Re: apt-get changelog [was: needrestart no longer depends on libmodule-scandeps-perl?]

2024-11-20 Thread Mike Kupfer
Charles Curley wrote: > On Wed, 20 Nov 2024 06:22:50 +0100 > wrote: > > > Hm. "apt-get changelog needrestart" works for me? Since apt delegates > > to apt-get, it should do the same... in fact, it works, too. > > > > What's missing? > > Possibly trixie v. bookworm. Specifically, I think it ha

Re: apt-get changelog [was: needrestart no longer depends on libmodule-scandeps-perl?]

2024-11-20 Thread tomas
On Wed, Nov 20, 2024 at 06:36:08AM -0700, Charles Curley wrote: > On Wed, 20 Nov 2024 06:22:50 +0100 > wrote: > > > Hm. "apt-get changelog needrestart" works for me? Since apt delegates > > to apt-get, it should do the same... in fact, it works, too. > > > > What's missing? > > Possibly trixie

Re: apt-get changelog [was: needrestart no longer depends on libmodule-scandeps-perl?]

2024-11-20 Thread Charles Curley
On Wed, 20 Nov 2024 06:22:50 +0100 wrote: > Hm. "apt-get changelog needrestart" works for me? Since apt delegates > to apt-get, it should do the same... in fact, it works, too. > > What's missing? Possibly trixie v. bookworm. Bookworm: charles@issola:~$ apt-get changelog needrestart Err:1 htt

Re: apt-mirror can't read bookworm-updates

2024-07-16 Thread Yuri Konotopov
This is known issue in the apt-mirror [1] You can use apt-mirror2 [2] which fixes all known apt-mirror issues [1] https://github.com/apt-mirror/apt-mirror/issues/144 [2] https://gitlab.com/apt-mirror2/apt-mirror2 -- Best regards, Yuri Konotopov

Re: Apt configuration - As Stable As Possible

2024-07-03 Thread Dmitrii Odintcov
Hey, Thank you for your reply Sven, and sorry for the belated response. Here is my setup now: sources.list ``` # stable deb https://deb.debian.org/debian/ bookworm main contrib non-free-firmware non-free deb-src https://deb.debian.org/debian/ bookworm main contrib non-free-firmware non-fr

Re: Apt configuration - As Stable As Possible

2024-04-06 Thread Sven Joachim
On 2024-04-07 04:48 +0300, Cyprus Socialite wrote: > I am trying to configure Apt to follow a "stable where we can, unstable > where we must" logic. > > On the "Stable+Backports - Testing - Unstable - Experimental" stencil, I > would like to > > - install left-to-right (the stablest version availa

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread Miroslav Skoric
On 1/30/24 1:43 PM, Michael Kjörling wrote: https://www.debian.org/releases/bullseye/amd64/release-notes/ch-upgrading.en.html#file-conflicts should help. Sure. Thanks!

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread Miroslav Skoric
On 1/30/24 1:40 PM, The Wanderer wrote: /tmp/apt-dpkg-install-S65GMD/8-marco-common_1.24.1-3_all.deb (--unpack): trying to overwrite '/usr/share/themes/Gorilla/metacity-1/metacity-theme-1.xml', which is also in package gnome-themes-more 0.9.0.deb0.8 Where do you get 'gnome-themes-more' from

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread Miroslav Skoric
On 1/30/24 1:41 PM, Greg Wooledge wrote: On Tue, Jan 30, 2024 at 01:19:09PM +0100, Miroslav Skoric wrote: Unpacking marco-common (1.24.1-3) over (1.20.3-1) ... .[1mdpkg:.[0m error processing archive /tmp/apt-dpkg-install-S65GMD/8-marco-common_1.24.1-3_all.deb (--unpack): trying to overwrite '/

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread Michael Kjörling
On 30 Jan 2024 13:19 +0100, from sko...@uns.ac.rs (Miroslav Skoric): > Preparing to unpack .../8-marco-common_1.24.1-3_all.deb ... > Unpacking marco-common (1.24.1-3) over (1.20.3-1) ... > .[1mdpkg:.[0m error processing archive > /tmp/apt-dpkg-install-S65GMD/8-marco-common_1.24.1-3_all.deb (--unpac

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread Greg Wooledge
On Tue, Jan 30, 2024 at 01:19:09PM +0100, Miroslav Skoric wrote: > Unpacking marco-common (1.24.1-3) over (1.20.3-1) ... > .[1mdpkg:.[0m error processing archive > /tmp/apt-dpkg-install-S65GMD/8-marco-common_1.24.1-3_all.deb (--unpack): > trying to overwrite > '/usr/share/themes/Gorilla/metacity-1

Re: apt full-upgrade failed at marco-common package

2024-01-30 Thread The Wanderer
On 2024-01-30 at 07:19, Miroslav Skoric wrote: > Hi, > > I [partially] upgraded buster to bullseye according to official "Release > Notes for Debian 11 (bullseye), 32-bit PC" (October 4, 2023). I did it > in two sessions as suggested: > > "4.4.4 Minimal system upgrade" (# apt upgrade --without

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Max Nikulin
On 26/12/2023 23:23, Dan Ritter wrote: https://wiki.debian.org/AptConfiguration#Be_careful_with_APT::Default-Release (quoted entirely) But omitting a couple of links to comments from developers that APT::Default-Release is deprecated. A tool to debug issues with upgrades is apt policy

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Stefan Monnier
>> What am I missing? > https://wiki.debian.org/AptConfiguration#Be_careful_with_APT::Default-Release Indeed! Thank you! Apparently the release notes didn't warn me loudly enough about it :-( Stefan

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Stefan Monnier
>> I take it this is bookworm. In that case, you also need: >> >> # bookworm-updates, to get updates before a point release is made; >> # see >> https://www.debian.org/doc/manuals/debian-reference/ch02.en.html#_updates_and_backports >> deb http://deb.debian.org/debian bookworm-updates main contrib

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Dan Ritter
Stefan Monnier wrote: > I noticed today that one of my machines was still running openssh > 1:9.2p1-2+deb12u1 rather than 1:9.2p1-2+deb12u2 even though it is > supposed to do its unattended-upgrades, so I tried a manual upgrade and > the result was still the same. > > Only after > > apt ins

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Stefan Monnier
>> The `sources.list` files says: >> >> deb http://security.debian.org/ stable-security main >> deb http://deb.debian.org/debian stable main > > I take it this is bookworm. In that case, you also need: > > # bookworm-updates, to get updates before a point release is made; > # see > https:

Re: APT preferring `stable` over `stable-security`

2023-12-26 Thread Charles Curley
On Tue, 26 Dec 2023 11:12:01 -0500 Stefan Monnier wrote: > The `sources.list` files says: > > deb http://security.debian.org/ stable-security main > deb http://deb.debian.org/debian stable main I take it this is bookworm. In that case, you also need: # bookworm-updates, to get updates

Re: apt upgrade can't find archive for virtualbox-7.0

2023-12-23 Thread Michael Kjörling
On 23 Dec 2023 09:22 -0500, from s.mol...@sbcglobal.net (Stephen P. Molnar): >> If you don't want to run VirtualBox going forward, the easiest way >> might be to just `apt purge virtualbox-7.0`. > (base) comp@AbNormal:~$ sudo apt purge virtualbox-7.0 > [sudo] password for comp: > Reading package li

Re: apt upgrade can't find archive for virtualbox-7.0; was: Synaptic Problem

2023-12-23 Thread Stephen P. Molnar
Thanks fr the reply. Please see below: On 12/23/2023 09:01 AM, Michael Kjörling wrote: On 23 Dec 2023 08:34 -0500, from s.mol...@sbcglobal.net (Stephen P. Molnar): However, I have a bit of a problem, when I attempt: (base) comp@AbNormal:~$ sudo apt update [sudo] password for comp: Hit:1 http:

Re: apt upgrade can't find archive for virtualbox-7.0; was: Synaptic Problem

2023-12-23 Thread Michael Kjörling
On 23 Dec 2023 08:34 -0500, from s.mol...@sbcglobal.net (Stephen P. Molnar): > However, I have a bit of a problem, when I attempt: > > (base) comp@AbNormal:~$ sudo apt update > [sudo] password for comp: > Hit:1 http://security.debian.org/debian-security bookworm-security InRelease > Hit:2 http://d

Re: Apt 2 not fully installed or removed.

2023-12-09 Thread Timothy M Butterworth
On Sat, Dec 9, 2023 at 9:07 AM Andy Smith wrote: > Hello, > > On Sat, Dec 09, 2023 at 02:26:41AM -0500, Timothy M Butterworth wrote: > > I figured out the problem and apt is working fine now. > > It would be nice for you to elaborate, both to satisfy my curiosity > 😀 and to provide a search engin

Re: Apt 2 not fully installed or removed.

2023-12-09 Thread Greg Wooledge
On Sat, Dec 09, 2023 at 02:26:41AM -0500, Timothy M Butterworth wrote: > > Removing php-horde (5.2.23+debian0-6) ... > > /var/lib/dpkg/info/php-horde.postrm: 28: /etc/apache2/envvars: > > /etc/default/locale: Permission denied > I figured out the problem and apt is working fine now. Was it the pe

Re: Apt 2 not fully installed or removed.

2023-12-08 Thread Andy Smith
Hello, On Sat, Dec 09, 2023 at 02:26:41AM -0500, Timothy M Butterworth wrote: > I figured out the problem and apt is working fine now. It would be nice for you to elaborate, both to satisfy my curiosity 😀 and to provide a search engine hit for anyone encountering this in future. Thanks, Andy --

Re: Apt 2 not fully installed or removed.

2023-12-08 Thread Timothy M Butterworth
On Sat, Dec 9, 2023 at 2:11 AM Timothy M Butterworth < timothy.m.butterwo...@gmail.com> wrote: > > All, > > I am having a problem with apt. I tried to remove php-horde and it failed > to fully remove. Now it generates an error message. Any suggestions? > > sudo apt remove php-horde > Reading packa

Re: Apt 2 not fully installed or removed.

2023-12-08 Thread Andy Smith
Hi, On Sat, Dec 09, 2023 at 02:11:54AM -0500, Timothy M Butterworth wrote: > /var/lib/dpkg/info/php-horde.postrm: 28: /etc/apache2/envvars: > /etc/default/locale: Permission denied The postrm script of php-horde is failing, so the package cannot be properly uninstalled. I'd look in /var/lib/dpkg/

Re: apt update does not work

2023-11-02 Thread David Wright
On Thu 02 Nov 2023 at 12:09:55 (-0400), Greg Wooledge wrote: > On Thu, Nov 02, 2023 at 04:56:59PM +0100, Martin wrote: > > I have installed old distribution > > # deb cdrom:[Debian GNU/Linux 9.1.0 _Stretch_ - Official amd64 DVD Binary-1 > > 20170722-11:29]/ stretch contrib main non-free > > (becau

Re: apt update does not work

2023-11-02 Thread Greg Wooledge
On Thu, Nov 02, 2023 at 04:56:59PM +0100, Martin wrote: > I have installed old distribution > # deb cdrom:[Debian GNU/Linux 9.1.0 _Stretch_ - Official amd64 DVD Binary-1 > 20170722-11:29]/ stretch contrib main non-free > (because that was newest distribution I had on DVD with me) > > I configured

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-11 Thread Bob Crochelt
On Tue, Oct 10, 2023, at 15:52, Eddie wrote: > > > On 10/10/23 14:41, Bob Crochelt wrote: > > > > > > On Tue, Oct 10, 2023, at 08:11, Anders Andersson wrote: > >> On Tue, Oct 10, 2023 at 1:19 PM Bob Crochelt >> > wrote: > >> > > >> > Hi: > >> > Fresh install Debian

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Eddie
On 10/10/23 14:41, Bob Crochelt wrote: On Tue, Oct 10, 2023, at 08:11, Anders Andersson wrote: On Tue, Oct 10, 2023 at 1:19 PM Bob Crochelt > wrote: > > Hi: > Fresh install Debian 12.  All seems well.  However, when I install a new package, in this case fvwm, the

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Bob Crochelt
On Tue, Oct 10, 2023, at 08:11, Anders Andersson wrote: > On Tue, Oct 10, 2023 at 1:19 PM Bob Crochelt wrote: > > > > Hi: > > Fresh install Debian 12. All seems well. However, when I install a new > > package, in this case fvwm, the package installs fine, but there is an > > error at the end

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Bob Crochelt
On Tue, Oct 10, 2023, at 11:31, Marco M. wrote: > Am 10.10.2023 um 11:25:13 Uhr schrieb Bob Crochelt: > > > No, it was not intentional. Should I remove it? > > If you don't run Debian on raspberry Pi, remove it. > Thanks to all. Followed the instructions on the Debian forums link and all is

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Marco M.
Am 10.10.2023 um 11:25:13 Uhr schrieb Bob Crochelt: > No, it was not intentional. Should I remove it? If you don't run Debian on raspberry Pi, remove it.

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Bob Crochelt
On Tue, Oct 10, 2023, at 02:13, David wrote: > On Tue, 10 Oct 2023 at 06:32, Bob Crochelt wrote: > > > Fresh install Debian 12. All seems well. However, when I install a new > > package, in this case fvwm, the package installs fine, but there is an > > error at the end... > > > > dpkg: depe

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Bob Crochelt
On Tue, Oct 10, 2023, at 00:04, Marco M. wrote: > Am 09.10.2023 um 23:31:14 Uhr schrieb Bob Crochelt: > > > raspi-firmware: missing /boot/firmware, did you forget to mount it? > > Does it exist? > On Pi it does. > > Run: > lsblk > cat /etc/fstab > Hi, Thanks for your help. lsblk NAME MAJ:M

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Andrew M.A. Cater
On Tue, Oct 10, 2023 at 04:31:15PM +0100, Tixy wrote: > On Tue, 2023-10-10 at 17:11 +0200, Anders Andersson wrote: > > This is a bit crazy. It can't be a "fresh install" if you have the > > amd64 kernel trying to configure the closed firmware for a raspberry > > pi. > > As Махно pointed out in ano

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Tixy
On Tue, 2023-10-10 at 17:11 +0200, Anders Andersson wrote: > This is a bit crazy. It can't be a "fresh install" if you have the > amd64 kernel trying to configure the closed firmware for a raspberry > pi. As Махно pointed out in another reply [1], this does really seem to be the case. If you follo

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Anders Andersson
On Tue, Oct 10, 2023 at 1:19 PM Bob Crochelt wrote: > > Hi: > Fresh install Debian 12. All seems well. However, when I install a new > package, in this case fvwm, the package installs fine, but there is an error > at the end... > > dpkg: dependency problems prevent configuration of linux-image

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Махно
Hello. Check this: https://forums.debian.net/viewtopic.php?t=155245 2023-10-10, an, 10:04 Marco M. rašė: > > Am 09.10.2023 um 23:31:14 Uhr schrieb Bob Crochelt: > > > raspi-firmware: missing /boot/firmware, did you forget to mount it? > > Does it exist? > On Pi it does. > > Run: > lsblk > cat /e

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread David
On Tue, 10 Oct 2023 at 06:32, Bob Crochelt wrote: > Fresh install Debian 12. All seems well. However, when I install a new > package, in this case fvwm, the package installs fine, but there is an error > at the end... > > dpkg: dependency problems prevent configuration of linux-image-amd64: >

Re: apt error, fresh install Debian 12/Dell desktop

2023-10-10 Thread Marco M.
Am 09.10.2023 um 23:31:14 Uhr schrieb Bob Crochelt: > raspi-firmware: missing /boot/firmware, did you forget to mount it? Does it exist? On Pi it does. Run: lsblk cat /etc/fstab

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread John Crawley
On 26/09/2023 12:06, Greg Wooledge wrote: On Tue, Sep 26, 2023 at 11:52:09AM +0900, John Crawley wrote: On 25/09/2023 20:21, Greg Wooledge wrote: Given the presence of an /etc/sudoers.dpkg-dist file on my system, which does in fact contain this: # This fixes CVE-2005-4890 and possibly breaks s

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread Greg Wooledge
On Tue, Sep 26, 2023 at 11:52:09AM +0900, John Crawley wrote: > On 25/09/2023 20:21, Greg Wooledge wrote: > > Given the presence of an /etc/sudoers.dpkg-dist file on my system, > > which does in fact contain this: > > > > # This fixes CVE-2005-4890 and possibly breaks some versions of kdesu > > #

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread John Crawley
On 25/09/2023 20:21, Greg Wooledge wrote: On Mon, Sep 25, 2023 at 11:14:24AM +0200, Michael wrote: so i looked into /etc/sudoers and all /etc/sudoers.d/* and found two suspicous flags: /etc/sudoers: Defaults use_pty /etc/sudoers.d/0pwfeedback: Defaults pwfeedback then consulting the sud

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread John Crawley
Many thanks to Michael for finding the change in sudo behaviour! For historical accuracy: On 25/09/2023 20:24, Greg Wooledge wrote: On Mon, Sep 25, 2023 at 01:35:38PM +0900, John Crawley wrote: 4) In a bash shell as root (e.g. "su" or "sudo -s"), do: errors=$(apt-get install mirage 2>&1 1

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread Greg Wooledge
On Mon, Sep 25, 2023 at 01:35:38PM +0900, John Crawley wrote: > > 4) In a bash shell as root (e.g. "su" or "sudo -s"), do: > > > > errors=$(apt-get install mirage 2>&1 1>/dev/tty) > > -bash: syntax error near unexpected token `2' > > So bash as root has a problem with the redirection. At th

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread Greg Wooledge
On Mon, Sep 25, 2023 at 11:14:24AM +0200, Michael wrote: > so i looked into /etc/sudoers and all /etc/sudoers.d/* and found two > suspicous flags: > > /etc/sudoers: > Defaults use_pty > > /etc/sudoers.d/0pwfeedback: > Defaults pwfeedback > > then consulting the sudo manpage convinced me, i

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-25 Thread Michael
hey, i was curious, so i tried it on the only machine i have sudo installed on, which is my Debian based Ubuntu based LinuxMint Laptop. micha@HP-Laptop: ~ > errors=$(sudo apt-get install mirage 2>&1 1>/dev/tty) [sudo] password for micha: Reading package lists... Done

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread John Crawley
On 25/09/2023 12:42, Greg Wooledge wrote: On Mon, Sep 25, 2023 at 11:58:13AM +0900, John Crawley wrote: adduser tmp adduser tmp sudo Log in to tmp (no graphical session set up), and the results are the same: behaviour in a bash shell is wrong, everything else works. I simply can't reproduce

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread Greg Wooledge
On Mon, Sep 25, 2023 at 11:58:13AM +0900, John Crawley wrote: > adduser tmp > adduser tmp sudo > > Log in to tmp (no graphical session set up), and the results are the same: > behaviour in a bash shell is wrong, everything else works. I simply can't reproduce your results at all. unicorn:~$ sud

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread John Crawley
On 25/09/2023 11:58, John Crawley wrote: So the 32bit system is different?? Doesn't semm to be that. amd64 Bookworm VM behaves the same way. -- John

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread John Crawley
Thanks for the ideas! On 25/09/2023 09:36, Greg Wooledge wrote: On Mon, Sep 25, 2023 at 09:10:28AM +0900, John Crawley wrote: I just tried, and yes it runs OK when the commands are in a script. But type directly into the terminal: errors=$(sudo apt-get install mirage 2>&1 1>/dev/tty) To see t

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread Greg Wooledge
On Mon, Sep 25, 2023 at 09:10:28AM +0900, John Crawley wrote: > On 24/09/2023 21:36, Greg Wooledge wrote: > > On Sun, Sep 24, 2023 at 12:03:12PM +0200, Michel Verdier wrote: > > > #!/bin/bash > > > errors=$(sudo apt-get install unknown 2>&1 1>/dev/tty) > > > echo "output: $errors" > > > errors=$(su

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread John Crawley
On 24/09/2023 21:36, Greg Wooledge wrote: On Sun, Sep 24, 2023 at 12:03:12PM +0200, Michel Verdier wrote: #!/bin/bash errors=$(sudo apt-get install unknown 2>&1 1>/dev/tty) echo "output: $errors" errors=$(sudo apt-get install mirage 2>&1 1>/dev/tty) echo "output: $errors" [...] It waits until I

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread Greg Wooledge
On Sun, Sep 24, 2023 at 12:03:12PM +0200, Michel Verdier wrote: > #!/bin/bash > errors=$(sudo apt-get install unknown 2>&1 1>/dev/tty) > echo "output: $errors" > errors=$(sudo apt-get install mirage 2>&1 1>/dev/tty) > echo "output: $errors" > > [...] > It waits until I type 'n' Same here.

Re: apt-get aborts in subshell with redirections on Debian 12

2023-09-24 Thread Michel Verdier
On 2023-09-24, John Crawley wrote: > errors=$( sudo apt-get install mirage 2>&1 1>/dev/tty ) > echo "$errors" #!/bin/bash errors=$(sudo apt-get install unknown 2>&1 1>/dev/tty) echo "output: $errors" errors=$(sudo apt-get install mirage 2>&1 1>/dev/tty) echo "output: $errors" debian version 12.1

Re: apt policy / listing packages from repo

2023-08-10 Thread Gareth Evans
On Thu 10 Aug 2023, at 18:54, Sven Joachim wrote: > On 2023-08-10 09:30 -0500, David Wright wrote: > >>> I was looking for a way to list packages installed from a particular >>> repo and/or sub-repo or whatever it's called (eg. main, non-free). >>> >>> Does anyone know of a way to do this, with a

Re: apt policy / listing packages from repo

2023-08-10 Thread Sven Joachim
On 2023-08-10 09:30 -0500, David Wright wrote: >> I was looking for a way to list packages installed from a particular >> repo and/or sub-repo or whatever it's called (eg. main, non-free). >> >> Does anyone know of a way to do this, with apt policy or otherwise? > > What I do in this situation is

Re: apt policy / listing packages from repo

2023-08-10 Thread David Wright
On Thu 10 Aug 2023 at 10:46:27 (+0100), Gareth Evans wrote: > There seems to be no mention of > > apt policy > > in either man apt or apt --help. As man apt says: "Much like apt itself, its manpage is intended as an end user interface and as such only mentions the most used commands and

Re: apt upgrade in buster is confused

2023-07-24 Thread Andy Smith
Hi, On Mon, Jul 24, 2023 at 01:35:49PM -0700, Scott Edwards wrote: > https://paste.debian.net/1286823/ > > I just want to upgrade to stable, but I'm stuck here buster is Debian 10. stable is Debian 12. If you are trying to upgrade buster to stable, you are making a mistake as you are not suppose

Re: apt upgrade in buster is confused

2023-07-24 Thread Charles Curley
On Mon, 24 Jul 2023 13:35:49 -0700 Scott Edwards wrote: > https://paste.debian.net/1286823/ > > I just want to upgrade to stable, but I'm stuck here Stuck where? What instructions did you follow. Did you modify /etc/apt/sources.list? Did you run "apt update" before "apt upgrade"? -- Does anyb

Re: apt upgrade in buster is confused

2023-07-24 Thread Jeffrey Walton
On Mon, Jul 24, 2023 at 4:36 PM Scott Edwards wrote: > > https://paste.debian.net/1286823/ > > I just want to upgrade to stable, but I'm stuck here Run 'apt-get update' first, and then 'apt-get upgrade'. If Apt-get fails, then try Aptitude. Aptitude has a better solver, and can often come up wit

Re: apt-cdrom: How do I use the flash drive as a CD-ROM to install software in Debian 12?

2023-06-16 Thread David Wright
On Thu 15 Jun 2023 at 21:32:41 (+), Totoro wrote: > After entering > > sudo apt update > > The following messages appeared on the console: > > Ign:1 cdrom://[Debian GNU/Linux 12.0.0 _Bookworm_ - Official amd64 DVD > Binary-1 with firmware 20230610-10:23"] bookworm InRelease > Err:2 cdrom:/

Re: Apt sources.list

2023-04-20 Thread Greg Wooledge
On Thu, Apr 20, 2023 at 12:18:35PM +0200, Vincent Lefevre wrote: > Anyway, in the time of freeze like now (probably with more > users trying testing), isn't it important that testing gets > security updates? It's not really about what's "important", but what's feasible given the available resource

Re: Apt sources.list

2023-04-20 Thread Vincent Lefevre
On 2023-04-18 13:52:13 -0400, Jeffrey Walton wrote: > On Tue, Apr 18, 2023 at 1:46 PM Frank wrote: > > Interesting. Like Tixy, I was under the impression testing didn't > > receive security support. I remember checking that several times over > > the years. Curious. Anyway, in the time of freeze

Re: Apt sources.list

2023-04-18 Thread Jeffrey Walton
On Tue, Apr 18, 2023 at 1:46 PM Frank wrote: > > Op 18-04-2023 om 16:33 schreef Vincent Lefevre: > > On 2023-04-15 21:59:19 +0200, Frank wrote: > >> Op 15-04-2023 om 18:12 schreef Tixy: > >>> Testing doesn't get explicit security support so there's no point in > >>> having 'testing-security' lines

Re: Apt sources.list

2023-04-18 Thread Frank
Op 18-04-2023 om 16:33 schreef Vincent Lefevre: On 2023-04-15 21:59:19 +0200, Frank wrote: Op 15-04-2023 om 18:12 schreef Tixy: Testing doesn't get explicit security support so there's no point in having 'testing-security' lines in sources.list (I guess it'll give an error anyway). No error.

Re: Apt sources.list

2023-04-18 Thread Vincent Lefevre
On 2023-04-15 21:59:19 +0200, Frank wrote: > Op 15-04-2023 om 18:12 schreef Tixy: > > On Sat, 2023-04-15 at 08:11 -0400, pa...@quillandmouse.com wrote: > > > > According to https://www.debian.org/releases/, bookworm at this time is > > > "testing". But when the next release comes, bookworm will st

Re: Apt sources.list

2023-04-17 Thread Jeffrey Walton
On Mon, Apr 17, 2023 at 12:45 AM wrote: > > On Sun, Apr 16, 2023 at 09:20:22PM -0400, Jeffrey Walton wrote: > > [...] > > > Corporations don't need browser cooperation for Data Loss Prevention > > > (DLP) (but they already have it). Corporations just run an > > > interception proxy, like NetSkope.

Re: Apt sources.list

2023-04-16 Thread tomas
On Sun, Apr 16, 2023 at 09:20:22PM -0400, Jeffrey Walton wrote: [...] > > Corporations don't need browser cooperation for Data Loss Prevention > > (DLP) (but they already have it). Corporations just run an > > interception proxy, like NetSkope. The NetScope Root CA is loaded into > > every browse

Re: Apt sources.list

2023-04-16 Thread Jeffrey Walton
On Sun, Apr 16, 2023 at 4:52 PM Jeffrey Walton wrote: > > On Sun, Apr 16, 2023 at 3:06 PM Tim Woodall wrote: > > > > On Sat, 15 Apr 2023, Greg Wooledge wrote: > > > > > Now, personally I don't feel this is a threat model that I need to > > > worry about. I just use plain old http sources at home

Re: Apt sources.list

2023-04-16 Thread Jeffrey Walton
On Sun, Apr 16, 2023 at 3:06 PM Tim Woodall wrote: > > On Sat, 15 Apr 2023, Greg Wooledge wrote: > > > Now, personally I don't feel this is a threat model that I need to > > worry about. I just use plain old http sources at home, and if "They" > > learn that I've downloaded rxvt-unicode and mutt,

Re: Apt sources.list

2023-04-16 Thread Tim Woodall
On Sat, 15 Apr 2023, Greg Wooledge wrote: Now, personally I don't feel this is a threat model that I need to worry about. I just use plain old http sources at home, and if "They" learn that I've downloaded rxvt-unicode and mutt, well, good for Them. The thread model I'm most concerned abou

Re: Apt sources.list

2023-04-16 Thread John Hasler
Frank writes: > Are you kidding? No way! Unstable is never pushed into testing just > like that. There are packages that will never move to testing at all! That's correct. Immediately after the release Testing and Stable are identical. Unstable is unchanged. When the freeze is lifted packages th

Re: Apt sources.list

2023-04-16 Thread David Wright
On Sun 16 Apr 2023 at 07:14:31 (+0200), Frank wrote: > Op 15-04-2023 om 22:15 schreef Andrew M.A. Cater: > > On Sat, Apr 15, 2023 at 08:14:11PM +0100, Brian wrote: > > > On Sat 15 Apr 2023 at 16:45:40 +, Andrew M.A. Cater wrote: > > > > > > > I would suggest that you remain on bookworm until b

Re: Apt sources.list

2023-04-16 Thread Frank
Op 16-04-2023 om 13:12 schreef Andrew M.A. Cater: Release day when someone pushes the magic switch and the symlinks move :) [snip] "Testing" == "Previous contents of Unstable" (== Trixie / Debian 13) Are you kidding? No way! Unstable is never pushed into testing just like that. There are p

Re: Apt sources.list

2023-04-16 Thread paulf
On Sat, 15 Apr 2023 20:30:11 -0400 Jeffrey Walton wrote: > On Sat, Apr 15, 2023 at 11:09 AM wrote: > > On Sat, 15 Apr 2023 14:01:27 +0100 > > Alain D D Williams wrote: > > > On Sat, Apr 15, 2023 at 08:52:06AM -0400, Greg Wooledge wrote: > > > While we are talking about this, is there any reason

Re: Apt sources.list

2023-04-16 Thread Eduardo M KALINOWSKI
On 15/04/2023 19:54, davidson wrote: On Sat, 15 Apr 2023 to...@tuxteam.de wrote: On Sat, Apr 15, 2023 at 12:18:57PM -0400, Dan Ritter wrote: It's nice not to be telling everyone who can sniff a plaintext connection which packages you are installing, Without doubt, this is an advantage of a TL

Re: Apt sources.list

2023-04-16 Thread Andrew M.A. Cater
On Sun, Apr 16, 2023 at 12:10:33AM -0400, Stefan Monnier wrote: > > On release day, bookworm -> "stable", > > So far so good. > > > "unstable" -> testing == trixie > > Really? I thought there was always a delay for packages to move from > unstable to testing. > Let's try this again because re

Re: Apt sources.list

2023-04-15 Thread tomas
On Sat, Apr 15, 2023 at 10:54:10PM +, davidson wrote: [...] > What's wrong, Tomas? Don't you want to watch pornographic videos and > conduct your banking with the same application? I'm glad I don't have to use the browser for any of those. Cheers -- t signature.asc Description: PGP signa

Re: Apt sources.list

2023-04-15 Thread Frank
Op 15-04-2023 om 22:15 schreef Andrew M.A. Cater: On Sat, Apr 15, 2023 at 08:14:11PM +0100, Brian wrote: On Sat 15 Apr 2023 at 16:45:40 +, Andrew M.A. Cater wrote: I would suggest that you remain on bookworm until bookworm is released as stable. At that point (and only then) change bookwor

Re: Apt sources.list

2023-04-15 Thread David Wright
On Sun 16 Apr 2023 at 00:10:33 (-0400), Stefan Monnier wrote: > > On release day, bookworm -> "stable", > > So far so good. > > > "unstable" -> testing == trixie > > Really? I thought there was always a delay for packages to move from > unstable to testing. Well, I suppose it gives the naïve u

Re: Apt sources.list

2023-04-15 Thread Stefan Monnier
> On release day, bookworm -> "stable", So far so good. > "unstable" -> testing == trixie Really? I thought there was always a delay for packages to move from unstable to testing. Stefan

Re: Apt sources.list

2023-04-15 Thread Jeffrey Walton
On Sat, Apr 15, 2023 at 11:09 AM wrote: > On Sat, 15 Apr 2023 14:01:27 +0100 > Alain D D Williams wrote: > > On Sat, Apr 15, 2023 at 08:52:06AM -0400, Greg Wooledge wrote: > > While we are talking about this, is there any reason why all the > > http: should not be https: ? > > > > I have done thi

Re: Apt sources.list

2023-04-15 Thread Stefan Monnier
>> Now, personally I don't feel this is a threat model that I need to >> worry about. I just use plain old http sources at home, and if >> "They" learn that I've downloaded rxvt-unicode and mutt, well, good >> for Them. > My understanding is that mandating HTTPS for all connections is supposed >

Re: Apt sources.list

2023-04-15 Thread davidson
On Sat, 15 Apr 2023 Greg Wooledge wrote: On Sat, Apr 15, 2023 at 10:54:10PM +, davidson wrote: In case you wish to obscure what software you *install*, but need not conceal the software you *download*: Step one: Make a list of the packages you want, and then augment it with as many plausi

Re: Apt sources.list

2023-04-15 Thread The Wanderer
On 2023-04-15 at 19:11, Greg Wooledge wrote: > On Sat, Apr 15, 2023 at 10:54:10PM +, davidson wrote: > >> In case you wish to obscure what software you *install*, but need >> not conceal the software you *download*: >> >> Step one: Make a list of the packages you want, and then augment >> it

Re: Apt sources.list

2023-04-15 Thread Greg Wooledge
On Sat, Apr 15, 2023 at 10:54:10PM +, davidson wrote: > In case you wish to obscure what software you *install*, but need not > conceal the software you *download*: > > Step one: Make a list of the packages you want, and then augment it > with as many plausible alternatives and red herrings

Re: Apt sources.list

2023-04-15 Thread davidson
On Sat, 15 Apr 2023 to...@tuxteam.de wrote: On Sat, Apr 15, 2023 at 12:18:57PM -0400, Dan Ritter wrote: pa...@quillandmouse.com wrote: Okay. Let's open this can of worms. I wish more would. The ONLY reason https is used on most sites is because Google *mandated* it years ago. ("Mandate" me

Re: Apt sources.list

2023-04-15 Thread songbird
Andrew M.A. Cater wrote: ... > On release day, bookworm -> "stable", "unstable" -> testing == trixie > Trixie is copied, essentially as the kickstarter for new "unstable". > "Unstable" == Forky. Unstable == Sid Forky will happen sometime in the future when they start talking about freezing tes

Re: Apt sources.list

2023-04-15 Thread Andrew M.A. Cater
On Sat, Apr 15, 2023 at 08:14:11PM +0100, Brian wrote: > On Sat 15 Apr 2023 at 16:45:40 +, Andrew M.A. Cater wrote: > > > I would suggest that you remain on bookworm until bookworm is released as > > stable. At that point (and only then) change bookworm to trixie and carry > > on. As soon as b

Re: Apt sources.list

2023-04-15 Thread paulf
On Sat, 15 Apr 2023 16:45:40 + "Andrew M.A. Cater" wrote: > On Sat, Apr 15, 2023 at 01:23:05PM +0100, Brian wrote: > > On Sat 15 Apr 2023 at 08:11:17 -0400, pa...@quillandmouse.com wrote: > > > > > Folks: > > > > > > Here is my sources.list file: > > > > > > --- > > > > > > deb http://deb

Re: Apt sources.list

2023-04-15 Thread Frank
Op 15-04-2023 om 18:12 schreef Tixy: On Sat, 2023-04-15 at 08:11 -0400, pa...@quillandmouse.com wrote: According to https://www.debian.org/releases/, bookworm at this time is "testing". But when the next release comes, bookworm will still be bookworm, but "testing" will be bookworm "plus". I'd

Re: Apt sources.list

2023-04-15 Thread Andy Smith
On Sat, Apr 15, 2023 at 07:21:17PM +0100, Alain D D Williams wrote: > On Sat, Apr 15, 2023 at 11:00:52AM -0400, pa...@quillandmouse.com wrote: > > > Okay. Let's open this can of worms. The ONLY reason https is used on > > most sites is because Google *mandated* it years ago. ("Mandate" means > > w

Re: Apt sources.list

2023-04-15 Thread Charles Curley
On Sat, 15 Apr 2023 11:00:52 -0400 wrote: > Okay. Let's open this can of worms. The ONLY reason https is used on > most sites is because Google *mandated* it years ago. ("Mandate" means > we'll downgrade your search ranking if you don't use https.) There is > otherwise no earthly reason to have a

Re: Apt sources.list

2023-04-15 Thread Alain D D Williams
On Sat, Apr 15, 2023 at 11:00:52AM -0400, pa...@quillandmouse.com wrote: > Okay. Let's open this can of worms. The ONLY reason https is used on > most sites is because Google *mandated* it years ago. ("Mandate" means > we'll downgrade your search ranking if you don't use https.) There is > otherwi

Re: Apt sources.list

2023-04-15 Thread tomas
On Sat, Apr 15, 2023 at 12:18:57PM -0400, Dan Ritter wrote: > pa...@quillandmouse.com wrote: > > > > Okay. Let's open this can of worms. The ONLY reason https is used on > > most sites is because Google *mandated* it years ago. ("Mandate" means > > we'll downgrade your search ranking if you don't

Re: Apt sources.list

2023-04-15 Thread Andrew M.A. Cater
On Sat, Apr 15, 2023 at 01:23:05PM +0100, Brian wrote: > On Sat 15 Apr 2023 at 08:11:17 -0400, pa...@quillandmouse.com wrote: > > > Folks: > > > > Here is my sources.list file: > > > > --- > > > > deb http://debian.uchicago.edu/debian/ bookworm main contrib non-free > > deb-src http://debian.uc

Re: Apt sources.list

2023-04-15 Thread Dan Ritter
pa...@quillandmouse.com wrote: > > Okay. Let's open this can of worms. The ONLY reason https is used on > most sites is because Google *mandated* it years ago. ("Mandate" means > we'll downgrade your search ranking if you don't use https.) There is > otherwise no earthly reason to have an encrypt

Re: Apt sources.list

2023-04-15 Thread Tixy
On Sat, 2023-04-15 at 08:11 -0400, pa...@quillandmouse.com wrote: > Folks: > > Here is my sources.list file: > > --- > > deb http://debian.uchicago.edu/debian/ bookworm main contrib non-free > deb-src http://debian.uchicago.edu/debian/ bookworm main contrib non-free > > deb http://security.debi

  1   2   3   4   5   6   7   8   9   10   >