[arch-general] Pacman 4.0.0rc2
You don't need to be as daring this time- we've had some 246 commits since RC1. The most relevant changes is signing is about 95% functional at this point- see directions below the links. * pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-i686.pkg.tar.gz * pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-x86_64.pkg.tar.gz Please report any issues you may find with this package, as it is getting very close to being an actual releasable version. These are debug builds with symbols, so getting stack traces and helpful logging should be relatively straight forward if necessary. == How to enable package signature checking == 1. Install above pacman RC package. 2. sudo pacman-key --init 3. `SigLevel = Optional` in pacman.conf is the default- for more info, see man pacman.conf, but this means signatures will be checked *if available*, and there will be no error if they are not. However, due to us not having a web of trust for Arch developer keys, you will need to add this to the [options] section: SigLevel = Optional TrustAll 4. Run -Syu or any other operation that fetches packages from sync databases. When it comes time to check package integrity, you may be prompted to import keys that are not in your keychain. If a signature is available, it will be used instead of sha256sums/md5sums. -Dan
On Thu, Sep 22, 2011 at 8:27 PM, Dan McGee <dpmcgee@gmail.com> wrote:
You don't need to be as daring this time- we've had some 246 commits since RC1. The most relevant changes is signing is about 95% functional at this point- see directions below the links.
* pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-i686.pkg.tar.gz * pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-x86_64.pkg.tar.gz
Please report any issues you may find with this package, as it is getting very close to being an actual releasable version. These are debug builds with symbols, so getting stack traces and helpful logging should be relatively straight forward if necessary.
== How to enable package signature checking == 1. Install above pacman RC package. 2. sudo pacman-key --init 3. `SigLevel = Optional` in pacman.conf is the default- for more info, see man pacman.conf, but this means signatures will be checked *if available*, and there will be no error if they are not. However, due to us not having a web of trust for Arch developer keys, you will need to add this to the [options] section: SigLevel = Optional TrustAll 4. Run -Syu or any other operation that fetches packages from sync databases. When it comes time to check package integrity, you may be prompted to import keys that are not in your keychain. If a signature is available, it will be used instead of sha256sums/md5sums.
-Dan
Hi, all worked well following the above steps. Is there any working version of devtools with pacman 4? -- (\_ /) copy the bunny to your profile (0.o ) to help him achieve world domination. (> <) come join the dark side. /_|_\ (we have cookies.)
On Thu, Sep 22, 2011 at 8:27 PM, Dan McGee <dpmcgee@gmail.com> wrote:
You don't need to be as daring this time- we've had some 246 commits since RC1. The most relevant changes is signing is about 95% functional at this point- see directions below the links.
* pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-i686.pkg.tar.gz * pacman -U http://dev.archlinux.org/~dan/pacman-4.0.0rc2-1-x86_64.pkg.tar.gz
Please report any issues you may find with this package, as it is getting very close to being an actual releasable version. These are debug builds with symbols, so getting stack traces and helpful logging should be relatively straight forward if necessary.
== How to enable package signature checking == 1. Install above pacman RC package. 2. sudo pacman-key --init 3. `SigLevel = Optional` in pacman.conf is the default- for more info, see man pacman.conf, but this means signatures will be checked *if available*, and there will be no error if they are not. However, due to us not having a web of trust for Arch developer keys, you will need to add this to the [options] section: SigLevel = Optional TrustAll 4. Run -Syu or any other operation that fetches packages from sync databases. When it comes time to check package integrity, you may be prompted to import keys that are not in your keychain. If a signature is available, it will be used instead of sha256sums/md5sums.
-Dan
After a successful update this showed up. *** stack smashing detected ***: pacman terminated ======= Backtrace: ========= /lib/libc.so.6(__fortify_fail+0x45)[0xb7766a45] /lib/libc.so.6(+0xe89f7)[0xb77669f7] /usr/lib/libcurl.so.4(+0x4c6c1)[0xb766b6c1] /usr/lib/libcurl.so.4(+0x29125)[0xb7648125] /usr/lib/libcurl.so.4(curl_mvsnprintf+0x45)[0xb7648175] /usr/lib/libcurl.so.4(curl_msnprintf+0x33)[0xb7646d33] /usr/lib/libcurl.so.4(Curl_failf+0xd6)[0xb7635856] /usr/lib/libcurl.so.4(Curl_speedcheck+0x13d)[0xb7641fcd] /usr/lib/libcurl.so.4(Curl_pp_easy_statemach+0xef)[0xb7665ccf] /usr/lib/libcurl.so.4(+0x17138)[0xb7636138] /usr/lib/libcurl.so.4(+0x17259)[0xb7636259] /usr/lib/libcurl.so.4(Curl_disconnect+0xd7)[0xb763c767] /usr/lib/libcurl.so.4(+0x1d93c)[0xb763c93c] /usr/lib/libcurl.so.4(Curl_close+0x9f)[0xb763ec4f] /usr/lib/libcurl.so.4(curl_easy_cleanup+0x1f)[0xb764e06f] /usr/lib/libalpm.so.7(+0x17385)[0xb77fe385] /usr/lib/libalpm.so.7(alpm_release+0x6f)[0xb77ede0f] pacman[0x80508b9] pacman[0x804b9c3] /lib/libc.so.6(__libc_start_main+0xf3)[0xb7697223] pacman[0x804cfe9] ======= Memory map: ======== 08048000-08060000 r-xp 00000000 08:03 783770 /usr/bin/pacman 08060000-08061000 r--p 00017000 08:03 783770 /usr/bin/pacman 08061000-08062000 rw-p 00018000 08:03 783770 /usr/bin/pacman 09b50000-0bad2000 rw-p 00000000 00:00 0 [heap] b6835000-b6851000 r-xp 00000000 08:03 804205 /usr/lib/libgcc_s.so.1 b6851000-b6852000 rw-p 0001b000 08:03 804205 /usr/lib/libgcc_s.so.1 b6852000-b6865000 r-xp 00000000 08:03 915559 /lib/libresolv-2.14.so b6865000-b6866000 r--p 00012000 08:03 915559 /lib/libresolv-2.14.so b6866000-b6867000 rw-p 00013000 08:03 915559 /lib/libresolv-2.14.so b6867000-b6869000 rw-p 00000000 00:00 0 b688d000-b688e000 ---p 00000000 00:00 0 b688e000-b708e000 rw-p 00000000 00:00 0 b708e000-b728e000 r--p 00000000 08:03 842617 /usr/lib/locale/locale-archive b728e000-b7290000 rw-p 00000000 00:00 0 b7290000-b7293000 r-xp 00000000 08:03 914426 /lib/libgpg-error.so.0.8.0 b7293000-b7294000 rw-p 00002000 08:03 914426 /lib/libgpg-error.so.0.8.0 b7294000-b72a3000 r-xp 00000000 08:03 812164 /usr/lib/libassuan.so.0.2.0 b72a3000-b72a4000 rw-p 0000f000 08:03 812164 /usr/lib/libassuan.so.0.2.0 b72a4000-b72bb000 r-xp 00000000 08:03 915560 /lib/libpthread-2.14.so b72bb000-b72bc000 r--p 00016000 08:03 915560 /lib/libpthread-2.14.so b72bc000-b72bd000 rw-p 00017000 08:03 915560 /lib/libpthread-2.14.so b72bd000-b72bf000 rw-p 00000000 00:00 0 b72bf000-b72c2000 r-xp 00000000 08:03 918561 /lib/libdl-2.14.so b72c2000-b72c3000 r--p 00002000 08:03 918561 /lib/libdl-2.14.so b72c3000-b72c4000 rw-p 00003000 08:03 918561 /lib/libdl-2.14.so b72c4000-b72cb000 r-xp 00000000 08:03 919174 /lib/librt-2.14.so b72cb000-b72cc000 r--p 00006000 08:03 919174 /lib/librt-2.14.so b72cc000-b72cd000 rw-p 00007000 08:03 919174 /lib/librt-2.14.so b72cd000-b72ce000 rw-p 00000000 00:00 0 b72ce000-b72f4000 r-xp 00000000 08:03 816019 /usr/lib/libssh2.so.1.0.1 b72f4000-b72f5000 r--p 00026000 08:03 816019 /usr/lib/libssh2.so.1.0.1 b72f5000-b72f6000 rw-p 00027000 08:03 816019 /usr/lib/libssh2.so.1.0.1 b72f6000-b731e000 r-xp 00000000 08:03 918555 /lib/libm-2.14.so b731e000-b731f000 r--p 00027000 08:03 918555 /lib/libm-2.14.so b731f000-b7320000 rw-p 00028000 08:03 918555 /lib/libm-2.14.so b7320000-b74ae000 r-xp 00000000 08:03 802375 /usr/lib/libcrypto.so.1.0.0 b74ae000-b74bd000 r--p 0018d000 08:03 802375 /usr/lib/libcrypto.so.1.0.0 b74bd000-b74c3000 rw-p 0019c000 08:03 802375 /usr/lib/libcrypto.so.1.0.0 b74c3000-b74c6000 rw-p 00000000 00:00 0 b74c6000-b74dc000 r-xp 00000000 08:03 789245 /usr/lib/libz.so.1.2.5 b74dc000-b74dd000 r--p 00015000 08:03 789245 /usr/lib/libz.so.1.2.5 b74dd000-b74de000 rw-p 00016000 08:03 789245 /usr/lib/libz.so.1.2.5 b74de000-b74ed000 r-xp 00000000 08:03 919485 /lib/libbz2.so.1.0.6 b74ed000-b74ee000 rw-p 0000f000 08:03 919485 /lib/libbz2.so.1.0.6 b74ee000-b74ef000 rw-p 00000000 00:00 0 b74ef000-b7514000 r-xp 00000000 08:03 801303 /usr/lib/liblzma.so.5.0.3 b7514000-b7515000 rw-p 00024000 08:03 801303 /usr/lib/liblzma.so.5.0.3 b7515000-b753b000 r-xp 00000000 08:03 803695 /usr/lib/libexpat.so.1.5.2 b753b000-b753d000 rw-p 00026000 08:03 803695 /usr/lib/libexpat.so.1.5.2 b753d000-b7541000 r-xp 00000000 08:03 930593 /lib/libattr.so.1.1.0 b7541000-b7542000 rw-p 00003000 08:03 930593 /lib/libattr.so.1.1.0 b7542000-b7549000 r-xp 00000000 08:03 914787 /lib/libacl.so.1.1.0 b7549000-b754a000 rw-p 00006000 08:03 914787 /lib/libacl.so.1.1.0 b754a000-b7590000 r-xp 00000000 08:03 803727 /usr/lib/libarchive.so.2.8.5 b7590000-b7591000 r--p 00045000 08:03 803727 /usr/lib/libarchive.so.2.8.5 b7591000-b7592000 rw-p 00046000 08:03 803727 /usr/lib/libarchive.so.2.8.5 b7592000-b7593000 rw-p 00000000 00:00 0 b7593000-b75e5000 r-xp 00000000 08:03 783957 /usr/lib/libssl.so.1.0.0 b75e5000-b75e6000 ---p 00052000 08:03 783957 /usr/lib/libssl.so.1.0.0 b75e6000-b75e8000 r--p 00052000 08:03 783957 /usr/lib/libssl.so.1.0.0 b75e8000-b75eb000 rw-p 00054000 08:03 783957 /usr/lib/libssl.so.1.0.0 b75eb000-b75ec000 rw-p 00000000 00:00 0 b75ec000-b761e000 r-xp 00000000 08:03 803613 /usr/lib/libgpgme.so.11.8.0 b761e000-b761f000 rw-p 00031000 08:03 803613 /usr/lib/libgpgme.so.11.8.0 b761f000-b767c000 r-xp 00000000 08:03 845615 /usr/lib/libcurl.so.4.2.0 b767c000-b767d000 r--p 0005d000 08:03 845615 /usr/lib/libcurl.so.4.2.0 b767d000-b767e000 rw-p 0005e000 08:03 845615 /usr/lib/libcurl.so.4.2.0 b767e000-b77e0000 r-xp 00000000 08:03 918554 /lib/libc-2.14.so b77e0000-b77e1000 ---p 00162000 08:03 918554 /lib/libc-2.14.so b77e1000-b77e3000 r--p 00162000 08:03 918554 /lib/libc-2.14.so b77e3000-b77e4000 rw-p 00164000 08:03 918554 /lib/libc-2.14.so b77e4000-b77e7000 rw-p 00000000 00:00 0 b77e7000-b7816000 r-xp 00000000 08:03 784116 /usr/lib/libalpm.so.7.0.0 b7816000-b7817000 r--p 0002e000 08:03 784116 /usr/lib/libalpm.so.7.0.0 b7817000-b7818000 rw-p 0002f000 08:03 784116 /usr/lib/libalpm.so.7.0.0 b7824000-b7825000 rw-p 00000000 00:00 0 b7825000-b782a000 r-xp 00000000 08:03 918566 /lib/libnss_dns-2.14.so b782a000-b782b000 r--p 00004000 08:03 918566 /lib/libnss_dns-2.14.so b782b000-b782c000 rw-p 00005000 08:03 918566 /lib/libnss_dns-2.14.so b782c000-b7837000 r-xp 00000000 08:03 915557 /lib/libnss_files-2.14.so b7837000-b7838000 r--p 0000a000 08:03 915557 /lib/libnss_files-2.14.so b7838000-b7839000 rw-p 0000b000 08:03 915557 /lib/libnss_files-2.14.so b783a000-b783d000 rw-p 00000000 00:00 0 b783d000-b783e000 r-xp 00000000 00:00 0 [vdso] b783e000-b785d000 r-xp 00000000 08:03 918557 /lib/ld-2.14.so b785d000-b785e000 r--p 0001e000 08:03 918557 /lib/ld-2.14.so b785e000-b785f000 rw-p 0001f000 08:03 918557 /lib/ld-2.14.so bfa20000-bfa41000 rw-p 00000000 00:00 0 [stack] Is it something to worry about? -- (\_ /) copy the bunny to your profile (0.o ) to help him achieve world domination. (> <) come join the dark side. /_|_\ (we have cookies.)
[2011-10-07 14:36:31 +0300] Axilleas P:
*** stack smashing detected ***: pacman terminated
That does not look too good to me... Could you copy-paste that into a bug report: https://bugs.archlinux.org/?project=3 (Not all pacman devs read arch-general.) -- Gaetan
On Fri, Oct 7, 2011 at 4:15 PM, Gaetan Bisson <bisson@archlinux.org> wrote:
[2011-10-07 14:36:31 +0300] Axilleas P:
*** stack smashing detected ***: pacman terminated
That does not look too good to me...
Could you copy-paste that into a bug report: https://bugs.archlinux.org/?project=3
(Not all pacman devs read arch-general.)
-- Gaetan
Will do, thanks -- (\_ /) copy the bunny to your profile (0.o ) to help him achieve world domination. (> <) come join the dark side. /_|_\ (we have cookies.)
participants (3)
-
Axilleas P
-
Dan McGee
-
Gaetan Bisson