Debian Bug report logs - #863911
unattended-upgrades: Needs a --download-only mode

version graph

Package: unattended-upgrades; Maintainer for unattended-upgrades is Michael Vogt <mvo@debian.org>; Source for unattended-upgrades is src:unattended-upgrades (PTS, buildd, popcon).

Reported by: Julian Andres Klode <jak@debian.org>

Date: Thu, 1 Jun 2017 20:57:02 UTC

Severity: important

Found in version unattended-upgrades/0.93.1

Fixed in version unattended-upgrades/0.94

Done: Michael Vogt <mvo@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, jak@debian.org, Michael Vogt <mvo@debian.org>:
Bug#863911; Package unattended-upgrades. (Thu, 01 Jun 2017 20:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Julian Andres Klode <jak@debian.org>:
New Bug report received and forwarded. Copy sent to jak@debian.org, Michael Vogt <mvo@debian.org>. (Thu, 01 Jun 2017 20:57:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Julian Andres Klode <jak@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: unattended-upgrades: Needs a --download-only mode
Date: Thu, 1 Jun 2017 22:52:07 +0200
[Message part 1 (text/plain, inline)]
Package: unattended-upgrades
Version: 0.93.1
Severity: important

In order to coordinate with the new split downloading and installing
in the systemd timer in apt 1.4.6, unattended-upgrades needs to gain
a --download-only flag (the flag needs precisely that name, that is
what apt is querying for).

Without the --download-only flag, downloads of new updates all happen
within a fairly short time window, potentially causing issues with
traffic load.

For more details, see https://bugs.debian.org/861357 and 
https://bugs.launchpad.net/bugs/1686470

Draft of a patch attached, needs testing.

-- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (900, 'unstable'), (500, 'unstable-debug'), (500, 'buildd-unstable'), (500, 'testing'), (100, 'experimental'), (1, 'experimental-debug')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.11.0-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages unattended-upgrades depends on:
ii  apt                    1.4.3~1.gbpf45046
ii  apt-utils              1.4.3~1.gbpf45046
ii  debconf [debconf-2.0]  1.5.60
ii  init-system-helpers    1.48
ii  lsb-base               9.20161125
ii  lsb-release            9.20161125
ii  python3                3.5.3-1
ii  python3-apt            1.4.0~beta3
ii  ucf                    3.0036
ii  xz-utils               5.2.2-1.2+b1

Versions of packages unattended-upgrades recommends:
ii  anacron             2.3-23
ii  cron [cron-daemon]  3.0pl1-128+b1

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx                         8.1.2-0.20160123cvs-4
ii  esmtp-run [mail-transport-agent]  1.2-14
pn  needrestart                       <none>

-- debconf information excluded

-- 
Debian Developer - deb.li/jak | jak-linux.org - free software dev
                  |  Ubuntu Core Developer |
When replying, only quote what is necessary, and write each reply
directly below the part(s) it pertains to ('inline').  Thank you.
[unattended-upgrade.diff (text/x-diff, attachment)]

Added tag(s) pending. Request was from Balint Reczey <balint.reczey@canonical.com> to control@bugs.debian.org. (Mon, 24 Jul 2017 18:12:10 GMT) (full text, mbox, link).


Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Tue, 08 Aug 2017 17:45:09 GMT) (full text, mbox, link).


Notification sent to Julian Andres Klode <jak@debian.org>:
Bug acknowledged by developer. (Tue, 08 Aug 2017 17:45:09 GMT) (full text, mbox, link).


Message #12 received at 863911-close@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 863911-close@bugs.debian.org
Subject: Bug#863911: fixed in unattended-upgrades 0.94
Date: Tue, 08 Aug 2017 17:43:45 +0000
Source: unattended-upgrades
Source-Version: 0.94

We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 863911@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated unattended-upgrades package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 28 Jul 2017 10:11:07 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source all
Version: 0.94
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <mvo@debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 837161 855361 863911 865897
Changes:
 unattended-upgrades (0.94) unstable; urgency=medium
 .
   [ Brian Murray ]
   * Add apt history log to apport reports
   * unattended-upgrades: Provide some information and create a log entry when
     there is a failure to parse the allowed origins. (LP: #1680599)
   * improve the changes sanity check to cache more insane cases
   * Do not mark packages for deletion / autoremoval if unattended-upgrades
     is being run in dry-run mode.
 .
   [ Louis Bouchard ]
   * Fix --delay type in unattended-upgrade-shutdown (Closes: #837161)
 .
   [ Balint Reczey ]
   * ACK NMU
   * Fix indentation in test-systemd.py
   * Keep apt's partial dir in tests.
     This fixes make -C test in a clean repository
   * Clean up all generated files in override_dh_auto_clean
   * Update debhelper compat level to 9
   * Move acquiring shutdown_lock earlier in u-u to cover dpkg --configure step
   * Start handling SIGUSR1 gracefully earlier in unattended-upgrade
     (LP: #1690980)
   * Handle SIGTERM instead of SIGUSR1 as a graceful shutdown signal
   * Place unattended-upgrade pid file early and remove it on exit.
   * Override maintainer-script-calls-systemctl lintian warnings
   * Don't start package downloads when shutdown has already started
   * Let unattended-upgrade run uninterrupted in shutdown mode until timeout
   * Fix indentation in test-systemd.py
 .
   [ Julian Andres Klode ]
   * Add a --download-only option (Closes: #863911) (LP: #1686470)
   * Fix PEP8 failures (replace except: with except Exception:)
     (Closes: #865897)
 .
   [ Steve Langasek ]
   * Add UbuntuESM to the list of sources automatically upgraded from by default
     (LP: #1687129)
 .
   [ Jonatan Nyberg ]
   * Update Swedish debconf strings (Closes: #855361)
 .
   [ Peter Lewis ]
   * Multiple typo fixes
 .
   [ Michael Vogt ]
   * add HACKING.md
   * add pep484 type hints
   * add spread test
   * Enable updates on Raspbian
 .
   [ John Horne ]
   * Blacklisted packages are now added to the pkgs_kept_back list.
   * Reduced instance of line too long.
   * Some typos corrected in the README file.
   * Fix for pep8 - closing bracket missing visual indentation
   * Added tests that blacklisted packages are mentioned in email messages.
   * Updated argument type comment for is_pkgname_in_blacklist function.
 .
   [ nachoparker ]
   * There is noRaspbian-Security label
Checksums-Sha1:
 de341c52f76090dd3219cac4cecbc19608afc91e 1743 unattended-upgrades_0.94.dsc
 ebef67f6e6d7533a33ed370e15d55192f87db782 91000 unattended-upgrades_0.94.tar.xz
 bd83efaf363b11c1113084f443b5893824060593 63744 unattended-upgrades_0.94_all.deb
 ccba301d4d838e0511febb840f608f88cb2c92c1 7968 unattended-upgrades_0.94_amd64.buildinfo
Checksums-Sha256:
 d28aa8dd9f9ed619c82f74789ae5b9ec070cbcc71a21c95648e8d3317b0a5f39 1743 unattended-upgrades_0.94.dsc
 7ecfa8a303ba3116bfa47f6a54535b1fee2783ed55a0a474a146f1b363a41d77 91000 unattended-upgrades_0.94.tar.xz
 e48917391d7900f1a3ff5507c65a322f488a532f8f14d238c4f0243c8561eb93 63744 unattended-upgrades_0.94_all.deb
 679f2efc59cca42a1d8ade6ea3226bb82907cf1cf54c1604c6db064ef4f82850 7968 unattended-upgrades_0.94_amd64.buildinfo
Files:
 02eeb61c2ba361f7dee5b148249ad753 1743 admin optional unattended-upgrades_0.94.dsc
 cb2e43728ce95aabd5ac9fc7bfc824da 91000 admin optional unattended-upgrades_0.94.tar.xz
 3c99d61c8038e8f7705423ce2552ba60 63744 admin optional unattended-upgrades_0.94_all.deb
 de119d2509c55c8d6bdb0aca66feb053 7968 admin optional unattended-upgrades_0.94_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=hJpq
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 11 Sep 2017 07:25:27 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jan 10 07:30:10 2018; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.