Accepted unattended-upgrades 1.12 (source) into experimental
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 18 Apr 2019 16:38:31 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.12
Distribution: experimental
Urgency: medium
Maintainer: Michael Vogt <mvo@debian.org>
Changed-By: Balint Reczey <rbalint@ubuntu.com>
Description:
unattended-upgrades - automatic installation of security upgrades
Closes: 905289 924554 925488
Launchpad-Bugs-Fixed: 1820888 1821101 1821103 1821376 1823376 1823872 1824341 1824804 1824876 1824949
Changes:
unattended-upgrades (1.12) experimental; urgency=medium
.
[ Brannon Dorsey ]
* Remove double "format" in 50unattended-upgrades configuration files
.
[ Daniel Herzig ]
* man: improve unattended-upgrade.8 man-page (Closes: #905289)
.
[ Jonatan Nyberg ]
* Swedish debconf strings update (Closes: #925488)
.
[ Balint Reczey ]
* Compare apt.package.Version objects and not the versions' string
representation. This prevented adjusting candidates when the strings sorted
differently (LP: #1820888)
* Enable test_clean and test_patch_days tests
* Fall back to adjusting more packages' candidates when a package from an
allowed origin can't be marked to install/upgrade. (LP: #1821101)
* Skip sending email when no package had to be installed, upgraded or removed
(LP: #1821103) (Closes: #924554)
* Add a few debug logging points
* Report packages kept back by origin (LP: #1821376)
* Fix trailing newlines in wrapped email lines
* Describe candidate adjustment fallback better in the debug message
* Fix missing space. Thanks to Alban VIDAL
* Update POT file
* Test upgrades to -updates and to -proposed in upgrade-all-security
autopkgtest. Also enable -updates, too, while testing in Debian.
* Add ${distro_id}ESM:${distro_codename}-security to allowed origins
(LP: #1823376)
* Detect changes to moved conffiles (LP: #1823872)
* Add tests for checking conffile moves.
Build depend on and use equivs to generate new test packages
* Make sure autoremovals don't start with a dirty cache and remove other
packages (LP: #1824341)
* Stop raising NoAllowedOriginError when marking packages to upgrade/install
fails (LP: #1824876)
* Continue applying minimal sets when one set can't be marked for upgrade.
Thanks to Anderson Luiz Alves for the patch, it needed minor modifications
(LP: #1824341)
* Skip trying to upgrade held packages in call_adjusted() (LP: #1824804)
* Adjust only transitive dependencies in the fallback when a package from an
allowed origin can't be marked to install/upgrade.
This is a much lighter approach than marking every upgradable package
because the full fallback was triggered on packages held back as well,
using an excessive amount of CPU time. (LP: #1824804, #1824949)
* Follow all kinds of transitive dependencies when adjusting dependencies
* Split() conffile data to set of names only once
* Don't parse dpkg conffile db when there are no conffiles in the package
* Detect unchanged moved conffiles.
When a package moves a conffile properly without any change no conffile
prompt needs to be shown thus the package can be upgraded unattended even
when the conffile is changed locally. (LP: #1823872)
Checksums-Sha1:
295f214df91720dc14f3b0112ab51c58bab9a06f 1877 unattended-upgrades_1.12.dsc
4650b06cfd029a04a7f0bd60c6b5e52b13ae484e 116056 unattended-upgrades_1.12.tar.xz
b56107b289d54b8a68accbd91c7f2bbdcce4d0fc 7993 unattended-upgrades_1.12_source.buildinfo
Checksums-Sha256:
e0ccecb483994ce78547f73a9f32b99401f16971a4e58a56d2766d6ef3ee4d22 1877 unattended-upgrades_1.12.dsc
6039070a66019b0b9be0996649180c28a4990e22f5c8bc0beeb6ecef3d67ed27 116056 unattended-upgrades_1.12.tar.xz
7780b10df501abf3833b57f9d1704e65c417ef19ae6ebbad3187e285eec4a4fa 7993 unattended-upgrades_1.12_source.buildinfo
Files:
077983ecea9a4e2721419fd60eca8af6 1877 admin optional unattended-upgrades_1.12.dsc
b7f711330500858dddb26f4486b1205d 116056 admin optional unattended-upgrades_1.12.tar.xz
b2bb267a52b3af42fe33785e41c51491 7993 admin optional unattended-upgrades_1.12_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEI/PvTgXX55rLQUfDg6KBkWslS0UFAly4qqkACgkQg6KBkWsl
S0VzzBAAj5guSYzla3SCxXxOLDwK2yevJIJD3d+0NM7Me5KtZeEyAtnsd1oS7ENv
3uWfR5HtmkI+XIshQeHUd1Uf3lIfgX9I4cLnni15+Kz4AeC7Mc05DuGF4DjLNqy8
Tj3gidbZ6gE3/wC92KVQcKM+b7BC5Na8xBqo/y+kMh0e4c727MwwG+Jq6BDHo827
B/PByB2y1IgUL7ma42Q43Lcjk6XBRg5VbMhVm5k9iKD3mSMscSHgG6qLEltU53gI
/WPbPYvwijbfZn9uircEcnXgF76yYdGjg+W0F48BOLVxOc4P5eom8JLLTTexfKfE
OPR/6nvV5QUTfG0e7hsExLdtKDnhEskP6NbUhWDJvs/aCK/QBhkRip1tGje2QPOy
FmCaE8LpDPOeJw2oWaf1GFYTkwc6HD1TrD8rHdjA4uo6spWTuIb4gRLzcUrZOm1y
U++S5wKlH43dHorIE1pjrmtNQ/sRTY8v4FSgqo1MLPLjK3FSVPqrWwkS8eaekSuL
GladSfbF4+Mi1UV4IV4V8qILVO+c0iqkJFY1nffBkUZktrK/qzfF3uqPAhoLp9a1
QDW2idtsj5ukwV5srATp5KjLeLRf9ZnrVK79uDkvPeDJno2ABe070plgO3nFjIcD
i7L9ZRLS5JTJFoEC97IQW0apCbIeM6Zpo6Eh3Drv9jQ696eCZ90=
=n5aU
-----END PGP SIGNATURE-----