public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
* Is schroot updating external apt databases?
@ 2022-10-24  6:26 Jan Kiszka
  2022-10-24  8:07 ` Uladzimir Bely
  0 siblings, 1 reply; 3+ messages in thread
From: Jan Kiszka @ 2022-10-24  6:26 UTC (permalink / raw)
  To: isar-users

Hi all,

while meditating over logs for other reasons, I noticed this:

...
+------------------------------------------------------------------------------+
| Update chroot                                                                |
+------------------------------------------------------------------------------+

Get:1 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar InRelease
Ign:1 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar InRelease
Get:2 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar Release [5105 B]
Get:2 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar Release [5105 B]
Get:3 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar Release.gpg
Ign:3 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar Release.gpg
Get:4 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar/main arm64 Packages [18.2 kB]
Get:5 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar/main armhf Packages [4498 B]
Get:6 file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-debian isar/main amd64 Packages [5638 B]
Hit:7 http://deb.debian.org/debian bullseye InRelease
Get:8 http://deb.debian.org/debian-security bullseye-security InRelease [48.4 kB]
Get:9 http://deb.debian.org/debian bullseye-updates InRelease [44.1 kB]
Get:10 http://deb.debian.org/debian-security bullseye-security/main Sources [166 kB]
Get:11 http://deb.debian.org/debian-security bullseye-security/main armhf Packages [191 kB]
Get:12 http://deb.debian.org/debian-security bullseye-security/main amd64 Packages [193 kB]
Get:13 http://deb.debian.org/debian-security bullseye-security/main arm64 Packages [191 kB]
Get:14 http://deb.debian.org/debian bullseye-updates/main Sources.diff/Index [14.0 kB]
Get:15 http://deb.debian.org/debian bullseye-updates/main armhf Packages.diff/Index [14.0 kB]
Get:16 http://deb.debian.org/debian bullseye-updates/main arm64 Packages.diff/Index [14.0 kB]
Get:17 http://deb.debian.org/debian bullseye-updates/main amd64 Packages.diff/Index [14.0 kB]
Get:18 http://deb.debian.org/debian bullseye-updates/main Sources T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [1848 B]
Get:18 http://deb.debian.org/debian bullseye-updates/main Sources T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [1848 B]
Get:19 http://deb.debian.org/debian bullseye-updates/main armhf Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9282 B]
Get:19 http://deb.debian.org/debian bullseye-updates/main armhf Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9282 B]
Get:20 http://deb.debian.org/debian bullseye-updates/main arm64 Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9315 B]
Get:20 http://deb.debian.org/debian bullseye-updates/main arm64 Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9315 B]
Get:21 http://deb.debian.org/debian bullseye-updates/main amd64 Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9785 B]
Get:21 http://deb.debian.org/debian bullseye-updates/main amd64 Packages T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9785 B]
Fetched 919 kB in 5s (169 kB/s)

Reading package lists...
Reading package lists...
Building dependency tree...
Reading state information...
Calculating upgrade...
The following packages will be upgraded:
 libc-bin libc-dev-bin libc-l10n libc6 libc6-dev linux-libc-dev locales
debconf: delaying package configuration, since apt-utils is not installed
7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.


Are we pulling newer packages from Debian here? This should not 
happen, obviously. What is done to prevent this?

Jan

-- 
Siemens AG, Technology
Competence Center Embedded Linux

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Is schroot updating external apt databases?
  2022-10-24  6:26 Is schroot updating external apt databases? Jan Kiszka
@ 2022-10-24  8:07 ` Uladzimir Bely
  2022-10-24  8:18   ` Baurzhan Ismagulov
  0 siblings, 1 reply; 3+ messages in thread
From: Uladzimir Bely @ 2022-10-24  8:07 UTC (permalink / raw)
  To: isar-users; +Cc: Jan Kiszka

In mail from Mondey, 24 Oct 2022 г. 09:26:10 +03 user Jan Kiszka 
wrote:
> Hi all,
> 
> while meditating over logs for other reasons, I noticed this:
> 
> ...
> +---------------------------------------------------------------------------
> ---+
> | Update chroot                                                             
> |   |
> +---------------------------------------------------------------------------
> ---+
> 
> Get:1
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar InRelease Ign:1
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar InRelease Get:2
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar Release [5105 B] Get:2
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar Release [5105 B] Get:3
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar Release.gpg Ign:3
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar Release.gpg Get:4
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar/main arm64 Packages [18.2 kB] Get:5
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar/main armhf Packages [4498 B] Get:6
> file:/home/builder/k3-rti-wdt/isar-apt/iot2050-debian-arm64/apt/iot2050-deb
> ian isar/main amd64 Packages [5638 B] Hit:7 http://deb.debian.org/debian
> bullseye InRelease
> Get:8 http://deb.debian.org/debian-security bullseye-security InRelease
> [48.4 kB] Get:9 http://deb.debian.org/debian bullseye-updates InRelease
> [44.1 kB] Get:10 http://deb.debian.org/debian-security
> bullseye-security/main Sources [166 kB] Get:11
> http://deb.debian.org/debian-security bullseye-security/main armhf Packages
> [191 kB] Get:12 http://deb.debian.org/debian-security
> bullseye-security/main amd64 Packages [193 kB] Get:13
> http://deb.debian.org/debian-security bullseye-security/main arm64 Packages
> [191 kB] Get:14 http://deb.debian.org/debian bullseye-updates/main
> Sources.diff/Index [14.0 kB] Get:15 http://deb.debian.org/debian
> bullseye-updates/main armhf Packages.diff/Index [14.0 kB] Get:16
> http://deb.debian.org/debian bullseye-updates/main arm64
> Packages.diff/Index [14.0 kB] Get:17 http://deb.debian.org/debian
> bullseye-updates/main amd64 Packages.diff/Index [14.0 kB] Get:18
> http://deb.debian.org/debian bullseye-updates/main Sources
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [1848 B] Get:18
> http://deb.debian.org/debian bullseye-updates/main Sources
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [1848 B] Get:19
> http://deb.debian.org/debian bullseye-updates/main armhf Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9282 B] Get:19
> http://deb.debian.org/debian bullseye-updates/main armhf Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9282 B] Get:20
> http://deb.debian.org/debian bullseye-updates/main arm64 Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9315 B] Get:20
> http://deb.debian.org/debian bullseye-updates/main arm64 Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9315 B] Get:21
> http://deb.debian.org/debian bullseye-updates/main amd64 Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9785 B] Get:21
> http://deb.debian.org/debian bullseye-updates/main amd64 Packages
> T-2022-10-21-2017.32-F-2022-10-21-2017.32.pdiff [9785 B] Fetched 919 kB in
> 5s (169 kB/s)
> 
> Reading package lists...
> Reading package lists...
> Building dependency tree...
> Reading state information...
> Calculating upgrade...
> The following packages will be upgraded:
>  libc-bin libc-dev-bin libc-l10n libc6 libc6-dev linux-libc-dev locales
> debconf: delaying package configuration, since apt-utils is not installed
> 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
> 
> 
> Are we pulling newer packages from Debian here? This should not
> happen, obviously. What is done to prevent this?

Yes, sbuild by default updates all the sources before package building.

It has options like `--(no-)apt-update`, `--(no-)apt-upgrade` and `--(no-)apt-
distupgrade` and corresponding config options to tune the behaviour.

We most probably should use them, but, at the same time, still somehow update 
'isar-apt' part. For example, in `--chroot-setup-commands` stage

> 
> Jan



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Is schroot updating external apt databases?
  2022-10-24  8:07 ` Uladzimir Bely
@ 2022-10-24  8:18   ` Baurzhan Ismagulov
  0 siblings, 0 replies; 3+ messages in thread
From: Baurzhan Ismagulov @ 2022-10-24  8:18 UTC (permalink / raw)
  To: isar-users

On Mon, Oct 24, 2022 at 11:07:15AM +0300, Uladzimir Bely wrote:
> > Are we pulling newer packages from Debian here? This should not
> > happen, obviously. What is done to prevent this?
> 
> Yes, sbuild by default updates all the sources before package building.
> 
> It has options like `--(no-)apt-update`, `--(no-)apt-upgrade` and `--(no-)apt-
> distupgrade` and corresponding config options to tune the behaviour.
> 
> We most probably should use them, but, at the same time, still somehow update 
> 'isar-apt' part. For example, in `--chroot-setup-commands` stage

We needed this to pull locally built dependencies like libhello. Seems like a
regression, we'll check.

With kind regards,
Baurzhan

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-10-24  8:18 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-10-24  6:26 Is schroot updating external apt databases? Jan Kiszka
2022-10-24  8:07 ` Uladzimir Bely
2022-10-24  8:18   ` Baurzhan Ismagulov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox