* Peter Palfrader <weasel@debian.org> [2017-01-05 22:01]: > So this only covers stretch and later users. Can you update your patch > with that in mind? Sure, attached.
From e636d7d173a476eef502b5043b239342c568e394 Mon Sep 17 00:00:00 2001 From: Jochen Sprickerhof <git@jochen.sprickerhof.de> Date: Wed, 4 Jan 2017 14:30:29 +0100 Subject: [PATCH] Use check-valid-until option in source --- web/app/snapshot/templates/description.mako | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/web/app/snapshot/templates/description.mako b/web/app/snapshot/templates/description.mako index db3495a..a815984 100644 --- a/web/app/snapshot/templates/description.mako +++ b/web/app/snapshot/templates/description.mako @@ -73,6 +73,15 @@ to prevent apt from disregarding snapshot entries ("Release file expired"). Use <code>aptitude -o Acquire::Check-Valid-Until=false update</code> or <code>apt-get -o Acquire::Check-Valid-Until=false update</code> for this purpose. </p> +<p> +If you use at least apt version 1.1.exp9 (stretch and later), you can use this instead: +</p> +<pre> +deb [check-valid-until=no] <a href="/archive/debian/20091004T111800Z/">http://snapshot.debian.org/archive/debian/20091004T111800Z/</a> lenny main +deb-src [check-valid-until=no] <a href="/archive/debian/20091004T111800Z/">http://snapshot.debian.org/archive/debian/20091004T111800Z/</a> lenny main +deb [check-valid-until=no] <a href="/archive/debian-security/20091004T121501Z/">http://snapshot.debian.org/archive/debian-security/20091004T121501Z/</a> lenny/updates main +deb-src [check-valid-until=no] <a href="/archive/debian-security/20091004T121501Z/">http://snapshot.debian.org/archive/debian-security/20091004T121501Z/</a> lenny/updates main +</pre> <p style="margin-top:2em;"> If you want anything related to a specific package simply enter the -- 2.11.0
Attachment:
signature.asc
Description: PGP signature