Your message dated Sun, 30 Apr 2023 08:23:52 +0200 with message-id <ef9fffcc-406d-dae8-56a5-b6ddc9c806cd@debian.org> and subject line Re: Bug#1035087: unblock: debian-archive-keyring/2023.3 has caused the Debian Bug report #1035087, regarding unblock: debian-archive-keyring/2023.3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1035087: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035087 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: debian-archive-keyring/2023.3
- From: Jonathan Wiltshire <jmw@debian.org>
- Date: Sat, 29 Apr 2023 12:28:19 +0100
- Message-id: <[🔎] 168276769926.67618.4656622032196483246.reportbug@lupin.powdarrmonkey.net>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-archive-keyring@packages.debian.org, jmw@debian.org Control: affects -1 + src:debian-archive-keyring Please unblock package debian-archive-keyring [ Reason ] Users who upgrade from bullseye to bookworm (debian-archive-keyring_2021.1.1 -> 2023.2) will have leftover keyrings in /etc/apt/trusted.gpg.d as well as the new ASCII fragements. In contrast, users who have followed bookworm for some time do not because an intermediate version did the right things. The jump in version for normal upgraders reveals the issue. This is bug #1033153. [ Impact ] Misleading listings of keys from apt, and the danger that user changes don't take effect because of the duplication. [ Tests ] Thorough manual testing with a range of upgrade paths. [ Risks ] Trivial change to clean up obsolete files - the risk is low. Source debdiff attached. [ Checklist ] [x] all changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock debian-archive-keyring/2023.3diff -Nru debian-archive-keyring-2023.2/debian/changelog debian-archive-keyring-2023.3/debian/changelog --- debian-archive-keyring-2023.2/debian/changelog 2023-03-17 17:03:56.000000000 +0000 +++ debian-archive-keyring-2023.3/debian/changelog 2023-03-28 21:31:07.000000000 +0100 @@ -1,3 +1,9 @@ +debian-archive-keyring (2023.3) unstable; urgency=medium + + * Reinstate cleanup of the APT keyrings for buster (Closes: #1033153) + + -- Jonathan Wiltshire <jmw@debian.org> Tue, 28 Mar 2023 21:31:07 +0100 + debian-archive-keyring (2023.2) unstable; urgency=medium * Reinstate buster keys for apt as fragments (Closes: #1033077) diff -Nru debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript --- debian-archive-keyring-2023.2/debian/debian-archive-keyring.maintscript 2023-03-17 17:03:56.000000000 +0000 +++ debian-archive-keyring-2023.3/debian/debian-archive-keyring.maintscript 2023-03-28 21:23:44.000000000 +0100 @@ -9,6 +9,9 @@ rm_conffile /etc/apt/trusted.gpg.d/debian-archive-stretch-security-automatic.gpg 2022.1~~ rm_conffile /etc/apt/trusted.gpg.d/debian-archive-stretch-stable.gpg 2022.1~~ # These ones are replaced by asc fragments +rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-automatic.gpg 2023.3~~ +rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-security-automatic.gpg 2023.3~~ +rm_conffile /etc/apt/trusted.gpg.d/debian-archive-buster-stable.gpg 2023.3~~ rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-automatic.gpg 2022.1~~ rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-security-automatic.gpg 2022.1~~ rm_conffile /etc/apt/trusted.gpg.d/debian-archive-bullseye-stable.gpg 2022.1~~
--- End Message ---
--- Begin Message ---
- To: Jonathan Wiltshire <jmw@debian.org>, 1035087-done@bugs.debian.org
- Subject: Re: Bug#1035087: unblock: debian-archive-keyring/2023.3
- From: Paul Gevers <elbrus@debian.org>
- Date: Sun, 30 Apr 2023 08:23:52 +0200
- Message-id: <ef9fffcc-406d-dae8-56a5-b6ddc9c806cd@debian.org>
- In-reply-to: <[🔎] 168276769926.67618.4656622032196483246.reportbug@lupin.powdarrmonkey.net>
- References: <[🔎] 168276769926.67618.4656622032196483246.reportbug@lupin.powdarrmonkey.net>
Hi, On 29-04-2023 13:28, Jonathan Wiltshire wrote:unblock debian-archive-keyring/2023.3Done, thanks. PaulAttachment: OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---