Devuan bug report logs - #78
unattended-upgrades: Default config for Origins-Pattern is for Debian, does not match Devuan repos/packages

Package: unattended-upgrades; Reported by: bobemoe/gup <[email protected]>; Done: Mark Hindley <[email protected]>; Maintainer for unattended-upgrades is Devuan Developers <[email protected]>.

Message received at [email protected]:


Received: (at 78-done) by bugs.devuan.org; 16 Feb 2023 07:28:36 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Thu, 16 Feb 2023 07:28:36 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id gDB7IuHa7WOxQAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Thu, 16 Feb 2023 07:27:29 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 84008A0; Thu, 16 Feb 2023 07:27:29 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 6285F25
	for <[email protected]>; Thu, 16 Feb 2023 07:27:24 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pSYfq-0003N6-IK; Thu, 16 Feb 2023 07:27:22 +0000
Received: (nullmailer pid 5799 invoked by uid 1000);
	Thu, 16 Feb 2023 07:27:22 -0000
Date: Thu, 16 Feb 2023 07:27:22 +0000
From: Mark Hindley <[email protected]>
To: Dennis Camera <[email protected]>
Cc: [email protected]
Subject: Re: unattended-upgraded: reappears on beowulf+
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>

Version: 2.9.1+nmu3

On Mon, Jul 19, 2021 at 10:51:24AM +0200, Dennis Camera wrote:
> This bug reoccurs on beowulf (1.11.2) and chimaera (2.8).
> 
> I believe that the unattended-upgrades package needs to be built separately for Devuan to include the 50unattended-upgrades.Devuan.

We now have support for directly rebuilding Debian sources and this is resolved
in Ceres.

Note that rebuilding means the version number does not change.

Closing.

Thanks

Mark

Notification sent to bobemoe/gup <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Mark Hindley <[email protected]>:
You have taken responsibility. Full text available.
Marked as found in versions 1.11.2 and reopened. Request was from Dennis Camera <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 78-done) by bugs.devuan.org; 17 Dec 2017 21:30:05 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Sun, 17 Dec 2017 22:30:05 +0100 (CET)
Received: from yggdrasil.evilham.com (yggdrasil.evilham.com [46.19.33.155])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id E167AF60948
	for <[email protected]>; Sun, 17 Dec 2017 22:22:52 +0100 (CET)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (1024-bit key; secure) header.d=evilham.com [email protected] header.b="girMakGA";
	dkim-atps=neutral
Received: from [10.8.8.244] (unknown [62.112.10.133])
	by yggdrasil.evilham.com (Postfix) with ESMTPSA id 45E4360D0F
	for <[email protected]>; Sun, 17 Dec 2017 22:22:33 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=evilham.com; s=mail;
	t=1513545753; bh=NEq9sn1sqZSF6oXE4vFLdHH8lSGZFCb5Dn0hxqM+XoI=;
	h=To:From:Subject:Date:From;
	b=girMakGADGCuAWHle0iKnLu9DHoVHk5aoRWkI4M765v3E1yVM9iBXwMwFhoEgdHQ9
	 CariIV93qJPvToS4V9zjF27mm1BOmMGEmRk+b2L3zLE8o+/ZL72uGs+y8whUbuupFi
	 SgZavnfT+62jEMj3ipMda+VurHgB2085TK+Ktc2o=
To: [email protected]
From: Evilham <[email protected]>
Subject: Fixed in newer version
Message-ID: <[email protected]>
Date: Sun, 17 Dec 2017 22:22:35 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Language: es-ES
Content-Transfer-Encoding: 8bit
X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

A new version of unattended-upgrades fixes this issue in both jessie and
ascii.
A patch has been sent upstream for beowulf+ support.
-- 
Evilham


Notification sent to bobemoe/gup <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Evilham <[email protected]>:
You have taken responsibility. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 19 May 2017 17:20:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from mail.dyne.org [178.62.188.7]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Fri, 19 May 2017 19:20:02 +0200 (CEST)
Received: from jh3.jhodges.co.uk (jh3.jhodges.co.uk [134.213.166.61])
	by tupac2.dyne.org (Postfix) with ESMTP id 9E0AD18DCC3
	for <[email protected]>; Fri, 19 May 2017 17:13:33 +0000 (UTC)
Received: from [192.168.1.219] (host81-157-121-46.range81-157.btcentralplus.com [81.157.121.46])
	by jh3.jhodges.co.uk (Postfix) with ESMTPSA id 7BCD721DDC
	for <[email protected]>; Fri, 19 May 2017 18:13:31 +0100 (BST)
To: Devuan Bug Tracking System <[email protected]>
From: bobemoe/gup <[email protected]>
Subject: unattended-upgrades: Default config for Origins-Pattern is for
 Debian, does not match Devuan repos/packages
Message-ID: <[email protected]>
Date: Fri, 19 May 2017 18:13:34 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101
 Icedove/45.6.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, score=-0.0 required=5.0 tests=RP_MATCHES_RCVD,SPF_PASS
	autolearn=disabled version=3.4.0
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on tupac2

Package: unattended-upgrades
Version: 0.83.3.2+deb8u1
Severity: important

I think the expected behaviour for unattended-upgrades with default
configuration is to only install security updates, however no updates are
installed at all.

The only uncommented line in /etc/apt/apt.conf.d/50unattended-upgrades is:
"origin=Debian,codename=${distro_codename},label=Debian-Security";
which looks like it should match the security repo, but for Devuan it 
does not.
I have added this line:
"a=stable-security,label=Devuan";
Which now correctly matches updates from the security repo.

This means manual intervention is required to configure the package to 
achieve
what is expected default behaviour, someone installing this package assuming
that it will apply security updates may get a nasty surprise!

I'm not sure the best way to fix this, adding the line as I have done 
feels a
bit like a workaround, as a comment in the config file says it reads 
variables
from /etc/debian_version, but this is not present on Devuan. We probably 
need
to patch something to read the /etc/devuan_version file. However, this 
alone
I don't think will solve the issue as it looks like origin, codename and 
label
differ between Debian and Devuan repos, so all the other example 
patterns in the
file may also need tweaking one way or another.

If I get a chance I will take a deeper look but it may be a while.

-- System Information:
Distributor ID:    Devuan
Description:    Devuan GNU/Linux 1.0 (jessie)
Release:    1.0
Codename:    jessie
Architecture: x86_64

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages unattended-upgrades depends on:
ii  apt                    1.0.9.8.4
ii  apt-utils              1.0.9.8.4
ii  debconf [debconf-2.0]  1.5.56
ii  init-system-helpers    1.24+devuan1.0
ii  lsb-base               4.1+devuan2
ii  lsb-release            4.1+devuan2
ii  python3                3.4.2-2
ii  python3-apt            0.9.3.12
ii  ucf                    3.0030
ii  xz-utils               5.1.1alpha+20120614-2+b3

unattended-upgrades recommends no packages.

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx                                  8.1.2-0.20141216cvs-2
ii  exim4-daemon-light [mail-transport-agent]  4.84.2-2+deb8u3

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Unattended-Upgrade::Origins-Pattern controls which packages are
// upgraded.
//
// Lines below have the format format is "keyword=value,...".  A
// package will be upgraded only if the values in its metadata match
// all the supplied keywords in a line.  (In other words, omitted
// keywords are wild cards.) The keywords originate from the Release
// file, but several aliases are accepted.  The accepted keywords are:
//   a,archive,suite (eg, "stable")
//   c,component     (eg, "main", "crontrib", "non-free")
//   l,label         (eg, "Debian", "Debian-Security")
//   o,origin        (eg, "Debian", "Unofficial Multimedia Packages")
//   n,codename      (eg, "jessie", "jessie-updates")
//     site          (eg, "http.debian.net")
// The available values on the system are printed by the command
// "apt-cache policy", and can be debugged by running
// "unattended-upgrades -d" and looking at the log file.
//
// Within lines unattended-upgrades allows 2 macros whose values are
// derived from /etc/debian_version:
//   ${distro_id}            Installed origin.
//   ${distro_codename}      Installed codename (eg, "jessie")
Unattended-Upgrade::Origins-Pattern {
         // Codename based matching:
         // This will follow the migration of a release through different
         // archives (e.g. from testing to stable and later oldstable).
//      "o=Debian,n=jessie";
//      "o=Debian,n=jessie-updates";
//      "o=Debian,n=jessie-proposed-updates";
//      "o=Debian,n=jessie,l=Debian-Security";
         // Archive or Suite based matching:
         // Note that this will silently match a different release after
         // migration to the specified archive (e.g. testing becomes the
         // new stable).
//      "o=Debian,a=stable";
//      "o=Debian,a=stable-updates";
//      "o=Debian,a=proposed-updates";
"origin=Debian,codename=${distro_codename},label=Debian-Security";
         "a=stable-security,label=Devuan";
};
// List of packages to not update (regexp are supported)
Unattended-Upgrade::Package-Blacklist {
//    "vim";
//    "libc6";
//    "libc6-dev";
//    "libc6-i686";
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run
//   dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps "true";
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown "true";
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. "[email protected]"
//Unattended-Upgrade::Mail "root";
// Set this value to "true" to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError "true";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies "false";
// Automatically reboot *WITHOUT CONFIRMATION* if
//  the file /var/run/reboot-required is found after the upgrade
//Unattended-Upgrade::Automatic-Reboot "false";
// If automatic reboot is enabled and needed, reboot at the specific
// time instead of immediately
//  Default: "now"
//Unattended-Upgrade::Automatic-Reboot-Time "02:00";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";


-- debconf information:
   unattended-upgrades/enable_auto_updates: false
bob@chodbox:~$




Acknowledgement sent to bobemoe/gup <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected].

Your message specified a Severity: in the pseudo-header, but the severity value important was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, normal, minor, wishlist.

Full text available.


Report forwarded to [email protected], [email protected]:
bug#78; Package unattended-upgrades. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 18 Jan 2025 04:39:02 UTC