-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
apt-get error - E: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' changed its 'Suite' value from 'testing' to 'stable' #5149
Comments
FWIW, I fixed this in one template by changing 'buster' to 'stable' in sources.list, performed one update, then changed sources.list back to 'buster'. But adrelanos' workaround is easier and probably more correct. |
This really isn't a Qubes issue. The "easier" way for end users updating manually is to use The only Qubes relevant part of this is the impact on the updater process, which reports success, but none the less fails. It should be possible to drop a config file in I'll add a note to the docs, and maybe the FAQ. |
Shouldn't the Qubes updater be robust against this sort of thing, though? |
Yes, definitely. However, Qubes RPC uses The template in testing is still from June, so I think the Qubes R4.2rc1 release could also have this problem. The template should be rebuilt or at least updated and then re-issued. |
No. It isn't a bug, and nor is it an error - neither in Debian nor in Qubes. It's a security mechanism.
Of course, there isn't a current template available as yet, only testing. And 4.2rc1 does have the testing template, so cant be updated without user intervention. I've tried to rebuild, but the build server seems to be broken at the moment, which is why we dont have an updated template,( and some packages aren't being pushed from testing to current). |
On Wed, Jul 10, 2019 at 07:34:47AM -0700, unman wrote:
> Shouldn't the Qubes updater be robust against this sort of thing, though?
No. It isn't a bug, and nor is it an error - neither in Debian nor in Qubes. It's a security mechanism.
no, it's a bug in Debian. luckily the workaround is easy, the easiest is
just to run 'apt update' and then resolve it manually as prompted.
see https://bugs.debian.org/931566
'apt: Don't complain about suite changes (Acquire::AllowReleaseInfoChange::Suite should be "true")'
…--
tschau,
Holger
-------------------------------------------------------------------------------
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
|
@h01ger To be picky, that's a feature request isn't it? |
On Wed, Jul 10, 2019 at 08:07:24AM -0700, unman wrote:
@h01ger To be picky, that's a feature request isn't it?
The existing treatment is completely in line with the apt-secure documentation.
well, that's the maintainers view. the release team considers it a
serious bugs in buster they want to see fixed.
…--
tschau,
Holger
-------------------------------------------------------------------------------
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
"... the premise [is] that privacy is about hiding a wrong. It's not.
Privacy is an inherent human right, and a requirement for maintaining
the human condition with dignity and respect." (Bruce Schneier)
|
I think we can agree that if Debian introduces that feature we'd incorporate it in to Qubes updater. |
Regardless of how Debian devs feel about the severity of the bug, they have the luxury of saying "Well, you installed a pre-release version and have an extra step to get it functioning as a full release". Qubes doesn't have that option, because it shouldn't be distributing templates that are in a pre-release state.... not unless they come from a testing repo. Qubes shouldn't be foisting an unnecessary transition from pre-release to release onto regular users. |
Ok, so there's some disagreement about whether this is a Debian bug and how we should handle it. @marmarek, I think we need a decision from you about how we'll proceed. |
Andrew David Wong:
> The only Qubes relevant part of this is the impact on the updater process, which reports success, but none the less fails.
Shouldn't the Qubes updater be robust against this sort of thing, though?
I wrote a parser for the "apt-get update" output since apt get has
unreliable exit codes (Debian bug report exists) but unlikely to be
actioned.
https://github.com/Whonix/security-misc/blob/master/usr/lib/security-misc/apt-get-wrapper
syntax:
/usr/lib/security-misc/apt-get-wrapper update <args>
|
I've created PR adding The PR applies to salt file update, used by "qubes update" application. It doesn't apply to template update started from qubes-manager. Nor manual |
@marmarek I recommend against any permanent disabling of AFAICT simply re-uploading an updated template would have fixed this issue, at least for the next two years until Debian 11 is released. |
Updated debian-10 templates are already in testing repo. @adrelanos you may want to build new Whonix templates. |
@adrelanos do you want some automatic update method (like PR I created above)? Or just template rebuild? debian-10 templates are still in testing and already rebuilt. Whonix 15 templates are in stable, so this is more visible to the users. |
Both ok for me. Debian/Qubes package updates are ok. No Whonix updates
yet. These are still being tested.
|
@adrelanos When would be a good time for new Whonix template builds? |
That change is not yet in stable-proposed or testers repository since some not so well tested changes in other packages are still being worked on in the developers repository. I am good for development, but don't have a good grip on stable/release management / backporting / Q/A. Due to missing https://phabricator.whonix.org/T709 (or similar) it's hard to keep track on singular changes and/or moving packages though suites faster. Specifically also tb-updater should have stable upgrades faster often. |
Now would be a good time. Since #4918 (comment) among other fixes and enhancements hit Whonix stable repository today. |
This issue was fixed |
Closing this as resolved. If you believe the issue is not yet resolved, or if anyone is still affected by this issue, please leave a comment, and we'll be happy to reopen this. Thank you. |
apt as released in initial debian-10 template, requires confirming the repository change from stable to oldstable (which happened with debian-11 release). Later versions of apt has this fixes, but lets fix updating from the older version too. Simply call 'apt-get update --allow-releaseinfo-change' before the update. Related to QubesOS/qubes-issues#6624 Fixes QubesOS/qubes-issues#5149 (which was about the very same thing with previous debian version)
apt as released in initial debian-10 template, requires confirming the repository change from stable to oldstable (which happened with debian-11 release). Later versions of apt has this fixes, but lets fix updating from the older version too. Simply call 'apt-get update --allow-releaseinfo-change' before the update. Related to QubesOS/qubes-issues#6624 Fixes QubesOS/qubes-issues#5149 (which was about the very same thing with previous debian version)
Automated announcement from builder-github The component
|
apt as released in initial debian-10 template, requires confirming the repository change from stable to oldstable (which happened with debian-11 release). Later versions of apt has this fixes, but lets fix updating from the older version too. Simply call 'apt-get update --allow-releaseinfo-change' before the update. Related to QubesOS/qubes-issues#6624 Fixes QubesOS/qubes-issues#5149 (which was about the very same thing with previous debian version) (cherry picked from commit c31289f)
Automated announcement from builder-github The component
|
Automated announcement from builder-github The component
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The component
Or update dom0 via Qubes Manager. |
Affects Debian buster and Whonix 15 templates.
Instructions for users (these work alike for any Debian buster and Whonix users):
https://forums.whonix.org/t/apt-get-error-e-repository-tor-https-cdn-aws-deb-debian-org-debian-security-buster-updates-inrelease-changed-its-suite-value-from-testing-to-stable/7704
Solution for upgrading through QVMM? Dunno.
This would likely be fixed in new template builds without code changes required.
The text was updated successfully, but these errors were encountered: