<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/test/integration, branch 1.9.1</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.9.1</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.9.1'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2019-06-11T15:27:34Z</updated>
<entry>
<title>http: Fix Host header in proxied https connections</title>
<updated>2019-06-11T15:27:34Z</updated>
<author>
<name>Simon Körner</name>
<email>git@lubiland.de</email>
</author>
<published>2019-05-17T22:32:15Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=86d4d98060f36c7e71c34af20a1193a75496ef72'/>
<id>urn:sha1:86d4d98060f36c7e71c34af20a1193a75496ef72</id>
<content type='text'>
Currently CONNECT requests use the name of the proxy as Host value, instead of
the origin server's name.

According to RFC 2616 "The Host field value MUST represent the naming authority
of the origin server or gateway given by the original URL."

The current implementation causes problems with some proxy vendors. This
commit fixes this.

[jak: Adding a test case]
See merge request apt-team/apt!66
</content>
</entry>
<entry>
<title>Introduce apt satisfy and apt-get satisfy</title>
<updated>2019-06-11T14:49:03Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-05-09T20:23:17Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9244f712396c10b674740cc79fdab61c47173d04'/>
<id>urn:sha1:9244f712396c10b674740cc79fdab61c47173d04</id>
<content type='text'>
Allow to satisfy dependency strings supplied on
the command line, optionally prefixed with
"Conflicts:" to satisfy them like Conflicts.

Build profiles and architecture restriction lists,
as used in build dependencies, are supported as
well.

Compared to build-dep, build-essential is not
installed automatically, and installing of recommended
packages follows the global default, which defaults
to yes.

Closes: #275379
See merge request apt-team/apt!63
</content>
</entry>
<entry>
<title>Use debDebFile to get control file instead of dpkg-deb</title>
<updated>2019-05-06T11:01:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-05-06T10:22:42Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=6089a4b17c61ef30b2efc00e270b0907f51f352a'/>
<id>urn:sha1:6089a4b17c61ef30b2efc00e270b0907f51f352a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add test case for local-only packages pinned to never</title>
<updated>2019-04-15T07:43:32Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-04-02T15:03:04Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5557a3c337075f9700a67d9ef74a79e914768197'/>
<id>urn:sha1:5557a3c337075f9700a67d9ef74a79e914768197</id>
<content type='text'>
Test from the fix for the regression in trusty for LP #1821308.
</content>
</entry>
<entry>
<title>Add explicit message for unsupported binary signature</title>
<updated>2019-03-03T20:52:40Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2019-03-03T18:41:42Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3e3638dc9389591cfd30baa6c41d85c31127402a'/>
<id>urn:sha1:3e3638dc9389591cfd30baa6c41d85c31127402a</id>
<content type='text'>
Verifying the content of Release.gpg made us fail on binary signatures
which were never officially supported (apt-secure manpage only documents
only the generation of ASCII armored), but silently accepted by gpgv as
we passed it on unchecked before.

The binary format is complex and is itself split into old and new
formats so adding support for this would not only add lots of code but
also a good opportunity for bugs and dubious benefit.

Reporting this issue explicitly should help repository creators figure
out the problem faster than the default NODATA message hinting at
captive portals.

Given that the binary format has no file magic or any other clear and
simple indication that this is a detached signature we guess based on
the first two bits only – and by that only supporting the "old" binary
format which seems to be the only one generated by gnupg in this case.

References: e2965b0b6bdd68ffcad0e06d11755412a7e16e50
Closes: #921685
</content>
</entry>
<entry>
<title>Fix various typos in the documentation</title>
<updated>2019-02-10T12:16:27Z</updated>
<author>
<name>Jakub Wilk</name>
<email>jwilk@jwilk.net</email>
</author>
<published>2019-02-10T11:51:30Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9a702b150c8ddeafa8c10c9f120dafdeb08ef93b'/>
<id>urn:sha1:9a702b150c8ddeafa8c10c9f120dafdeb08ef93b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge branch 'pu/dead-pin' into 'master'</title>
<updated>2019-02-04T12:44:08Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2019-02-04T12:44:08Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3a015964dd56edf897ee062b2eafa2cfc0584380'/>
<id>urn:sha1:3a015964dd56edf897ee062b2eafa2cfc0584380</id>
<content type='text'>
A pin of -32768 overrides any other, disables repo

See merge request apt-team/apt!40</content>
</entry>
<entry>
<title>Add a Packages-Require-Authorization Release file field</title>
<updated>2019-02-01T16:52:03Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-02-01T13:43:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c2b9b0489538fed4770515bd8853a960b13a2618'/>
<id>urn:sha1:c2b9b0489538fed4770515bd8853a960b13a2618</id>
<content type='text'>
This new field allows a repository to declare that access to
packages requires authorization. The current implementation will
set the pin to -32768 if no authorization has been provided in
the auth.conf(.d) files.

This implementation is suboptimal in two aspects:
(1) A repository should behave more like NotSource repositories
(2) We only have the host name for the repository, we cannot use
    paths yet.

- We can fix those after an ABI break.

The code also adds a check to acquire-item.cc to not use the
specified repository as a download source, mimicking NotSource.
</content>
</entry>
<entry>
<title>Introduce experimental 'never' pinning for sources</title>
<updated>2019-02-01T16:51:35Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2018-12-18T13:50:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8bb2a91a070170d7d8e71206d1c66a26809bdbc3'/>
<id>urn:sha1:8bb2a91a070170d7d8e71206d1c66a26809bdbc3</id>
<content type='text'>
This allows disabling a repository by pinning it to 'never',
which is internally translated to a value of -32768 (or whatever
the minimum of short is).

This overrides any other pin for that repository. It can be used
to make sure certain sources are never used; for example, in
unattended-upgrades.

To prevent semantic changes to existing files, we substitute
min + 1 for every pin-priority: &lt;min&gt;. This is a temporary
solution, as we are waiting for an ABI break.

To add pins with that value, the special Pin-Priority
"never" may be used for now. It's unclear if that will
persist, or if the interface will change eventually.
</content>
</entry>
<entry>
<title>Merge branch 'pu/refuseunsignedlines' into 'master'</title>
<updated>2019-02-01T14:40:06Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2019-02-01T14:40:06Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d5dcc2e9d3008b57c3fae0bcb5b1c2a197f5430c'/>
<id>urn:sha1:d5dcc2e9d3008b57c3fae0bcb5b1c2a197f5430c</id>
<content type='text'>
Fail if InRelease or Release.gpg contain unsigned lines

See merge request apt-team/apt!45</content>
</entry>
</feed>
