Your message dated Tue, 08 Aug 2017 17:43:45 +0000
with message-id <e1df8xh-000hke...@fasolo.debian.org>
and subject line Bug#837161: fixed in unattended-upgrades 0.94
has caused the Debian Bug report #837161,
regarding /usr/share/unattended-upgrades/unattended-upgrade-shutdown: setting 
--delay throws TypeError
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
837161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837161
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.83.3.2+deb8u1
Severity: normal
File: /usr/share/unattended-upgrades/unattended-upgrade-shutdown
Tags: patch

Calling unattended-upgrade-shutdown with the --delay option will cause
it to throw a TypeError:

# ./unattended-upgrade-shutdown --lock /doesnt/exist --delay 1
Traceback (most recent call last):
  File "./unattended-upgrade-shutdown", line 152, in <module>
    if (time.time() - start_time) > options.delay * 60:
TypeError: unorderable types: float() > str()


Explicitly casting the --delay option's value to int fixes this:

--- unattended-upgrade-shutdown.orig    2015-06-15 15:45:43.000000000 +0200
+++ unattended-upgrade-shutdown 2016-09-09 13:29:43.976000000 +0200
@@ -149,7 +149,7 @@
         # show log
         log_progress()
         time.sleep(5)
-        if (time.time() - start_time) > options.delay * 60:
+        if (time.time() - start_time) > int(options.delay) * 60:
             logging.warning(_("Giving up on lockfile after %s delay") %
                             options.delay)
             sys.exit(1)


-- System Information:
Debian Release: 8.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages unattended-upgrades depends on:
ii  apt                    1.0.9.8.3
ii  apt-utils              1.0.9.8.3
ii  debconf [debconf-2.0]  1.5.56
ii  init-system-helpers    1.22
ii  lsb-base               4.1+Debian13+nmu1
ii  lsb-release            4.1+Debian13+nmu1
ii  python3                3.4.2-2
ii  python3-apt            0.9.3.12
ii  ucf                    3.0030
ii  xz-utils               5.1.1alpha+20120614-2+b3

unattended-upgrades recommends no packages.

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx                       8.1.2-0.20141216cvs-2
ii  postfix [mail-transport-agent]  2.11.3-1

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Unattended-Upgrade::Origins-Pattern controls which packages are
// upgraded.
//
// Lines below have the format format is "keyword=value,...".  A
// package will be upgraded only if the values in its metadata match
// all the supplied keywords in a line.  (In other words, omitted
// keywords are wild cards.) The keywords originate from the Release
// file, but several aliases are accepted.  The accepted keywords are:
//   a,archive,suite (eg, "stable")
//   c,component     (eg, "main", "crontrib", "non-free")
//   l,label         (eg, "Debian", "Debian-Security")
//   o,origin        (eg, "Debian", "Unofficial Multimedia Packages")
//   n,codename      (eg, "jessie", "jessie-updates")
//     site          (eg, "http.debian.net")
// The available values on the system are printed by the command
// "apt-cache policy", and can be debugged by running
// "unattended-upgrades -d" and looking at the log file.
//
// Within lines unattended-upgrades allows 2 macros whose values are
// derived from /etc/debian_version:
//   ${distro_id}            Installed origin.
//   ${distro_codename}      Installed codename (eg, "jessie")
Unattended-Upgrade::Origins-Pattern {
        // Codename based matching:
        // This will follow the migration of a release through different
        // archives (e.g. from testing to stable and later oldstable).
//      "o=Debian,n=jessie";
//      "o=Debian,n=jessie-updates";
//      "o=Debian,n=jessie-proposed-updates";
//      "o=Debian,n=jessie,l=Debian-Security";
        // Archive or Suite based matching:
        // Note that this will silently match a different release after
        // migration to the specified archive (e.g. testing becomes the
        // new stable).
//      "o=Debian,a=stable";
//      "o=Debian,a=stable-updates";
//      "o=Debian,a=proposed-updates";
        "origin=Debian,codename=${distro_codename},label=Debian-Security";
};
// List of packages to not update (regexp are supported)
Unattended-Upgrade::Package-Blacklist {
//      "vim";
//      "libc6";
//      "libc6-dev";
//      "libc6-i686";
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run 
//   dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps "true";
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown "true";
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. "u...@example.com"
//Unattended-Upgrade::Mail "root";
Unattended-Upgrade::Mail "root";
// Set this value to "true" to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError "true";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies "false";
// Automatically reboot *WITHOUT CONFIRMATION* if
//  the file /var/run/reboot-required is found after the upgrade 
//Unattended-Upgrade::Automatic-Reboot "false";
// If automatic reboot is enabled and needed, reboot at the specific
// time instead of immediately
//  Default: "now"
//Unattended-Upgrade::Automatic-Reboot-Time "02:00";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";


-- debconf information:
  unattended-upgrades/enable_auto_updates: false

--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 0.94

We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 837...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <m...@debian.org> (supplier of updated unattended-upgrades package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 28 Jul 2017 10:11:07 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source all
Version: 0.94
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <m...@debian.org>
Changed-By: Michael Vogt <m...@debian.org>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 837161 855361 863911 865897
Changes:
 unattended-upgrades (0.94) unstable; urgency=medium
 .
   [ Brian Murray ]
   * Add apt history log to apport reports
   * unattended-upgrades: Provide some information and create a log entry when
     there is a failure to parse the allowed origins. (LP: #1680599)
   * improve the changes sanity check to cache more insane cases
   * Do not mark packages for deletion / autoremoval if unattended-upgrades
     is being run in dry-run mode.
 .
   [ Louis Bouchard ]
   * Fix --delay type in unattended-upgrade-shutdown (Closes: #837161)
 .
   [ Balint Reczey ]
   * ACK NMU
   * Fix indentation in test-systemd.py
   * Keep apt's partial dir in tests.
     This fixes make -C test in a clean repository
   * Clean up all generated files in override_dh_auto_clean
   * Update debhelper compat level to 9
   * Move acquiring shutdown_lock earlier in u-u to cover dpkg --configure step
   * Start handling SIGUSR1 gracefully earlier in unattended-upgrade
     (LP: #1690980)
   * Handle SIGTERM instead of SIGUSR1 as a graceful shutdown signal
   * Place unattended-upgrade pid file early and remove it on exit.
   * Override maintainer-script-calls-systemctl lintian warnings
   * Don't start package downloads when shutdown has already started
   * Let unattended-upgrade run uninterrupted in shutdown mode until timeout
   * Fix indentation in test-systemd.py
 .
   [ Julian Andres Klode ]
   * Add a --download-only option (Closes: #863911) (LP: #1686470)
   * Fix PEP8 failures (replace except: with except Exception:)
     (Closes: #865897)
 .
   [ Steve Langasek ]
   * Add UbuntuESM to the list of sources automatically upgraded from by default
     (LP: #1687129)
 .
   [ Jonatan Nyberg ]
   * Update Swedish debconf strings (Closes: #855361)
 .
   [ Peter Lewis ]
   * Multiple typo fixes
 .
   [ Michael Vogt ]
   * add HACKING.md
   * add pep484 type hints
   * add spread test
   * Enable updates on Raspbian
 .
   [ John Horne ]
   * Blacklisted packages are now added to the pkgs_kept_back list.
   * Reduced instance of line too long.
   * Some typos corrected in the README file.
   * Fix for pep8 - closing bracket missing visual indentation
   * Added tests that blacklisted packages are mentioned in email messages.
   * Updated argument type comment for is_pkgname_in_blacklist function.
 .
   [ nachoparker ]
   * There is noRaspbian-Security label
Checksums-Sha1:
 de341c52f76090dd3219cac4cecbc19608afc91e 1743 unattended-upgrades_0.94.dsc
 ebef67f6e6d7533a33ed370e15d55192f87db782 91000 unattended-upgrades_0.94.tar.xz
 bd83efaf363b11c1113084f443b5893824060593 63744 unattended-upgrades_0.94_all.deb
 ccba301d4d838e0511febb840f608f88cb2c92c1 7968 
unattended-upgrades_0.94_amd64.buildinfo
Checksums-Sha256:
 d28aa8dd9f9ed619c82f74789ae5b9ec070cbcc71a21c95648e8d3317b0a5f39 1743 
unattended-upgrades_0.94.dsc
 7ecfa8a303ba3116bfa47f6a54535b1fee2783ed55a0a474a146f1b363a41d77 91000 
unattended-upgrades_0.94.tar.xz
 e48917391d7900f1a3ff5507c65a322f488a532f8f14d238c4f0243c8561eb93 63744 
unattended-upgrades_0.94_all.deb
 679f2efc59cca42a1d8ade6ea3226bb82907cf1cf54c1604c6db064ef4f82850 7968 
unattended-upgrades_0.94_amd64.buildinfo
Files:
 02eeb61c2ba361f7dee5b148249ad753 1743 admin optional 
unattended-upgrades_0.94.dsc
 cb2e43728ce95aabd5ac9fc7bfc824da 91000 admin optional 
unattended-upgrades_0.94.tar.xz
 3c99d61c8038e8f7705423ce2552ba60 63744 admin optional 
unattended-upgrades_0.94_all.deb
 de119d2509c55c8d6bdb0aca66feb053 7968 admin optional 
unattended-upgrades_0.94_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=hJpq
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to