<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/test, branch 1.9.8</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.9.8</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.9.8'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2020-01-16T10:10:47Z</updated>
<entry>
<title>NewProvidesAllArch: Check if group is empty before using it</title>
<updated>2020-01-16T10:10:47Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-16T09:53:05Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ea4b7921b7e3eadb42be1deab5f343dbba8f29df'/>
<id>urn:sha1:ea4b7921b7e3eadb42be1deab5f343dbba8f29df</id>
<content type='text'>
APT 1.9.6 introduced empty groups by making use of groups to
deduplicate package names. This is not normally a problem, but
here we assumed that every group has at least one package.

This caused a problem because automake was providing automake-1.16
while having the source package automake-1.16. So we found the
automake-1.16 group, iterated over its empty package list, trying
to store the provides (which hence never happened).

LP: #1859952
</content>
</entry>
<entry>
<title>Merge branch 'pu/apt-regex-cli' into 'master'</title>
<updated>2020-01-15T22:02:32Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2020-01-15T22:02:32Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=087c97b7959acb1f9417b0b02be58709666476dc'/>
<id>urn:sha1:087c97b7959acb1f9417b0b02be58709666476dc</id>
<content type='text'>
apt(8): Disable regular expressions and fnmatch

See merge request apt-team/apt!95</content>
</entry>
<entry>
<title>apt(8): Disable regular expressions and fnmatch</title>
<updated>2020-01-15T21:19:17Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-15T21:01:54Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=21cb4a9e513ccb6f376fbcaf67957c4851cbbe32'/>
<id>urn:sha1:21cb4a9e513ccb6f376fbcaf67957c4851cbbe32</id>
<content type='text'>
This is the first step. Next step will be to add warnings to
apt-get and then remove support there as well.
</content>
</entry>
<entry>
<title>netrc: Add warning when ignoring entries for unencrypted protocols</title>
<updated>2020-01-15T21:07:25Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-04T12:58:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=a9916c3faa2b8c6fa288599efec65868d050b0ef'/>
<id>urn:sha1:a9916c3faa2b8c6fa288599efec65868d050b0ef</id>
<content type='text'>
Commit 93f33052de84e9aeaf19c92291d043dad2665bbd restricted auth.conf
entries to only apply to https by default, but this was silent - there
was no information why http sources with auth.conf entries suddenly
started failing. Add such information, and extend test case to cover
it.
</content>
</entry>
<entry>
<title>Deprecate the Summation classes and mark them for removal</title>
<updated>2020-01-14T12:10:36Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:05:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5872a2e7dd308e49a063a20da1beb40a32d1e9b2'/>
<id>urn:sha1:5872a2e7dd308e49a063a20da1beb40a32d1e9b2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>gtests: Fix netrc parser test regression from https-only changes</title>
<updated>2020-01-07T20:45:53Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:45:53Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=436993e9d7f687f6f6a83ca7e2ec42dd289463ea'/>
<id>urn:sha1:436993e9d7f687f6f6a83ca7e2ec42dd289463ea</id>
<content type='text'>
We missed that because the CI never ran GTests, because it did
not find the GTest library and failed silently (until the previous
commit).
</content>
</entry>
<entry>
<title>Add support for GTest 1.9, do not fail silently if its missing</title>
<updated>2020-01-07T20:32:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2020-01-07T20:29:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=01ff55f375b3d9e96b178d3a963d9e3d5ac5134b'/>
<id>urn:sha1:01ff55f375b3d9e96b178d3a963d9e3d5ac5134b</id>
<content type='text'>
Require passing -DWITH_TESTS=OFF to CMakeList to disable
unit tests, rather than ignoring them if GTest cannot be
found; which just happened on CI...
</content>
</entry>
<entry>
<title>satisfy: Fix segmentation fault when called with empty argument</title>
<updated>2019-12-06T12:48:07Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-06T12:46:58Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=05d1549fb65b00137b22159761462626d11bfe73'/>
<id>urn:sha1:05d1549fb65b00137b22159761462626d11bfe73</id>
<content type='text'>
apt satisfy "" caused a segmentation fault because we were iterating
over the characters, checking if the next character was the end of
the string; when it could also be the current character.

Instead, check whether the next character is before the end of
the string, rather than identical to the end.
</content>
</entry>
<entry>
<title>Merge branch 'pu/patterns-phase2' into 'master'</title>
<updated>2019-12-02T14:49:07Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2019-12-02T14:49:07Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b59be3af284d13988182d99fcd2ab5948a0f6a83'/>
<id>urn:sha1:b59be3af284d13988182d99fcd2ab5948a0f6a83</id>
<content type='text'>
Pu/patterns phase2

See merge request apt-team/apt!85</content>
</entry>
<entry>
<title>netrc: Restrict auth.conf entries to https by default</title>
<updated>2019-12-02T13:27:38Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-12-02T10:46:49Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=93f33052de84e9aeaf19c92291d043dad2665bbd'/>
<id>urn:sha1:93f33052de84e9aeaf19c92291d043dad2665bbd</id>
<content type='text'>
This avoids downgrade attacks where an attacker could inject

Location: http://private.example/

and then (having access to raw data to private.example, for example,
by opening a port there, or sniffing network traffic) read the credentials
for the private repository.

Closes: #945911
</content>
</entry>
</feed>
