appily accept any patch flying my way
implementing architecture wildcards differently if need be, but I am not
going to do it myself mainly because I expect that to have fallout – not
in apt, but in things using apt – and I don't have the energy (or the
rights) to deal with such things efficiently.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
e
machine to "the cloud" or adds a new user + ssh server or or or…
What you could do with it is perhaps a shortcut for pinning, showing an
additional message/require an additional confirmation, if a package is
picked from that repository, or actually all of that in different
features…
peration we want to delay until after we have figured out all
build-dependencies as we would have to calculate it again then.
Before the rewrite it wasn't important then this calculation happened,
so the code did it very early on, so later parts "optimized" for code
length it s
s made from a machine (running Debian stable)
which isn't the machine the bug was observed on (as the report claims
to be against a Debian testing/unstable verion).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ekend)
and figure out how to solve this then hopefully without reverting the
merges entirely.
As a "workaround" I would suggest using just one mirror for the time
being – and depending on why you have this multimirror setup you might
want to look into httpredir.debian.org as mirror.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
your
/var/lib/apt/lists before you do this in case this isn't always
reproducible (if you get the "wrong" mirror for example).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ser from depends on it…
This might also be the right time for users to reconsider if they really
need all these third-party repositories they have configured over the
years. Debian has an evergrowing archive of software after all – and if
it isn't in the archive yet, consider adding it!
B
ion criteria using --criteria-plain
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
hey also serve as an information on who can be contacted with
suggestions/patches/thankyou-notes. :)
Feel free to translate this inline in a reply instead of rolling a complete po
if that is easier for you.
Thanks again & Best regards
David Kalnischkies
signature.asc
Description: PGP signature
n feel free to reopen/ask.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
me and ends with a hashsum mismatch.
One, two, three or twenty old versions is arbitrary indeed,
apt-ftparchive picked 2 olds (probably at semi-random) but any other
number would work. Any time-based requirement would work, too. For some
values of A and B at least. Perhaps the spec shouldn't r
rors are behind the same name ftp.debian.org, so
with the IP we have a chance to figure out which mirror of the many in
the rotation is it your machine was talking to (aka: its not your IP or
otherwise a secret).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
I see all sorts of problems with it… for example:
I couldn't survive without ssh and mosh gets you only so far…, but
I digress.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
gainst reality. Yeah, that would be nice… but its also
work to implement such a system. Can I assume you are volunteering?
Happy "package managment" days and best regards
David Kalnischkies
signature.asc
Description: PGP signature
typo… can you highlight what
is wrong and maybe even give a suggestion for an improvement?
But if you think 'apt' is a typo… we have a present for you. :)
Happy holidays to you, too & best regards
David Kalnischkies
signature.asc
Description: PGP signature
chitecture
> of this version, which is "-" if there is no version, and a field showing
> the MultiArch type "same", foreign", "allowed" or "none".»
Added.
> I hope I am not wasting your time.
Of course you aren't. T
lapsed on page load by javascript. The inherit
elements are e.g. all styled with the '.inherit' css class which just
sets 'display:none'. Not setting it via css but doing something like
$('.inherit').hide(0) would be nicer in case of bugs like this one and
also for users who have javascript disabled by default.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
nterface… /nitpick ]
> resolvers like dose3 or aspcud will happily find a solution.
I hope so! Otherwise I would seriously question what researchers have
done in the last decade (we are actually getting close to two now)… ;)
Of course, they aren't perfect either or someone surely had put in the
effort of making them the default…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Thu, Dec 11, 2014 at 01:02:35PM +1000, Russell Stuart wrote:
> On Thu, 2014-12-11 at 02:07 +0100, David Kalnischkies wrote:
> > Beside from compatibility concerns (old clients might be confused) it is
> > also wrong from an architectual point of view: A dependency usually is
&g
On Thu, Dec 11, 2014 at 03:29:07PM +, Thorsten Glaser wrote:
> David Kalnischkies dixit:
> >That would be nice… we can't really us an unsigned Release file though
>
> Uhm, it downloads Release.gpg right after Release and before all
> the Packages* files, so thi
t; which has a slightly different meaning for
me if its attached to code. ;)
(As usual, if you are said volunteer feel free to contact me (or better
yet deity@) and we will do what we can to help you out; I just want to
make cristal clear that we don't have the resources to do it ourselves
ve as hinted
above. Please CC de...@lists.debian.org if there are any questions you
think we could answer.
Best regards
David Kalnischkies
¹ The cagefights are a design decision in the current default resolver,
which is impossible^Whard to change and absolutely not going to happen
any time soon y
e release you can use (that isn't the case for < 1.0 which you
were testing, but for >= 1.1).
Best regards
David Kalnischkies
P.S.: "Securing" the transport via HTTPS or Tor isn't really a solution
btw as this isn't a "conventional" replay attack as you aren&
ll-recommends.
I would recommend not to recommend it because apt follows the general
recommendation of not recommending the installation of recommendations
of build-dependencies by default for all recommended Debian releases.
Recommended summary: Already the default since 2011.
Recommending eve
y, I guess 'domain knowledge' is involved as we wouldn't be
talking if libssl-dev would be a new mail-transport-agent. It would be
perfectly clear that it must conflict with the others even if there is
no technical reason for it given that the other mail-transport-agents
already confli
what "reproducible" means in
super laymen terms as I am not sure users will understand it. We have
trained people to understand "reproducible" in terms of bugs, but what
that means in the context of installing binary packages… installing
things is pretty reproducible, isn't it?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
.5 pile. Until that goes public, patch attached.
Best regards
David Kalnischkies
From 4c4e306a1be1e074ca07bec542c1469b909e2bfa Mon Sep 17 00:00:00 2001
From: David Kalnischkies
Date: Mon, 29 May 2017 18:02:28 +0200
Subject: [PATCH] don't show incorrect 'How odd' errror in no-download mod
On Tue, May 30, 2017 at 01:29:33AM +0200, Jakub Wilk wrote:
> * David Kalnischkies , 2017-05-28, 10:35:
> > > > Unfortunately, this protection is ineffective. All the attacker
> > > > needs to do to hide security updates is to replace all the files
> > > >
sitory/Format#Date.2C_Valid-Until
And indeed if I run apt-ftparchive:
$ mkdir /tmp/aptftptest
$ cd /tmp/aptftptest
$ apt-ftparchive release .
Date: Wed, 16 Aug 2017 14:35:14 +
MD5Sum:
SHA1:
SHA256:
SHA512:
$
(beside that our test framework uses it, too, so that should work™)
Best regards
at could turn out to be more confusing than
helping… (and as said, dpkg hasn't changed in a while).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
omplete or outdated already)
and the other files tend to be no longer compressed & you can't be sure
that if you compress it again, that you would get the same hash (as e.g.
different versions of a compressor can generate different compatible
files).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
lso breaking some
security aspects as apt uses the old data e.g. to prevent an attacker from
serving "older but still valid" data…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ot;RootDir" isn't really used
much due to it behaviour of being a prefix for all pathnames – even for
absolute paths. You might want to try setting "Dir" instead.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
nds. :)
The DoUpdate function in apt-private/private-update.cc should be a good
start for looking into it althrough the implementation of the message
might end up in another place (e.g. in the Fetcher implementation in
apt-pkg/acquire.cc). If there are questions we are happy to help here,
on
is using it anymore… desperate the name HTTP is a lot
better for file transfers anyhow.
Best regards
David Kalnischkies
[0] https://lists.debian.org/debian-announce/2017/msg1.html
signature.asc
Description: PGP signature
vive with leaving this open until someone comes
along with more experience who fixes it – or closes it at the time ftp
is gone.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ault-Release; see also the apt_preferences(5) manual page.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
again for not reacting earlier & feel free to ping the report in case
that should happen again!
And of course also: Thanks for the update!
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
of an argument than "but … the DPL said so!"… ;)
Best regards
David Kalnischkies
P.S.: apt-sortpkgs can help all those poor folks with unreproducible
index files now – it will also make indexes reproducible across tools
(assuming they all generate the same fields).
signature.asc
Description: PGP signature
helps already. If not the output of the earlier two might
help us. If "apt update" still fails please add: -o Debug::Acquire::gpgv=1
and include the full output (beware, that can be a lot) in a followup.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
nd the problem that it effects filelist
which it shouldn't. Lastly, we have basically no test covering this
which conflicts with the no-new-untested code rule we try to enforce
meaning yet more work.
(Then again, in the time I wrote the mails, I could have probably just
written a few alibi tests and fix the patch, … oh well.)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
aps it would be
a good idea to implement list in a way of showing which keyrings belong
to which package (and which do not belong to any package, aka created by
user). I will leave that up for someone to decide & work on who is a lot
more interested in third-party repositories, through.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
pg by bending it to our needs – with the upside
that one day we might 'easily' change to the web of trust if it becomes
feasible for our usecase.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
chive doesn't
get a whole lot of attention and testing and I would like to avoid
fixing regressions on emergency in stable buster.
Best regards
David Kalnischkies
From ec18a3647f678590ba4dc1112820fd19919ac0c8 Mon Sep 17 00:00:00 2001
From: David Kalnischkies
Date: Fri, 28 Jul 2017
upstream itself
or via Tor is working on fixing this at the root?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
I would presume they managed to pull
it of somehow (or we would be looking at v7 everywhere now).
Best regards
David Kalnischkies
[0]
https://lists.debian.org/
signature.asc
Description: PGP signature
u said it right in the paragraph I quoted and still I missed it
that both symbols are emitted and thought the symbols patch is a typo
missing a '-' … thanks brain, very good job…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ign so you are quickly wasting a lot of time (ignoring
all the problems you have while collection the dependencies). From that
short paragraph alone you can guess that this is non-trivial aka not for
stretch. It is in fact basically a new resolver which we get ever so
slightly closer to cleanly
the "pkg" is missing
from them – just don't ask me why as I have no idea ;) )
Assuming this is reproducible. I fear it isn't… (running apt with these
options isn't dangerous or anything if someone wanted to try for longer,
they just make apt super chatty about some things.)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Wed, Dec 07, 2016 at 11:28:09PM -0600, Steve M. Robbins wrote:
> On Thursday, December 1, 2016 1:16:43 PM CST David Kalnischkies wrote:
> > So @googletest maintainers, please state what you can/want to do about
> > it or not. Being a build-dependency of apt provide
On Sun, Dec 04, 2016 at 04:13:47AM +0100, Guillem Jover wrote:
> On Tue, 2016-11-22 at 18:50:51 +0100, David Kalnischkies wrote:
> > On Tue, Nov 22, 2016 at 02:43:35PM +0100, Vincent Lefevre wrote:
> > > --\ Packages to be upgraded (17)
> > […]
>
earch for keywords /after/ fixing something, but I am never
looking for something to fix as the influx of new ones is more than
enough…
Best regards
David Kalnischkies
[0] Its maintained of course: If there are bugs we might end up fixing
them eventually – but its the same with the 600 other bugs in src
l
files in /var/lib/apt/lists are nice and valid while after (a
successful) apt call a broken file has slipped in creating errors.
The attached log shows apt behaving as intended – well, perhaps apt
should be clever enough to remove broken files from its lists/ directory
but thats a wishlist as it shouldn't end up in a situation in which it
has broken files there in the first place…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
gtracker isn't
the place to discuss this – nor is my existance exorbitantly interested in
'chairing' such a discussion at the moment as there are other things
I should be working on, which is also why I only think in private that
this might be a topic which should end up on d-d@ as it effects at least
the big virtual packages.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
t belong there even if there is precedence by other
tools. Its also not for state keeping (/var/lib) and not a cache
(/var/cache) as its never read. It does log the current state of the
system through which is why I placed it in /var/log. Its not ideal that
this is root-only, but as mentioned I really don't like ~/.
Do you have a better suggestion for a location?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
-8
locale btw – actually LC_NUMERIC=C.UTF-8 is enough.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
d for a source-only upload failed, so beside the need to fix
this build-failure the package (which I see you claim to have done
already in your newest version) will also have to pass binary-NEW now.
So, you should be preparing and asking for sponsorship of 4.2.2-2
(just answering the questi
mple enough detection to not worry for the moment), so I aim low and
treat it as a feature request rather than a bug. Not sure how
non-apt-based frontends like dselect behave through, so for them that
might be one…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
sympathy for mirrors returning 404 for files which should
be there… switch to another perhaps?
Based on this report and #831762 I made a bunch of commits which for
this report I am not entirely sure will fix the problem, but I at least
have some hope for it. We will see with the next upload I guess. In
unhelpful), will use different circuits for different
sources and stuff.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
So, with that in mind and given that even the reporter can't reproduce
it the bugreport as such seems rather unactionable - tagging as such.
Best regards
David Kalnischkies
[1] https://en.wikipedia.org/wiki/Bus_error
signature.asc
Description: PGP signature
"your" solution. There is no "temp" hold at the moment apart
from asking apt to install a package already installed, but that might
be added some time in the future.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
we don't
react to the window change 'instantly'…
I have no immediate idea at least but with my mentioned commit we
are at least back to a pre-beta3 state which seemed to have worked for
a while now… (unsurprisingly, I couldn't reproduce the problem in a few
test runs bef
as simple as dying/faulty memory? apt & dpkg have a tendency
to show hardware issues as they are more demanding than most apps…
If someone could replicate that system and run the update for real that
would probably shine more light on the issue – unreproducible for me
until then.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ed-By: Sources" --format='$(FILENAME) $(CODENAME)
$(SUITE)' | while read file codename suite; do
| if /usr/lib/apt/apt-helper cat-file "$file" | grep-dctrl -q -PX apt -a -F
Version -X '1.4~beta2'; then
| echo "FOUND in: $codename ($suite) $file";
| fi
| done
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
as an upgrade is based on your knowledge of mariadb
and how it (incompatibly!) changes in each new version: For apt it looks
like the package 'default-texteditor' changed its depends from 'vim' to
'emacs' [actually worse than that as those two are co-installable] and
that isn't an upgrade! ;)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
of
systems always carries a risk of activating also bugs with it.
The very nature of the option makes it also particularily hard to test
– apt itself hasn't a single test covering this option.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ne some additional light on this while I cuddle with
my pillow with those questions already…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
he longer the grace period the better…
btw: Upstream seems to have retired their remark on compiling googletest
on your own as I can't find it any longer on their website and e.g. in
the RPM/BSD worlds you get a binary only.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Thu, Nov 17, 2016 at 07:20:47AM +0900, Daniel Kahn Gillmor wrote:
> On Wed 2016-11-16 22:42:04 +0900, David Kalnischkies wrote:
> > On Wed, Nov 16, 2016 at 02:40:59PM +0900, Daniel Kahn Gillmor wrote:
> >> weird that it says "1 not upgraded" in response to &quo
ver intelligent enough to
produce helpful messages.
Other solvers have a lot more liberty of course: I haven't tried but
aptitude or apt with --solver aspcud (or another) likely solves this
specific situation – but they have other drawbacks in exchange.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
t that is the idea],
so that should absolutely be doable if someone wants to work on
implementing it.
If someone wants to try feel free to contact us on deity@/#debian-apt!
Best regards
David Kalnischkies
¹ and it isn't clear if we do change to something else at some point as the
dependen
On Sat, Nov 19, 2016 at 10:06:17PM -0600, Steve M. Robbins wrote:
> On Fri, Nov 18, 2016 at 01:29:07PM +0100, David Kalnischkies wrote:
> > You should also update your README.Debian and the descriptions with the
> > new paths and the transitional package as [...]
>
l take just as long to reach critical
mass, but I have some hope for that format to not be changed and
text-based formats tend to be easier to work with for humans.
I have a patch for this mostly done which I am going to merge if I don't
hear people complain bigtime about it and would consider t
self: I haven't looked closely, but apt tries
to not explore solutions caused by M-A:same version screw – aptitude
seems way more willing to suggest such solutions; that is okay I guess
as it is way more interactive, too.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
red flag…
You should also follow the manpage advice and append the label of the
repository to the option to have it not effect all your sources, but
just those with that label (l= in apt policy output). btw: In stretch
you are able to just mark the sources line(s) for your local mirror(s)
directly with those options.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
'real'
user – and 99% of users will never need it (or at least shouldn't be
forced by 6+ years outdated advice to use it).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ecursive invocation style
dpkg::install::recursive "false";
dpkg::install::recursive::force "true";
So, lets let everyone pick his/her preferred poison and we will see who
dies last in this vote… (cc'ed dpkg as they are as involved in it as apt
is).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
k first
before we rush into evaluating and moving to other testing frameworks,
which is time better spent on other bugs if we can help it…
Beside, even if you decide not care that would still need to be
expressed in the metadata, so reassign the bug as to be handled by you.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
%lu es va instal·lar automàticament i ja no és necessari:\n"
aka: "ŀl" changed to "l·l". Is that intended?
Attached is the file (compressed) as it came out of our 'make update-po'
which additionally re-wrapped some lines, so you can see what I mean
with the plur
fi" but that would really need someone to verify
that this has the intended result (and is available in your setup).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
omething can be said about having the
other test named 'run-tests' …).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
o: As this is adding a non-trivial amount of code to a much beloved
and very important feature it would be in your best interest to add
some very basic tests for this [for you] obviously very important
behaviour² so future incarnations do not (re)break reproducibility of
moo. You may add them to
xample code I gave all these situations will
produce a line and you can let it give you any info available in the
Release file – I would suggest looking at the output of the command and
the documentation in /usr/share/doc/apt-doc/acquire-additional-files.txt
> part I have to use `apt-cache madison' or `apt show' for. `apt show'
> contains an `APT-Sources' line which I could presumably correlate with
> indextargets.
Don't use 'apt' in scripts. And as said above all info is available
anyhow so you don't need to correlate anything.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Tue, Jan 03, 2017 at 10:29:19AM +0100, Olaf van der Spek wrote:
> 2016-12-25 13:12 GMT+01:00 David Kalnischkies :
> >> Can't it detect mariadb-server-10.1 being a proper upgrade of
> >> mariadb-server-10.0 and hence scoring this as neutral or positive?
> >
>
On Sat, Dec 31, 2016 at 01:25:33AM +, Ian Jackson wrote:
> David Kalnischkies writes ("Re: Bug#848194: Want way to get Release (or
> InRelease) file from cache"):
> > On Mon, Dec 19, 2016 at 01:18:13AM +, Ian Jackson wrote:
> > > I get a sense of puzzlement
t' should free you of your
troubles. :)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
e visited the webpage? If a bug effects central parts of the
infrastructure its always more problematic than a bug in leaf package…
the hope is that such bugs are unlikely enough that we don't have to
base our bugreporting system on handwritten notes and carrier pigeons.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
hanks for maintaining https-everywhere (and many other extensions) in
Debian to have it just one apt call away! :)
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
On Thu, Sep 01, 2016 at 02:10:14PM +0200, ydir...@free.fr wrote:
> > >> I don't see sysvinit being Essential anymore in unstable:
> > >>
> > >> → apt-cache show sysvinit | fgrep -i Essential
> > >> This package depends on init, which is an essential package that
> > >> →
> > >>
> > >> Any chance t
s seems to be documented e.g. in "BINARY SPECIFIC CONFIGURATION" of
apt.conf manpage. Have you just not found this, was the text unclear or
what do you think we should be doing to resolve this bug?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
the long description:
https://anonscm.debian.org/cgit/apt/apt.git/commit/?id=70ff288b98a7aae2c2808112015d34f76f2d5114
Feel free to ignore the warning until apt transitions to testing as it
is perfectly harmless – no need to upgrade apt out of line to fix this.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
Control: reassign -1 apt-listchanges
APT isn't respecting this file because it isn't its file and knows
nothing about it nor has any functionality which would use it.
It is the file of a hookscript, hence reassigning to that, full-quoting
the initial mail for reassigning benefit.
On Tue, Aug 09,
ut I would suggest looking into initializing apt in the right order or
you will eventually will run again into issues with config options not
having the option set they are supposed to have, which is why I leave
this bug here – unsure if its a cme or libapt-pkg-perl problem, I am
just not enough of a perler to know…
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
modified prior to this code
> being run. Not sure where, perhaps there is another use of AptPkg in cme?
The first is correct, the later indicates that $_config->init was never called
as Dir couldn't be empty in that case (and that Dir::State gets its default
value here is actually an unattended but harmless side effect of the dpkg/status
finding code in its current form). Given that the error message has a '/' in
front I lean towards assuming that the configuration is eventually initialized,
just too late.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ex-digit. True, it
wasn't very friendly to copy&pasting the fingerprint as you needed to
remove the spaces, but I implemented automatic space-removal for the
lazy just today, so that shouldn't be a problem either.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
ld be command mode. Especially in the first one every
keypress can count, so perhaps you want to expand on what you do – but
aptitude people will know better than me what to do (of course, in the
event that this is a libapt regression feel free to hand it back).
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
the responsible translator (Chris Leick) instead as he
will know best what the "state of the union" is.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
s not exist [0].
See also #823910.
I am going to write a patch for apt later, but I guess that can't be
considered a bugfix and hence might not be 1.3 material (depending on
how big or not that might turn out to be).
Best regards
David Kalnischkies
[0] file:///usr/share/doc/debian-policy/policy-1.html#f55
signature.asc
Description: PGP signature
#x27;.
e.g.: apt install -s awesome apt-doc+ dpkg-dev-
This installs (or upgrades) 'awesome' and 'apt-doc' and removes
'dpkg-dev'.
Is that what you are asking for?
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
501 - 600 of 1111 matches
Mail list logo