Back to unattended-upgrades PTS page

Accepted unattended-upgrades 1.7 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 18 Oct 2018 00:58:48 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.7
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <mvo@debian.org>
Changed-By: Balint Reczey <rbalint@ubuntu.com>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 909543
Launchpad-Bugs-Fixed: 1649709 1778219 1795657 1795692 1795696 1796100
Changes:
 unattended-upgrades (1.7) unstable; urgency=medium
 .
   [ Nils Toedtmann ]
   * Clarify 'A reboot is required' warning, that the requirement might stem
     from a previous run
 .
   [ Balint Reczey ]
   * Build depend on and run pycodestyle, the replacement of pep8
   * autopkgtest: Clean up after failed debootstrap to retry cleanly
   * Handle when unattended-upgrades stopped without
     unattended-upgrade-shutdown sending SIGTERM (LP: #1795657)
   * Don't crash on missing dpkg log file (LP: #1795692)
   * do_auto_remove() is successful unless a commit() operation fails
     (LP: #1795696)
   * Check only dowloaded .deb files for conffile prompts (LP: #1796100)
   * Recommend systemd-sysv as the first alternative of cron.
     Unattended-upgrades is started via systemd timers or by the .service file
     on the default Debian and Ubuntu installations without cron's involvement.
     Systems without systemd-sysv can still install unattended-upgrades and run
     it via cron.
   * Only suggest python3-gi and skip check for metered connection when it is
     missing (Closes: #909543)
   * Only suggest powermgmt-base amd skip checking power status when it is not
     present
   * Show message about missing optional dependencies only once
   * Add configuration file option to enable verbose and debug logging.
     Thanks to Paul Wise
   * Revert to running unattended-upgrades.service in multi-user.target
   * Trigger unattended-upgrade-shutdown actions with PrepareForShutdown()
     Performing upgrades in service's ExecStop did not work when the upgrades
     involved restarting services because systemd blocked other stop/start
     actions making maintainer scripts time out and be killed leaving a broken
     system behind.
     Running unattended-upgrades.service before shutdown.target as a oneshot
     service made it run after unmounting filesystems and scheduling services
     properly on shutdown is a complex problem and adding more services to the
     mix make it even more fragile.
     The solution of monitoring PrepareForShutdown() signal from DBus
     allows Unattended Upgrade to run _before_ the jobs related to shutdown are
     queued thus package upgrades can safely restart services without
     risking causing deadlocks or breaking part of the shutdown actions.
     Also ask running unattended-upgrades to stop when shutdown starts even in
     InstallOnShutdown mode and refactor most of unattended-upgrade-shutdown to
     UnattendedUpgradesShutdown class. (LP: #1778219)
   * Handle reverting to WantedBy=multi-user.target when upgrading from 1.5 or
     1.6
   * debian/postinst: Redirect stdout from systemctl and deb-systemd-invoke to
     stderr and skip running systemctl start unattended-upgrades.service when
     unattended-upgrades is already running to avoid deadlock.
   * Increase logind's InhibitDelayMaxSec to 30s.
     This allows more time for unattended-upgrades to shut down gracefully
     or even install a few packages in InstallOnShutdown mode, but is still a
     big step back from the 30 minutes allowed for InstallOnShutdown previously.
     Users enabling InstallOnShutdown node are advised to increase
     InhibitDelayMaxSec even further, possibly to 30 minutes.
 .
   [ Brian Murray ]
   * unattended-upgrades: Do not automatically upgrade the development release
     of Ubuntu unless Unattended-Upgrade::DevRelease is true. (LP: #1649709)
 .
   [ Julian Andres Klode ]
   * Do not run on development releases until 21 days before release.
     This works for Ubuntu, and is only enabled there. Also explicitly
     log those messages to syslog, so a user can easily find them and
     then dig for more information in the u-u log.
Checksums-Sha1:
 1fec12ee2a1b57ee06f5e54dfadebf3c120a9904 1844 unattended-upgrades_1.7.dsc
 1474a9e35bfb478a2f4a0d24b99388b7501befbf 107236 unattended-upgrades_1.7.tar.xz
 a861dc9e9b0e406e073937486b0f704eb0e987e8 7785 unattended-upgrades_1.7_source.buildinfo
Checksums-Sha256:
 6be876fbf44f3068f4f842896b1db88cb1f9b316d19fe16be96c5daa10199f53 1844 unattended-upgrades_1.7.dsc
 c2caf69537d1e7651f9cb9b7540c9d137b6cf7cda58dda57099e3d86bb4577a3 107236 unattended-upgrades_1.7.tar.xz
 4191a0ab033907a3f50da604205b928c86ea582514bb3a5d603f5c94cc49c330 7785 unattended-upgrades_1.7_source.buildinfo
Files:
 a4d4da1e785edcd1041fb7a2e5f3c56a 1844 admin optional unattended-upgrades_1.7.dsc
 3bfa5737d2ac636d592f7073bb3edbc8 107236 admin optional unattended-upgrades_1.7.tar.xz
 a8b001984c5fc809a6bcbc26560590d2 7785 admin optional unattended-upgrades_1.7_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=FsNq
-----END PGP SIGNATURE-----