Bug#902653: unattended-upgrades: Please do not auto enable upon install

2019-10-03 Thread Patrik Schindler
Hello,

my opinion: If I install something by hand I do so because I want it's 
functionality. From this POV, it should be enabled. After all, if I install a 
package which does some "magic" I don't install and forget but take my time to 
review it's config files to understand how it works. If I don't want it's 
functionality (yet), I simply could remove or don't install in the first place.
If it's installed by default on new installs, it maybe should be disabled to 
not do something unexpected. Since I don't do new installs but just clone a 
master install, my opinion isn't too relevant, maybe.
It could be a simple solution to just print a message text about the status 
(enabled/disabled, reflecting probably existing conffile content) in postinst. 
I've seen other packages doing so do direct the user that he has to take 
further measures.

Sites with many servers and some kind of automation (ansible or something 
similar) IMO should test new packages in a sandbox system before rollout to 
many machines automatically and having interesting surprises afterwards. At 
least, I'd consider this real-world practice.

:wq! PoC

PGP-Key: DDD3 4ABF 6413 38DE - https://www.pocnet.net/poc-key.asc



Bug#902653: unattended-upgrades: Please do not auto enable upon install

2018-09-10 Thread Bálint Réczey
Hi Olivier,

Olivier Berger  ezt írta (időpont:
2018. szept. 10., H, 9:02):
>
> On Fri, Jun 29, 2018 at 09:41:25AM +0200, Alexandre Detiste wrote:
> >
> > > some packages have unattended-upgrades as a dependency or in recommends
> >
> > I only see "plinth - web front end for administering every aspect of a
> > FreedomBox"
> > and "python3-software-properties"
> >
>
> I have the feeling that python3-software-properties is in turn almost
> always installed with Gnome nowadays (testing here)... which would make
> unattended-upgrades run on every Gnome desktop basically.
>
> I'm noty sure this is the intended behaviour, even if the problem
> probably lies in the python3-software-properties maintainer, then, and
> where recommends is a too strong dependency ?

Recommends is already a demotion from Depends, done in
software-properties (0.96.19), but it is up to the maintainer to
demote it further.

I would still recommend installing u-u on desktops, too, and I made
several changes recently to make u-u a good fit there, too, like
skipping upgrades on battery and on metered Internet connections.

Cheers,
Balint

>
> Hope this helps.
>
> Best regards,
> --
> Olivier BERGER
> http://www-public.telecom-sudparis.eu/~berger_o/ - OpenPGP-Id: 2048R/5819D7E8
> Ingenieur Recherche - Dept INF
> Institut Mines-Telecom, Telecom SudParis, Evry (France)
>



Bug#902653: unattended-upgrades: Please do not auto enable upon install

2018-09-10 Thread Olivier Berger
On Fri, Jun 29, 2018 at 09:41:25AM +0200, Alexandre Detiste wrote:
> 
> > some packages have unattended-upgrades as a dependency or in recommends
> 
> I only see "plinth - web front end for administering every aspect of a
> FreedomBox"
> and "python3-software-properties"
> 

I have the feeling that python3-software-properties is in turn almost
always installed with Gnome nowadays (testing here)... which would make
unattended-upgrades run on every Gnome desktop basically.

I'm noty sure this is the intended behaviour, even if the problem
probably lies in the python3-software-properties maintainer, then, and
where recommends is a too strong dependency ?

Hope this helps.

Best regards,
-- 
Olivier BERGER 
http://www-public.telecom-sudparis.eu/~berger_o/ - OpenPGP-Id: 2048R/5819D7E8
Ingenieur Recherche - Dept INF
Institut Mines-Telecom, Telecom SudParis, Evry (France)



Bug#902653: unattended-upgrades: Please do not auto enable upon install

2018-06-29 Thread Bálint Réczey
Control: tags -1 wontfix

Hi Annadane,

2018-06-29 9:26 GMT+02:00 annadane :
> Package: unattended-upgrades
> Severity: wishlist
>
> Dear Maintainer,
>
> If it were possible, I'd like to see unattended-upgrades not enable itself by 
> default when the user first installs it. I'm actually not sure what the 
> default is when you specifically tell it to install - aka "apt install 
> unattended-upgrades", but in any event I feel it should a) be off by default 
> unless the user specifically configures it to be on and more importantly b) 
> some packages have unattended-upgrades as a dependency or in recommends (I've 
> noticed it gets installed sometimes as an effect of installing some other 
> packages) - in that case ESPECIALLY it should really *not* be enabled by 
> default. Just my 2 cents. This also happens in Sid (it's not as catastrophic 
> in Stable though it can be) where one really wants to vet one's updates as 
> there's higher chance of breakage.

Installing or not installing u-u by default is not up to the u-u
maintainers, but up to the ones working on installers. It u-u's case I
agree with their decision to have u-u installed by default since this
package ensures that systems are kept up-to-date on server installs.
U-u can be disabled by the administrator at any time, or it can be
configured to keep a specific set of packages unaffected. A discussion
about having it enabled can be read in #597061.

If you are on stable or testing and any upgrade breaks, please report
it, those breakages should be fixed.

If you are on sid, since transitions can be in flight or due to other
transient bugs your upgrades may fail, but unattended-upgrades is
upgrading packages in minimal sets and as a Sid User you should be
able able to recover from those states. Sid Users should be aware of
the risks of running bleeding edge Debian and I updated the
recommendations for them to consider disabling unattended-upgrades at
https://wiki.debian.org/DebianUnstable

Cheers,
Balint



Bug#902653: unattended-upgrades: Please do not auto enable upon install

2018-06-29 Thread Alexandre Detiste
Hi,

That's a recurrent anti-pattern that Debian tries to get away from,
like the old /etc/default/$ ENABLED=yes stuff.

Normal people expect stuff to just works out of the box;
and things should be optimised for the most common case.

You could rather use systemd functionnallity to disable/mask
apt-daily-upgrade.timer.

> some packages have unattended-upgrades as a dependency or in recommends

I only see "plinth - web front end for administering every aspect of a
FreedomBox"
and "python3-software-properties"

Greetings,

2018-06-29 9:26 GMT+02:00 annadane :
> Package: unattended-upgrades
> Severity: wishlist
>
> Dear Maintainer,
>
> If it were possible, I'd like to see unattended-upgrades not enable itself by 
> default when the user first installs it. I'm actually not sure what the 
> default is when you specifically tell it to install - aka "apt install 
> unattended-upgrades", but in any event I feel it should a) be off by default 
> unless the user specifically configures it to be on and more importantly b) 
> some packages have unattended-upgrades as a dependency or in recommends (I've 
> noticed it gets installed sometimes as an effect of installing some other 
> packages) - in that case ESPECIALLY it should really *not* be enabled by 
> default. Just my 2 cents. This also happens in Sid (it's not as catastrophic 
> in Stable though it can be) where one really wants to vet one's updates as 
> there's higher chance of breakage.
>
> -- System Information:
> Debian Release: buster/sid
>   APT prefers unstable
>   APT policy: (500, 'unstable')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 4.16.0-2-amd64 (SMP w/4 CPU cores)
> Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
> LANGUAGE=en_CA:en (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
>



Bug#902653: unattended-upgrades: Please do not auto enable upon install

2018-06-29 Thread annadane
Package: unattended-upgrades
Severity: wishlist

Dear Maintainer,

If it were possible, I'd like to see unattended-upgrades not enable itself by 
default when the user first installs it. I'm actually not sure what the default 
is when you specifically tell it to install - aka "apt install 
unattended-upgrades", but in any event I feel it should a) be off by default 
unless the user specifically configures it to be on and more importantly b) 
some packages have unattended-upgrades as a dependency or in recommends (I've 
noticed it gets installed sometimes as an effect of installing some other 
packages) - in that case ESPECIALLY it should really *not* be enabled by 
default. Just my 2 cents. This also happens in Sid (it's not as catastrophic in 
Stable though it can be) where one really wants to vet one's updates as there's 
higher chance of breakage.

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.16.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled