[Bug 1811120] Re: Backport auth.conf.d
Launchpad Bug Tracker
1811120 at bugs.launchpad.net
Thu Mar 21 11:05:31 UTC 2019
This bug was fixed in the package apt - 1.0.1ubuntu2.22
---------------
apt (1.0.1ubuntu2.22) trusty; urgency=medium
* apt.dirs: Install auth.conf.d directory (LP: #1818996)
* Merge translations from 1.2.31
apt (1.0.1ubuntu2.21) trusty; urgency=medium
[ Julian Andres Klode ]
* travis CI: Use docker container to get useful results
* fix and non-silent fail dpkg-overwrite error test (LP: #1817088)
* Introduce experimental 'never' pinning for sources (LP: #1814727)
* Add support for /etc/apt/auth.conf.d/*.conf (netrcparts) (LP: #1811120)
* Add a Packages-Require-Authorization Release file field (LP: #1814727)
* NeverAutoRemove kernel meta packages (LP: #1787460)
* Introduce APT::Install::Pre-Invoke / Post-Invoke-Success (LP: #1815761)
[ David Kalnischkies ]
* ftparchive/writer.cc: use a std::vector instead of hardcoded array
(LP: #1817048)
-- Julian Andres Klode <juliank at ubuntu.com> Tue, 12 Mar 2019 15:15:54
+0100
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1811120
Title:
Backport auth.conf.d
Status in apt package in Ubuntu:
Fix Released
Status in apt source package in Trusty:
Fix Released
Status in apt source package in Xenial:
Fix Released
Status in apt source package in Bionic:
Fix Released
Status in apt source package in Cosmic:
Fix Released
Status in apt source package in Disco:
Fix Released
Bug description:
[Impact]
Backport auth.conf.d support to allow specifying per-repository authentication data in separate files, so packages can setup authenticated repositories.
[Regression potential]
We ignore errors from opening auth.conf.d files, so regressions can only occur when parsing a file fails, in which case apt would exit with an error.
[Test case]
The test suite provides autopkgtests for auth.conf.d which creates an auth.conf.d file and checks that it is successfully used; so we can check if those passed.
Except on trusty- do it manually there, by adding a file for a private
ppa, and then running update.
- make sure to upgrade apt-transport-https on trusty & xenial...
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1811120/+subscriptions
More information about the foundations-bugs
mailing list