Problem building a Debian package in AFS
I have two Debian servers: one is buster and one is bullseye. They both run the openafs-client service. When I run "gbp buildpackage mypackage" it completes successfully on both servers as long as the directory where I run "gbp" is _not_ in AFS. If I run "gbp" in an AFS directory it completes successfully on the buster server but fails almost immediately if run on the bullseye server. The failed build output on the bullseye server looks like this: - test2-bullseye:~/development/git/vemail> gbp buildpackage dh clean dh_clean gbp:info: Exporting 'HEAD' to '/afs/example.com/users/rlinxster/development/git/build-area/email-virtual-domain-tmp' gbp:info: Moving '/afs/example.com/users/rlinxster/development/git/build-area/email-virtual-domain-tmp' to '/afs/example.com/users/rlinxster/development/git/build-area/email-virtual-domain-11' gbp:info: Performing the build Building with cowbuilder for distribution sid I: using cowbuilder as pbuilder dh clean dh_clean dpkg-source: info: using source format '3.0 (native)' dpkg-source: info: building email-virtual-domain in email-virtual-domain_11.tar.xz dpkg-source: info: building email-virtual-domain in email-virtual-domain_11.dsc I: Generated dsc will be overwritten by build result; not generating changes file E: File not found: ../email-virtual-domain_11.dsc gbp:error: 'git-pbuilder' failed: it exited with 1 - Here is my .gbp.conf (same on both servers): - [DEFAULT] builder = git-pbuilder cleaner = fakeroot debian/rules clean pristine-tar = True [buildpackage] export-dir = ../build-area/ tarball-dir = .. [import-orig] dch = False
When are distributions removed from main package mirrors?
Every so often distributions are removed from the main Debian package mirrors. For example, on 20-Mar-2019 it was announced that non-LTS wheezy and jessie were being removed (https://lists.debian.org/debian-devel-announce/2019/03/msg6.html) Is there a Debian document or guideline that provides a schedule for when a distribution will be removed from the main mirrors, or are removals purely ad-hoc? A. Lewenberg
Plans on security issues with OpenSSL 1.1.1 after September 2023?
On 2023-09-11 version 1.1.1 of OpenSSL will no longer get any fixes. To quote from their recent posting (https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/): "[OpenSSL 1.1.1] will no longer be receiving publicly available security fixes after that date." Debian bullseye does not reach its EOL until mid-2024. Between September 2024 and bullseye's EOL, if a security issue comes up with OpenSSL 1.1.1, what can we expect from Debian's openssl package maintainers?