Your message dated Fri, 09 Feb 2018 15:36:47 +0000
with message-id <e1ekajh-0002mi...@fasolo.debian.org>
and subject line Bug#877395: fixed in unattended-upgrades 0.99
has caused the Debian Bug report #877395,
regarding unattended-upgrades: Codename based matching should use 
${distro_codename}, not "jessie"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
877395: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877395
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.98
Severity: normal

Dear Maintainer,

In /etc/apt/apt.conf.d/50unattended-upgrades, in the the section
labeled "Unattended-Upgrades::Origins-Pattern, there are two problems.

1) The release name is hardcoded to "jessie" in the commented out
example of how to always have the latest software for a named Debian
release, but never automatically upgrade to a new release. This should
default to ${distro_codename}, so people can simply uncomment the
lines to have them work.

2) The line which automatically handles security upgrades is in the
wrong section. It correctly use ${distro_codename}, but is listed with
the archive based matching rules.)

I have an included a patch which fixes those problems.


-- System Information:
Debian Release: 9.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages unattended-upgrades depends on:
ii  apt                    1.4.7
ii  apt-utils              1.4.7
ii  debconf [debconf-2.0]  1.5.61
ii  init-system-helpers    1.48
ii  lsb-base               9.20161125
ii  lsb-release            9.20161125
ii  python3                3.5.3-1
ii  python3-apt            1.4.0~beta3
ii  ucf                    3.0036
ii  xz-utils               5.2.2-1.2+b1

Versions of packages unattended-upgrades recommends:
ii  anacron             2.3-24
ii  cron [cron-daemon]  3.0pl1-128+b1

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx                                  <none>
ii  exim4-daemon-light [mail-transport-agent]  4.89-2+deb9u1
pn  needrestart                                <none>

-- debconf information:
* unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";
* unattended-upgrades/enable_auto_updates: true
--- /etc/apt/apt.conf.d/50unattended-upgrades.orig      2017-10-01 
04:00:12.040037525 -0700
+++ /etc/apt/apt.conf.d/50unattended-upgrades   2017-10-01 04:14:27.382575445 
-0700
@@ -19,15 +19,17 @@
 // Within lines unattended-upgrades allows 2 macros whose values are
 // derived from /etc/debian_version:
 //   ${distro_id}            Installed origin.
-//   ${distro_codename}      Installed codename (eg, "jessie")
+//   ${distro_codename}      Installed codename (eg, "buster")
 Unattended-Upgrade::Origins-Pattern {
         // Codename based matching:
         // This will follow the migration of a release through different
         // archives (e.g. from testing to stable and later oldstable).
-//      "o=Debian,n=jessie";
-//      "o=Debian,n=jessie-updates";
-//      "o=Debian,n=jessie-proposed-updates";
-//      "o=Debian,n=jessie,l=Debian-Security";
+       // Software will be the latest available for the named release,
+       // but the Debian release itself will not be automatically upgraded.
+//     "origin=Debian,codename=${distro_codename}";
+//     "origin=Debian,codename=${distro_codename}-updates";
+//     "origin=Debian,codename=${distro_codename}-proposed-updates";
+       "origin=Debian,codename=${distro_codename},label=Debian-Security";
 
         // Archive or Suite based matching:
         // Note that this will silently match a different release after
@@ -37,7 +39,6 @@
 //      "o=Debian,a=stable-updates";
 //      "o=Debian,a=proposed-updates";
 //      "o=Debian Backports,a=${distro_codename}-backports,l=Debian Backports";
-        "origin=Debian,codename=${distro_codename},label=Debian-Security";
 };
 
 // List of packages to not update (regexp are supported)

--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 0.99

We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 877...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey <rbal...@ubuntu.com> (supplier of updated unattended-upgrades 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 09 Feb 2018 02:52:19 +0700
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 0.99
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <m...@debian.org>
Changed-By: Balint Reczey <rbal...@ubuntu.com>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 597061 787945 817974 838368 875383 876425 877395 886803
Launchpad-Bugs-Fixed: 1230246 1269177 1446552 1458204 1577215 1737442 1737635 
1737637 1737717 1741579
Changes:
 unattended-upgrades (0.99) unstable; urgency=medium
 .
   [ Peter Nowee ]
   * Fix Raspbian default config codename matching.
     Using `archive=${distro_codename}` does not match, at least not in
     Raspbian Stretch anymore. Changing it to `codename=${distro_codename}`.
     I tested that it now works and did not notice any regressions.
     Same change was made to the Debian-specific configuration 3 years ago,
     see commit 9a2afa5.
   * Enable RPi-specific upgrades on Raspbian.
     In addition to the Raspbian repository, Raspbian images distributed by
     the Raspberry Pi Foundation (RPF) depend on the RPF repository for
     kernel and firmware updates.
     This commit adds a pattern matching line for packages from the RPF
     repository to the Raspbian config file for unattended-upgrades.
 .
   [ Alexandre Detiste ]
   * Drop unused dependency on apt-utils (Closes: #876425)
 .
   [ Frans Spiesschaert ]
   * Dutch translation update
 .
   [ Chris Leick ]
   * German translation update
 .
   [ Ben Wong ]
   * Fix configuration file examples (Closes: #877395)
 .
   [ Balint Reczey ]
   * Test for running systemd on Debian, too, when applying workaround for it
   * Fix calling dh_installinit during build
   * Tidy up d/control using cme fix
   * Fix log file location in man page.
     Thanks to Jaakov for the bug report (Closes: #817974)
   * Build-depend on debhelper (>= 9.20160709) instead of dh-systemd
   * Link unattended-upgrades.8 to unattended-upgrade.8 man page
   * Add Auto-Submitted header to email report (LP: #1230246)
   * Exit with error when package installation failed or u-u is signalled to
     stop (Closes: #838368)
   * Process packages needing smaller upgrade sets earlier in generating
     minimal upgrade sets.
     Inspired by Michael Vogt's partition pre-calculation code
   * Exit with printing error when apt errors prevent initialization
     (LP: #1737442)
   * Mark invalid UTF-8 characters in dpkg's log, but don't crash
     (LP: #1737635)
   * Try upgrading packages replacing configuration dir with configuration file
     (LP: #1737637)
   * Make unattended-upgrade-shutdown exit with error when apt config is
     invalid (LP: #1737717)
   * Exit when an apt error prevents checking a package for conffile prompt
   * Install upgrades from ${distro_codename}, label=Debian by default.
     This enables updates from stable point releases but also lets testing
     and sid being updated with the package updates.
     Fixes #33. (Closes: #787945, #597061)
   * Fix debian/NEWS.Debian's format
   * Add NEWS item about unattended-uprades installing stable/all updates
   * Stop asking debconf question about Origins-Pattern.
     50unattended-upgrades now contains multiple origins by default and setting
     them from debconf can't be made really easy. Users should change the
     configuration file itself instead. (LP: #1577215)
   * Update PO files about debconf templates
   * Don't log exceptions which did not happen
   * Add autopkgtest for upgrading unstable between two snapshots from
     snapshot.d.o
   * Remove tabs from Debian's configuration file
   * Catch SystemError instead of apt_pkg.Error for backwards compatibility
   * Check in autopkgtest if unattended-upgrades mark additional packages as
     manually installed
   * Test upgrading a full system with desktop packages in autopkgtest.
     Also pick different shapshots with which does not contain
     broken packages.
   * Test sending email after upgrading a full system
   * Show "please don't turn off the computer" while installing updates on
     shutdown.
     This is more informational for users than the original "sleeping for 5s".
     Thanks to Mario Loderer for the suggestion (LP: #1741579)
   * Use eatmydata for system upgrade autopkgtest
   * Run upgrade-between-snapshots autopkgtest even on other distros
   * Apt install built u-u in snapshot upgrade test
   * Update .pot file
   * Fix version of test package in test_remove_unused_dependencies
     (Closes: #886803)
   * Refresh cache after committing changes to avoid reinstalling packages
     (Closes: #875383)
   * Relax calculating truly minimal sets to sets expected to be minimal.
     This speeds up calculation by making it from ~O(n^2) to ~O(n) at the
     expense of creating slightly bigger sets in rare cases.
 .
   [ Evilham ]
   * Add Devuan support.
 .
   [ Brian Murray ]
   * unattended-upgrades: Do not reboot during a dry-run (LP: #1269177)
 .
   [ Michael Vogt ]
   * enable pep484 test
   * mypy fixes
   * add two missing return values
   * tests: cleanup test_mail.py to use proper tmpdirs
 .
   [ Julian Andres Klode ]
   * Do not touch reboot-required on linux-image-extra removal (LP: #1458204)
 .
   [ Sjoerd Job Postmus ]
   * Adjust candidate version of packages to be newly installed (LP: #1446552)
Checksums-Sha1:
 88b1d55ee38d20cc8b35b8eeb316dd6a5d92c63c 1825 unattended-upgrades_0.99.dsc
 1ad08e3fe4fac2f43381849dbef5df6baf13277d 228572 unattended-upgrades_0.99.tar.xz
 1cb96a07393c7f167d22a23c533997f9dbf02ece 6353 
unattended-upgrades_0.99_source.buildinfo
Checksums-Sha256:
 161d5b7d19300df67bf6a879bb1f13a6545424c1b07884f2c04d00ac742f0310 1825 
unattended-upgrades_0.99.dsc
 d41e4dd9780b4e89c99ff2ce1c2feef4f717d719727f69db378cc3dec57c81ec 228572 
unattended-upgrades_0.99.tar.xz
 fb5d842b1a827df8edbccd221e8e1f623a61aa81870892125a77f737a016cc56 6353 
unattended-upgrades_0.99_source.buildinfo
Files:
 2c092986708cbc06f9f24c23c12531c8 1825 admin optional 
unattended-upgrades_0.99.dsc
 d9c549321654bf20bc6194e4c7796112 228572 admin optional 
unattended-upgrades_0.99.tar.xz
 8fb686e84e3f76b51b3a409b0694ff6d 6353 admin optional 
unattended-upgrades_0.99_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=4uQR
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to