Your message dated Mon, 26 Oct 2020 18:18:24 +0000 with message-id <e1kx74a-000h9y...@fasolo.debian.org> and subject line Bug#969936: fixed in debian-lan-config 0.27 has caused the Debian Bug report #969936, regarding bullseye: add support, switch from /updates to -security to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 969936: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969936 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: debian-lan-config Version: 0.26 Severity: serious File: /usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc User: debian-de...@lists.debian.org Usertags: bullseye-security The above script references $release/updates but when bullseye is released that should be replaced by $release-security. It looks like when a bullseye system is being installed, the setrel function does not recognise the target release and so it won't setup the apt sources.list at all. Then even if the release were recognised properly, the script would generate an incorrect sources.list using /updates instead of -security which would cause the target system to not get security updates from bullseye in a timely manner. In addition, the SERVER_A sources.list references buster for the main set of packages but uses stable/updates for security updates. This means that after the bullseye release servers installed using the debian-lan-config package will get packages from buster but their security updates from bullseye, which seems incorrect. $ grep -A100 setrel ./usr/share/debian-lan-config/fai/config/scripts/LAST/50-misc setrel() { # if release is not set, try to determine it if [ -n "$release" ]; then return fi if [ ! -f $target/etc/os-release ]; then return fi dists="jessie stretch buster bionic xenial trusty" for d in $dists; do if grep -iq $d $target/etc/os-release; then release=$d break fi done } # if installation was done from CD, replace useless sources.list setrel if [ -f $target/etc/apt/sources.list -a -n "$release" ]; then grep -q 'file generated by fai-cd' $target/etc/apt/sources.list && cat <<EOF > $target/etc/apt/sources.list deb $apt_cdn/debian $release main contrib non-free deb $apt_cdn/debian-security $release/updates main contrib non-free #deb [trusted=yes] http://fai-project.org/download $release koeln EOF # if the package fai-server was installed, enable the project's repository if [ -f $target/var/lib/dpkg/info/fai-server.list ]; then sed -i -e '/fai-project.org/s/^#//' $target/etc/apt/sources.list fi fi # for ARM architecture, we may need the kernel and initrd to boot or flash the device if ifclass ARM64; then cp -pv $target/boot/vmlinuz* $target/boot/initrd* $FAI_RUNDIR fi exit $error $ cat /usr/share/debian-lan-config/fai/config/files/etc/fai/apt/sources.list/SERVER_A deb http://deb.debian.org/debian/ buster main deb http://security.debian.org/ stable/updates main deb http://deb.debian.org/debian/ buster-updates main ## Backports repository: #deb http://deb.debian.org/debian/ buster-backports main -- System Information: Debian Release: bullseye/sid APT prefers testing-debug APT policy: (900, 'testing-debug'), (900, 'testing'), (800, 'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.7.0-3-amd64 (SMP w/4 CPU threads) Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled debian-lan-config depends on no packages. debian-lan-config recommends no packages. Versions of packages debian-lan-config suggests: pn fai-server <none> -- bye, pabs https://wiki.debian.org/PaulWise
signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---Source: debian-lan-config Source-Version: 0.27 Done: a...@debian.org (Andreas B. Mundt) We believe that the bug you reported is fixed in the latest version of debian-lan-config, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 969...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andreas B. Mundt <a...@debian.org> (supplier of updated debian-lan-config package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 26 Oct 2020 18:04:03 +0100 Source: debian-lan-config Architecture: source Version: 0.27 Distribution: unstable Urgency: medium Maintainer: Debian LAN Developers <debian-lan-de...@lists.alioth.debian.org> Changed-By: Andreas B. Mundt <a...@debian.org> Closes: 969936 Changes: debian-lan-config (0.27) unstable; urgency=medium . * Update 'sources.list' files for bullseye (closes: #969936). * debian/copyright: spaces rather than tabs to start continuation lines. * Update standards version to 4.5.0, no changes needed. * Switch dh compat level to 13. * Make sure some services are not started during conversion. * Workaround and many fixes/adaptions for bullseye. * Fixes for SSSD: Services are socket activated by now. * Update boot parameters for diskless machines. Checksums-Sha1: 90c021aca0a73d37b42302358b2b1b7e19c0b87f 1683 debian-lan-config_0.27.dsc 6e282e27e1fa22dd1c78f119a2ddbdf6295228b1 56868 debian-lan-config_0.27.tar.xz efbd58534c011810ba375eda711e19ccb23c53f7 5587 debian-lan-config_0.27_amd64.buildinfo Checksums-Sha256: faf2d1e3883db9ff520b50138f48d865858cdf89be31f5b1e2e8e15ab0c866bd 1683 debian-lan-config_0.27.dsc 6ad23af49b8dc50bab4f53fb7f71b8f96efdf71388abd89836e6d950286fcaaa 56868 debian-lan-config_0.27.tar.xz 1f2057b95b5f144010ea93e309bc263b5d0505cc96722b22de8fe7ef1f4ba404 5587 debian-lan-config_0.27_amd64.buildinfo Files: 8db111efeb68fa312310290146228935 1683 admin optional debian-lan-config_0.27.dsc 20e17e811cc619c00e3cbbfc5bdd5dcb 56868 admin optional debian-lan-config_0.27.tar.xz 39d896d313c3009da994a126cabfdf88 5587 admin optional debian-lan-config_0.27_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEk4pc7h4pDeJV2ayYsB/qhGF7WG0FAl+XDV4ACgkQsB/qhGF7 WG1pghAAwErMVjdN+vpt+x4FBXzE75Ks1TJRK3gvgzgNaoTucp6kA9F1pGJ0Di1T umNGTxtXkSHenDaL3H2nWa+uZjfGcrkRKQRgMzwwXDgQ+DdIUwgFVO1tN6hwBq/C DjDDlLaeXzoIls9itqcsTgXa6cuJF2PJy8oBaoWn5iOuCsmK46wowWaF9B4hfc/w r42ABdUVttuGb3kjzgclW22BbCTM22h+Ej/BR3bgyK8yN/FZPvJyg6ERbpy9C/9g wPmntALiEjY9zkGi+UvyX9bJSn25TsWX8kQwFyyA1vA0YK0I81S5EfAdLMj5IRak vAEPH1iDxCXuJSUh5itU1ZYVgvggH43Jnv7MToy21ULQEHPmVwLm6fKWNu8hb4Tm M/ULVkO9SNw/S8Edxjn4Jg+djsuNJBsX3La4wmEwssqmVLTqLiv+IeYPAmnp4IOg DP4WMdajPJ7RlaEXDALd6HYI59l2keFT4W8wzdNmeDOKRDNjSOLQ25tUJCJR+xtx 09ujugc0cF4kSfk7OhRdLqlzRLWV696ZrNLjmBhQnRJNOmy2kosNv9Y3XHGdIqE7 iDFUWRAJf/SXKCsYqfDKfTmqnDNalFCZpHem4T6yihf3UazIQifWdXdAccPU9/Bn xqlhZ1yhYUw5yZwwqGrlkvi49U56+SyMkXmNZh3PA6mj9yI00Jg= =uXNb -----END PGP SIGNATURE-----
--- End Message ---