Accepted unattended-upgrades 1.7 (source) into unstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 18 Oct 2018 00:58:48 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.7
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <mvo@debian.org>
Changed-By: Balint Reczey <rbalint@ubuntu.com>
Description:
unattended-upgrades - automatic installation of security upgrades
Closes: 909543
Launchpad-Bugs-Fixed: 1649709 1778219 1795657 1795692 1795696 1796100
Changes:
unattended-upgrades (1.7) unstable; urgency=medium
.
[ Nils Toedtmann ]
* Clarify 'A reboot is required' warning, that the requirement might stem
from a previous run
.
[ Balint Reczey ]
* Build depend on and run pycodestyle, the replacement of pep8
* autopkgtest: Clean up after failed debootstrap to retry cleanly
* Handle when unattended-upgrades stopped without
unattended-upgrade-shutdown sending SIGTERM (LP: #1795657)
* Don't crash on missing dpkg log file (LP: #1795692)
* do_auto_remove() is successful unless a commit() operation fails
(LP: #1795696)
* Check only dowloaded .deb files for conffile prompts (LP: #1796100)
* Recommend systemd-sysv as the first alternative of cron.
Unattended-upgrades is started via systemd timers or by the .service file
on the default Debian and Ubuntu installations without cron's involvement.
Systems without systemd-sysv can still install unattended-upgrades and run
it via cron.
* Only suggest python3-gi and skip check for metered connection when it is
missing (Closes: #909543)
* Only suggest powermgmt-base amd skip checking power status when it is not
present
* Show message about missing optional dependencies only once
* Add configuration file option to enable verbose and debug logging.
Thanks to Paul Wise
* Revert to running unattended-upgrades.service in multi-user.target
* Trigger unattended-upgrade-shutdown actions with PrepareForShutdown()
Performing upgrades in service's ExecStop did not work when the upgrades
involved restarting services because systemd blocked other stop/start
actions making maintainer scripts time out and be killed leaving a broken
system behind.
Running unattended-upgrades.service before shutdown.target as a oneshot
service made it run after unmounting filesystems and scheduling services
properly on shutdown is a complex problem and adding more services to the
mix make it even more fragile.
The solution of monitoring PrepareForShutdown() signal from DBus
allows Unattended Upgrade to run _before_ the jobs related to shutdown are
queued thus package upgrades can safely restart services without
risking causing deadlocks or breaking part of the shutdown actions.
Also ask running unattended-upgrades to stop when shutdown starts even in
InstallOnShutdown mode and refactor most of unattended-upgrade-shutdown to
UnattendedUpgradesShutdown class. (LP: #1778219)
* Handle reverting to WantedBy=multi-user.target when upgrading from 1.5 or
1.6
* debian/postinst: Redirect stdout from systemctl and deb-systemd-invoke to
stderr and skip running systemctl start unattended-upgrades.service when
unattended-upgrades is already running to avoid deadlock.
* Increase logind's InhibitDelayMaxSec to 30s.
This allows more time for unattended-upgrades to shut down gracefully
or even install a few packages in InstallOnShutdown mode, but is still a
big step back from the 30 minutes allowed for InstallOnShutdown previously.
Users enabling InstallOnShutdown node are advised to increase
InhibitDelayMaxSec even further, possibly to 30 minutes.
.
[ Brian Murray ]
* unattended-upgrades: Do not automatically upgrade the development release
of Ubuntu unless Unattended-Upgrade::DevRelease is true. (LP: #1649709)
.
[ Julian Andres Klode ]
* Do not run on development releases until 21 days before release.
This works for Ubuntu, and is only enabled there. Also explicitly
log those messages to syslog, so a user can easily find them and
then dig for more information in the u-u log.
Checksums-Sha1:
1fec12ee2a1b57ee06f5e54dfadebf3c120a9904 1844 unattended-upgrades_1.7.dsc
1474a9e35bfb478a2f4a0d24b99388b7501befbf 107236 unattended-upgrades_1.7.tar.xz
a861dc9e9b0e406e073937486b0f704eb0e987e8 7785 unattended-upgrades_1.7_source.buildinfo
Checksums-Sha256:
6be876fbf44f3068f4f842896b1db88cb1f9b316d19fe16be96c5daa10199f53 1844 unattended-upgrades_1.7.dsc
c2caf69537d1e7651f9cb9b7540c9d137b6cf7cda58dda57099e3d86bb4577a3 107236 unattended-upgrades_1.7.tar.xz
4191a0ab033907a3f50da604205b928c86ea582514bb3a5d603f5c94cc49c330 7785 unattended-upgrades_1.7_source.buildinfo
Files:
a4d4da1e785edcd1041fb7a2e5f3c56a 1844 admin optional unattended-upgrades_1.7.dsc
3bfa5737d2ac636d592f7073bb3edbc8 107236 admin optional unattended-upgrades_1.7.tar.xz
a8b001984c5fc809a6bcbc26560590d2 7785 admin optional unattended-upgrades_1.7_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=FsNq
-----END PGP SIGNATURE-----