Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
On Fri, Mar 8, 2013 at 6:50 AM, Michael Vogt m...@debian.org wrote:

 On Thu, Mar 07, 2013 at 04:43:03PM +0100, g0to wrote:
  Package: unattended-upgrades
  Version: 0.79.4
  Severity: grave
  Tags: security
  Justification: renders package unusable

 Thanks for your bugreport.

  after trying to make it run by myself and googling and make a few
 questions here[1] and there[2], I've decided to contact you to report what
 seems to be a lack of functionality of the package.
 
  Following the instructions in
 /usr/share/doc/unattended-upgrades/README, after installing the package,
 I enabled it
 
  sudo dpkg-reconfigure -plow unattended-upgrades
 
  uncommented the proper lines in
 /etc/apt/apt.conf.d/50unattended-upgrades (below) and waited for it to
 unattendedly keeps my system update. But that didn't happen.
  After checking the logs in /var/log/unattended-upgrades/ and
 /var/log/apt/history.log for several days, no activity was recorded there.
  I also tried running it in the --dry-run way and it dry worked with
 no errors.
 
  I've tagged the bug like a security issue because someone could trust
 the security updates of their system after installing and enabling the
 package and don't check if it's working after a long, and potentially
 insecure, time.
 
  Thank you for your time and for your job maintaining the package.

 The way you enabled it should work so I would need some additional
 information from you to figure out what is going on. Could you please
 send me the output of:
 $ apt-config dump|grep Periodic


APT::Periodic ;
APT::Periodic::Update-Package-Lists 1;
APT::Periodic::Unattended-Upgrade 1;



 and then the debug output that:
  $ sudo unattended-upgrade --debug --dry-run  /tmp/un.output 21
 This will generate a file /tmp/un.output that I need too.


I think that you had a typo at the end of your line. This is the output of
running
 $ sudo unattended-upgrade --debug --dry-run  /tmp/un.output 21

Initial blacklisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Debian,n=wheezy', 'o=Debian,n=wheezy-updates',
'o=Debian,n=wheezy-proposed-updates', 'o=Debian,n=wheezy,l=Debian-Security']
pkgs that look like they should be upgraded:
Fetched 0 B in 0s (0
B/s)
fetch.run() result: 0
blacklist: []
Packages that are auto removed: ''
InstCount=0 DelCount=0 BrokenCout=0
No packages found that can be upgraded unattended


 and finally the file:
  /var/log/unattended-upgrades/unattended-upgrades.log


Note that this file didn't exist until I ran the line above (the
--dry-run). Here's its content:

2013-03-08 11:48:08,316 INFO Initial blacklisted packages:
2013-03-08 11:48:08,322 INFO Starting unattended upgrades script
2013-03-08 11:48:08,328 INFO Allowed origins are: ['o=Debian,n=wheezy',
'o=Debian,n=wheezy-updates', 'o=Debian,n=wheezy-proposed-updates',
'o=Debian,n=wheezy,l=Debian-Security']
2013-03-08 11:49:15,411 DEBUG pkgs that look like they should be upgraded:
2013-03-08 11:49:15,488 DEBUG fetch.run() result: 0
2013-03-08 11:49:15,490 DEBUG blacklist: []
2013-03-08 11:49:35,734 INFO Packages that are auto removed: ''
2013-03-08 11:49:35,736 DEBUG InstCount=0 DelCount=0 BrokenCout=0
2013-03-08 11:49:35,741 INFO No packages found that can be upgraded
unattended



 That hopefully gives me enough information to figure out what is going
 on. I suspect for some reason the script is not run in your cron which
 is strange. It hooks into /etc/cron.daily/apt, you can also run:
  $ sudo sh -x /etc/cron.daily/apt


+ test -r /var/lib/apt/extended_states
+ cd /var/backups
+ cmp -s apt.extended_states.0 /var/lib/apt/extended_states
+ which apt-config
+ AutoAptEnable=1
+ apt-config shell AutoAptEnable APT::Periodic::Enable
+ eval
+ [ 1 -eq 0 ]
+ VERBOSE=0
+ apt-config shell VERBOSE APT::Periodic::Verbose
+ eval
+ debug_echo verbose level 0
+ [ 0 -ge 1 ]
+ [ 0 -le 2 ]
+ XSTDOUT=/dev/null
+ XSTDERR=2/dev/null
+ XAPTOPT=-qq
+ XUUPOPT=
+ [ 0 -ge 3 ]
+ check_power
+ which on_ac_power
+ return 0
+ which apt-get
+ eval apt-get check -f -qq 2/dev/null
+ apt-get check -f -qq
+ date +%s
+ now=1362740095
+ UpdateInterval=0
+ apt-config shell UpdateInterval APT::Periodic::Update-Package-Lists
+ eval UpdateInterval='1'
+ UpdateInterval=1
+ DownloadUpgradeableInterval=0
+ apt-config shell DownloadUpgradeableInterval
APT::Periodic::Download-Upgradeable-Packages
+ eval
+ UnattendedUpgradeInterval=0
+ apt-config shell UnattendedUpgradeInterval
APT::Periodic::Unattended-Upgrade
+ eval UnattendedUpgradeInterval='1'
+ UnattendedUpgradeInterval=1
+ AutocleanInterval=0
+ apt-config shell AutocleanInterval APT::Periodic::AutocleanInterval
+ eval
+ BackupArchiveInterval=0
+ apt-config shell BackupArchiveInterval
APT::Periodic::BackupArchiveInterval
+ eval
+ Debdelta=1
+ apt-config shell Debdelta
APT::Periodic::Download-Upgradeable-Packages-Debdelta
+ eval
+ [ 1 -eq 0 ]
+ do_cache_backup 0
+ BackupArchiveInterval=0
+ [ 0 -eq 0 ]
+ return
+ random_sleep
+ RandomSleep=1800
+ apt-config shell RandomSleep 

Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
Hi, Teodor,

On Fri, Mar 8, 2013 at 7:50 AM, Teodor MICU mteo...@gmail.com wrote:

 2013/3/7 g0to amo...@gmail.com:
  -- Configuration Files:
  /etc/apt/apt.conf.d/50unattended-upgrades changed:
  // Automatically upgrade packages from these origin patterns
  Unattended-Upgrade::Origins-Pattern {
  // Codename based matching:
  // This will follow the migration of a release through different
  // archives (e.g. from testing to stable and later oldstable).
  o=Debian,n=wheezy;
  o=Debian,n=wheezy-updates;
  o=Debian,n=wheezy-proposed-updates;
  o=Debian,n=wheezy,l=Debian-Security;

 This config was removed in version 0.79.5 and might not work at all:

  - remove codename based matching example as this needs a newer
python-apt than available in wheezy, thanks to Russell Stuart


I'm currently using 0.79.4, therefore the config change does not affect me,
right?



  // Archive or Suite based matching:
  // Note that this will silently match a different release after
  // migration to the specified archive (e.g. testing becomes the
  // new stable).
  //  o=Debian,a=stable;
  //  o=Debian,a=stable-updates;
  //  o=Debian,a=proposed-updates;
  //  origin=Debian,archive=stable,label=Debian-Security;
  };

 Usually this is what you need to enable, plus an extra line if you are
 using testing or unstable.


Anyway, my main issue is that the unattended upgrades don't run. If it
would be only a config file problem, they would run but with no upgradable
candidates.

Please, correct me if I'm wrong and thanks for your input.

Cheers.



 Cheers



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Steven Chamberlain
Hi g0to,

This looks to be an anacron issue, and /etc/cron.daily/apt not running
automatically.  Please could you take a look at:

# cat /var/spool/anacron/cron.daily
# grep daily /var/log/cron.log.1
# ps aux | grep cron | grep -v grep

Thanks!
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
On Fri, Mar 8, 2013 at 3:20 PM, Steven Chamberlain ste...@pyro.eu.orgwrote:

 Hi g0to,


Hello, Steven!



 This looks to be an anacron issue, and /etc/cron.daily/apt not running
 automatically.  Please could you take a look at:

 # cat /var/spool/anacron/cron.daily

20130308


 # grep daily /var/log/cron.log.1

The file /var/log/cron.log.1 does not exist.


 # ps aux | grep cron | grep -v grep

 root  1962  0.0  0.4   4368   952 ?Ss   11:22   0:00
/usr/sbin/cron


 Thanks!

Cheers, mate.

Regards,
g0to.


 Regards,
 --
 Steven Chamberlain
 ste...@pyro.eu.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Steven Chamberlain
On 08/03/13 15:08, Arturo Moral wrote:
 # cat /var/spool/anacron/cron.daily
 20130308

This means 'cron' was working properly, and it updated the timestamp in
that file.

What about the file /etc/cron.d/anacron ?  Is it there, what are its
contents?  Also:

$ ls -al /usr/sbin/anacron /etc/init.d/anacron /usr/bin/on_ac_power


 # grep daily /var/log/cron.log.1
 
 The file /var/log/cron.log.1 does not exist.

Thank you.  On my system (with rsyslogd) that would be created by
logrotate from cron.daily...  What about this file instead?

# grep daily /var/log/cron.log

Thanks.
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
On Fri, Mar 8, 2013 at 4:15 PM, Steven Chamberlain ste...@pyro.eu.orgwrote:

 On 08/03/13 15:08, Arturo Moral wrote:
  # cat /var/spool/anacron/cron.daily
  20130308

 This means 'cron' was working properly, and it updated the timestamp in
 that file.

 What about the file /etc/cron.d/anacron ?  Is it there, what are its
 contents?


# /etc/cron.d/anacron: crontab entries for the anacron package

SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin

30 7* * *   roottest -x /etc/init.d/anacron 
/usr/sbin/invoke-rc.d anacron start /dev/null



 Also:

 $ ls -al /usr/sbin/anacron /etc/init.d/anacron /usr/bin/on_ac_power

ls: cannot access /usr/bin/on_ac_power: No such file or directory
-rwxr-xr-x 1 root root 2,0K may 21  2012 /etc/init.d/anacron
-rwxr-xr-x 1 root root  30K jun  2  2012 /usr/sbin/anacron




  # grep daily /var/log/cron.log.1
 
  The file /var/log/cron.log.1 does not exist.

 Thank you.  On my system (with rsyslogd) that would be created by
 logrotate from cron.daily...  What about this file instead?

 # grep daily /var/log/cron.log

That file doesn't exist either. I use to check cron outputs in
/var/log/syslog so I ran:

# grep -i daily /var/log/syslog
Mar  8 11:27:51 raspi anacron[1920]: Job `cron.daily' terminated



 Thanks.
 Regards,
 --
 Steven Chamberlain
 ste...@pyro.eu.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Steven Chamberlain
On 16:27, Arturo Moral wrote:
 # grep -i daily /var/log/syslog
 Mar  8 11:27:51 raspi anacron[1920]: Job `cron.daily' terminated

The log was probably rotated at that point.  Is there anythikng more of
interest in the preceding log, e.g. syslog.1 or syslog.1.gz?

Thanks,
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
On Fri, Mar 8, 2013 at 4:49 PM, Steven Chamberlain ste...@pyro.eu.orgwrote:

 On 16:27, Arturo Moral wrote:
  # grep -i daily /var/log/syslog
  Mar  8 11:27:51 raspi anacron[1920]: Job `cron.daily' terminated

 The log was probably rotated at that point.  Is there anythikng more of
 interest in the preceding log, e.g. syslog.1 or syslog.1.gz?


Here are all the daily occurrences inside syslog, syslog.1 and
syslog.2.gz:

Mar  4 21:25:01 raspi /USR/SBIN/CRON[20013]: (root) CMD (test -x
/usr/sbin/anacron || ( cd /  run-parts --report /etc/cron.daily ))
Mar  5 00:30:24 raspi anacron[1781]: Will run job `cron.daily' in 5 min.
Mar  5 10:16:35 raspi anacron[1781]: Job `cron.daily' started
Mar  5 10:16:36 raspi anacron[2631]: Updated timestamp for job `cron.daily'
to 2013-03-05
Mar  5 10:28:38 raspi anacron[1781]: Job `cron.daily' terminated
Mar  5 21:25:01 raspi /USR/SBIN/CRON[21063]: (root) CMD (test -x
/usr/sbin/anacron || ( cd /  run-parts --report /etc/cron.daily ))
Mar  6 21:25:01 raspi /USR/SBIN/CRON[23904]: (root) CMD (test -x
/usr/sbin/anacron || ( cd /  run-parts --report /etc/cron.daily ))
Mar  7 00:28:24 raspi anacron[1939]: Will run job `cron.daily' in 5 min.
Mar  7 12:47:32 raspi anacron[1939]: Job `cron.daily' started
Mar  7 12:47:32 raspi anacron[3205]: Updated timestamp for job `cron.daily'
to 2013-03-07
Mar  7 12:54:22 raspi anacron[1939]: Job `cron.daily' terminated
Mar  7 21:25:01 raspi /USR/SBIN/CRON[32538]: (root) CMD (test -x
/usr/sbin/anacron || ( cd /  run-parts --report /etc/cron.daily ))
Mar  8 00:10:23 raspi anacron[1920]: Will run job `cron.daily' in 5 min.
Mar  8 11:27:42 raspi anacron[1920]: Job `cron.daily' started
Mar  8 11:27:42 raspi anacron[4741]: Updated timestamp for job `cron.daily'
to 2013-03-08
Mar  8 11:27:51 raspi anacron[1920]: Job `cron.daily' terminated



 Thanks,


Thank you for your quick responses, Steven.

For me, everything seems to be working properly. I can't spot the problem.

Cheers.


 Regards,
 --
 Steven Chamberlain
 ste...@pyro.eu.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Teodor MICU
control: -1 severity normal

2013/3/8 Arturo Moral amo...@gmail.com:
 This config was removed in version 0.79.5 and might not work at all:

 I'm currently using 0.79.4, therefore the config change does not affect me,
 right?

You should not use it, 0.79.5 will migrate to testing on the following days.

 Anyway, my main issue is that the unattended upgrades don't run. If it would
 be only a config file problem, they would run but with no upgradable
 candidates.

You didn't show that u-a doesn't work. From what we've seen so far it
works as expected, maybe you need to investigate why Cron doesn't
run?!

Do you know for sure that there are packages to be upgraded? Running
apt-get upgrade will tell you. If apt-get doesn't find packages to
be upgraded, neither does u-a.

Cheers


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-08 Thread Arturo Moral
Hey, Teodor,

On Fri, Mar 8, 2013 at 6:09 PM, Teodor MICU mteo...@gmail.com wrote:

 control: -1 severity normal

 2013/3/8 Arturo Moral amo...@gmail.com:
  This config was removed in version 0.79.5 and might not work at all:
 
  I'm currently using 0.79.4, therefore the config change does not affect
 me,
  right?

 You should not use it, 0.79.5 will migrate to testing on the following
 days.


I'm using it because it's the current version in testing. It's not a
personal choice and I will be happy upgrading to 0.79.5 when that time
comes.



  Anyway, my main issue is that the unattended upgrades don't run. If it
 would
  be only a config file problem, they would run but with no upgradable
  candidates.

 You didn't show that u-a doesn't work. From what we've seen so far it
 works as expected, maybe you need to investigate why Cron doesn't
 run?!


So far, cron is doing its job with the rest of the jobs. I did not find any
reference about tweaking cron in unattended-upgrades documentation for
making the package works. For me, if unattended-upgrades is not doing its
daily check after being enabled and well configured, the package does not
work properly. If I missed a final step after installing, enabling and
configuring for making it work autonomously, please let me know.



 Do you know for sure that there are packages to be upgraded? Running
 apt-get upgrade will tell you. If apt-get doesn't find packages to
 be upgraded, neither does u-a.


I've been doing the upgrades manually and there were several packages to
upgrade since I installed and enabled unattended-upgrades. Anyway, I'm
not having any issue on what updates or what doesn't. I should see a log
file inside /var//log/unattended-upgrades/ with details on every day's
check but the file didn't exist until I ran a --dry-run days after
enabling.



 Cheers



Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-07 Thread g0to
Package: unattended-upgrades
Version: 0.79.4
Severity: grave
Tags: security
Justification: renders package unusable

Dear Maintainer,

after trying to make it run by myself and googling and make a few questions 
here[1] and there[2], I've decided to contact you to report what seems to be a 
lack of functionality of the package.

Following the instructions in /usr/share/doc/unattended-upgrades/README, 
after installing the package, I enabled it

sudo dpkg-reconfigure -plow unattended-upgrades

uncommented the proper lines in /etc/apt/apt.conf.d/50unattended-upgrades 
(below) and waited for it to unattendedly keeps my system update. But that 
didn't happen.
After checking the logs in /var/log/unattended-upgrades/ and 
/var/log/apt/history.log for several days, no activity was recorded there.
I also tried running it in the --dry-run way and it dry worked with no 
errors.

I've tagged the bug like a security issue because someone could trust the 
security updates of their system after installing and enabling the package and 
don't check if it's working after a long, and potentially insecure, time.

Thank you for your time and for your job maintaining the package.

Cheers,
g0to

[1]
http://serverfault.com/questions/483751/unattended-upgrades-doesnt-upgrade-or-does-nothing-at-all
[2] http://lists.debian.org/debian-user/2013/03/msg00394.html


-- System Information:
Debian Release: 7.0
Architecture: armhf (armv6l)

Kernel: Linux 3.6.11+ (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages unattended-upgrades depends on:
ii  apt0.9.7.7+rpi1
ii  apt-utils  0.9.7.7+rpi1
ii  debconf [debconf-2.0]  1.5.49
ii  lsb-base   4.1+Debian8+rpi1
ii  lsb-release4.1+Debian8+rpi1
ii  python 2.7.3-4
ii  python-apt 0.8.8.1
ii  ucf3.0025+nmu3
ii  xz-utils   5.1.1alpha+20120614-2

unattended-upgrades recommends no packages.

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx none
pn  mail-transport-agent  none

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Automatically upgrade packages from these origin patterns
Unattended-Upgrade::Origins-Pattern {
// Codename based matching:
// This will follow the migration of a release through different
// archives (e.g. from testing to stable and later oldstable).
o=Debian,n=wheezy;
o=Debian,n=wheezy-updates;
o=Debian,n=wheezy-proposed-updates;
o=Debian,n=wheezy,l=Debian-Security;
// Archive or Suite based matching:
// Note that this will silently match a different release after
// migration to the specified archive (e.g. testing becomes the
// new stable).
//  o=Debian,a=stable;
//  o=Debian,a=stable-updates;
//  o=Debian,a=proposed-updates;
//  origin=Debian,archive=stable,label=Debian-Security;
};
// List of packages to not update
Unattended-Upgrade::Package-Blacklist {
//  vim;
//  libc6;
//  libc6-dev;
//  libc6-i686;
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run 
//   dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg false;
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps true;
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown true;
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. u...@example.com
//Unattended-Upgrade::Mail root
// Set this value to true to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError true;
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
Unattended-Upgrade::Remove-Unused-Dependencies true;
// Automatically reboot *WITHOUT CONFIRMATION* if a 
// the file /var/run/reboot-required is found after the upgrade 
Unattended-Upgrade::Automatic-Reboot true;
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit 70;


-- debconf information:
* unattended-upgrades/enable_auto_updates: true


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject 

Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-07 Thread Michael Vogt
On Thu, Mar 07, 2013 at 04:43:03PM +0100, g0to wrote:
 Package: unattended-upgrades
 Version: 0.79.4
 Severity: grave
 Tags: security
 Justification: renders package unusable

Thanks for your bugreport.
 
 after trying to make it run by myself and googling and make a few questions 
 here[1] and there[2], I've decided to contact you to report what seems to be 
 a lack of functionality of the package.
 
 Following the instructions in /usr/share/doc/unattended-upgrades/README, 
 after installing the package, I enabled it
 
 sudo dpkg-reconfigure -plow unattended-upgrades
 
 uncommented the proper lines in /etc/apt/apt.conf.d/50unattended-upgrades 
 (below) and waited for it to unattendedly keeps my system update. But that 
 didn't happen.
 After checking the logs in /var/log/unattended-upgrades/ and 
 /var/log/apt/history.log for several days, no activity was recorded there.
 I also tried running it in the --dry-run way and it dry worked with no 
 errors.
 
 I've tagged the bug like a security issue because someone could trust the 
 security updates of their system after installing and enabling the package 
 and don't check if it's working after a long, and potentially insecure, time.
 
 Thank you for your time and for your job maintaining the package.

The way you enabled it should work so I would need some additional
information from you to figure out what is going on. Could you please
send me the output of:
$ apt-config dump|grep Periodic

and then the debug output that:
 $ sudo unattended-upgrade --debug --dry-run  /tmp/un.output 21
This will generate a file /tmp/un.output that I need too.

and finally the file:
 /var/log/unattended-upgrades/unattended-upgrades.log

That hopefully gives me enough information to figure out what is going
on. I suspect for some reason the script is not run in your cron which
is strange. It hooks into /etc/cron.daily/apt, you can also run:
 $ sudo sh -x /etc/cron.daily/apt
and add the output to this report as well. Note that this code has a
sleep (to distribute load better) in it, so the command will take some
minutes to complete.

Cheers,
 Michael


 Cheers,
 g0to
 
 [1]
 http://serverfault.com/questions/483751/unattended-upgrades-doesnt-upgrade-or-does-nothing-at-all
 [2] http://lists.debian.org/debian-user/2013/03/msg00394.html
 
 
 -- System Information:
 Debian Release: 7.0
 Architecture: armhf (armv6l)
 
 Kernel: Linux 3.6.11+ (PREEMPT)
 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash
 
 Versions of packages unattended-upgrades depends on:
 ii  apt0.9.7.7+rpi1
 ii  apt-utils  0.9.7.7+rpi1
 ii  debconf [debconf-2.0]  1.5.49
 ii  lsb-base   4.1+Debian8+rpi1
 ii  lsb-release4.1+Debian8+rpi1
 ii  python 2.7.3-4
 ii  python-apt 0.8.8.1
 ii  ucf3.0025+nmu3
 ii  xz-utils   5.1.1alpha+20120614-2
 
 unattended-upgrades recommends no packages.
 
 Versions of packages unattended-upgrades suggests:
 pn  bsd-mailx none
 pn  mail-transport-agent  none
 
 -- Configuration Files:
 /etc/apt/apt.conf.d/50unattended-upgrades changed:
 // Automatically upgrade packages from these origin patterns
 Unattended-Upgrade::Origins-Pattern {
 // Codename based matching:
 // This will follow the migration of a release through different
 // archives (e.g. from testing to stable and later oldstable).
 o=Debian,n=wheezy;
 o=Debian,n=wheezy-updates;
 o=Debian,n=wheezy-proposed-updates;
 o=Debian,n=wheezy,l=Debian-Security;
 // Archive or Suite based matching:
 // Note that this will silently match a different release after
 // migration to the specified archive (e.g. testing becomes the
 // new stable).
 //  o=Debian,a=stable;
 //  o=Debian,a=stable-updates;
 //  o=Debian,a=proposed-updates;
 //  origin=Debian,archive=stable,label=Debian-Security;
 };
 // List of packages to not update
 Unattended-Upgrade::Package-Blacklist {
 //vim;
 //libc6;
 //libc6-dev;
 //libc6-i686;
 };
 // This option allows you to control if on a unclean dpkg exit
 // unattended-upgrades will automatically run 
 //   dpkg --force-confold --configure -a
 // The default is true, to ensure updates keep getting installed
 //Unattended-Upgrade::AutoFixInterruptedDpkg false;
 // Split the upgrade into the smallest possible chunks so that
 // they can be interrupted with SIGUSR1. This makes the upgrade
 // a bit slower but it has the benefit that shutdown while a upgrade
 // is running is possible (with a small delay)
 //Unattended-Upgrade::MinimalSteps true;
 // Install all unattended-upgrades when the machine is shuting down
 // instead of doing it in the background while the machine is running
 // This will (obviously) make shutdown slower
 //Unattended-Upgrade::InstallOnShutdown true;
 // Send email to this address for problems or 

Bug#702509: unattended-upgrades: does not run autonomously, even after it was enabled

2013-03-07 Thread Teodor MICU
2013/3/7 g0to amo...@gmail.com:
 -- Configuration Files:
 /etc/apt/apt.conf.d/50unattended-upgrades changed:
 // Automatically upgrade packages from these origin patterns
 Unattended-Upgrade::Origins-Pattern {
 // Codename based matching:
 // This will follow the migration of a release through different
 // archives (e.g. from testing to stable and later oldstable).
 o=Debian,n=wheezy;
 o=Debian,n=wheezy-updates;
 o=Debian,n=wheezy-proposed-updates;
 o=Debian,n=wheezy,l=Debian-Security;

This config was removed in version 0.79.5 and might not work at all:

 - remove codename based matching example as this needs a newer
   python-apt than available in wheezy, thanks to Russell Stuart

 // Archive or Suite based matching:
 // Note that this will silently match a different release after
 // migration to the specified archive (e.g. testing becomes the
 // new stable).
 //  o=Debian,a=stable;
 //  o=Debian,a=stable-updates;
 //  o=Debian,a=proposed-updates;
 //  origin=Debian,archive=stable,label=Debian-Security;
 };

Usually this is what you need to enable, plus an extra line if you are
using testing or unstable.

Cheers


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org