<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/debian/NEWS, branch 2.1.20</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.1.20</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.1.20'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2021-01-08T21:18:01Z</updated>
<entry>
<title>Release 2.1.16 - "Happy build-essential freeeze" release</title>
<updated>2021-01-08T21:18:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2021-01-08T20:58:58Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3f9e5bedf1c9b15db8960d2daa32f703c3cc2346'/>
<id>urn:sha1:3f9e5bedf1c9b15db8960d2daa32f703c3cc2346</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add support for Phased-Update-Percentage</title>
<updated>2021-01-08T13:48:47Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-08-10T18:16:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c5bc86d45e003905ef411146e66b414d26fb1ff8'/>
<id>urn:sha1:c5bc86d45e003905ef411146e66b414d26fb1ff8</id>
<content type='text'>
This adds support for Phased-Update-Percentage by pinning
upgrades that are not to be installed down to 1.

The output of policy has been changed to add the level of
phasing, and documentation has been improved to document
how phased updates work.

The patch detects if it is running in a chroot, and if so, always
includes phased updates, restoring classic apt behavior to avoid
behavioral changes on buildd chroots.

Various options are added to control this all:

* APT::Get::{Always,Never}-Include-Phased-Updates and their legacy
  update-manager equivalents to always or never include phased updates
* APT::Machine-ID can be set to a UUID string to have all machines in a
  fleet phase the same
* Dir::Etc::Machine-ID is weird in that it's default is sort of like
  ../machine-id, but not really, as ../machine-id would look up
  $PWD/../machine-id and not relative to Dir::Etc; but it allows you to
  override the path to machine-id (as opposed to the value)
* Dir::Bin::ischroot is the path to the ischroot(1) binary which is used
  to detect whether we are running in a chroot.
</content>
</entry>
<entry>
<title>Automatically remove unused kernels on dist-upgrade</title>
<updated>2021-01-04T09:54:42Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-12-17T14:19:53Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=944baec85a7496c1595242a31f6b1b37530451a5'/>
<id>urn:sha1:944baec85a7496c1595242a31f6b1b37530451a5</id>
<content type='text'>
Kernels clutter /boot and /boot is small size, so we need to take
extra care to remove kernels when possible.
</content>
</entry>
<entry>
<title>Release 1.9.11</title>
<updated>2020-02-26T20:31:05Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-02-26T20:30:15Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=de9762d5443b8a957fae781bbdc4a740cc6c4e6f'/>
<id>urn:sha1:de9762d5443b8a957fae781bbdc4a740cc6c4e6f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>apt(8): Wait for frontend and cache lock</title>
<updated>2020-02-26T19:36:52Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-02-26T19:31:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=93e1565796b61eb44bec39f50e09a34cbe090178'/>
<id>urn:sha1:93e1565796b61eb44bec39f50e09a34cbe090178</id>
<content type='text'>
This is a rework of !6 with additional stuff for the frontend
lock, so we can lock the frontend lock and then keep looping
over dpkg lock.
</content>
</entry>
<entry>
<title>Release 1.9.6</title>
<updated>2020-01-15T22:08:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-15T22:07:22Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=799508a65e2df5f4af267f3597ba1117bb3c3eeb'/>
<id>urn:sha1:799508a65e2df5f4af267f3597ba1117bb3c3eeb</id>
<content type='text'>
</content>
</entry>
<entry>
<title>apt(8): Disable regular expressions and fnmatch</title>
<updated>2020-01-15T21:19:17Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-15T21:01:54Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=21cb4a9e513ccb6f376fbcaf67957c4851cbbe32'/>
<id>urn:sha1:21cb4a9e513ccb6f376fbcaf67957c4851cbbe32</id>
<content type='text'>
This is the first step. Next step will be to add warnings to
apt-get and then remove support there as well.
</content>
</entry>
<entry>
<title>Release 1.9.5</title>
<updated>2019-12-02T17:18:57Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-02T17:18:57Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5a98b531f7afcd34367b46ac9e0c7bfe151d6999'/>
<id>urn:sha1:5a98b531f7afcd34367b46ac9e0c7bfe151d6999</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netrc: Restrict auth.conf entries to https by default</title>
<updated>2019-12-02T13:27:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-02T10:46:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=93f33052de84e9aeaf19c92291d043dad2665bbd'/>
<id>urn:sha1:93f33052de84e9aeaf19c92291d043dad2665bbd</id>
<content type='text'>
This avoids downgrade attacks where an attacker could inject

Location: http://private.example/

and then (having access to raw data to private.example, for example,
by opening a port there, or sniffing network traffic) read the credentials
for the private repository.

Closes: #945911
</content>
</entry>
<entry>
<title>Flip /: in documented default value of DPkg::Path</title>
<updated>2019-04-05T15:52:09Z</updated>
<author>
<name>Alwin Henseler</name>
<email>reallynoshame@gmail.com</email>
</author>
<published>2019-04-05T14:42:54Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=4c27ca80e2de06ab0fd058349f9813b60824cf04'/>
<id>urn:sha1:4c27ca80e2de06ab0fd058349f9813b60824cf04</id>
<content type='text'>
The value as shown in the NEWS file (not in the code) has a typo in
which just a "/" and ":" are swapped.

Closes: #917986
</content>
</entry>
</feed>
