]> git.saurik.com Git - apt.git/blobdiff - doc/apt-get.8.xml
deprecate 'apt-key update' and no-op it in Debian
[apt.git] / doc / apt-get.8.xml
index 60fa46f976b8be673eb1571d9316ff04c5e24ae2..e1cdbc3cfb21f04c4a46217bba468a19ed7f0105 100644 (file)
@@ -14,7 +14,7 @@
    &apt-email;
    &apt-product;
    <!-- The last update date -->
-   <date>2015-08-14T00:00:00Z</date>
+   <date>2016-03-18T00:00:00Z</date>
  </refentryinfo>
  
  <refmeta>
              working with APT to get information as well as filenames for
              downloaded files so they can use them as well instead of
              downloading them again on their own. Detailed documentation is
-             omitted here and can instead be found in the source tree in
-             <literal><filename>doc/acquire-additional-files.txt</filename></literal>.
+             omitted here and can instead be found in the file
+             &apt-acquire-additional-files; shipped by the <package>apt-doc</package> package.
           </para>
        </listitem>
      </varlistentry>
      Configuration Item: <literal>APT::Get::Assume-No</literal>.</para></listitem>
      </varlistentry>
 
-     <varlistentry><term><option>-u</option></term><term><option>--show-upgraded</option></term>
-     <listitem><para>Show upgraded packages; print out a list of all packages that are to be
-     upgraded. 
+     <varlistentry><term><option>--no-show-upgraded</option></term>
+     <listitem><para>Do not show a list of all packages that are to be upgraded.
      Configuration Item: <literal>APT::Get::Show-Upgraded</literal>.</para></listitem>
      </varlistentry>
 
 
      <varlistentry><term><option>--no-allow-insecure-repositories</option></term>
      <listitem><para>Forbid the update command to acquire unverifiable
-     data from configured sources. Apt will fail at the update command
-     for repositories without valid cryptographically signatures.
+     data from configured sources. APT will fail at the update command
+     for repositories without valid cryptographically signatures. See
+     also &apt-secure; for details on the concept and the implications.
 
      Configuration Item: <literal>Acquire::AllowInsecureRepositories</literal>.</para></listitem>
      </varlistentry>