Hi,

That's a recurrent anti-pattern that Debian tries to get away from,
like the old /etc/default/$<package> ENABLED=yes stuff.

Normal people expect stuff to just works out of the box;
and things should be optimised for the most common case.

You could rather use systemd functionnallity to disable/mask
apt-daily-upgrade.timer.

> some packages have unattended-upgrades as a dependency or in recommends

I only see "plinth - web front end for administering every aspect of a
FreedomBox"
and "python3-software-properties"

Greetings,

2018-06-29 9:26 GMT+02:00 annadane <fjfj...@protonmail.com>:
> Package: unattended-upgrades
> Severity: wishlist
>
> Dear Maintainer,
>
> If it were possible, I'd like to see unattended-upgrades not enable itself by 
> default when the user first installs it. I'm actually not sure what the 
> default is when you specifically tell it to install - aka "apt install 
> unattended-upgrades", but in any event I feel it should a) be off by default 
> unless the user specifically configures it to be on and more importantly b) 
> some packages have unattended-upgrades as a dependency or in recommends (I've 
> noticed it gets installed sometimes as an effect of installing some other 
> packages) - in that case ESPECIALLY it should really *not* be enabled by 
> default. Just my 2 cents. This also happens in Sid (it's not as catastrophic 
> in Stable though it can be) where one really wants to vet one's updates as 
> there's higher chance of breakage.
>
> -- System Information:
> Debian Release: buster/sid
>   APT prefers unstable
>   APT policy: (500, 'unstable')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 4.16.0-2-amd64 (SMP w/4 CPU cores)
> Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
> LANGUAGE=en_CA:en (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
>

Reply via email to