<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt, branch 1.5_alpha4</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.5_alpha4</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.5_alpha4'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2017-06-30T16:21:33Z</updated>
<entry>
<title>Upload 1.5~alpha4 to experimental</title>
<updated>2017-06-30T16:21:33Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T16:18:47Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3be04d30cbb801777dce9d3e46c19722ab480b14'/>
<id>urn:sha1:3be04d30cbb801777dce9d3e46c19722ab480b14</id>
<content type='text'>
</content>
</entry>
<entry>
<title>shippable: Run tests in parallel</title>
<updated>2017-06-30T16:16:51Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T15:56:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d6bcfa40f170434c387acfd6e8c1425f3fe057af'/>
<id>urn:sha1:d6bcfa40f170434c387acfd6e8c1425f3fe057af</id>
<content type='text'>
Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>CMake: Do not allow FORCE_CURL=ON with WITH_CURL=OFF</title>
<updated>2017-06-30T16:16:42Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T15:50:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=551861110db67c7bad2bd0715f46191454c0b9a7'/>
<id>urn:sha1:551861110db67c7bad2bd0715f46191454c0b9a7</id>
<content type='text'>
This makes no sense. We need both entries in the cache, as
we check FORCE_CURL in the test suite.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>TLS support: Error out on unsupported curl options</title>
<updated>2017-06-30T15:20:21Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T15:20:21Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=6a0e7acbf01e22665d89a9c6556f3a8220a78756'/>
<id>urn:sha1:6a0e7acbf01e22665d89a9c6556f3a8220a78756</id>
<content type='text'>
Silently ignoring the options might be a security issue,
so produce an error instead.
</content>
</entry>
<entry>
<title>Improve closing the TLS connection</title>
<updated>2017-06-30T15:12:11Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T15:12:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8f5db6b513b90b6ee5b625131a25b146fa912e0d'/>
<id>urn:sha1:8f5db6b513b90b6ee5b625131a25b146fa912e0d</id>
<content type='text'>
If gnutls_session_bye() exited with an error, we never closed
the underlying file descriptor, causing the method to think the
connection was still open. This caused problems especially in
test-partial-file-support where we checked that a "complete"
file and an incomplete file work. The first GET returns a 416
with Connection: close, and the next GET request then accidentally
reads the body of the 416 as the header for its own request.
</content>
</entry>
<entry>
<title>Switch to 'http' as the default https method</title>
<updated>2017-06-30T14:33:09Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T14:33:09Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c6a428e4d17b408c2701def5daa46ca950948980'/>
<id>urn:sha1:c6a428e4d17b408c2701def5daa46ca950948980</id>
<content type='text'>
The old curl based method is still available as 'curl',
'curl+http', and 'curl+https'.
</content>
</entry>
<entry>
<title>travis: Switch to Docker</title>
<updated>2017-06-30T14:02:17Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T13:40:40Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=46c31341ef4b09bb3509ebbc49416e34b68e1be4'/>
<id>urn:sha1:46c31341ef4b09bb3509ebbc49416e34b68e1be4</id>
<content type='text'>
This runs parallel builds on docker, based on debian:testing
docker images, with ccache enabled and parallel running of the
test suite (ccache supports coverage builds these days, and
parallel testing just needs unbuffer to handle the stty stuff)

This is a huge step up from building on a mix of trusty, wily,
and xenial. Most importantly, coverage now correctly detects
partial covered lines instead of just reporting almost all of
them as fully covered.

We use ftp.de.debian.org as deb.debian.org backed by Amazon
503s too often.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>Allow http(s) and socks5h for http and https in proxy auto detect</title>
<updated>2017-06-30T13:00:41Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T12:38:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=535c06a759dc13c8e2858735973cac24ceaa36fa'/>
<id>urn:sha1:535c06a759dc13c8e2858735973cac24ceaa36fa</id>
<content type='text'>
This makes it possible to write sensible auto detect scripts.
</content>
</entry>
<entry>
<title>http: Add support for https:// proxies</title>
<updated>2017-06-30T13:00:41Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T11:52:18Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=bafebf1afc59db7df7e0148b723f3f361770272c'/>
<id>urn:sha1:bafebf1afc59db7df7e0148b723f3f361770272c</id>
<content type='text'>
HTTPS proxies just require unwrapping the TLS layer at the proxy
connection, that's easy, and of course sending proxy-specific
headers that are sent on "http" proxies.
</content>
</entry>
<entry>
<title>http: Add support for CONNECT proxying to HTTPS locations</title>
<updated>2017-06-30T13:00:41Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-06-30T11:24:04Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=64207dad49f1c803d2b004ccf8fc6432789a8cc2'/>
<id>urn:sha1:64207dad49f1c803d2b004ccf8fc6432789a8cc2</id>
<content type='text'>
Proxying HTTPS traffic requires the proxy providing the
CONNECT method. This implements the client side of it,
although it is a bit hacky.

HTTP connect is a normal HTTP CONNECT request, followed
by a normal HTTP response, just that the body of the
response is the TCP stream of the target host.

We use a special wrapper in case there are data bytes
in the header packets - in that case, the bytes are
stored in a buffer and the buffer will be drained first,
afterwards the connection continues directly with the
TCP stream (with one more vcall).

Also: Do not send full URI to https destinations when proxying,
as we are directly interfacing with the destination data stream.
</content>
</entry>
</feed>
