<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods/aptmethod.h, branch 2.1.12</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.1.12</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.1.12'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2020-02-18T11:48:38Z</updated>
<entry>
<title>Remove code tagged APT_PKG_590, add some missing includes</title>
<updated>2020-02-18T11:48:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-02-18T11:48:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=e8016805b87bead8eb3dff0d0559c5d9590b721b'/>
<id>urn:sha1:e8016805b87bead8eb3dff0d0559c5d9590b721b</id>
<content type='text'>
Remove all code scheduled to be removed after 5.90, and fix
files to include files they previously got from hashes.h
including more headers.
</content>
</entry>
<entry>
<title>seccomp: Allow recvmmsg_time64() and futex_time64()</title>
<updated>2020-02-10T08:02:12Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-02-10T08:01:31Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=7e445a53444e253cca44c54ed5978276f1581a50'/>
<id>urn:sha1:7e445a53444e253cca44c54ed5978276f1581a50</id>
<content type='text'>
Saw those in libseccomp commit, figured should add them
too.
</content>
</entry>
<entry>
<title>seccomp: Allow time64 variants (&gt;402,&lt;415) of allowed syscalls</title>
<updated>2020-02-09T21:06:30Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-02-09T20:01:26Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3b7c766275927c35d93fac49a72889bd26337622'/>
<id>urn:sha1:3b7c766275927c35d93fac49a72889bd26337622</id>
<content type='text'>
Went through the list of syscalls starting at 403 (and looked
one back) up to the next unknown syscalls, and added all those that
were present in their non-time64 variant.

Closes: #951012
</content>
</entry>
<entry>
<title>netrc: Add warning when ignoring entries for unencrypted protocols</title>
<updated>2020-01-15T21:07:25Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-04T12:58:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=a9916c3faa2b8c6fa288599efec65868d050b0ef'/>
<id>urn:sha1:a9916c3faa2b8c6fa288599efec65868d050b0ef</id>
<content type='text'>
Commit 93f33052de84e9aeaf19c92291d043dad2665bbd restricted auth.conf
entries to only apply to https by default, but this was silent - there
was no information why http sources with auth.conf entries suddenly
started failing. Add such information, and extend test case to cover
it.
</content>
</entry>
<entry>
<title>Apply various suggestions by cppcheck</title>
<updated>2019-07-08T13:51:17Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2019-07-08T13:48:59Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=2b734a7ec429825c7007c1093883229e069d36c7'/>
<id>urn:sha1:2b734a7ec429825c7007c1093883229e069d36c7</id>
<content type='text'>
Reported-By: cppcheck
</content>
</entry>
<entry>
<title>aptmethod.h: Do not have gcc warning about ignoring write() result</title>
<updated>2019-02-05T11:50:05Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-02-05T11:48:46Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=e435312f0692996232fc12786be59513a2536489'/>
<id>urn:sha1:e435312f0692996232fc12786be59513a2536489</id>
<content type='text'>
This is a special case here, a best effort write, so there's no
point in having warnings about it for every method.
</content>
</entry>
<entry>
<title>Add support for /etc/apt/auth.conf.d/*.conf (netrcparts)</title>
<updated>2018-12-04T16:48:41Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2018-12-03T16:39:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=bbfcc05c1978decd28df9681fd73e2a7d9a8c2a5'/>
<id>urn:sha1:bbfcc05c1978decd28df9681fd73e2a7d9a8c2a5</id>
<content type='text'>
This allows us to install matching auth files for sources.list.d
files, for example; very useful.

This converts aptmethod's authfd from one FileFd to a vector of
pointers to FileFd, as FileFd cannot be copied, and move operators
are hard.
</content>
</entry>
<entry>
<title>Allow restart_syscall() syscall in seccomp sandboxes</title>
<updated>2018-04-06T12:18:25Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2018-04-06T12:18:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=da385be6c38c5f79b7ee6d175f855c08090d959f'/>
<id>urn:sha1:da385be6c38c5f79b7ee6d175f855c08090d959f</id>
<content type='text'>
Closes: #891644
</content>
</entry>
<entry>
<title>Turn off seccomp sandboxing by default</title>
<updated>2018-04-06T12:17:26Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2018-04-06T11:53:20Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=e688a4f4890c04021468932e57e17891853c8443'/>
<id>urn:sha1:e688a4f4890c04021468932e57e17891853c8443</id>
<content type='text'>
LP: #1732030
Closes: #890489
Fixes meefik/linuxdeploy#869
</content>
</entry>
<entry>
<title>reimplement and simplify mirror:// method</title>
<updated>2018-01-03T17:55:41Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2017-10-27T16:39:36Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=57fa854e4cdb060e87ca265abd5a83364f9fa681'/>
<id>urn:sha1:57fa854e4cdb060e87ca265abd5a83364f9fa681</id>
<content type='text'>
Embedding an entire acquire stack and HTTP logic in the mirror method
made it rather heavy weight and fragile. This reimplement goes the other
way by doing only the bare minimum in the method itself and instead
redirect the actual download of files to their proper methods.

The reimplementation drops the (in the real world) unused query-string
feature as it isn't really implementable in the new architecture.
</content>
</entry>
</feed>
