Your message dated Wed, 12 Dec 2018 13:06:07 +0000
with message-id <[email protected]>
and subject line Bug#753892: fixed in unattended-upgrades 1.9
has caused the Debian Bug report #753892,
regarding Package-Blacklist: regular expressions are not only supported, they 
are mandatory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
753892: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753892
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.82.7
Severity: minor

Hi,

The file 50unattended-upgrades contains this section:

// List of packages to not update (regexp are supported)
Unattended-Upgrade::Package-Blacklist {
//  "vim";
//  "libc6";
//  "libc6-dev";
//  "libc6-i686";
};

Since the program uses re.match in python, "libc6" is actually used as the regex "^libc6", which already also matches libc6-dev, libc6-i686 or anything other that starts with lib6c. Identically, "vim" also matches vimperator, etc...

This makes the list of examples a bit misleading for users. Regexes are not only supported, they are mandatory here. :)

Here's a suggestion for a change of this part of the configuration file, which might help users who are not very familiar with regular expressions a bit:

// Regular expressions, matching packages to exclude from upgrading
Unattended-Upgrade::Package-Blacklist {
    // The following matches all packages starting with linux-
//  "linux-";

    // Use $ to explicitely define the end of a package name. Without
    // the $, "libc6" would match all of them.
//  "libc6$";
//  "libc6-dev$";
//  "libc6-i686$";

    // The following matches packages like xen-system-amd64, xen-utils-4.1,
    // xenstore-utils and libxenstore3.0
    "(lib)?xen(store)?";

    // For more information about regular expressions, see
    // https://docs.python.org/3/howto/regex.html
};

Since the configured list is a blacklist, it's easier to accidentally prevent upgrades instead of accidentally installing them when making mistakes, that's nice.

Regards,

--
Hans van Kranenburg - System / Network Engineer
T +31 (0)10 2760434 | [email protected] | www.mendix.com

--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 1.9

We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey <[email protected]> (supplier of updated unattended-upgrades 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 12 Dec 2018 13:41:49 +0100
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.9
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <[email protected]>
Changed-By: Balint Reczey <[email protected]>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 753892 775469
Launchpad-Bugs-Fixed: 1167053 1805447 1806487
Changes:
 unattended-upgrades (1.9) unstable; urgency=medium
 .
   [ Julian Andres Klode ]
   * test_dev_release: Fix and enable test.
   * Depend on python3-distro-info.
     This is needed to make sure DEVEL_UNTIL_RELEASE actually works. We need
     to fix up travis in addition to control, as it only knows about trusty
     build dependencies.
   * Import distro_info globally, and fix calculation of days.
     The check was off by one: If you were 21 days away from the release,
     it would not switch on, but tell you that it would not upgrade before
     today.
   * test_dev_release: Test Unattended-Upgrade::DevRelease=auto.
 .
   [ David Lang and Balint Reczey]
   * Allow installing untrusted packages when APT::Get::AllowUnauthenticated
     is set (Closes: #775469) (LP: #1167053)
 .
   [ Hans van Kranenburg and Balint Reczey]
   * Clarify highly misleading Package-Blacklist option documentation
     (Closes: #753892)
 .
   [ Balint Reczey ]
   * test/test_dev_release.py: Fix missing mock attributes
   * Leave the cache clean when returning from calculate_upgradable_pkgs()
     When collecting upgradable packages the upgradable ones stayed in the
     cache and they were upgraded together even when unattended-upgrades
     was configured to perform upgrades in minimal steps.
     Thanks to Paul Wise
   * debian/tests/upgrade-all-security: Check if all security-updates are
     applied and if old-autoremovable packages are kept
   * Clear cache only when needed when checking black- and whitelists
   * Add --no-minimal-upgrade-steps option
   * Stop using untrusted package names as blacklists (LP: #1805447)
   * Update copyright info
   * Load modules lazily loaded by datetime.datetime.strptime() when u-u starts
     When Python is upgraded to a new major version the the version running
     unattended-upgrades can be removed as being newly unused causing a crash.
   * Start service after systemd-logind.service to be able to take inhibition 
lock
     and handle gracefully when logind is down (LP: #1806487)
   * List packages making reboot required in /var/run/reboot-required.pkgs
Checksums-Sha1:
 b6780b988abea5fbee26f5b6090c6d80ce3ecb52 1865 unattended-upgrades_1.9.dsc
 9de05de9b90f96b8515afdf344b9324b187ee675 111984 unattended-upgrades_1.9.tar.xz
 c195df2483648a15922533700781fe88e6e2f34b 7821 
unattended-upgrades_1.9_source.buildinfo
Checksums-Sha256:
 3c58830b403920a815c2ff52c41132f9e3ff4c48a919e1cb4243d5d9845df868 1865 
unattended-upgrades_1.9.dsc
 b67cc877ecf443bb4b69aee08d272b24995c0d9a1a2be6ca41f67f6bb868e928 111984 
unattended-upgrades_1.9.tar.xz
 91c8bef00e55d5df95b428201a18a756cf885f48e372282e65cbef3a0f9782fe 7821 
unattended-upgrades_1.9_source.buildinfo
Files:
 42deda63e38567a9ab042c6b922c8be4 1865 admin optional 
unattended-upgrades_1.9.dsc
 54bcf29b23bf5d4b4f8e49f1f17fcfd5 111984 admin optional 
unattended-upgrades_1.9.tar.xz
 a8978478b4f50951cb7980b50558a574 7821 admin optional 
unattended-upgrades_1.9_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=8syb
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to