[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1035087: unblock: debian-archive-keyring/2023.3



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-archive-keyring@packages.debian.org, jmw@debian.org
Control: affects -1 + src:debian-archive-keyring

Please unblock package debian-archive-keyring

[ Reason ]
Users who upgrade from bullseye to bookworm
(debian-archive-keyring_2021.1.1 -> 2023.2) will have leftover keyrings
in /etc/apt/trusted.gpg.d as well as the new ASCII fragements.  In
contrast, users who have followed bookworm for some time do not because
an intermediate version did the right things. The jump in version for
normal upgraders reveals the issue.
This is bug #1033153.

[ Impact ]
Misleading listings of keys from apt, and the danger that user changes
don't take effect because of the duplication.

[ Tests ]
Thorough manual testing with a range of upgrade paths.

[ Risks ]
Trivial change to clean up obsolete files - the risk is low.
Source debdiff attached.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock debian-archive-keyring/2023.3
diff -Nru debian-archive-keyring-2023.2/debian/changelog debian-archive-keyring-2023.3/debian/changelog
--- debian-archive-keyring-2023.2/debian/changelog	2023-03-17 17:03:56.000000000 +0000
+++ debian-archive-keyring-2023.3/debian/changelog	2023-03-28 21:31:07.000000000 +0100
@@ -1,3 +1,9 @@
+debian-archive-keyring (2023.3) unstable; urgency=medium
+
+  * Reinstate cleanup of the APT keyrings for buster (Closes: #1033153)
+
+ -- Jonathan Wiltshire <jmw@debian.org>  Tue, 28 Mar 2023 21:31:07 +0100
+
 debian-archive-keyring (2023.2) unstable; urgency=medium
 
   * Reinstate buster keys for apt as fragments (Closes: #1033077)
diff -Nru debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript
--- debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript	2023-03-17 17:03:56.000000000 +0000
+++ debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript	2023-03-28 21:23:44.000000000 +0100
@@ -9,6 +9,9 @@
 rm_conffile /etc/apt/trusted.gpg.d/debian-archive-stretch-security-automatic.gpg 2022.1~~
 rm_conffile /etc/apt/trusted.gpg.d/debian-archive-stretch-stable.gpg 2022.1~~
 # These ones are replaced by asc fragments
+rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-automatic.gpg 2023.3~~
+rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-security-automatic.gpg 2023.3~~
+rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-stable.gpg 2023.3~~
 rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-automatic.gpg 2022.1~~
 rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-security-automatic.gpg 2022.1~~
 rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-stable.gpg 2022.1~~

Reply to: