]> git.saurik.com Git - apt.git/commitdiff
Document Acquire{MaxReleaseFileSize,AllowInsecureRepositories,AllowDowngradeToInsecur...
authorMichael Vogt <mvo@ubuntu.com>
Mon, 13 Oct 2014 07:39:25 +0000 (09:39 +0200)
committerMichael Vogt <mvo@ubuntu.com>
Mon, 13 Oct 2014 09:29:46 +0000 (11:29 +0200)
Document the new options to restrict loading unauthenticated data
into our parsers.

doc/apt-get.8.xml
doc/apt.conf.5.xml

index 80b3be639389483a3a472023283b76590b17e900..a372a0d30fe8bb6eb1c9f87d76bb2a3d740d9bb7 100644 (file)
      Configuration Item: <literal>APT::Get::AllowUnauthenticated</literal>.</para></listitem>
      </varlistentry>
 
+     <varlistentry><term><option>--no-allow-insecure-repositories</option></term>
+     <listitem><para>Forbid the update command to acquire unverifiable
+     data from configured sources. Apt will fail at the update command
+     for repositories without valid cryptographically signatures.
+
+     Configuration Item: <literal>Acquire::AllowInsecureRepositories</literal>.</para></listitem>
+     </varlistentry>
+
      <varlistentry><term><option>--show-progress</option></term>
      <listitem><para>Show user friendly progress information in the
      terminal window when packages are installed, upgraded or
index 0f98a6fe935b1b3250250705aa254d9ab38e2ab2..efe986ea8c33a8e8ec2a2f7c7ff51d25abd8597e 100644 (file)
@@ -586,6 +586,38 @@ DPkg::Pre-Install-Pkgs {"/usr/sbin/dpkg-preconfigure --apt";};
         </para></listitem>
      </varlistentry>
 
+     <varlistentry><term><option>MaxReleaseFileSize</option></term>
+        <listitem><para>
+           The maximum file size of Release/Release.gpg/InRelease files.
+           The default is 10MB.
+        </para></listitem>
+     </varlistentry>
+
+     <varlistentry><term><option>AllowInsecureRepositories</option></term>
+        <listitem><para>
+           Allow the update operation to load data files from
+           a repository without a trusted signature. If enabled this
+           option no data files will be loaded and the update
+           operation fails with a error for this source. The default
+           is false for backward compatibility. This will be changed
+           in the future.
+        </para></listitem>
+     </varlistentry>
+
+     <varlistentry><term><option>AllowDowngradeToInsecureRepositories</option></term>
+        <listitem><para>
+           Allow that a repository that was previously gpg signed to become
+           unsigned durign a update operation. When there is no valid signature
+           of a perviously trusted repository apt will refuse the update. This
+           option can be used to override this protection. You almost certainly
+           never want to enable this. The default is false.
+
+           Note that apt will still consider packages from this source
+           untrusted and warn about them if you try to install
+           them.
+         </para></listitem>
+     </varlistentry>
+
    </variablelist>
  </refsect1>