summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLuca Boccassi <bluca@debian.org>2018-03-23 15:13:41 +0000
committerLuca Boccassi <bluca@debian.org>2018-03-23 16:02:52 +0000
commit0e91aeea428577b71fa0e2dd21d5cf664a0ebbe9 (patch)
tree7f69d8a1365471e2d2ad475cddbbf9587acd1515
parent46c95969265fff53173a06419db46133c12f42ae (diff)
downloadvyos-live-build-0e91aeea428577b71fa0e2dd21d5cf664a0ebbe9.tar.gz
vyos-live-build-0e91aeea428577b71fa0e2dd21d5cf664a0ebbe9.zip
Add Acquire::AllowInsecureRepositories to fix apt-secure in sid
The apt-secure option does not work anymore when building a sid image, as with apt 1.6 the existing options are no longer enough to get apt to accept an unsigned repository, which is necessary when using a local cached repository (offline build). Pass Acquire::AllowInsecureRepositories "true"; together with the other options when --apt-secure false is used to fix the issue.
-rwxr-xr-xscripts/build/chroot_apt2
1 files changed, 2 insertions, 0 deletions
diff --git a/scripts/build/chroot_apt b/scripts/build/chroot_apt
index d48da7ec4..4888ebd9c 100755
--- a/scripts/build/chroot_apt
+++ b/scripts/build/chroot_apt
@@ -78,11 +78,13 @@ case "${1}" in
true)
echo "APT::Get::AllowUnauthenticated \"false\";" > chroot/etc/apt/apt.conf.d/00secure
echo "Aptitude::CmdLine::Ignore-Trust-Violations \"false\";" >> chroot/etc/apt/apt.conf.d/00secure
+ echo "Acquire::AllowInsecureRepositories \"false\";" >> chroot/etc/apt/apt.conf.d/00secure
;;
false)
echo "APT::Get::AllowUnauthenticated \"true\";" > chroot/etc/apt/apt.conf.d/00secure
echo "Aptitude::CmdLine::Ignore-Trust-Violations \"true\";" >> chroot/etc/apt/apt.conf.d/00secure
+ echo "Acquire::AllowInsecureRepositories \"true\";" >> chroot/etc/apt/apt.conf.d/00secure
;;
esac