun 2015-07-05 11:10:59 -0400, David Kalnischkies wrote:
I don't know where you get the stdin from. What I am trying here is
merging a keybox into a simple keyring in a single command, no funky
business with stdin
on homedir '/tmp/gpg2to1'
| gpg: key 76B9B739: David Kalnischkies da...@kalnischkies.de not
changed
| gpg: Total number processed: 1
| gpg: unchanged: 1
right. --export | --import is the expected workflow.
This is the same error as printed if I s#gpg2#gpg# btw which is kinda
: public key David Kalnischkies da...@kalnischkies.de
imported
| gpg: Total number processed: 1
| gpg: imported: 1 (RSA: 1)
| gpg: no ultimately trusted keys found
| /tmp/gpg2to1$ gpg2 --no-options --no-default-keyring --keyring
~/.gnupg/pubring.gpg --export 76B9B739 | gpg2 --no-options
On Wed, Jun 24, 2015 at 11:25:54PM +0200, Johannes Schauer wrote:
Hi,
Quoting David Kalnischkies (2015-06-24 23:18:12)
So, long story short, the solution I would like to propose is:
$ apt-get files Codename: sid Trusted: yes Created-By: Packages
[…]
so the arguments to apt-get
On Thu, Jun 26, 2014 at 10:58:38PM +0200, David Kalnischkies wrote:
On Thu, Jun 26, 2014 at 10:30:24PM +0200, Johannes Schauer wrote:
Quoting David Kalnischkies (2014-06-26 21:48:42)
I think it is a bad idea to use our lib-directory directly.
if apt developers agree that it is a bad
, no perl. We have nobody who could review/maintain that.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
file through.
Changes to the file can be detected by dpkg and even if you remove it
dpkg will not add it again on a package upgrade.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
.)
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
of dependency solving was magic. It still very much is, but we are
so much used to it now, that we expect more and more. Unfortunately
without purring more resources into it. Instead we declare package
management a solved problem…
Best regards
David Kalnischkies
signature.asc
Description: Digital
as non-root in the process and only allow
libapt to be loaded by only one root application at the time. That would
immensly cripple the useability for next to no gain…
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
Hi,
On Tue, May 05, 2015 at 09:43:53AM +0200, Cesare Leonardi wrote:
root@etna:~# apt update
Get:1 http://httpredir.debian.org unstable InRelease [204 kB]
Hit http://httpredir.debian.org experimental InRelease
[…]
Err http://httpredir.debian.org experimental/non-free amd64 Packages
Hit
to try only!)
A thank you goes out to everyone reporting this bug and especially to
Axel for helping me debug this – and of course a sorry to everyone
for breaking things, especially to the release team.
Best regards
David Kalnischkies
commit 6c9937da76b9155d166092b9dda22d06200510c1
Author
is dependent on those.
No such bug found on my cubietruck.
btw: Is cubietruck 'armhf' or 'armel'?
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
) in the diff between 1.0.9.7 and 1.0.9.8.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
-apt) anything (optionally even stuff
related to apt). ;)
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
to be honest).
The patch is attached there and as one-liney and 'safe' as the rest of
this bundle is supposed to be…
Thanks and best regards
David Kalnischkies
signature.asc
Description: Digital signature
::pkgProblemResolver=1
How the execution shedule looks and why:
-o Debug::pkgOrderList=1 (usually just noise through)
-o Debug::pkgPackageManager=1
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
be skipped as it isn't run at buildtime.
Best regards
David Kalnischkies
commit 596ec43ce34421080a58b28299c1ed9cb0dbaa25
Author: David Kalnischkies da...@kalnischkies.de
Date: Sun Apr 12 19:16:01 2015 +0200
parse specific-arch dependencies correctly on single-arch systems
On single-arch
, not if a nonexistent id
triggers an error.
msgtest Try to remove a key which exists, but isn't in the 'forced keyring'
testsuccess --nomsg aptkey --fakeroot --keyring rootdir/etc/apt/trusted.gpg
del DBAC8DAE
Shouldn't (at least) this testcase fail if you fail on not acting?
Best regards
David
Thanks for considering an:
unblock apt/1.0.9.8
and best regards
David Kalnischkies (for the APT team)
commit d5cf8851753dde4f45bfd3b48fcdf34247a8752a
Author: David Kalnischkies da...@kalnischkies.de
Date: Tue Apr 7 22:34:34 2015 +0200
keyids in apt-key del should be case-insensitive
and installs new recommends, while leaving the
old ones uninstalled, so such a list might want to consider that as
well.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
and it at least catches the essence of
both suggested patches.
Best regards
David Kalnischkies
commit 70c374f18a69661006fc0472018efe833e03fa90
Author: David Kalnischkies da...@kalnischkies.de
Date: Tue Apr 7 14:34:04 2015 +0200
properly handle expected filesize in https
The worker
On Thu, Mar 19, 2015 at 10:40:32PM +0100, Matthias Klose wrote:
On 03/18/2015 11:39 AM, David Kalnischkies wrote:
Attached is as far as I got in terms of a testcase. Still depends on
libapt as if I make the method directly available everything is fine…
would it be possible to have a test
as the 'install' case already works, the 'remove' case should be very
similar. Anyone interested on working on this is highly encouraged to
drop us a line (or two) and/or join #debian-apt on IRC.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
wastes three keystrokes per user. ;)
Attached is a diff to drop the -f from all translations, even those
which seem kinda stale (I have my doubts aptitude -f had the behaviour
suggested in older version here either, but I haven't touched those).
Hope that helps.
Best regards
David Kalnischkies
21/kB/42kB² should
not matter much (trivial diff attached).
Best regards
David Kalnischkies
² 'decomp' mostly because apt has a tendency to use incomprehensible
strings here – or does any normal user know what rred is?
Most who see it think its a typo for 'read' after all. ;)
diff --git a/apt
to update my commit message a bit now with a second bugreport
about this and then we will see what reality says to these patches.
Thanks again Best regards
David Kalnischkies
commit d11f36bd012abe0b8dafebc898f5e47c901b5f95
Author: David Kalnischkies da...@kalnischkies.de
Date: Fri Mar 27 15:53:43 2015
its
first birthday and is tagged 'newcomer'… Someone who is interested in
working on this is highly encouraged to contact us!
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
at guessing and I tend to dislike
bugreporters who do it myself, but I couldn't help it…
The subject being the biggest offender really…
So take everything I just noted with at least a bit of salt.
Best regards
David Kalnischkies
¹ with the help of Julien Cristau and Helmut Grohne
² 4.x series tested
to release critical as if you follow the release notes
to the letter everything is fine, but I would treat it as such as not
everyone does.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
in general (even through
I realize that this is dangerously close to core principles).
Best regards
David Kalnischkies
P.S.: I am also realizing now that I 'happily' omitted -core and -sysv
in the mentions of specific inits by accident. So its now left as an
exercise for the reader to add
well to drop these files entirely as unsigned flats work fine
without a Release file, too – and it looks even more like a bad idea
this way (which is always good).
I don't know about other (non-)users of these Release files through.
Best regards
David Kalnischkies
signature.asc
Description
the
first proposed solution?
(¹ on IRC as while I follow aptitude bugs, I don't really want to chirp
on them as as a non-user it isn't my business, but now that I am invited
via deity@ to comment I have a bit less qualms…)
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
information (to be fair, I am inclined to close them
as well, but I guess it will be a jessie-ignore by Nils [or another
release teamer] instead to scare me).
Or is there anything left unanswered/open?
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
are not loosing
any data (well, with a fulldisk we potentially are, but that is the bug
of other tools not handling this case) and its not opening a security
hole. So neither of the reasons for 'grave' apply here and hence not
release critical.
Best regards
David Kalnischkies
signature.asc
Description
doubt
that this is a problem in practice, but it is technically allowed (as
long as debconf has no python dependency). This probably get slight more
real if python-minimal ever decides to link to (e.g.) python5 instead.
Best regards
David Kalnischkies
signature.asc
Description: Digital
idea to implement something like it in
apt-cacher-ng and/or hinting at the DIRECT config in its configuration,
hence reassigning to them to decide on further actions.
Best regards
David Kalnischkies
signature.asc
Description: Digital signature
401 - 500 of 1103 matches
Mail list logo