Your message dated Mon, 26 Oct 2020 18:18:24 +0000
with message-id <e1kx74a-000h9y...@fasolo.debian.org>
and subject line Bug#969936: fixed in debian-lan-config 0.27
has caused the Debian Bug report #969936,
regarding bullseye: add support, switch from /updates to -security
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
969936: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969936
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: debian-lan-config
Version: 0.26
Severity: serious
File: /usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc
User: debian-de...@lists.debian.org
Usertags: bullseye-security

The above script references $release/updates but when bullseye is
released that should be replaced by $release-security.

It looks like when a bullseye system is being installed, the setrel
function does not recognise the target release and so it won't setup
the apt sources.list at all.

Then even if the release were recognised properly, the script would
generate an incorrect sources.list using /updates instead of -security
which would cause the target system to not get security updates from
bullseye in a timely manner.

In addition, the SERVER_A sources.list references buster for the main
set of packages but uses stable/updates for security updates. This
means that after the bullseye release servers installed using the
debian-lan-config package will get packages from buster but their
security updates from bullseye, which seems incorrect.

   $  grep -A100 setrel 
./usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc
   setrel() {

       # if release is not set, try to determine it

       if [ -n "$release" ]; then
        return
       fi
       if [ ! -f $target/etc/os-release ]; then
        return
       fi

       dists="jessie stretch buster bionic xenial trusty"
       for d in $dists; do
        if grep -iq $d $target/etc/os-release; then
            release=$d
            break
        fi
       done
   }

   # if installation was done from CD, replace useless sources.list
   setrel
   if [ -f $target/etc/apt/sources.list -a -n "$release" ]; then
       grep -q 'file generated by fai-cd' $target/etc/apt/sources.list && cat 
<<EOF > $target/etc/apt/sources.list
   deb $apt_cdn/debian $release main contrib non-free
   deb $apt_cdn/debian-security $release/updates main contrib non-free
   #deb [trusted=yes] http://fai-project.org/download $release koeln
   EOF
       # if the package fai-server was installed, enable the project's 
repository
       if [ -f $target/var/lib/dpkg/info/fai-server.list ]; then
        sed -i -e '/fai-project.org/s/^#//' $target/etc/apt/sources.list
       fi
   fi

   # for ARM architecture, we may need the kernel and initrd to boot or flash 
the device
   if ifclass ARM64; then
       cp -pv $target/boot/vmlinuz* $target/boot/initrd* $FAI_RUNDIR
   fi

   exit $error

   $ cat 
/usr/share/debian-lan-config/fai/config/files/etc/fai/apt/sources.list/SERVER_A
   deb http://deb.debian.org/debian/ buster main
   deb http://security.debian.org/ stable/updates main
   deb http://deb.debian.org/debian/ buster-updates main

   ## Backports repository:
   #deb http://deb.debian.org/debian/ buster-backports main

   -- System Information:
   Debian Release: bullseye/sid
     APT prefers testing-debug
     APT policy: (900, 'testing-debug'), (900, 'testing'), (800, 
'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 
'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental')
   Architecture: amd64 (x86_64)

   Kernel: Linux 5.7.0-3-amd64 (SMP w/4 CPU threads)
   Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), 
LANGUAGE=en_AU:en
   Shell: /bin/sh linked to /bin/dash
   Init: systemd (via /run/systemd/system)
   LSM: AppArmor: enabled

   debian-lan-config depends on no packages.

   debian-lan-config recommends no packages.

   Versions of packages debian-lan-config suggests:
   pn  fai-server  <none>

   -- 
   bye,
   pabs

   https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---
--- Begin Message ---
Source: debian-lan-config
Source-Version: 0.27
Done: a...@debian.org (Andreas B. Mundt)

We believe that the bug you reported is fixed in the latest version of
debian-lan-config, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 969...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas B. Mundt <a...@debian.org> (supplier of updated debian-lan-config 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 26 Oct 2020 18:04:03 +0100
Source: debian-lan-config
Architecture: source
Version: 0.27
Distribution: unstable
Urgency: medium
Maintainer: Debian LAN Developers <debian-lan-de...@lists.alioth.debian.org>
Changed-By: Andreas B. Mundt <a...@debian.org>
Closes: 969936
Changes:
 debian-lan-config (0.27) unstable; urgency=medium
 .
   * Update 'sources.list' files for bullseye (closes: #969936).
   * debian/copyright: spaces rather than tabs to start continuation lines.
   * Update standards version to 4.5.0, no changes needed.
   * Switch dh compat level to 13.
   * Make sure some services are not started during conversion.
   * Workaround and many fixes/adaptions for bullseye.
   * Fixes for SSSD: Services are socket activated by now.
   * Update boot parameters for diskless machines.
Checksums-Sha1:
 90c021aca0a73d37b42302358b2b1b7e19c0b87f 1683 debian-lan-config_0.27.dsc
 6e282e27e1fa22dd1c78f119a2ddbdf6295228b1 56868 debian-lan-config_0.27.tar.xz
 efbd58534c011810ba375eda711e19ccb23c53f7 5587 
debian-lan-config_0.27_amd64.buildinfo
Checksums-Sha256:
 faf2d1e3883db9ff520b50138f48d865858cdf89be31f5b1e2e8e15ab0c866bd 1683 
debian-lan-config_0.27.dsc
 6ad23af49b8dc50bab4f53fb7f71b8f96efdf71388abd89836e6d950286fcaaa 56868 
debian-lan-config_0.27.tar.xz
 1f2057b95b5f144010ea93e309bc263b5d0505cc96722b22de8fe7ef1f4ba404 5587 
debian-lan-config_0.27_amd64.buildinfo
Files:
 8db111efeb68fa312310290146228935 1683 admin optional debian-lan-config_0.27.dsc
 20e17e811cc619c00e3cbbfc5bdd5dcb 56868 admin optional 
debian-lan-config_0.27.tar.xz
 39d896d313c3009da994a126cabfdf88 5587 admin optional 
debian-lan-config_0.27_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=uXNb
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to