Your message dated Fri, 23 Feb 2018 18:12:56 +0700
with message-id 
<CAK0OdpxDHaSX5ThSugNjQLkNBUWBv4_qNsF3Fxqio2RaMKyb=q...@mail.gmail.com>
and subject line Re: Bug#890668: unattended-upgrades: All Debian packages are 
updated (not only Debian-Security) including blocked packages
has caused the Debian Bug report #890668,
regarding unattended-upgrades: All Debian packages are updated (not only 
Debian-Security) including blocked packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
890668: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890668
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.99
Severity: important
Tags: d-i

With unattended-upgrades 0.99: All Debian packages are updated (not only
Debian-Security) including blocked packages

I don't wan't to upgrade Tellico 3.1-0.3, because the last version (3.1.1-0.1)
has an annoying bug (sorry i don't report it). So i have blocked this 3.1-0.3
version on Synaptic.

I hadn't this probleme before this 0.99 version (upgraded on the 02.10.2018)

/etc/apt/apt.conf.d/10periodic (i never edited it) :
APT::Periodic::Update-Package-Lists "0";
APT::Periodic::Unattended-Upgrade "1";
APT::Periodic::Download-Upgradeable-Packages "1";
APT::Periodic::AutocleanInterval "0";

If i understand Debian Wiki correctly :
APT::Periodic::Download-Upgradeable-Packages "1" mean Do "apt-get upgrade
--download-only" so unattended-upgrades must only download upgradable packages,
and not to update all the system, and let alone update blocked packets.

This can cause a severe malfunction of my system if I dont want to update a
kernel or a library whose top version does not work

In /var/log/unattended-upgrades :
(...)
2018-02-17 08:21:24,977 INFO Paquets initialement sur la liste noire:
2018-02-17 08:21:24,997 INFO Paquets initialement sur la liste blanche:
2018-02-17 08:21:24,997 INFO Démarrage du script de mise à niveau automatique
2018-02-17 08:21:24,997 INFO Les origines permises sont:
[‘origin=Debian,codename=sid,label=Debian’,
‘origin=Debian,codename=sid,label=Debian-Security’]
2018-02-17 08:21:46,799 INFO Paquets initialement sur la liste noire:
2018-02-17 08:21:46,800 INFO Paquets initialement sur la liste blanche:
2018-02-17 08:21:46,800 INFO Démarrage du script de mise à niveau automatique
2018-02-17 08:21:46,801 INFO Les origines permises sont:
[‘origin=Debian,codename=sid,label=Debian’,
‘origin=Debian,codename=sid,label=Debian-Security’]
2018-02-17 08:21:57,915 INFO Paquets mis à niveau: tellico tellico-data
tellico-doc tellico-scripts
2018-02-17 08:21:57,915 INFO Écriture du journal de dpkg dans «
/var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
2018-02-17 08:25:11,516 INFO Toutes les mises à niveau ont été installées
(...)
2018-02-12 17:30:45,179 INFO Paquets mis à niveau: corebird tellico tellico-
data tellico-doc tellico-scripts
(…)
2018-02-14 17:56:53,341 INFO Paquets mis à niveau: tellico tellico-data
tellico-doc tellico-scripts

I can reproduce this bug on my system easily.



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Foreign Architectures: 64, x32, 32

Kernel: Linux 4.14.0-3-686-pae (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.65
ii  lsb-base               9.20170808
ii  lsb-release            9.20170808
ii  python3                3.6.4-1
ii  python3-apt            1.4.0~beta3+b1
ii  ucf                    3.0037
ii  xz-utils               5.2.2-1.3

Versions of packages unattended-upgrades recommends:
ii  anacron             2.3-24
ii  cron [cron-daemon]  3.0pl1-128.1

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx             <none>
pn  mail-transport-agent  <none>
pn  needrestart           <none>

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Unattended-Upgrade::Origins-Pattern controls which packages are
// upgraded.
//
// Lines below have the format format is "keyword=value,...".  A
// package will be upgraded only if the values in its metadata match
// all the supplied keywords in a line.  (In other words, omitted
// keywords are wild cards.) The keywords originate from the Release
// file, but several aliases are accepted.  The accepted keywords are:
//   a,archive,suite (eg, "stable")
//   c,component     (eg, "main", "contrib", "non-free")
//   l,label         (eg, "Debian", "Debian-Security")
//   o,origin        (eg, "Debian", "Unofficial Multimedia Packages")
//   n,codename      (eg, "jessie", "jessie-updates")
//     site          (eg, "http.debian.net")
// The available values on the system are printed by the command
// "apt-cache policy", and can be debugged by running
// "unattended-upgrades -d" and looking at the log file.
//
// Within lines unattended-upgrades allows 2 macros whose values are
// derived from /etc/debian_version:
//   ${distro_id}            Installed origin.
//   ${distro_codename}      Installed codename (eg, "buster")
Unattended-Upgrade::Origins-Pattern {
        // Codename based matching:
        // This will follow the migration of a release through different
        // archives (e.g. from testing to stable and later oldstable).
        // Software will be the latest available for the named release,
        // but the Debian release itself will not be automatically upgraded.
//      "origin=Debian,codename=${distro_codename}-updates";
//      "origin=Debian,codename=${distro_codename}-proposed-updates";
        "origin=Debian,codename=${distro_codename},label=Debian";
        "origin=Debian,codename=${distro_codename},label=Debian-Security";
        // Archive or Suite based matching:
        // Note that this will silently match a different release after
        // migration to the specified archive (e.g. testing becomes the
        // new stable).
//      "o=Debian,a=stable";
//      "o=Debian,a=stable-updates";
//      "o=Debian,a=proposed-updates";
//      "o=Debian Backports,a=${distro_codename}-backports,l=Debian Backports";
};
// List of packages to not update (regexp are supported)
Unattended-Upgrade::Package-Blacklist {
//     "vim";
//     "libc6";
//     "libc6-dev";
//     "libc6-i686";
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run 
//   dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGTERM. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps "false";
// Install all unattended-upgrades when the machine is shutting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown "true";
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. "u...@example.com"
//Unattended-Upgrade::Mail "root";
// Set this value to "true" to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError "true";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies "false";
// Automatically reboot *WITHOUT CONFIRMATION* if
//  the file /var/run/reboot-required is found after the upgrade 
//Unattended-Upgrade::Automatic-Reboot "false";
// Automatically reboot even if there are users currently logged in.
//Unattended-Upgrade::Automatic-Reboot-WithUsers "true";
// If automatic reboot is enabled and needed, reboot at the specific
// time instead of immediately
//  Default: "now"
//Unattended-Upgrade::Automatic-Reboot-Time "02:00";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";
// Enable logging to syslog. Default is False
// Unattended-Upgrade::SyslogEnable "false";
// Specify syslog facility. Default is daemon
// Unattended-Upgrade::SyslogFacility "daemon";


-- debconf information:
  unattended-upgrades/enable_auto_updates: false
  unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";
# unattended-upgrades --debug --dry-run
Paquets initialement sur la liste noire: 
Paquets initialement sur la liste blanche: 
Démarrage du script de mise à niveau automatique
Les origines permises sont: ['origin=Debian,codename=sid,label=Debian', 
'origin=Debian,codename=sid,label=Debian-Security']
adjusting candidate version: 'mazeofgalious=0.62.dfsg2-4+b1'
adjusting candidate version: 'mazeofgalious-data=0.62.dfsg2-4'
adjusting candidate version: 'uqm=0.6.2.dfsg-9.5'
adjusting candidate version: 'uqm-content=0.6.0+deb1-6'
adjusting candidate version: 'uqm-music=0.6.0+deb1-6'
adjusting candidate version: 'uqm-voice=0.6.0+deb1-6'
Checking: lzip ([<Origin component:'main' archive:'unstable' origin:'Debian' 
label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: numix-gtk-theme ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
pkg 'murrine-themes' now marked delete
sanity check failed
Checking: python-debian ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: python3-debian ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: tellico ([<Origin component:'main' archive:'unstable' origin:'Debian' 
label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: tellico-data ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: tellico-doc ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
Checking: tellico-scripts ([<Origin component:'main' archive:'unstable' 
origin:'Debian' label:'Debian' site:'ftp.us.debian.org' isTrusted:True>])
pkgs that look like they should be upgraded: lzip
python-debian
python3-debian
tellico
tellico-data
tellico-doc
tellico-scripts
Fetched 0 B in 0s (0 B/s)                                                       
                                                                               
fetch.run() result: 0
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 84944 DestFile:'/var/cache/apt/archives/lzip_1.20-1_i386.deb' 
DescURI: 
'http://ftp.us.debian.org/debian/pool/main/l/lzip/lzip_1.20-1_i386.deb' ID:0 
ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/lzip_1.20-1_i386.deb')
found pkg: lzip
No conffiles in deb '/var/cache/apt/archives/lzip_1.20-1_i386.deb' (There is no 
member named 'conffiles')
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 73084 DestFile:'/var/cache/apt/archives/python-debian_0.1.32_all.deb' 
DescURI: 
'http://ftp.us.debian.org/debian/pool/main/p/python-debian/python-debian_0.1.32_all.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/python-debian_0.1.32_all.deb')
found pkg: python-debian
No conffiles in deb '/var/cache/apt/archives/python-debian_0.1.32_all.deb' 
(There is no member named 'conffiles')
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 73132 
DestFile:'/var/cache/apt/archives/python3-debian_0.1.32_all.deb' DescURI: 
'http://ftp.us.debian.org/debian/pool/main/p/python-debian/python3-debian_0.1.32_all.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/python3-debian_0.1.32_all.deb')
found pkg: python3-debian
No conffiles in deb '/var/cache/apt/archives/python3-debian_0.1.32_all.deb' 
(There is no member named 'conffiles')
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 1342032 DestFile:'/var/cache/apt/archives/tellico_3.1.1-0.1_i386.deb' 
DescURI: 
'http://ftp.us.debian.org/debian/pool/main/t/tellico/tellico_3.1.1-0.1_i386.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/tellico_3.1.1-0.1_i386.deb')
found pkg: tellico
No conffiles in deb '/var/cache/apt/archives/tellico_3.1.1-0.1_i386.deb' (There 
is no member named 'conffiles')
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 824980 
DestFile:'/var/cache/apt/archives/tellico-data_3.1.1-0.1_all.deb' DescURI: 
'http://ftp.us.debian.org/debian/pool/main/t/tellico/tellico-data_3.1.1-0.1_all.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/tellico-data_3.1.1-0.1_all.deb')
found pkg: tellico-data
conffile line: '/etc/xdg/tellico-script.knsrc 3b13857b8692887ddbb919837069a3bd'
current md5: 3b13857b8692887ddbb919837069a3bd
conffile line: '/etc/xdg/tellico-template.knsrc 
8099647550d74292a1b19d6afd7bed60'
current md5: 8099647550d74292a1b19d6afd7bed60
conffile line: '/etc/xdg/tellicorc a9611de9255e0dbca8d860a8ba9a9347'
current md5: a9611de9255e0dbca8d860a8ba9a9347
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 47588 
DestFile:'/var/cache/apt/archives/tellico-scripts_3.1.1-0.1_all.deb' DescURI: 
'http://ftp.us.debian.org/debian/pool/main/t/tellico/tellico-scripts_3.1.1-0.1_all.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/tellico-scripts_3.1.1-0.1_all.deb')
found pkg: tellico-scripts
No conffiles in deb '/var/cache/apt/archives/tellico-scripts_3.1.1-0.1_all.deb' 
(There is no member named 'conffiles')
<apt_pkg.AcquireItem object:Status: 2 Complete: 1 Local: 1 IsTrusted: 1 
FileSize: 2921688 
DestFile:'/var/cache/apt/archives/tellico-doc_3.1.1-0.1_all.deb' DescURI: 
'http://ftp.us.debian.org/debian/pool/main/t/tellico/tellico-doc_3.1.1-0.1_all.deb'
 ID:0 ErrorText: ''>
check_conffile_prompt('/var/cache/apt/archives/tellico-doc_3.1.1-0.1_all.deb')
found pkg: tellico-doc
No conffiles in deb '/var/cache/apt/archives/tellico-doc_3.1.1-0.1_all.deb' 
(There is no member named 'conffiles')
blacklist: []
whitelist: []
Option --dry-run given, *not* performing real actions
Paquets mis à niveau: lzip python-debian python3-debian tellico tellico-data 
tellico-doc tellico-scripts
Écriture du journal de dpkg dans « 
/var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
applying set ['lzip']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/lzip_1.20-1_i386.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade {'python-debian', 'tellico-scripts', 'tellico-data', 'tellico', 
'python3-debian', 'tellico-doc'}
applying set ['python-debian']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/python-debian_0.1.32_all.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade {'tellico-scripts', 'python3-debian', 'tellico', 'tellico-doc', 
'tellico-data'}
applying set ['python3-debian']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/python3-debian_0.1.32_all.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade {'tellico-data', 'tellico-scripts', 'tellico', 'tellico-doc'}
applying set ['tellico-doc']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/tellico-doc_3.1.1-0.1_all.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade {'tellico-scripts', 'tellico', 'tellico-data'}
applying set ['tellico-scripts']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/tellico-scripts_3.1.1-0.1_all.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade {'tellico', 'tellico-data'}
applying set ['tellico-data', 'tellico', 'tellico-scripts']
/usr/bin/dpkg --status-fd 9 --no-triggers --unpack --auto-deconfigure 
/var/cache/apt/archives/tellico_3.1.1-0.1_i386.deb 
/var/cache/apt/archives/tellico-data_3.1.1-0.1_all.deb 
/var/cache/apt/archives/tellico-scripts_3.1.1-0.1_all.deb 
/usr/bin/dpkg --status-fd 9 --configure --pending 
left to upgrade set()
Toutes les mises à niveau ont été installées
adjusting candidate version: 'mazeofgalious=0.62.dfsg2-4+b1'
adjusting candidate version: 'mazeofgalious-data=0.62.dfsg2-4'
adjusting candidate version: 'uqm=0.6.2.dfsg-9.5'
adjusting candidate version: 'uqm-content=0.6.0+deb1-6'
adjusting candidate version: 'uqm-music=0.6.0+deb1-6'
adjusting candidate version: 'uqm-voice=0.6.0+deb1-6'
Suppression automatique des paquets: nvidia-legacy-340xx-kernel-4.12.0-1-686-pae
Ces packets ont été correctement supprimés
InstCount=0 DelCount=0 BrokenCount=0


--- End Message ---
--- Begin Message ---
Control: notfound -1 0.99

Dear Serge,

2018-02-23 2:05 GMT+07:00 Goupil <goupil...@gmail.com>:
> Dear Bálint,
>
> Sorry, i wasn't informed of thoses changes and i did not know this command
> (apt-mark hold <package name>).
> This modification affect the behavior of Synaptic whose 'locking'
> functionality is no longer operational when this package is installed.
>
> I'm going to make a bug report about synaptic.
>
> This issue is solved.

I see you found the relevant bug, #276655 in synaptic.

>
> Thank you very much for your time and your answer, and sorry for the
> inconvenience.

No problem, your email made me look at u-u code to check if it really
honors the hold marker and noticed that blacklist and whitelist was
not honored in auto-removal. The next upload will fix that.

Cheers,
Balint

>
> Cheers,
>
> Serge Le Tyrant.
>
>
>
> Le 21/02/2018 à 18:41, Bálint Réczey a écrit :
>>
>> Control: tags -1 moreinfo
>>
>> Dear Serge,
>>
>> 2018-02-17 22:20 GMT+07:00 Serge Le Tyrant <goupil...@gmail.com>:
>>>
>>> Package: unattended-upgrades
>>> Version: 0.99
>>> Severity: important
>>> Tags: d-i
>>>
>>> With unattended-upgrades 0.99: All Debian packages are updated (not only
>>> Debian-Security) including blocked packages
>>
>> Yes, this is a result of a recent intentional change to fix #597061 and
>> #787945.
>>
>>> I don't wan't to upgrade Tellico 3.1-0.3, because the last version
>>> (3.1.1-0.1)
>>> has an annoying bug (sorry i don't report it). So i have blocked this
>>> 3.1-0.3
>>> version on Synaptic.
>>
>> Unfortunately this 'locking' affect's only Synaptic. To hold a package
>> for most package management interfaces please use:
>>
>>   apt-mark hold <package name>
>>
>>> I hadn't this probleme before this 0.99 version (upgraded on the
>>> 02.10.2018)
>>
>> Yes, the change took place in 0.99.
>>
>>> /etc/apt/apt.conf.d/10periodic (i never edited it) :
>>> APT::Periodic::Update-Package-Lists "0";
>>> APT::Periodic::Unattended-Upgrade "1";
>>> APT::Periodic::Download-Upgradeable-Packages "1";
>>> APT::Periodic::AutocleanInterval "0";
>>>
>>> If i understand Debian Wiki correctly :
>>> APT::Periodic::Download-Upgradeable-Packages "1" mean Do "apt-get upgrade
>>> --download-only" so unattended-upgrades must only download upgradable
>>> packages,
>>> and not to update all the system, and let alone update blocked packets.
>>
>> No, this option is documented in /usr/lib/apt/apt.systemd.daily and
>> controls only the interval packages are downloaded.
>>
>>> This can cause a severe malfunction of my system if I dont want to update
>>> a
>>> kernel or a library whose top version does not work
>>
>> Please use the apt-mark hold <package name> command to lock packages
>> and u-u will honor that. You can also choose set
>> Unattended-Upgrade::Package-Blacklist, but that affects
>> unattended-upgrades only and not for example apt-get dselect-upgrade.
>>
>> Cheers,
>> Balint
>>
>

--- End Message ---

Reply via email to