<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods, branch 1.2.7</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.2.7</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.2.7'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2016-03-15T11:33:21Z</updated>
<entry>
<title>methods/gpgv: Warn about SHA1 (and RIPEMD-160)</title>
<updated>2016-03-15T11:33:21Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-15T11:30:37Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=07ea3af0fe55fdfe976ab847c5c88efd703d1282'/>
<id>urn:sha1:07ea3af0fe55fdfe976ab847c5c88efd703d1282</id>
<content type='text'>
We will drop support for those in the future.

Also adjust the std::array to be a std::vector, as that's easier to
maintain.
</content>
</entry>
<entry>
<title>apt-pkg/acquire-worker.cc: Introduce 104 Warning message</title>
<updated>2016-03-15T11:33:21Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-15T10:40:10Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8c9b7725c3d89461e78061aff4bc644cdb237fe7'/>
<id>urn:sha1:8c9b7725c3d89461e78061aff4bc644cdb237fe7</id>
<content type='text'>
This can be used by workers to send warnings to the main
program. The messages will be passed to _error-&gt;Warning()
by APT with the URI prepended.

We are not going to make that really public now, as the
interface might change a bit.
</content>
</entry>
<entry>
<title>methods/gpgv: Correctly handle weak signatures with multiple keys</title>
<updated>2016-03-15T11:33:21Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-15T09:56:05Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=08fd77e83528fd03795524adf76e359ae2b56e06'/>
<id>urn:sha1:08fd77e83528fd03795524adf76e359ae2b56e06</id>
<content type='text'>
We added weak signatures to BadSigners, meaning that a Release file
signed by both a weak signature and a strong signature would be
rejected; preventing people from migrating from DSA to RSA keys
in a sane way.

Instead of using BadSigners, treat weak signatures like expired
keys: They are no good signatures, and they are worthless.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>methods/gpgv: Reject weak digest algorithms</title>
<updated>2016-03-14T14:37:05Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-14T14:35:14Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d91051242d10ada198b4ed59d59ad4aa8f59bcaf'/>
<id>urn:sha1:d91051242d10ada198b4ed59d59ad4aa8f59bcaf</id>
<content type='text'>
This keeps a list of weak digest algorithms. For now, only MD5
is disabled, as SHA1 breaks to many repos.
</content>
</entry>
<entry>
<title>Revert "Handle ERRSIG in the gpgv method like BADSIG"</title>
<updated>2016-03-14T13:44:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-14T13:44:33Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=0d80586a67622d4d58908fee41c3be8a6813d426'/>
<id>urn:sha1:0d80586a67622d4d58908fee41c3be8a6813d426</id>
<content type='text'>
This reverts commit 76a71a1237d22c1990efbc19ce0e02aacf572576.

That commit broke the test suite.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>Handle ERRSIG in the gpgv method like BADSIG</title>
<updated>2016-03-14T13:23:50Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-03-14T13:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=76a71a1237d22c1990efbc19ce0e02aacf572576'/>
<id>urn:sha1:76a71a1237d22c1990efbc19ce0e02aacf572576</id>
<content type='text'>
ERRSIG is created whenever a key uses an unknown/weak digest
algorithm, for example. This allows us to report a more useful
error than just "unknown apt-key error.":

The following signatures were invalid: ERRSIG 13B00F1FD2C19886 1 2 01 1457609403 5

While still not being the best reportable error message, it's
better than unknown apt-key error and hopefully redirects users
to complain to their repository owners.
</content>
</entry>
<entry>
<title>rred: If there were I/O errors, fail</title>
<updated>2016-02-04T16:56:27Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-02-04T16:56:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=610e13842a3718128c03454c5dfcbde49d323281'/>
<id>urn:sha1:610e13842a3718128c03454c5dfcbde49d323281</id>
<content type='text'>
We basically ignored errors from writing and flushing, let's
not do that.
</content>
</entry>
<entry>
<title>act on various suggestions from cppcheck</title>
<updated>2016-01-26T14:32:15Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-01-25T21:13:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=2651f1c071927b7fc440ec7a638ecad7ccf04a2e'/>
<id>urn:sha1:2651f1c071927b7fc440ec7a638ecad7ccf04a2e</id>
<content type='text'>
Reported-By: cppcheck
Git-Dch: Ignore
</content>
</entry>
<entry>
<title>Only enable pipelining if server is HTTP/1.1</title>
<updated>2016-01-12T22:40:59Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2016-01-12T14:18:12Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b6d88f39aceda2e093e1bf8751f07236b7d9e483'/>
<id>urn:sha1:b6d88f39aceda2e093e1bf8751f07236b7d9e483</id>
<content type='text'>
Just enabling it for anyone breaks with HTTP/1.0 servers and
proxies sometimes.

Closes: #810796
</content>
</entry>
<entry>
<title>allow pdiff bootstrap from all supported compressors</title>
<updated>2016-01-08T14:40:01Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2016-01-05T23:05:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=4e3c5633b1e74b4f58b95f339cfbbf4cbf21ab3e'/>
<id>urn:sha1:4e3c5633b1e74b4f58b95f339cfbbf4cbf21ab3e</id>
<content type='text'>
There is no reason to enforce that the file we start the bootstrap with
is compressed with a compressor which is available online. This allows
us to change the on-disk format as well as deals with repositories
adding/removing support for a specific compressor.
</content>
</entry>
</feed>
