From 14e325c7e4b33e8fc6d33b99d1ffd3b934d26ed0 Mon Sep 17 00:00:00 2001 From: Julian Andres Klode Date: Wed, 22 Jun 2016 14:51:31 +0200 Subject: Release 1.3~exp3 Quite a huge churn of new strings. --- configure.ac | 2 +- debian/changelog | 31 ++++++++ doc/apt-ftparchive.1.xml | 2 +- doc/apt-get.8.xml | 2 +- doc/apt-secure.8.xml | 2 +- doc/apt-verbatim.ent | 2 +- doc/apt.conf.5.xml | 2 +- doc/po/apt-doc.pot | 117 +++++++++++++++++++++-------- doc/po/de.po | 125 +++++++++++++++++++++++-------- doc/po/es.po | 114 ++++++++++++++++++++-------- doc/po/fr.po | 125 +++++++++++++++++++++++-------- doc/po/it.po | 188 ++++++++++++++++++++++++++++++++++++---------- doc/po/ja.po | 186 +++++++++++++++++++++++++++++++++++---------- doc/po/nl.po | 191 +++++++++++++++++++++++++++++++++++++---------- doc/po/pl.po | 114 ++++++++++++++++++++-------- doc/po/pt.po | 125 +++++++++++++++++++++++-------- doc/po/pt_BR.po | 114 ++++++++++++++++++++-------- doc/sources.list.5.xml | 2 +- po/apt-all.pot | 66 +++++++++------- po/ar.po | 64 +++++++++------- po/ast.po | 64 +++++++++------- po/bg.po | 64 +++++++++------- po/bs.po | 64 +++++++++------- po/ca.po | 64 +++++++++------- po/cs.po | 68 +++++++++-------- po/cy.po | 64 +++++++++------- po/da.po | 64 +++++++++------- po/de.po | 64 +++++++++------- po/dz.po | 64 +++++++++------- po/el.po | 64 +++++++++------- po/es.po | 70 +++++++++-------- po/eu.po | 64 +++++++++------- po/fi.po | 64 +++++++++------- po/fr.po | 64 +++++++++------- po/gl.po | 64 +++++++++------- po/hu.po | 72 ++++++++++-------- po/it.po | 64 +++++++++------- po/ja.po | 70 +++++++++-------- po/km.po | 64 +++++++++------- po/ko.po | 64 +++++++++------- po/ku.po | 64 +++++++++------- po/lt.po | 64 +++++++++------- po/mr.po | 64 +++++++++------- po/nb.po | 64 +++++++++------- po/ne.po | 64 +++++++++------- po/nl.po | 71 ++++++++++-------- po/nn.po | 64 +++++++++------- po/pl.po | 64 +++++++++------- po/pt.po | 64 +++++++++------- po/pt_BR.po | 64 +++++++++------- po/ro.po | 64 +++++++++------- po/ru.po | 70 +++++++++-------- po/sk.po | 64 +++++++++------- po/sl.po | 64 +++++++++------- po/sv.po | 68 +++++++++-------- po/th.po | 64 +++++++++------- po/tl.po | 64 +++++++++------- po/tr.po | 70 +++++++++-------- po/uk.po | 64 +++++++++------- po/vi.po | 64 +++++++++------- po/zh_CN.po | 68 +++++++++-------- po/zh_TW.po | 64 +++++++++------- 62 files changed, 2723 insertions(+), 1590 deletions(-) diff --git a/configure.ac b/configure.ac index 97dd61a31..4e08cc473 100644 --- a/configure.ac +++ b/configure.ac @@ -19,7 +19,7 @@ AC_CONFIG_AUX_DIR(buildlib) AC_CONFIG_HEADER(include/config.h:buildlib/config.h.in include/apti18n.h:buildlib/apti18n.h.in) PACKAGE="apt" -PACKAGE_VERSION="1.3~exp2" +PACKAGE_VERSION="1.3~exp3" PACKAGE_MAIL="APT Development Team " AC_DEFINE_UNQUOTED(PACKAGE,"$PACKAGE") AC_DEFINE_UNQUOTED(PACKAGE_VERSION,"$PACKAGE_VERSION") diff --git a/debian/changelog b/debian/changelog index 126a7cd62..5aa64c41d 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,34 @@ +apt (1.3~exp3) experimental; urgency=medium + + [ Petter Reinholdtsen ] + * Norwegian Bokmål program translation update (Closes: 827067) + + [ David Kalnischkies ] + * apt-key: don't search PATH if command is a path already + * don't use FindFile for external Dir::Bin commands + * http: don't hang on redirect with length + connection close + * merge sources.list lines based on Release filename (Closes: 826944) + * avoid std::get_time usage to sidestep libstdc++6 bug (LP: 1593583) + * do not error if auto-detect-proxy cmd has no output (Closes: 827713) + * implement and document DIRECT for auto-detect-proxy + * run update post-invokes even on (partial) failures + * handle weak-security repositories as unauthenticated (Closes: 827364) + * generalize secure->insecure downgrade protection + * forbid insecure repositories by default expect in apt-get (Closes: 808367) + * source: if download is skipped, don't try to unpack + * better error message for insufficient hashsums (Closes: 827758) + * add [weak] tag to hash errors to indicate insufficiency + * ensure filesize of deb is included in the hashes list + * add insecure (and weak) allow-options for sources.list + + [ Dominic Benson ] + * Reinstate caching of file hashes in apt-ftparchive (Closes: #806924) + + [ Zhou Mo ] + * zh_CN.po: update simplified chinese translation + + -- Julian Andres Klode Wed, 22 Jun 2016 14:50:12 +0200 + apt (1.3~exp2) experimental; urgency=medium [ Johannes 'josch' Schauer ] diff --git a/doc/apt-ftparchive.1.xml b/doc/apt-ftparchive.1.xml index b0bf01b89..c9e5ba28e 100644 --- a/doc/apt-ftparchive.1.xml +++ b/doc/apt-ftparchive.1.xml @@ -14,7 +14,7 @@ &apt-email; &apt-product; - 2016-05-27T00:00:00Z + 2016-06-11T00:00:00Z diff --git a/doc/apt-get.8.xml b/doc/apt-get.8.xml index 8fc6cc26d..e1cdbc3cf 100644 --- a/doc/apt-get.8.xml +++ b/doc/apt-get.8.xml @@ -14,7 +14,7 @@ &apt-email; &apt-product; - 2016-05-16T00:00:00Z + 2016-03-18T00:00:00Z diff --git a/doc/apt-secure.8.xml b/doc/apt-secure.8.xml index 79bb86a0f..491c40f62 100644 --- a/doc/apt-secure.8.xml +++ b/doc/apt-secure.8.xml @@ -13,7 +13,7 @@ &apt-email; &apt-product; - 2016-03-18T00:00:00Z + 2016-06-20T00:00:00Z diff --git a/doc/apt-verbatim.ent b/doc/apt-verbatim.ent index 623505d11..d9c9c0f06 100644 --- a/doc/apt-verbatim.ent +++ b/doc/apt-verbatim.ent @@ -239,7 +239,7 @@ "> - + diff --git a/doc/apt.conf.5.xml b/doc/apt.conf.5.xml index dfdd0eabf..23ff061f0 100644 --- a/doc/apt.conf.5.xml +++ b/doc/apt.conf.5.xml @@ -19,7 +19,7 @@ &apt-email; &apt-product; - 2016-05-27T00:00:00Z + 2016-06-20T00:00:00Z diff --git a/doc/po/apt-doc.pot b/doc/po/apt-doc.pot index cc9f4acc9..09954b442 100644 --- a/doc/po/apt-doc.pot +++ b/doc/po/apt-doc.pot @@ -5,9 +5,9 @@ #, fuzzy msgid "" msgstr "" -"Project-Id-Version: apt-doc 1.3~exp2\n" +"Project-Id-Version: apt-doc 1.3~exp3\n" "Report-Msgid-Bugs-To: APT Development Team \n" -"POT-Creation-Date: 2016-06-11 17:24+0200\n" +"POT-Creation-Date: 2016-06-22 14:50+0200\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" @@ -1398,8 +1398,9 @@ msgstr "" #: apt-get.8.xml:1 msgid "" "Forbid the update command to acquire unverifiable data from configured " -"sources. Apt will fail at the update command for repositories without valid " -"cryptographically signatures. Configuration Item: " +"sources. APT will fail at the update command for repositories without valid " +"cryptographically signatures. See also &apt-secure; for details on the " +"concept and the implications. Configuration Item: " "Acquire::AllowInsecureRepositories." msgstr "" @@ -2157,27 +2158,59 @@ msgid "" "Starting with version 0.6, APT contains code that does " "signature checking of the Release file for all repositories. This ensures " "that data like packages in the archive can't be modified by people who have " -"no access to the Release file signing key." +"no access to the Release file signing key. Starting with version 1.1 " +"APT requires repositories to provide recent " +"authentication information for unimpeded usage of the repository." msgstr "" #. type: Content of: #: apt-secure.8.xml:1 msgid "" "If an archive has an unsigned Release file or no Release file at all current " -"APT versions will raise a warning in update operations " -"and front-ends like apt-get will require explicit " -"confirmation if an installation request includes a package from such an " -"unauthenticated archive." +"APT versions will refuse to download data from them by default in " +"update operations and even if forced to download " +"front-ends like &apt-get; will require explicit confirmation if an " +"installation request includes a package from such an unauthenticated " +"archive." msgstr "" #. type: Content of: #: apt-secure.8.xml:1 msgid "" -"In the future APT will refuse to work with unauthenticated repositories by " -"default until support for them is removed entirely. Users have the option to " -"opt-in to this behavior already by setting the configuration option " -" to " -"false." +"As a temporary exception &apt-get; (not &apt;!) raises warnings only if it " +"encounters unauthenticated archives to give a slightly longer grace period " +"on this backward compatibility effecting change. This exception will be " +"removed in future releases and you can opt-out of this grace period by " +"setting the configuration option " +" to " +"false or " +" on the command line." +msgstr "" + +#. type: Content of: +#: apt-secure.8.xml:1 +msgid "" +"You can force all APT clients to raise only warnings by setting the " +"configuration option to " +"true. Individual repositories can also be allowed to be " +"insecure via the &sources-list; option " +"allow-insecure=yes. Note that insecure repositories are " +"strongly discouraged and all options to force apt to continue supporting " +"them will eventually be removed. Users also have the " +" option available to disable even the warnings, but " +"be sure to understand the implications as detailed in &sources-list;." +msgstr "" + +#. type: Content of: +#: apt-secure.8.xml:1 +msgid "" +"A repository which previously was authentication but would loose this state " +"in an update operation raises an error in all APT clients " +"irrespective of the option to allow or forbid usage of insecure " +"repositories. The error can be overcome by additionally setting " +" to " +"true or for Individual repositories with the " +"&sources-list; option allow-downgrade-to-insecure=yes." msgstr "" #. type: Content of: @@ -3195,13 +3228,17 @@ msgstr "" #: apt.conf.5.xml:1 msgid "" "Acquire::http::Proxy-Auto-Detect can be used to specify " -"an external command to discover the http proxy to use. Apt expects the " -"command to output the proxy on stdout in the style " -"http://proxy:port/. This will override the generic " -"Acquire::http::Proxy but not any specific host proxy " -"configuration set via Acquire::http::Proxy::$HOST. See " -"the &squid-deb-proxy-client; package for an example implementation that uses " -"avahi. This option takes precedence over the legacy option name " +"an external command to discover the http proxy to use. The first and only " +"parameter is an URI denoting the host to be contacted to allow for " +"host-specific configuration. APT expects the command to output the proxy on " +"stdout as a single line in the style http://proxy:port/ " +"or the word DIRECT if no proxy should be used. No output " +"indicates that the generic proxy settings should be used. Note that " +"auto-detection will not be used for a host if a host-specific proxy " +"configuration is already set via " +"Acquire::http::Proxy::HOST. " +"See the &squid-deb-proxy-client; package for an example implementation that " +"uses avahi. This option takes precedence over the legacy option name " "ProxyAutoDetect." msgstr "" @@ -3485,21 +3522,30 @@ msgstr "" #. type: Content of: #: apt.conf.5.xml:1 msgid "" -"Allow the update operation to load data files from a repository without a " -"trusted signature. If enabled this option no data files will be loaded and " -"the update operation fails with a error for this source. The default is " -"false for backward compatibility. This will be changed in the future." +"Allow update operations to load data files from repositories without " +"sufficient security information. The default value is " +"\"false\". Concept, implications as well as alternatives " +"are detailed in &apt-secure;." +msgstr "" + +#. type: Content of: +#: apt.conf.5.xml:1 +msgid "" +"Allow update operations to load data files from repositories which provide " +"security information, but these are deemed no longer cryptographically " +"strong enough. The default value is \"false\". Concept, " +"implications as well as alternatives are detailed in &apt-secure;." msgstr "" #. type: Content of: #: apt.conf.5.xml:1 msgid "" "Allow that a repository that was previously gpg signed to become unsigned " -"durign a update operation. When there is no valid signature of a previously " -"trusted repository apt will refuse the update. This option can be used to " -"override this protection. You almost certainly never want to enable " -"this. The default is false. Note that apt will still consider packages from " -"this source untrusted and warn about them if you try to install them." +"during an update operation. When there is no valid signature for a " +"previously trusted repository apt will refuse the update. This option can be " +"used to override this protection. You almost certainly never want to enable " +"this. The default is false. Concept, implications as " +"well as alternatives are detailed in &apt-secure;." msgstr "" #. type: Content of: @@ -5577,6 +5623,17 @@ msgid "" "detect and error out on such anomalies." msgstr "" +#. type: Content of: +#: sources.list.5.xml:1 +msgid "" +" (), " +" () and " +" " +"() are boolean values which all " +"default to no. If set to yes they " +"circumvent parts of &apt-secure; and should therefore not be used lightly!" +msgstr "" + #. type: Content of: #: sources.list.5.xml:1 msgid "" diff --git a/doc/po/de.po b/doc/po/de.po index 71f25a51c..78c08b126 100644 --- a/doc/po/de.po +++ b/doc/po/de.po @@ -7,7 +7,7 @@ msgid "" msgstr "" "Project-Id-Version: apt-doc 1.0.8\n" "Report-Msgid-Bugs-To: APT Development Team \n" -"POT-Creation-Date: 2016-06-11 17:24+0200\n" +"POT-Creation-Date: 2016-06-22 14:50+0200\n" "PO-Revision-Date: 2014-09-14 14:46+0200\n" "Last-Translator: Chris Leick \n" "Language-Team: German \n" @@ -1959,8 +1959,9 @@ msgstr "" #: apt-get.8.xml msgid "" "Forbid the update command to acquire unverifiable data from configured " -"sources. Apt will fail at the update command for repositories without valid " -"cryptographically signatures. Configuration Item: Acquire::" +"sources. APT will fail at the update command for repositories without valid " +"cryptographically signatures. See also &apt-secure; for details on the " +"concept and the implications. Configuration Item: Acquire::" "AllowInsecureRepositories." msgstr "" @@ -3033,7 +3034,9 @@ msgid "" "Starting with version 0.6, APT contains code that does " "signature checking of the Release file for all repositories. This ensures " "that data like packages in the archive can't be modified by people who have " -"no access to the Release file signing key." +"no access to the Release file signing key. Starting with version 1.1 " +"APT requires repositories to provide recent " +"authentication information for unimpeded usage of the repository." msgstr "" "Beginnend mit Version 0.6 enthält apt Code, der die " "Signatur der Release-Datei für alle Archive prüft. Dies stellt sicher, dass " @@ -3044,20 +3047,48 @@ msgstr "" #: apt-secure.8.xml msgid "" "If an archive has an unsigned Release file or no Release file at all current " -"APT versions will raise a warning in update operations " -"and front-ends like apt-get will require explicit " -"confirmation if an installation request includes a package from such an " -"unauthenticated archive." +"APT versions will refuse to download data from them by default in " +"update operations and even if forced to download front-" +"ends like &apt-get; will require explicit confirmation if an installation " +"request includes a package from such an unauthenticated archive." msgstr "" #. type: Content of: #: apt-secure.8.xml msgid "" -"In the future APT will refuse to work with unauthenticated repositories by " -"default until support for them is removed entirely. Users have the option to " -"opt-in to this behavior already by setting the configuration option " -" to false." +"As a temporary exception &apt-get; (not &apt;!) raises warnings only if it " +"encounters unauthenticated archives to give a slightly longer grace period " +"on this backward compatibility effecting change. This exception will be " +"removed in future releases and you can opt-out of this grace period by " +"setting the configuration option to false or on the command line." +msgstr "" + +#. type: Content of: +#: apt-secure.8.xml +msgid "" +"You can force all APT clients to raise only warnings by setting the " +"configuration option to " +"true. Individual repositories can also be allowed to be " +"insecure via the &sources-list; option allow-insecure=yes. Note that insecure repositories are strongly discouraged and all " +"options to force apt to continue supporting them will eventually be " +"removed. Users also have the option available to " +"disable even the warnings, but be sure to understand the implications as " +"detailed in &sources-list;." +msgstr "" + +#. type: Content of: +#: apt-secure.8.xml +msgid "" +"A repository which previously was authentication but would loose this state " +"in an update operation raises an error in all APT clients " +"irrespective of the option to allow or forbid usage of insecure " +"repositories. The error can be overcome by additionally setting " +" to " +"true or for Individual repositories with the &sources-" +"list; option allow-downgrade-to-insecure=yes." msgstr "" #. type: Content of: @@ -4616,16 +4647,30 @@ msgstr "" #. type: Content of: #: apt.conf.5.xml +#, fuzzy +#| msgid "" +#| "Acquire::http::Proxy-Auto-Detect can be used to " +#| "specify an external command to discover the http proxy to use. Apt " +#| "expects the command to output the proxy on stdout in the style " +#| "http://proxy:port/. This will override the generic " +#| "Acquire::http::Proxy but not any specific host proxy " +#| "configuration set via Acquire::http::Proxy::$HOST. " +#| "See the &squid-deb-proxy-client; package for an example implementation " +#| "that uses avahi. This option takes precedence over the legacy option name " +#| "ProxyAutoDetect." msgid "" "Acquire::http::Proxy-Auto-Detect can be used to specify " -"an external command to discover the http proxy to use. Apt expects the " -"command to output the proxy on stdout in the style http://proxy:" -"port/. This will override the generic Acquire::http::" -"Proxy but not any specific host proxy configuration set via " -"Acquire::http::Proxy::$HOST. See the &squid-deb-proxy-" -"client; package for an example implementation that uses avahi. This option " -"takes precedence over the legacy option name ProxyAutoDetect." +"an external command to discover the http proxy to use. The first and only " +"parameter is an URI denoting the host to be contacted to allow for host-" +"specific configuration. APT expects the command to output the proxy on " +"stdout as a single line in the style http://proxy:port/ " +"or the word DIRECT if no proxy should be used. No output " +"indicates that the generic proxy settings should be used. Note that auto-" +"detection will not be used for a host if a host-specific proxy configuration " +"is already set via Acquire::http::Proxy::HOST. See the &squid-deb-proxy-client; package for an " +"example implementation that uses avahi. This option takes precedence over " +"the legacy option name ProxyAutoDetect." msgstr "" "Acquire::http::Proxy-Auto-Detect kann benutzt werden, um " "einen externen Befehl zum Auffinden des HTTP-Proxys anzugeben, der benutzt " @@ -5088,21 +5133,30 @@ msgstr "" #. type: Content of: #: apt.conf.5.xml msgid "" -"Allow the update operation to load data files from a repository without a " -"trusted signature. If enabled this option no data files will be loaded and " -"the update operation fails with a error for this source. The default is " -"false for backward compatibility. This will be changed in the future." +"Allow update operations to load data files from repositories without " +"sufficient security information. The default value is \"false\". Concept, implications as well as alternatives are detailed in " +"&apt-secure;." +msgstr "" + +#. type: Content of: +#: apt.conf.5.xml +msgid "" +"Allow update operations to load data files from repositories which provide " +"security information, but these are deemed no longer cryptographically " +"strong enough. The default value is \"false\". Concept, " +"implications as well as alternatives are detailed in &apt-secure;." msgstr "" #. type: Content of: #: apt.conf.5.xml msgid "" "Allow that a repository that was previously gpg signed to become unsigned " -"durign a update operation. When there is no valid signature of a previously " -"trusted repository apt will refuse the update. This option can be used to " -"override this protection. You almost certainly never want to enable this. " -"The default is false. Note that apt will still consider packages from this " -"source untrusted and warn about them if you try to install them." +"during an update operation. When there is no valid signature for a " +"previously trusted repository apt will refuse the update. This option can be " +"used to override this protection. You almost certainly never want to enable " +"this. The default is false. Concept, implications as " +"well as alternatives are detailed in &apt-secure;." msgstr "" #. type: Content of: @@ -8023,6 +8077,17 @@ msgid "" "detect and error out on such anomalies." msgstr "" +#. type: Content of: +#: sources.list.5.xml +msgid "" +" (), " +" () and (