Your message dated Fri, 5 May 2023 18:18:59 +0200 with message-id <5bc1122a-6f61-d9ff-dedb-d7cf90fe65c4@debian.org> and subject line Re: marionnet: bullseye: /updates -> -security has caused the Debian Bug report #970069, regarding marionnet: bullseye: /updates -> -security to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 970069: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970069 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: marionnet: bullseye: /updates -> -security
- From: Paul Wise <pabs@debian.org>
- Date: Fri, 11 Sep 2020 13:40:18 +0800
- Message-id: <30a94e741502499689f7d82d5d1266f732f0e9f4.camel@debian.org>
Source: marionnet Version: 0.90.6+bzr508-1 Severity: minor File: uml/pupisto.debian/pupisto.debian.sh User: debian-devel@lists.debian.org Usertags: bullseye-security With the release of Debian bullseye and later, security updates are provided in the bullseye-security suite instead of bullseye/updates. In the marionnet source package there appears to be a script that generates a Debian chroot/container for building packages and that script relies on appears to write an apt sources.list that will not provide security updates for packages installed in the chroot/container. I suggest that this script check the version of the Debian release in question using distro-info and then if the release is 11 or higher, then use $release-security otherwise use $release/updates as before. It is much better to use distro-info than to hard-code the release version numbers. It might even be a good idea to include the security suite information in distro-info itself and look it up there. I filed this bug at severity minor since the script in question doesn't appear to be used for any part of the Debian packages nor for building the Debian packages, but only for some upstream packages. $ grep -B4 -A7 /updates uml/pupisto.debian/pupisto.debian.sh function fix_apt_sources_update_and_upgrade { # global DEBIANROOT HTTP_SERVER RELEASE local ROOT=${1:-$DEBIANROOT} local TARGET=$ROOT/etc/apt/sources.list sudo_fprintf $TARGET "%s\n%s\n" "deb $HTTP_SERVER $RELEASE main" "deb http://security.debian.org/ $RELEASE/updates main" # Update: # sudo_careful_chroot ${ROOT} aptitude update sudo_careful_chroot ${ROOT} apt-get update # Upgrade: # sudo_careful_chroot ${ROOT} aptitude -y safe-upgrade sudo_careful_chroot ${ROOT} apt-get -y upgrade } -- bye, pabs https://wiki.debian.org/PaulWiseAttachment: signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
- To: 970069-done@bugs.debian.org
- Subject: Re: marionnet: bullseye: /updates -> -security
- From: Bastian Germann <bage@debian.org>
- Date: Fri, 5 May 2023 18:18:59 +0200
- Message-id: <5bc1122a-6f61-d9ff-dedb-d7cf90fe65c4@debian.org>
- In-reply-to: <30a94e741502499689f7d82d5d1266f732f0e9f4.camel@debian.org>
- References: <30a94e741502499689f7d82d5d1266f732f0e9f4.camel@debian.org> <30a94e741502499689f7d82d5d1266f732f0e9f4.camel@debian.org>
Version: 0.90.6+bzr508-1+rm
--- End Message ---