-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 18 Oct 2018 00:58:48 +0200 Source: unattended-upgrades Binary: unattended-upgrades Architecture: source Version: 1.7 Distribution: unstable Urgency: medium Maintainer: Michael Vogt <mvo@debian.org> Changed-By: Balint Reczey <rbalint@ubuntu.com> Description: unattended-upgrades - automatic installation of security upgrades Closes: 909543 Launchpad-Bugs-Fixed: 1649709 1778219 1795657 1795692 1795696 1796100 Changes: unattended-upgrades (1.7) unstable; urgency=medium . [ Nils Toedtmann ] * Clarify 'A reboot is required' warning, that the requirement might stem from a previous run . [ Balint Reczey ] * Build depend on and run pycodestyle, the replacement of pep8 * autopkgtest: Clean up after failed debootstrap to retry cleanly * Handle when unattended-upgrades stopped without unattended-upgrade-shutdown sending SIGTERM (LP: #1795657) * Don't crash on missing dpkg log file (LP: #1795692) * do_auto_remove() is successful unless a commit() operation fails (LP: #1795696) * Check only dowloaded .deb files for conffile prompts (LP: #1796100) * Recommend systemd-sysv as the first alternative of cron. Unattended-upgrades is started via systemd timers or by the .service file on the default Debian and Ubuntu installations without cron's involvement. Systems without systemd-sysv can still install unattended-upgrades and run it via cron. * Only suggest python3-gi and skip check for metered connection when it is missing (Closes: #909543) * Only suggest powermgmt-base amd skip checking power status when it is not present * Show message about missing optional dependencies only once * Add configuration file option to enable verbose and debug logging. Thanks to Paul Wise * Revert to running unattended-upgrades.service in multi-user.target * Trigger unattended-upgrade-shutdown actions with PrepareForShutdown() Performing upgrades in service's ExecStop did not work when the upgrades involved restarting services because systemd blocked other stop/start actions making maintainer scripts time out and be killed leaving a broken system behind. Running unattended-upgrades.service before shutdown.target as a oneshot service made it run after unmounting filesystems and scheduling services properly on shutdown is a complex problem and adding more services to the mix make it even more fragile. The solution of monitoring PrepareForShutdown() signal from DBus allows Unattended Upgrade to run _before_ the jobs related to shutdown are queued thus package upgrades can safely restart services without risking causing deadlocks or breaking part of the shutdown actions. Also ask running unattended-upgrades to stop when shutdown starts even in InstallOnShutdown mode and refactor most of unattended-upgrade-shutdown to UnattendedUpgradesShutdown class. (LP: #1778219) * Handle reverting to WantedBy=multi-user.target when upgrading from 1.5 or 1.6 * debian/postinst: Redirect stdout from systemctl and deb-systemd-invoke to stderr and skip running systemctl start unattended-upgrades.service when unattended-upgrades is already running to avoid deadlock. * Increase logind's InhibitDelayMaxSec to 30s. This allows more time for unattended-upgrades to shut down gracefully or even install a few packages in InstallOnShutdown mode, but is still a big step back from the 30 minutes allowed for InstallOnShutdown previously. Users enabling InstallOnShutdown node are advised to increase InhibitDelayMaxSec even further, possibly to 30 minutes. . [ Brian Murray ] * unattended-upgrades: Do not automatically upgrade the development release of Ubuntu unless Unattended-Upgrade::DevRelease is true. (LP: #1649709) . [ Julian Andres Klode ] * Do not run on development releases until 21 days before release. This works for Ubuntu, and is only enabled there. Also explicitly log those messages to syslog, so a user can easily find them and then dig for more information in the u-u log. Checksums-Sha1: 1fec12ee2a1b57ee06f5e54dfadebf3c120a9904 1844 unattended-upgrades_1.7.dsc 1474a9e35bfb478a2f4a0d24b99388b7501befbf 107236 unattended-upgrades_1.7.tar.xz a861dc9e9b0e406e073937486b0f704eb0e987e8 7785 unattended-upgrades_1.7_source.buildinfo Checksums-Sha256: 6be876fbf44f3068f4f842896b1db88cb1f9b316d19fe16be96c5daa10199f53 1844 unattended-upgrades_1.7.dsc c2caf69537d1e7651f9cb9b7540c9d137b6cf7cda58dda57099e3d86bb4577a3 107236 unattended-upgrades_1.7.tar.xz 4191a0ab033907a3f50da604205b928c86ea582514bb3a5d603f5c94cc49c330 7785 unattended-upgrades_1.7_source.buildinfo Files: a4d4da1e785edcd1041fb7a2e5f3c56a 1844 admin optional unattended-upgrades_1.7.dsc 3bfa5737d2ac636d592f7073bb3edbc8 107236 admin optional unattended-upgrades_1.7.tar.xz a8b001984c5fc809a6bcbc26560590d2 7785 admin optional unattended-upgrades_1.7_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEI/PvTgXX55rLQUfDg6KBkWslS0UFAlvh24IACgkQg6KBkWsl S0XtkBAAtp/KdzFyrqYFYgng4YWLPEy+IPinsdeYsP8XKxU3zmQfzBosNsGC9i7e 38Vq4RY66gbZnFhTfjH3hngedEBC1ym1/JeqzE7LJ6VdnVpwidgdxeouOTMGglle VH8shBAK+KLpGwbYMGsbrgGpLoHzFEdYA7hvCEGvlhw+hFB2UBOF4Fr8lIw9tKsR x3EJKIEuB3UGq0ClSjcBrk+59ZzK1c34OqUfBDGyqUGVddE4nzs9a5VmIKYyafGm U7ApZ5mhyYvGQqvmG+3oWtloNtc/KhyCX9Fqk17D2TOjwc32QPKFPz3dQ5hQmL3d CUBcAkkBxSI9xARH+0LG9IF8h4nHddc+8TInwEUrX+WnkowK/TDpnkP+ip+lgiCO +IGEVgzViJnx5JQqcNJ1+10Hn8uVXyWnwKGzJUVV8d8PnTWB2YDjkZdtsqq72pAm lK7cDf+IO/PLCerM+a3bLvZjHB7lxwIyfKoOsKJMhjIii/w5Pr72Uow5CLtdKFXp 6WXIe5IvAjmHQcfBnpMTFKRq8AyQkGSsRLTo3wDEAX4pfgwsgNxAvdUZJctttWqS /+0WFgeF1zxhjoRZZQJMcwxTlqB7MTxJ8tJfV3PxytzMwpBPaMrE9HVqrWUfQAtR i5UQMaRMadhC63zcyB0cwufV8wJHPZmbD7MZdaKqgITTtIkVqYA= =FsNq -----END PGP SIGNATURE-----