UbuntuUpdates.org

Package "unattended-upgrades"


Moved to xenial:main:updates


Name: unattended-upgrades

Description:

automatic installation of security upgrades

Latest version: *DELETED*
Release: xenial (16.04)
Level: proposed
Repository: main

Links

Save this URL for the latest version of "unattended-upgrades": https://www.ubuntuupdates.org/unattended-upgrades


Download "unattended-upgrades"


Other versions of "unattended-upgrades" in Xenial

Repository Area Version
base main 0.90
security main 0.90ubuntu0.10
updates main 1.1ubuntu1.18.04.7~16.04.3

Changelog

Version: *DELETED* 2019-05-07 12:06:26 UTC
Moved to xenial:main:updates
No changelog for deleted or moved packages.

Version: 1.1ubuntu1.18.04.7~16.04.3 2019-04-30 12:07:09 UTC

  unattended-upgrades (1.1ubuntu1.18.04.7~16.04.3) xenial; urgency=medium

  * Detect changes to moved conffiles (LP: #1823872)
    - Add tests for checking conffile moves.
      Build depend on and use equivs to generate new test packages
    - Split() conffile data to set of names only once
    - Don't parse dpkg conffile db when there are no conffiles in the package
  * Detect unchanged moved conffiles.
    When a package moves a conffile properly without any change no conffile
    prompt needs to be shown thus the package can be upgraded unattended.
    (LP: #1823872)
  * Skip sending email when no package had to be installed, upgraded or removed
    (LP: #1821103) (Closes: #924554)
  * Make sure autoremovals don't start with a dirty cache and remove other
    packages (LP: #1824341)
  * Continue applying minimal sets when one set can't be marked for upgrade.
    Thanks to Anderson Luiz Alves for the patch, it needed minor modifications
    (LP: #1824341)
  * Stop raising NoAllowedOriginError when marking packages to upgrade/install
    fails (LP: #1824876)
  * Adjust only transitive dependencies in the fallback when a package from an
    allowed origin can't be marked to install/upgrade.
    This is a much lighter approach than marking every upgradable package
    because the full fallback was triggered on packages held back as well,
    using an excessive amount of CPU time.
    Also it crashed with packages not having any version in allowed origins.
    (LP: #1824804, #1824949)
  * Skip trying to upgrade held packages in call_adjusted() (LP: #1824804)
  * Follow all kinds of transitive dependencies when adjusting dependencies
  * Don't crash collecting transitive dependencies when package has no candidate
    (LP: #1825886)
  * Use mark_install_adjusted() in rewind_cache()
    The original cache had packages marked with adjustments thus rewinding
    should also do adjustments to reach the same state.
    Also not using mark_install_adjusted() crashes when apt raises error on
    held packages. (LP: #1826157)
    - test_rewind: Update test to check if adjustend rewinding took place
  * do_auto_remove() is successful unless a commit() operation fails
    (LP: #1795696)
  * Compare apt.package.Version objects and not the versions' string
    representation. (LP: #1820888)
    This prevented adjusting candidates when the strings sorted differently.
    Also extend tests to catch issue.
  * Fall back to adjusting more packages' candidates
    when a package from an allowed origin can't be marked to install/upgrade.
    (LP: #1821101)

 -- Balint Reczey <email address hidden> Mon, 29 Apr 2019 12:23:14 +0200

1823872 Fixing fsfreeze-hook can break unattended upgrades
1821103 [SRU] Skip sending email when no package had to be installed, upgraded or removed
1824341 NoAllowedOrigin cause package removal
1824876 unattended-upgrades: call_adjusted() raises NoAllowedOriginError when marking packages to upgrade/install fails
1824804 Unattended upgrades falls back to adjust all upgradable packages in attempt to install held packages
1825886 Unattended-upgrades may crash when a package does not have a candidate
1826157 unattended-upgrades: rewind_cache() may crash due to not adjusting package candidates
1795696 /usr/bin/unattended-upgrade:UnboundLocalError:/usr/bin/unattended-upgrade@1991:main:do_auto_remove
1820888 unattended-upgrades may hold back upgrades due to comparing package versions by their string representation
1821101 unattended-upgrades: Fall back to adjusting more packages' candidates when a package from an allowed origin can't be marked to install/upgrade
924554 SUCCESS messages: significant behaviour change - Debian Bug report logs

Version: *DELETED* 2019-04-30 11:06:22 UTC
Moved to xenial:main:updates
No changelog for deleted or moved packages.

Version: 1.1ubuntu1.18.04.7~16.04.2 2019-02-28 14:06:58 UTC

  unattended-upgrades (1.1ubuntu1.18.04.7~16.04.2) xenial; urgency=medium

  * Don't check blacklist too early and report updates from not allowed origins
    as kept back. (LP: #1781176)
  * test/test_blacklisted_wrong_origin.py: Fix and enable test
  * Filter out progress indicator from dpkg log (LP: #1599646)
  * Clear cache when autoremoval fails (LP: #1779157)
  * Find autoremovable kernel packages using the patterns in APT's way
    (LP: #1815494)

Source diff to previous version
1781176 Blacklisted packages are included in the \
1599646 E-mail report contains repeated \
1779157 /usr/bin/unattended-upgrade:AssertionError:/usr/bin/unattended-upgrade@1927:main:do_install
1815494 May remove autoremovable non-kernel packages matching pattern from APT::VersionedKernelPackages

Version: 1.1ubuntu1.18.04.7~16.04.1 2018-12-13 18:07:10 UTC

  unattended-upgrades (1.1ubuntu1.18.04.7~16.04.1) xenial; urgency=medium

  * Start service after systemd-logind.service to be able to take inhibition
    lock (LP: #1806487)
  * Handle gracefully when logind is down (LP: #1806487)

1806487 [regression] Crashing with dbus.exceptions.DBusException when logind can't be started (yet)



About   -   Send Feedback to @ubuntu_updates