Back to unattended-upgrades PTS page

Accepted unattended-upgrades 1.4 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 05 Jul 2018 23:36:00 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.4
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <mvo@debian.org>
Changed-By: Balint Reczey <rbalint@ubuntu.com>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 855570 892028 898607 899366
Launchpad-Bugs-Fixed: 1396787 1778800 1779157
Changes:
 unattended-upgrades (1.4) unstable; urgency=medium
 .
   * Skip starting init.d script in debhelper-generated postinst part
     (LP: #1778800)
   * Use "deb-systemd-invoke start" instead of "systemctl start" in postinst.
     It is used only in a workaround applied for a Debian bug and for upgrading
     from pre-bionic versions.
   * Clear cache when autoremoval is invalid for a package set marked for
     removal (LP: #1779157)
   * Clear cache after failed commits to return from a possibly invalid state
   * Unlock for dpkg operations with apt_pkg.pkgsystem_unlock_inner() when it
     is available, also stop running when reacquiring the lock fails.
     Thanks to to Julian Andres Klode for original partial patch
   * Use fully qualified domain name in email subject.
   * Send email about all failures and crashes (Closes: #898607)
   * Add short textual summary of the results in the summary email
   * Recommend overriding configuration in a separate file.
     This can be better than changing /etc/apt/apt.conf.d/50unattended-upgrades
     because package updates don't conflict with local changes this way.
   * Adjust candidates only for packages to be possibly installed
     (Closes: #892028, #899366) (LP: #1396787)
   * Add Unattended-Upgrade::OnlyOnACPower config file example for all
     distributions
   * debian/control: Drop redundant Testsuite: autopkgtest field to keep Lintian
     happy
   * Bump Standards-Version to 4.1.4
   * Add debian/tests/upgrade-all-security to install all current security
     updates. On development releases this tests latest stable, on stable
     releases it tests the release itself.
   * Skip updates on metered connections (Closes: #855570)
   * Quote shell variables in autopkgtest
   * Stop u-u early when it should stop later anyway
   * Measure time for --dry-run and after all updates are installed in
     autopkgtests
   * Filter out packages cheaper when they are not from allowed origins
   * Collect autoremovable packages, too, when looking for upgradable ones
Checksums-Sha1:
 fdba3bc92a9d74b0c8f8cc9096708ed35e374f88 1862 unattended-upgrades_1.4.dsc
 c41945498d65434aef217c9e6d7c4b0be66b89a3 102196 unattended-upgrades_1.4.tar.xz
 3960ae2da02c8011da0b6a6f16fb3e0f4ee349aa 7613 unattended-upgrades_1.4_source.buildinfo
Checksums-Sha256:
 215c60033a76fd6cf9e323d6718e13cbab944f5f0030130bffd20709ad373acd 1862 unattended-upgrades_1.4.dsc
 c0db0c4403a7677a39c4e5405a146f9faa875e43fa09b03513eb29c1d99fa955 102196 unattended-upgrades_1.4.tar.xz
 986e349a3af22b1dd75aeaf7c6e7b578c95342943789cf7d2b3c2f5be6a14d24 7613 unattended-upgrades_1.4_source.buildinfo
Files:
 2be36e724078e6d939d62a9ab01d18b5 1862 admin optional unattended-upgrades_1.4.dsc
 7f228544cc76cd7cf8ef533a3860e26e 102196 admin optional unattended-upgrades_1.4.tar.xz
 3a469be08fa021d61e461a0e3baf0cdc 7613 admin optional unattended-upgrades_1.4_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJHBAEBCgAxFiEEOXpIEO6xMwaMLot69mTSVrRpGn0FAls/UA4THHJiYWxpbnRA
dWJ1bnR1LmNvbQAKCRD2ZNJWtGkaffb0EACzMOmJNWcOUD+lNu7BwXUZKyf5v9W8
rhTPU1npXpSGcYHaKTBNOPQXISTMOYcMZvEPg6dUsYBPGJYQtxQfGq3kKyrguz7O
pXzB5pcJ62fKrxKOq1Qvo6dGJ5wHzT3rtQmGdC+D8fife6hvLTC49Mu1wQwrEWrU
9UDYAEdQqXIMVUwMe/cpNZNK0rQttHXm3WshXzIxx6qDyIw4gBgSTTvqj4SY2jvG
j9xeJSF1yOPLqSUEQ/ESnF4WGtCwmRvXcOCM76ckoSrLswqS+poSQG93QBHwunvM
7Aor3eUEbycvvcjUwWLmVsoaL8QdjrIBRFxZGwQPLH5FCKDZJFzMo+5QtB1/JQhp
uGJ1fqdOZUX16w86JrBnQiC0qLAwwlGNbMoqw2I867/8uFkk/7FL2RTqRmy8Upvf
IQrAhBmCIcIOlaGQ5TR2A9qqI0VlHrrAnBohun3/s2x8DfwhzzpXZk50xol3s6R0
/jRWtDgq/IIwxwZMu5rUCST4ia92k9FPEYDY1azh2tlHoiKYSsVfn+qiaF8Rvmc+
xC9Zjij480ES/bODvcIzzJ02IabYwaFK64/XsvFGAWjonvtY51NBasAJnqxcom+c
Vit2AmZK9nI5a/PIEQUQNb0h6JP5fp6+u+tQ1F5BU4NthdfNfxWfSFfVlFV25RM1
L5cjwkn1eMpRTQ==
=hPEV
-----END PGP SIGNATURE-----