[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#640122: apt-get ignores apt.conf option "Acquire::Max-ValidTime" on amd64



Package: apt
Version: 0.8.10.3+squeeze1
Severity: normal


We're using an internal mirror which is updated at a defined interval for consistency.
The 'Release' files from security.debian.org set a quite short timeout in their Vaild-Until:
header (10 days). If we're trying to update an internal system from this mirror a few days
later (apt-get update), it complains about the 'Release' file being expired and ignores it
by default.

So we've set the apt.conf option "Acquire::Max-ValidTime" to "1209600" (see apt-config output
below). While this works on i686 systems, it is ignored on amd64 systems, even though
apt-config shows it. We've worked around this bug for now  by also setting
"Acquire::Check-Valid-Until" to "false" on our amd64 systems (this option is not ignored),
but this isn't a real solution.

I already tried setting it as APT::Acquire::Max-ValidTime "1209600" - but that version
is ignored on both i686 and amd64.

-- Package-specific info:

-- apt-config dump --

APT "";
APT::Architecture "amd64";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^firmware-linux.*";
APT::NeverAutoRemove:: "^linux-firmware$";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^kfreebsd-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
APT::NeverAutoRemove:: "^linux-ubuntu-modules-.*";
APT::Never-MarkAuto-Sections "";
APT::Never-MarkAuto-Sections:: "metapackages";
APT::Never-MarkAuto-Sections:: "restricted/metapackages";
APT::Never-MarkAuto-Sections:: "universe/metapackages";
APT::Never-MarkAuto-Sections:: "multiverse/metapackages";
APT::Never-MarkAuto-Sections:: "oldlibs";
APT::Never-MarkAuto-Sections:: "restricted/oldlibs";
APT::Never-MarkAuto-Sections:: "universe/oldlibs";
APT::Never-MarkAuto-Sections:: "multiverse/oldlibs";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::mirrors "mirrors/";
Dir::State::extended_states "extended_states";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::netrc "auth.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Etc::preferencesparts "preferences.d";
Dir::Etc::trusted "trusted.gpg";
Dir::Etc::trustedparts "trusted.gpg.d";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Media "";
Dir::Media::MountPath "/media/apt";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
Dir::Log::History "history.log";
Dir::Ignore-Files-Silently "";
Dir::Ignore-Files-Silently:: "~$";
Dir::Ignore-Files-Silently:: "\.disabled$";
Dir::Ignore-Files-Silently:: "\.bak$";
Dir::Ignore-Files-Silently:: "\.dpkg-[a-z]+$";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
Acquire "";
Acquire::Check-Valid-Until "false";
Acquire::Max-ValidTime "1209600";
CommandLine "";
CommandLine::AsString "apt-config dump";

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --

deb http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free

deb http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free

# squeeze-updates, previously known as 'volatile'
deb http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free
deb-src http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free

-- System Information:
Debian Release: 6.0.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apt depends on:
ii  debian-archive-keyring  2010.08.28       GnuPG archive keys of the Debian a
ii  gnupg                   1.4.10-4         GNU privacy guard - a free PGP rep
ii  libc6                   2.11.2-10        Embedded GNU C Library: Shared lib
ii  libgcc1                 1:4.4.5-8        GCC support library
ii  libstdc++6              4.4.5-8          The GNU Standard C++ Library v3
ii  zlib1g                  1:1.2.3.4.dfsg-3 compression library - runtime

apt recommends no packages.

Versions of packages apt suggests:
pn  apt-doc               <none>             (no description available)
ii  aptitude              0.6.3-3.2          terminal-based package manager (te
ii  bzip2                 1.0.5-6            high-quality block-sorting file co
ii  dpkg-dev              1.15.8.11          Debian package development tools
pn  lzma                  <none>             (no description available)
ii  python-apt            0.7.100.1+squeeze1 Python interface to libapt-pkg

-- no debconf information

Diese elektronische Nachricht ist vertraulich. Die Information ist 
nur fuer den Adressaten bestimmt. Falls Sie nicht der Adressat 
sind, informieren Sie bitte sofort den Absender und vernichten 
Sie diese E-Mail sowie alle Kopien und angeschlossenen 
Anlagen. Bitte beachten Sie, dass es in diesem Fall verboten und 
gesetzeswidrig ist, diese Nachricht zu kopieren, weiterzuleiten 
oder zu benutzen. Es wurden alle moeglichen Massnahmen 
getroffen um eine Virusfreiheit der beigefuegten Dateien zu 
gewaehrleisten. Wir uebernehmen jedoch keine Verantwortung
fuer Schaeden, die aufgrund von Software-Viren entstehen und 
empfehlen Ihnen vor Benutzung der Dateien eine Ueberpruefung 
auf Viren durchzufuehren.

This electronic message contains information that is confidential. 
The information is intended for the use of the addressee only. If 
you are not the addressee please inform the sender immediately 
and delete this e-mail, its attachments and any copies. Please 
note that any disclosure, copy, distribution or use of the contents 
of this message is prohibited and may be unlawful. We have 
taken every reasonable precaution to ensure that any kind of 
attachment to this e-mail has been swept for viruses.
However, we cannot accept liability for any damage sustained as 
a result of software viruses and would advise you to carry out your 
own virus checks before opening any attachment.



Reply to: