<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/cmdline, branch 1.0.9.4</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.0.9.4</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.0.9.4'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2014-11-28T15:15:39Z</updated>
<entry>
<title>support long keyids in "apt-key del" instead of ignoring them</title>
<updated>2014-11-28T15:15:39Z</updated>
<author>
<name>James McCoy</name>
<email>jamessan@debian.org</email>
</author>
<published>2014-11-28T13:21:06Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=69d8b8537af1dd52db5f2e0e785bdce3e52fdf8d'/>
<id>urn:sha1:69d8b8537af1dd52db5f2e0e785bdce3e52fdf8d</id>
<content type='text'>
apt-key given a long keyid reports just "OK" all the time, but doesn't
delete the mentioned key as it doesn't find the key.

Note: In debian/experimental this was closed with
29f1b977100aeb6d6ebd38923eeb7a623e264ffe which just added the testcase
as the rewrite of apt-key had fixed this as well.

Closes: 754436
</content>
</entry>
<entry>
<title>use 'best' hash for source authentication</title>
<updated>2014-11-10T16:23:29Z</updated>
<author>
<name>David Kalnischkies</name>
<email>kalnischkies@gmail.com</email>
</author>
<published>2013-08-18T21:27:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3a2b39ee602dd5a98b8fdaee2f1c8e0b13a276e2'/>
<id>urn:sha1:3a2b39ee602dd5a98b8fdaee2f1c8e0b13a276e2</id>
<content type='text'>
Collect all hashes we can get from the source record and put them into a
HashStringList so that 'apt-get source' can use it instead of using
always the MD5sum.

We therefore also deprecate the MD5 struct member in favor of the list.

While at it, the parsing of the Files is enhanced so that records which
miss "Files" (aka MD5 checksums) are still searched for other checksums
as they include just as much data, just not with a nice and catchy name.

This is a cherry-pick of 1262d35 with some dirty tricks to preserve ABI.

LP: 1098738
</content>
</entry>
<entry>
<title>apt-get: Create the temporary downloaded changelog inside tmpdir</title>
<updated>2014-10-02T20:05:25Z</updated>
<author>
<name>Guillem Jover</name>
<email>guillem@debian.org</email>
</author>
<published>2014-10-02T15:48:13Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=4c370aad7539b7e3bc0028aa538f34b95a526cff'/>
<id>urn:sha1:4c370aad7539b7e3bc0028aa538f34b95a526cff</id>
<content type='text'>
The code is creating a secure temporary directory, but then creates
the changelog alongside the tmpdir in the same base directory. This
defeats the secure tmpdir creation, making the filename predictable.

Inject a '/' between the tmpdir and the changelog filename.
</content>
</entry>
<entry>
<title>generalize Acquire::GzipIndex</title>
<updated>2014-09-21T08:18:03Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2014-09-21T08:18:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b0f4b486e6850c5f98520ccf19da71d0ed748ae4'/>
<id>urn:sha1:b0f4b486e6850c5f98520ccf19da71d0ed748ae4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use heap to allocate PatternMatch to avoid potential stack overflow</title>
<updated>2014-09-02T15:25:35Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-02T15:06:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=097248092ea4ff4543dfb17deb4e0d31dd697c71'/>
<id>urn:sha1:097248092ea4ff4543dfb17deb4e0d31dd697c71</id>
<content type='text'>
When apt-cache search with many args (&gt; 130) is given the allocation
of PatternMatch on the stack may fail resulting in a segmentation
fault. By using the heap the max size is much bigger and we also
get a bad_alloc expection instead of a segfault (which we can catch
*if* this ever becomes a pratical problem). No test for the crash
as its not reproducable with the MALLOC_ settings in framework.

Closes: 759612
</content>
</entry>
<entry>
<title>Make Proxy-Auto-Detect check for each host</title>
<updated>2014-09-02T14:02:37Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-02T13:50:19Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c6ee61eab54edf6cc3fbe118d304d72a860e1451'/>
<id>urn:sha1:c6ee61eab54edf6cc3fbe118d304d72a860e1451</id>
<content type='text'>
When doing Acquire::http{,s}::Proxy-Auto-Detect, run the auto-detect
command for each host instead of only once. This should make using
"proxy" from libproxy-tools feasible which can then be used for PAC
style or other proxy configurations.

Closes: #759264
</content>
</entry>
<entry>
<title>add dpkg::source-options for dpkg-source invocation</title>
<updated>2014-08-26T18:49:48Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-08-16T11:29:10Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c53cf70da31a3c59675af8c5425b54433793dc8d'/>
<id>urn:sha1:c53cf70da31a3c59675af8c5425b54433793dc8d</id>
<content type='text'>
dpkg-source can be told to enforce signature checks with
--require-valid-signature, but while this isn't feasible as default for
Debian itself at the moment, a local admin should be able to use it.

This commit also fixes the size limit on the construction of the command
being called for dpkg-source and dpkg-buildpackage.

Closes: 757534
</content>
</entry>
<entry>
<title>show our broken packages message in 'apt' solver</title>
<updated>2014-06-18T09:17:18Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-06-17T15:45:33Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d39d7f885d61bfe296c131c83bdc042a2ab6b0d7'/>
<id>urn:sha1:d39d7f885d61bfe296c131c83bdc042a2ab6b0d7</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge remote-tracking branch 'mvo/feature/apt-update-info' into debian/sid</title>
<updated>2014-06-10T12:49:58Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2014-06-10T12:49:58Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=59d6e5b06c25acdd6583ea801740c36acabc19ac'/>
<id>urn:sha1:59d6e5b06c25acdd6583ea801740c36acabc19ac</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge remote-tracking branch 'mvo/bugfix/apt-get-source-unauthenticated-warning' into debian/sid</title>
<updated>2014-06-10T12:47:03Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2014-06-10T12:47:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ac00cca724734db58ad14ab8c77d445d0df3bc9f'/>
<id>urn:sha1:ac00cca724734db58ad14ab8c77d445d0df3bc9f</id>
<content type='text'>
</content>
</entry>
</feed>
