X-Git-Url: https://git.saurik.com/apt.git/blobdiff_plain/5ff8dd6bd1c30c29a7398e339d3bdeaffe2f4489..8b21456acba3cbbc28f35eba684d8f21b0c290b4:/doc/apt.conf.5.xml
diff --git a/doc/apt.conf.5.xml b/doc/apt.conf.5.xml
index 6aa0c9629..a248b2cfd 100644
--- a/doc/apt.conf.5.xml
+++ b/doc/apt.conf.5.xml
@@ -19,7 +19,7 @@
&apt-email;
&apt-product;
- 2016-05-27T00:00:00Z
+ 2016-07-07T00:00:00Z
@@ -444,15 +444,20 @@ APT::Compressor::rev {
only if the client uses a known identifier.
Acquire::http::Proxy-Auto-Detect can be used to
- specify an external command to discover the http proxy to use. Apt expects
- the command to output the proxy on stdout in the style
- http://proxy:port/. This will override the
- generic Acquire::http::Proxy but not any specific
- host proxy configuration set via
- Acquire::http::Proxy::$HOST.
+ specify an external command to discover the http proxy to use. The first
+ and only parameter is an URI denoting the host to be contacted to allow
+ for host-specific configuration. APT expects the command to output the
+ proxy on stdout as a single line in the style http://proxy:port/
+ or the word DIRECT if no proxy should be used. No output
+ indicates that the generic proxy settings should be used.
+
+ Note that auto-detection will not be used for a host if a host-specific proxy
+ configuration is already set via Acquire::http::Proxy::HOST.
See the &squid-deb-proxy-client; package for an example implementation that
- uses avahi. This option takes precedence over the legacy option name
+ uses avahi.
+
+ This option takes precedence over the legacy option name
ProxyAutoDetect.
@@ -645,27 +650,32 @@ APT::Compressor::rev {
- Allow the update operation to load data files from
- a repository without a trusted signature. If enabled this
- option no data files will be loaded and the update
- operation fails with a error for this source. The default
- is false for backward compatibility. This will be changed
- in the future.
+ Allow update operations to load data files from
+ repositories without sufficient security information.
+ The default value is "false".
+ Concept, implications as well as alternatives are detailed in &apt-secure;.
+
+
+
+
+
+ Allow update operations to load data files from
+ repositories which provide security information, but these
+ are deemed no longer cryptographically strong enough.
+ The default value is "false".
+ Concept, implications as well as alternatives are detailed in &apt-secure;.
- Allow that a repository that was previously gpg signed to become
- unsigned durign a update operation. When there is no valid signature
- of a previously trusted repository apt will refuse the update. This
- option can be used to override this protection. You almost certainly
- never want to enable this. The default is false.
-
- Note that apt will still consider packages from this source
- untrusted and warn about them if you try to install
- them.
-
+ Allow that a repository that was previously gpg signed to become
+ unsigned during an update operation. When there is no valid signature
+ for a previously trusted repository apt will refuse the update. This
+ option can be used to override this protection. You almost certainly
+ never want to enable this. The default is false.
+ Concept, implications as well as alternatives are detailed in &apt-secure;.
+
scope