<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/test, branch 1.9.6</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.9.6</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.9.6'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2020-01-15T22:02:32Z</updated>
<entry>
<title>Merge branch 'pu/apt-regex-cli' into 'master'</title>
<updated>2020-01-15T22:02:32Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2020-01-15T22:02:32Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=087c97b7959acb1f9417b0b02be58709666476dc'/>
<id>urn:sha1:087c97b7959acb1f9417b0b02be58709666476dc</id>
<content type='text'>
apt(8): Disable regular expressions and fnmatch

See merge request apt-team/apt!95</content>
</entry>
<entry>
<title>apt(8): Disable regular expressions and fnmatch</title>
<updated>2020-01-15T21:19:17Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-15T21:01:54Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=21cb4a9e513ccb6f376fbcaf67957c4851cbbe32'/>
<id>urn:sha1:21cb4a9e513ccb6f376fbcaf67957c4851cbbe32</id>
<content type='text'>
This is the first step. Next step will be to add warnings to
apt-get and then remove support there as well.
</content>
</entry>
<entry>
<title>netrc: Add warning when ignoring entries for unencrypted protocols</title>
<updated>2020-01-15T21:07:25Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-04T12:58:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=a9916c3faa2b8c6fa288599efec65868d050b0ef'/>
<id>urn:sha1:a9916c3faa2b8c6fa288599efec65868d050b0ef</id>
<content type='text'>
Commit 93f33052de84e9aeaf19c92291d043dad2665bbd restricted auth.conf
entries to only apply to https by default, but this was silent - there
was no information why http sources with auth.conf entries suddenly
started failing. Add such information, and extend test case to cover
it.
</content>
</entry>
<entry>
<title>Deprecate the Summation classes and mark them for removal</title>
<updated>2020-01-14T12:10:36Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:05:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5872a2e7dd308e49a063a20da1beb40a32d1e9b2'/>
<id>urn:sha1:5872a2e7dd308e49a063a20da1beb40a32d1e9b2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>gtests: Fix netrc parser test regression from https-only changes</title>
<updated>2020-01-07T20:45:53Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:45:53Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=436993e9d7f687f6f6a83ca7e2ec42dd289463ea'/>
<id>urn:sha1:436993e9d7f687f6f6a83ca7e2ec42dd289463ea</id>
<content type='text'>
We missed that because the CI never ran GTests, because it did
not find the GTest library and failed silently (until the previous
commit).
</content>
</entry>
<entry>
<title>Add support for GTest 1.9, do not fail silently if its missing</title>
<updated>2020-01-07T20:32:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:29:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=01ff55f375b3d9e96b178d3a963d9e3d5ac5134b'/>
<id>urn:sha1:01ff55f375b3d9e96b178d3a963d9e3d5ac5134b</id>
<content type='text'>
Require passing -DWITH_TESTS=OFF to CMakeList to disable
unit tests, rather than ignoring them if GTest cannot be
found; which just happened on CI...
</content>
</entry>
<entry>
<title>satisfy: Fix segmentation fault when called with empty argument</title>
<updated>2019-12-06T12:48:07Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-06T12:46:58Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=05d1549fb65b00137b22159761462626d11bfe73'/>
<id>urn:sha1:05d1549fb65b00137b22159761462626d11bfe73</id>
<content type='text'>
apt satisfy "" caused a segmentation fault because we were iterating
over the characters, checking if the next character was the end of
the string; when it could also be the current character.

Instead, check whether the next character is before the end of
the string, rather than identical to the end.
</content>
</entry>
<entry>
<title>Merge branch 'pu/patterns-phase2' into 'master'</title>
<updated>2019-12-02T14:49:07Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2019-12-02T14:49:07Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b59be3af284d13988182d99fcd2ab5948a0f6a83'/>
<id>urn:sha1:b59be3af284d13988182d99fcd2ab5948a0f6a83</id>
<content type='text'>
Pu/patterns phase2

See merge request apt-team/apt!85</content>
</entry>
<entry>
<title>netrc: Restrict auth.conf entries to https by default</title>
<updated>2019-12-02T13:27:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-02T10:46:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=93f33052de84e9aeaf19c92291d043dad2665bbd'/>
<id>urn:sha1:93f33052de84e9aeaf19c92291d043dad2665bbd</id>
<content type='text'>
This avoids downgrade attacks where an attacker could inject

Location: http://private.example/

and then (having access to raw data to private.example, for example,
by opening a port there, or sniffing network traffic) read the credentials
for the private repository.

Closes: #945911
</content>
</entry>
<entry>
<title>Remove failed trusted signature instead of index on IMS hit</title>
<updated>2019-11-27T21:00:43Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2019-11-27T11:10:31Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=1690c3f87ae45a41e8d3e09bf0b1021c008460b9'/>
<id>urn:sha1:1690c3f87ae45a41e8d3e09bf0b1021c008460b9</id>
<content type='text'>
While passing the combi Release and Release.gpg to the gpgv method for
verification the filename of Release is placed where usually Release.gpg
is assumed in the rest of the code. The "usual" cases like passing
verification and failing verification ending in an error are taking care
of this, but the code path dealing with a failed verification, but
ignoring said failure (e.g. due to trusted=yes) was not which results in
the wrong file being removed later on (in case the index happens to be
unmodified since the last update call) leading us into the abyss of
strange failures (fixed in the previous commit) were nothing should have
changed.

This is not a security issue in this form as the repository needs to fail
verification &amp; the user forcing apt to ignore the failure and carry on
anyhow. It does show however how complicated the code and its various
interconnected paths can become.

Reported-By: Val "pinkieval" Lorentz on IRC
</content>
</entry>
</feed>
