Your message dated Wed, 15 May 2013 09:00:15 +0200
with message-id <[email protected]>
and subject line Re: Bug#702509: unattended-upgrades: does not run 
autonomously, even after it was enabled
has caused the Debian Bug report #702509,
regarding unattended-upgrades: does not run autonomously, even after it was 
enabled
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
702509: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702509
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.79.4
Severity: grave
Tags: security
Justification: renders package unusable

Dear Maintainer,

after trying to make it run by myself and googling and make a few questions 
here[1] and there[2], I've decided to contact you to report what seems to be a 
lack of functionality of the package.

Following the instructions in "/usr/share/doc/unattended-upgrades/README", 
after installing the package, I enabled it

    sudo dpkg-reconfigure -plow unattended-upgrades

uncommented the proper lines in "/etc/apt/apt.conf.d/50unattended-upgrades" 
(below) and waited for it to unattendedly keeps my system update. But that 
didn't happen.
After checking the logs in "/var/log/unattended-upgrades/" and 
"/var/log/apt/history.log" for several days, no activity was recorded there.
I also tried running it in the "--dry-run" way and it "dry worked" with no 
errors.

I've tagged the bug like a security issue because someone could trust the 
security updates of their system after installing and enabling the package and 
don't check if it's working after a long, and potentially insecure, time.

Thank you for your time and for your job maintaining the package.

Cheers,
g0to

[1]
http://serverfault.com/questions/483751/unattended-upgrades-doesnt-upgrade-or-does-nothing-at-all
[2] http://lists.debian.org/debian-user/2013/03/msg00394.html


-- System Information:
Debian Release: 7.0
Architecture: armhf (armv6l)

Kernel: Linux 3.6.11+ (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages unattended-upgrades depends on:
ii  apt                    0.9.7.7+rpi1
ii  apt-utils              0.9.7.7+rpi1
ii  debconf [debconf-2.0]  1.5.49
ii  lsb-base               4.1+Debian8+rpi1
ii  lsb-release            4.1+Debian8+rpi1
ii  python                 2.7.3-4
ii  python-apt             0.8.8.1
ii  ucf                    3.0025+nmu3
ii  xz-utils               5.1.1alpha+20120614-2

unattended-upgrades recommends no packages.

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx             <none>
pn  mail-transport-agent  <none>

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Automatically upgrade packages from these origin patterns
Unattended-Upgrade::Origins-Pattern {
        // Codename based matching:
        // This will follow the migration of a release through different
        // archives (e.g. from testing to stable and later oldstable).
        "o=Debian,n=wheezy";
        "o=Debian,n=wheezy-updates";
        "o=Debian,n=wheezy-proposed-updates";
        "o=Debian,n=wheezy,l=Debian-Security";
        // Archive or Suite based matching:
        // Note that this will silently match a different release after
        // migration to the specified archive (e.g. testing becomes the
        // new stable).
//      "o=Debian,a=stable";
//      "o=Debian,a=stable-updates";
//      "o=Debian,a=proposed-updates";
//      "origin=Debian,archive=stable,label=Debian-Security";
};
// List of packages to not update
Unattended-Upgrade::Package-Blacklist {
//      "vim";
//      "libc6";
//      "libc6-dev";
//      "libc6-i686";
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run 
//   dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps "true";
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown "true";
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. "[email protected]"
//Unattended-Upgrade::Mail "root"
// Set this value to "true" to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError "true";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
Unattended-Upgrade::Remove-Unused-Dependencies "true";
// Automatically reboot *WITHOUT CONFIRMATION* if a 
// the file /var/run/reboot-required is found after the upgrade 
Unattended-Upgrade::Automatic-Reboot "true";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";


-- debconf information:
* unattended-upgrades/enable_auto_updates: true

--- End Message ---
--- Begin Message ---
Closing as per bug log.

--- End Message ---

Reply via email to