[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#778357: marked as done (audit 'apt-get update' exit codes)



Your message dated Fri, 08 Jan 2021 22:03:26 +0000
with message-id <E1kxzqw-0003MY-Pj@fasolo.debian.org>
and subject line Bug#594813: fixed in apt 2.1.16
has caused the Debian Bug report #594813,
regarding audit 'apt-get update' exit codes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
594813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594813
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: apt
Severity: important
X-Debbugs-CC: holger@layer-acht.org,pabs@debian.org

When "apt-get update" fails the program under some conditions exits with
a 0 status. It would be useful if it exited with a non-zero status in
that case (or if there were a switch to tell it to do so).

Since there is already...

- provide meaningful exit codes for network failures
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776152

and

- apt: Provide meaningful exit codes for gpg failures
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745735

That have been found more or less by trial and error... I am wondering,
if there are any other situations, where this could happen.

Perhaps while you're at #776152 and #745735, could you please check if
there are other cases, where apt-get exits with a 0 status, where it
should exit with a non-zero status?

Cheers,
Patrick

--- End Message ---
--- Begin Message ---
Source: apt
Source-Version: 2.1.16
Done: Julian Andres Klode <jak@debian.org>

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 594813@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julian Andres Klode <jak@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 08 Jan 2021 21:49:15 +0100
Source: apt
Architecture: source
Version: 2.1.16
Distribution: unstable
Urgency: medium
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Julian Andres Klode <jak@debian.org>
Closes: 188161 211075 594813 649588 969932 973305
Changes:
 apt (2.1.16) unstable; urgency=medium
 .
   [ Faidon Liambotis ]
   * Various fixes to http and connect method
     - basehttp: also consider Access when a Server's URI
     - connect: convert a C-style string to std::string
     - connect: use ServiceNameOrPort, not Port, as the cache key
 .
   [ Julian Andres Klode ]
   * patterns: Add dependency patterns ?depends, ?conflicts, etc.
     Note that the -broken- variants are not implemented yet.
   * Rewrite of the kernel autoremoval code:
     - Determine autoremovable kernels at run-time (LP: #1615381), this fixes the
       issue where apt could consider a running kernel autoremovable
     - Automatically remove unused kernels on apt {full,dist}-upgrade.
       This helps ensuring that we don't run out of /boot space.
     - Only keep up to 3 (not 4) kernels.
       Ubuntu boot partitions were sized for 3 kernels, not 4.
   * Bump codenames to bullseye/hirsute and adjust -security codename for
     bullseye (Closes: #969932)
   * Ignore failures from immediate configuration. This does not change the
     actual installation ordering - we never passed the return code to the
     caller and installation went underway anyway if it could be ordered at a
     later stage, this just removes spurious after-the-fact errors.
     (Closes: #973305, #188161, #211075, #649588) (LP: #1871268)
   * Add support for Phased-Update-Percentage, previously used only by
     update-manager.
   * Implement update --error-on=any so that scripts can reliably check for
     transient failures as well. (Closes: #594813)
 .
   [ Demi M. Obenour ]
   * test/integration/framework: Be compatible with Bash
 .
   [ Vangelis Skarmoutsos ]
   * Greek program translation update
Checksums-Sha1:
 36c442af8f390f912d5708a7bc160b1ed8caef0d 2784 apt_2.1.16.dsc
 75b426e31453b8af90a9557b0f9c9c3e03e1fdf5 2191892 apt_2.1.16.tar.xz
 409320f90a5e88b25f108aecfba553cff020f703 7500 apt_2.1.16_source.buildinfo
Checksums-Sha256:
 bfd7131905a3037a6283e44046ff995cd8a29f27ebd64b24022c23ee5db9a658 2784 apt_2.1.16.dsc
 32ab26926b05dd15ed09b5b844eb7c780ae5c9c62e6bf7cf8e4333f5e25fb4a8 2191892 apt_2.1.16.tar.xz
 7f12ff6faffade64be0779fc946159389241f4f5f85f4bcff176d6a94faedbdc 7500 apt_2.1.16_source.buildinfo
Files:
 c1d0b94a337d210841e2483183410c3e 2784 admin important apt_2.1.16.dsc
 aa52ed26ee2e74b823fd8e2825b9e76d 2191892 admin important apt_2.1.16.tar.xz
 68fab02971bb43edcb7422391421160e 7500 admin important apt_2.1.16_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJDBAEBCgAtFiEET7WIqEwt3nmnTHeHb6RY3R2wP3EFAl/4z44PHGpha0BkZWJp
YW4ub3JnAAoJEG+kWN0dsD9xqqMP/1zfNKKDO/zhs0VATzCM6PIy7btd8ZhSyTCI
Eo4bPcA5S3vSvb6arr+qvE8Hiox3FiGPzkd1zL3m9VaCol0dR5OBEMgr/l5gzX6s
8MXMEoeCkALK3UN9b456/+RH1Av/GJWnEqrFQoJQaeHRisJFjPxFP2yjkYI2ixOM
yOzKIVjRdkV5euDhA/TpTHKtKl63q0yQE5yfIoGwnIKb9vcCzZ+MrdLep6hCSRc9
hXjy/+5OyAWDktlP9odYgSrTefocjSoD9OrNEZut/h+0Xz2lhVyh0kA+ubeH5s7j
nue0uKc4QssZz15yZGVyup0ZxGenUZf0AUwSegXKu3Ui0GY6vt+4fh1wtxeLVJiP
gwja2F63SDQDYWNf08Y2FC20x1xpf1ogC5dNDtP6+jbw/XHtk0CZj+ES9ky5qUdL
o0iq1IdpdY+Kxi6koL2vfT70jwL7ZW+QTbnKdYL2MGhZMgK8YdFK28x98BYrP+oY
RD23tUum57RSOkokKJPqRaoHkiqcnrXwQ1lYdRLHkmfFwRTc9f2QJEhQTREsCFbq
IUrnagYZB+Pi9T7wEzqcdw3to1AowU9hzkYqGimRqKNqxC0ZiHkFF7HmIDdVBJbQ
3OSCFcnDbxwlFxp0l7HfI3u+aZSFUNS3vIMsI9GuCybmvydmkEI8ry+vjwfGtmfN
TtWcmhk/
=dOI/
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: