Received: (at 78-done) by bugs.devuan.org; 16 Feb 2023 07:28:36 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 16 Feb 2023 07:28:36 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id gDB7IuHa7WOxQAAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 16 Feb 2023 07:27:29 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 84008A0; Thu, 16 Feb 2023 07:27:29 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 6285F25 for <[email protected]>; Thu, 16 Feb 2023 07:27:24 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pSYfq-0003N6-IK; Thu, 16 Feb 2023 07:27:22 +0000 Received: (nullmailer pid 5799 invoked by uid 1000); Thu, 16 Feb 2023 07:27:22 -0000 Date: Thu, 16 Feb 2023 07:27:22 +0000 From: Mark Hindley <[email protected]> To: Dennis Camera <[email protected]> Cc: [email protected] Subject: Re: unattended-upgraded: reappears on beowulf+ Message-ID: <[email protected]> References: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> Version: 2.9.1+nmu3 On Mon, Jul 19, 2021 at 10:51:24AM +0200, Dennis Camera wrote: > This bug reoccurs on beowulf (1.11.2) and chimaera (2.8). > > I believe that the unattended-upgrades package needs to be built separately for Devuan to include the 50unattended-upgrades.Devuan. We now have support for directly rebuilding Debian sources and this is resolved in Ceres. Note that rebuilding means the version number does not change. Closing. Thanks Mark
bobemoe/gup <[email protected]>
:Mark Hindley <[email protected]>
:Dennis Camera <[email protected]>
to [email protected]
.
Full text available.Received: (at 78-done) by bugs.devuan.org; 17 Dec 2017 21:30:05 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 17 Dec 2017 22:30:05 +0100 (CET) Received: from yggdrasil.evilham.com (yggdrasil.evilham.com [46.19.33.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id E167AF60948 for <[email protected]>; Sun, 17 Dec 2017 22:22:52 +0100 (CET) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (1024-bit key; secure) header.d=evilham.com [email protected] header.b="girMakGA"; dkim-atps=neutral Received: from [10.8.8.244] (unknown [62.112.10.133]) by yggdrasil.evilham.com (Postfix) with ESMTPSA id 45E4360D0F for <[email protected]>; Sun, 17 Dec 2017 22:22:33 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=evilham.com; s=mail; t=1513545753; bh=NEq9sn1sqZSF6oXE4vFLdHH8lSGZFCb5Dn0hxqM+XoI=; h=To:From:Subject:Date:From; b=girMakGADGCuAWHle0iKnLu9DHoVHk5aoRWkI4M765v3E1yVM9iBXwMwFhoEgdHQ9 CariIV93qJPvToS4V9zjF27mm1BOmMGEmRk+b2L3zLE8o+/ZL72uGs+y8whUbuupFi SgZavnfT+62jEMj3ipMda+VurHgB2085TK+Ktc2o= To: [email protected] From: Evilham <[email protected]> Subject: Fixed in newer version Message-ID: <[email protected]> Date: Sun, 17 Dec 2017 22:22:35 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: es-ES Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org A new version of unattended-upgrades fixes this issue in both jessie and ascii. A patch has been sent upstream for beowulf+ support. -- Evilham
bobemoe/gup <[email protected]>
:Evilham <[email protected]>
:Received: (at submit) by bugs.devuan.org; 19 May 2017 17:20:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from mail.dyne.org [178.62.188.7] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Fri, 19 May 2017 19:20:02 +0200 (CEST) Received: from jh3.jhodges.co.uk (jh3.jhodges.co.uk [134.213.166.61]) by tupac2.dyne.org (Postfix) with ESMTP id 9E0AD18DCC3 for <[email protected]>; Fri, 19 May 2017 17:13:33 +0000 (UTC) Received: from [192.168.1.219] (host81-157-121-46.range81-157.btcentralplus.com [81.157.121.46]) by jh3.jhodges.co.uk (Postfix) with ESMTPSA id 7BCD721DDC for <[email protected]>; Fri, 19 May 2017 18:13:31 +0100 (BST) To: Devuan Bug Tracking System <[email protected]> From: bobemoe/gup <[email protected]> Subject: unattended-upgrades: Default config for Origins-Pattern is for Debian, does not match Devuan repos/packages Message-ID: <[email protected]> Date: Fri, 19 May 2017 18:13:34 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Icedove/45.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.0 required=5.0 tests=RP_MATCHES_RCVD,SPF_PASS autolearn=disabled version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on tupac2 Package: unattended-upgrades Version: 0.83.3.2+deb8u1 Severity: important I think the expected behaviour for unattended-upgrades with default configuration is to only install security updates, however no updates are installed at all. The only uncommented line in /etc/apt/apt.conf.d/50unattended-upgrades is: "origin=Debian,codename=${distro_codename},label=Debian-Security"; which looks like it should match the security repo, but for Devuan it does not. I have added this line: "a=stable-security,label=Devuan"; Which now correctly matches updates from the security repo. This means manual intervention is required to configure the package to achieve what is expected default behaviour, someone installing this package assuming that it will apply security updates may get a nasty surprise! I'm not sure the best way to fix this, adding the line as I have done feels a bit like a workaround, as a comment in the config file says it reads variables from /etc/debian_version, but this is not present on Devuan. We probably need to patch something to read the /etc/devuan_version file. However, this alone I don't think will solve the issue as it looks like origin, codename and label differ between Debian and Devuan repos, so all the other example patterns in the file may also need tweaking one way or another. If I get a chance I will take a deeper look but it may be a while. -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 1.0 (jessie) Release: 1.0 Codename: jessie Architecture: x86_64 Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages unattended-upgrades depends on: ii apt 1.0.9.8.4 ii apt-utils 1.0.9.8.4 ii debconf [debconf-2.0] 1.5.56 ii init-system-helpers 1.24+devuan1.0 ii lsb-base 4.1+devuan2 ii lsb-release 4.1+devuan2 ii python3 3.4.2-2 ii python3-apt 0.9.3.12 ii ucf 3.0030 ii xz-utils 5.1.1alpha+20120614-2+b3 unattended-upgrades recommends no packages. Versions of packages unattended-upgrades suggests: ii bsd-mailx 8.1.2-0.20141216cvs-2 ii exim4-daemon-light [mail-transport-agent] 4.84.2-2+deb8u3 -- Configuration Files: /etc/apt/apt.conf.d/50unattended-upgrades changed: // Unattended-Upgrade::Origins-Pattern controls which packages are // upgraded. // // Lines below have the format format is "keyword=value,...". A // package will be upgraded only if the values in its metadata match // all the supplied keywords in a line. (In other words, omitted // keywords are wild cards.) The keywords originate from the Release // file, but several aliases are accepted. The accepted keywords are: // a,archive,suite (eg, "stable") // c,component (eg, "main", "crontrib", "non-free") // l,label (eg, "Debian", "Debian-Security") // o,origin (eg, "Debian", "Unofficial Multimedia Packages") // n,codename (eg, "jessie", "jessie-updates") // site (eg, "http.debian.net") // The available values on the system are printed by the command // "apt-cache policy", and can be debugged by running // "unattended-upgrades -d" and looking at the log file. // // Within lines unattended-upgrades allows 2 macros whose values are // derived from /etc/debian_version: // ${distro_id} Installed origin. // ${distro_codename} Installed codename (eg, "jessie") Unattended-Upgrade::Origins-Pattern { // Codename based matching: // This will follow the migration of a release through different // archives (e.g. from testing to stable and later oldstable). // "o=Debian,n=jessie"; // "o=Debian,n=jessie-updates"; // "o=Debian,n=jessie-proposed-updates"; // "o=Debian,n=jessie,l=Debian-Security"; // Archive or Suite based matching: // Note that this will silently match a different release after // migration to the specified archive (e.g. testing becomes the // new stable). // "o=Debian,a=stable"; // "o=Debian,a=stable-updates"; // "o=Debian,a=proposed-updates"; "origin=Debian,codename=${distro_codename},label=Debian-Security"; "a=stable-security,label=Devuan"; }; // List of packages to not update (regexp are supported) Unattended-Upgrade::Package-Blacklist { // "vim"; // "libc6"; // "libc6-dev"; // "libc6-i686"; }; // This option allows you to control if on a unclean dpkg exit // unattended-upgrades will automatically run // dpkg --force-confold --configure -a // The default is true, to ensure updates keep getting installed //Unattended-Upgrade::AutoFixInterruptedDpkg "false"; // Split the upgrade into the smallest possible chunks so that // they can be interrupted with SIGUSR1. This makes the upgrade // a bit slower but it has the benefit that shutdown while a upgrade // is running is possible (with a small delay) //Unattended-Upgrade::MinimalSteps "true"; // Install all unattended-upgrades when the machine is shuting down // instead of doing it in the background while the machine is running // This will (obviously) make shutdown slower //Unattended-Upgrade::InstallOnShutdown "true"; // Send email to this address for problems or packages upgrades // If empty or unset then no email is sent, make sure that you // have a working mail setup on your system. A package that provides // 'mailx' must be installed. E.g. "[email protected]" //Unattended-Upgrade::Mail "root"; // Set this value to "true" to get emails only on errors. Default // is to always send a mail if Unattended-Upgrade::Mail is set //Unattended-Upgrade::MailOnlyOnError "true"; // Do automatic removal of new unused dependencies after the upgrade // (equivalent to apt-get autoremove) //Unattended-Upgrade::Remove-Unused-Dependencies "false"; // Automatically reboot *WITHOUT CONFIRMATION* if // the file /var/run/reboot-required is found after the upgrade //Unattended-Upgrade::Automatic-Reboot "false"; // If automatic reboot is enabled and needed, reboot at the specific // time instead of immediately // Default: "now" //Unattended-Upgrade::Automatic-Reboot-Time "02:00"; // Use apt bandwidth limit feature, this example limits the download // speed to 70kb/sec //Acquire::http::Dl-Limit "70"; -- debconf information: unattended-upgrades/enable_auto_updates: false bob@chodbox:~$
bobemoe/gup <[email protected]>
:[email protected]
.
Your message specified a Severity: in the pseudo-header, but the severity value important was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, normal, minor, wishlist.
Full text available.
[email protected], [email protected]
:bug#78
; Package unattended-upgrades
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sat, 18 Jan 2025 04:39:02 UTC