On Mon, Apr 23, 2012 at 12:41:01PM +0300, Teodor wrote:
> Package: unattended-upgrades
> Version: 0.76.2
> Severity: grave
> Justification: renders package unusable

Thanks for your bugreport. 

This should work with current sid but it will not work with older
version of python-apt. I added a check into do the code to not crash
if it runs with older versions of python-apt.

Cheers,
 Michael
 
> Hi,
> 
> I upgraded u-a on one 32-bit server to test if another problem is fixed and
> found that it doesn't work anymore:
> 
> | root@goliath:~# unattended-upgrades --debug
> | INFO:root:Initial blacklisted packages: locales libc6-i686 libc-bin libc6 
> linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free 
> linux-base libupsclient1 nut nut-cgi squid3-common squid3
> | Initial blacklisted packages: locales libc6-i686 libc-bin libc6 
> linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free 
> linux-base libupsclient1 nut nut-cgi squid3-common squid3
> | INFO:root:Starting unattended upgrades script
> | Starting unattended upgrades script
> | INFO:root:Allowed origins are: ['o=Debian,a=stable', 
> 'o=Debian,a=stable-updates', 'o=Debian,a=proposed-updates', 
> 'origin=Debian,archive=stable,label=Debian-Security']
> | Allowed origins are: ['o=Debian,a=stable', 'o=Debian,a=stable-updates', 
> 'o=Debian,a=proposed-updates', 
> 'origin=Debian,archive=stable,label=Debian-Security']
> | Traceback (most recent call last):
> |   File "/usr/bin/unattended-upgrades", line 920, in <module>
> |     main(options)
> |   File "/usr/bin/unattended-upgrades", line 699, in main
> |     allowed_origins=allowed_origins)
> |   File "/usr/bin/unattended-upgrades", line 70, in __init__
> |     self.adjust_candidate_versions()
> |   File "/usr/bin/unattended-upgrades", line 94, in adjust_candidate_versions
> |     if ver.policy_priority < 0:
> | AttributeError: 'Version' object has no attribute 'policy_priority'
> 
> (on this system I do many u-a tests, that's why it has many packages 
> blacklisted)
> 
> Thanks
> 
> 
> -- System Information:
> Debian Release: 6.0.4
>   APT prefers stable-updates
>   APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
> 'stable')
> Architecture: i386 (i686)
> 
> Kernel: Linux 2.6.32-5-686-bigmem (SMP w/2 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> 
> Versions of packages unattended-upgrades depends on:
> ii  apt                   0.8.10.3+squeeze1  Advanced front-end for dpkg
> ii  apt-utils             0.8.10.3+squeeze1  APT utility programs
> ii  debconf [debconf-2.0] 1.5.36.1           Debian configuration management 
> sy
> ii  lsb-release           3.2-23.2squeeze1   Linux Standard Base version 
> report
> ii  python                2.6.6-3+squeeze6   interactive high-level 
> object-orie
> ii  python-apt            0.7.100.1+squeeze1 Python interface to libapt-pkg
> ii  ucf                   3.0025+nmu1        Update Configuration File: 
> preserv
> 
> unattended-upgrades recommends no packages.
> 
> Versions of packages unattended-upgrades suggests:
> pn  bsd-mailx                     <none>     (no description available)
> 
> -- Configuration Files:
> /etc/apt/apt.conf.d/50unattended-upgrades changed:
> // Automatically upgrade packages from these origin patterns
> Unattended-Upgrade::Origins-Pattern {
>         // Codename based matching:
>         // This will follow the migration of a release through different
>         // archives (e.g. from testing to stable and later oldstable).
> //      "o=Debian,n=squeeze";
> //      "o=Debian,n=squeeze-updates";
> //      "o=Debian,n=squeeze-proposed-updates";
> //      "o=Debian,n=squeeze,l=Debian-Security";
>         // Archive or Suite based matching:
>         // Note that this will silently match a different release after
>         // migration to the specified archive (e.g. testing becomes the
>         // new stable).
>       "o=Debian,a=stable";
>       "o=Debian,a=stable-updates";;
>       "o=Debian,a=proposed-updates";
>         "origin=Debian,archive=stable,label=Debian-Security";
> };
> // List of packages to not update
> Unattended-Upgrade::Package-Blacklist {
> //    "vim";
> //    "libc6";
> //    "libc6-dev";
> //    "libc6-i686";
> };
> // This option allows you to control if on a unclean dpkg exit
> // unattended-upgrades will automatically run 
> //   dpkg --force-confold --configure -a
> // The default is true, to ensure updates keep getting installed
> //Unattended-Upgrade::AutoFixInterruptedDpkg "false";
> // Split the upgrade into the smallest possible chunks so that
> // they can be interrupted with SIGUSR1. This makes the upgrade
> // a bit slower but it has the benefit that shutdown while a upgrade
> // is running is possible (with a small delay)
> //Unattended-Upgrade::MinimalSteps "true";
> // Install all unattended-upgrades when the machine is shuting down
> // instead of doing it in the background while the machine is running
> // This will (obviously) make shutdown slower
> //Unattended-Upgrade::InstallOnShutdown "true";
> // Send email to this address for problems or packages upgrades
> // If empty or unset then no email is sent, make sure that you
> // have a working mail setup on your system. A package that provides
> // 'mailx' must be installed.
> Unattended-Upgrade::Mail "root";
> // Set this value to "true" to get emails only on errors. Default
> // is to always send a mail if Unattended-Upgrade::Mail is set
> //Unattended-Upgrade::MailOnlyOnError "true";
> // Do automatic removal of new unused dependencies after the upgrade
> // (equivalent to apt-get autoremove)
> //Unattended-Upgrade::Remove-Unused-Dependencies "false";
> // Automatically reboot *WITHOUT CONFIRMATION* if a 
> // the file /var/run/reboot-required is found after the upgrade 
> //Unattended-Upgrade::Automatic-Reboot "false";
> // Use apt bandwidth limit feature, this example limits the download
> // speed to 70kb/sec
> //Acquire::http::Dl-Limit "70";
> 
> 
> -- debconf information:
> * unattended-upgrades/enable_auto_updates: true
> 
> 



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to