[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#968220: marked as done (apt: 'apt source' fails: Data left in buffer)



Your message dated Tue, 11 Aug 2020 12:48:30 +0000
with message-id <E1k5The-0001Au-JV@fasolo.debian.org>
and subject line Bug#968220: fixed in apt 2.1.10
has caused the Debian Bug report #968220,
regarding apt: 'apt source' fails: Data left in buffer
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
968220: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968220
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: apt
Version: 2.1.9
Severity: normal

The 'apt source' command fails to download package sources:

$ apt source hello
Reading package lists... Done
Need to get 733 kB of source archives.
Get:1 https://ftp.icm.edu.pl/packages/linux-debian bullseye/main hello
2.10-2 (dsc) [1335 B]
Err:1 https://ftp.icm.edu.pl/packages/linux-debian bullseye/main hello
2.10-2 (dsc)
  Data left in buffer [IP: 193.219.28.2 443]
Get:2 https://ftp.icm.edu.pl/packages/linux-debian bullseye/main hello
2.10-2 (tar) [726 kB]
Get:3 https://ftp.icm.edu.pl/packages/linux-debian bullseye/main hello
2.10-2 (diff) [6132 B]
Err:3 https://ftp.icm.edu.pl/packages/linux-debian bullseye/main hello
2.10-2 (diff)
  Data left in buffer [IP: 193.219.28.2 443]
Fetched 726 kB in 1s (505 kB/s)
E: Failed to fetch
https://ftp.icm.edu.pl/packages/linux-debian/pool/main/h/hello/hello_2.10-2.dsc
 Data left in buffer [IP: 193.219.28.2 443]
E: Failed to fetch
https://ftp.icm.edu.pl/packages/linux-debian/pool/main/h/hello/hello_2.10-2.debian.tar.xz
 Data left in buffer [IP: 193.219.28.2 443]
E: Failed to fetch some archives.
$ ls -log hello_*
-rw-r--r-- 1      0 May 13  2019 hello_2.10-2.debian.tar.xz
-rw-r--r-- 1      0 May 13  2019 hello_2.10-2.dsc
-rw-r--r-- 1 725946 Mar 22  2015 hello_2.10.orig.tar.gz
$

Using the '-o Acquire::https::Pipeline-Depth=0' option makes no difference.

Other programs download the files successfully without a complaint.


-- Package-specific info:

-- /etc/apt/sources.list.d/debian.sources --

Types: deb deb-src
URIs: https://ftp.icm.edu.pl/packages/linux-debian/
Suites: bullseye sid experimental
Components: main contrib non-free
Signed-By: /etc/apt/trusted.gpg.d/debian-archive-buster-automatic.gpg
Description: Debian

Types: deb deb-src
URIs: https://deb.debian.org/debian-security/
Suites: bullseye-security
Components: main contrib non-free
Signed-By: /etc/apt/trusted.gpg.d/debian-archive-buster-security-automatic.gpg
Description: Debian security updates


-- /etc/apt/sources.list.d/local.sources --

Types: deb
URIs: file:/usr/src/deb/
Suites: /
Trusted: yes
Description: local


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (800, 'testing'), (700, 'unstable'), (600, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.7.0-2-amd64 (SMP w/4 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages apt depends on:
ii  adduser                 3.118
ii  debian-archive-keyring  2019.1
ii  gpgv                    2.2.20-1
ii  libapt-pkg6.0           2.1.9
ii  libc6                   2.31-2
ii  libgcc-s1               10.1.0-6
ii  libgnutls30             3.6.14-2+b1
ii  libseccomp2             2.4.3-1+b1
ii  libstdc++6              10.1.0-6
ii  libsystemd0             246-2

Versions of packages apt recommends:
ii  ca-certificates  20200601

Versions of packages apt suggests:
ii  apt-doc                      2.1.9
pn  aptitude | synaptic | wajig  <none>
ii  dpkg-dev                     1.20.5
ii  gnupg                        2.2.20-1
pn  powermgmt-base               <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: apt
Source-Version: 2.1.10
Done: Julian Andres Klode <jak@debian.org>

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968220@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julian Andres Klode <jak@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 11 Aug 2020 14:28:07 +0200
Source: apt
Architecture: source
Version: 2.1.10
Distribution: unstable
Urgency: medium
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Julian Andres Klode <jak@debian.org>
Closes: 931566 968220
Changes:
 apt (2.1.10) unstable; urgency=medium
 .
   * Default Acquire::AllowReleaseInfoChange::Suite to "true" (Closes: #931566)
   * acquire: Do not hide _error messages in Fail()
   * Further improvements to HTTP method (Closes: #968220, verified against
     that server and the Canonical infra where it blocked buildds)
     - Do not use non-blocking local I/O - they don't do anything anyway,
       and we can't really use non-blocking I/O here because we need to be able
       to flush it.
     - Restore successful exits from Die() and rewrite Die() in a more
       comprehensible way, after careful code path analysis
     - http: Fully flush local file both before/after server read, avoiding
       both partial flush before sending requests to the server, as well as
       preventing leftover data before receiving from the server, which cause
       data left in the buffer.
Checksums-Sha1:
 6d7df5bb0e8cee789834e0fae8c436bc40f675f7 2760 apt_2.1.10.dsc
 164d6425ef9202be3220a943bbf6b1beb7ed22d5 2179772 apt_2.1.10.tar.xz
 456adef0976e1c4dc1c9a4161fe698d7b602ee10 7206 apt_2.1.10_source.buildinfo
Checksums-Sha256:
 2368cefda44f61bb73970781be04ae7947290606d929f1682fb3cfa6ddb6ec0a 2760 apt_2.1.10.dsc
 aa678d0fcd614a7707e77f3219097401141f5426cd1095c4aa50043920a2c04b 2179772 apt_2.1.10.tar.xz
 2854cf57f5bafb91d46a94bf4bba8683cf37f002a202485558f8e2859d5c9847 7206 apt_2.1.10_source.buildinfo
Files:
 2cdf3eee708f002afc59afaf0c54b6d4 2760 admin important apt_2.1.10.dsc
 66fe46f1df713881782b2f9eb60436d9 2179772 admin important apt_2.1.10.tar.xz
 7261ff07fda643324f2b6a09f73bf320 7206 admin important apt_2.1.10_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=GrVk
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: