[ubuntu/cosmic-proposed] unattended-upgrades 1.5ubuntu3.18.10.0 (Accepted)

Balint Reczey rbalint at ubuntu.com
Mon Nov 26 17:22:19 UTC 2018


unattended-upgrades (1.5ubuntu3.18.10.0) cosmic; urgency=medium

  * Revert to running unattended-upgrades.service in multi-user.target
  * Trigger unattended-upgrade-shutdown actions with PrepareForShutdown()
    Performing upgrades in service's ExecStop did not work when the upgrades
    involved restarting services because systemd blocked other stop/start
    actions making maintainer scripts time out and be killed leaving a broken
    system behind.
    Running unattended-upgrades.service before shutdown.target as a oneshot
    service made it run after unmounting filesystems and scheduling services
    properly on shutdown is a complex problem and adding more services to the
    mix make it even more fragile.
    The solution of monitoring PrepareForShutdown() signal from DBus
    allows Unattended Upgrade to run _before_ the jobs related to shutdown are
    queued thus package upgrades can safely restart services without
    risking causing deadlocks or breaking part of the shutdown actions.
    Also ask running unattended-upgrades to stop when shutdown starts even in
    InstallOnShutdown mode and refactor most of unattended-upgrade-shutdown to
    UnattendedUpgradesShutdown class. (LP: #1778219, LP: #1803137)
  * Handle reverting to WantedBy=multi-user.target
  * Increase logind's InhibitDelayMaxSec to 30s.
    This allows more time for unattended-upgrades to shut down gracefully
    or even install a few packages in InstallOnShutdown mode, but is still a
    big step back from the 30 minutes allowed for InstallOnShutdown previously.
    Users enabling InstallOnShutdown mode are advised to increase
    InhibitDelayMaxSec even further possibly to 30 minutes.
  * Cache polling result for PreparingForShutdown after it becomes true
  * debian/tests/test-systemd.py: Reboot system with dbus call to honor
    inhibitor locks
  * Add NEWS entry about increasing InhibitDelayMaxSec and InstallOnShutdown
    changes
  * Stop using ActionGroups, they interfere with apt.Cache.clear()
    causing all autoremovable packages to be handled as newly autoremovable ones
    and be removed by default. Dropping ActionGroup usage does not slow down the
    most frequent case of not having anything to upgrade and when ther are
    packages to upgrade the gain is small compared to the actual package
    installation.
    Also collect autoremovable packages before adjusting candidates because that
    also changed .is_auto_removable attribute of some of them. (LP: #1803749)
    (Closes: #910874)

Date: Mon, 26 Nov 2018 12:28:55 +0100
Changed-By: Balint Reczey <rbalint at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/unattended-upgrades/1.5ubuntu3.18.10.0
-------------- next part --------------
Format: 1.8
Date: Mon, 26 Nov 2018 12:28:55 +0100
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source
Version: 1.5ubuntu3.18.10.0
Distribution: cosmic
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Balint Reczey <rbalint at ubuntu.com>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 910874
Launchpad-Bugs-Fixed: 1778219 1803137 1803749
Changes:
 unattended-upgrades (1.5ubuntu3.18.10.0) cosmic; urgency=medium
 .
   * Revert to running unattended-upgrades.service in multi-user.target
   * Trigger unattended-upgrade-shutdown actions with PrepareForShutdown()
     Performing upgrades in service's ExecStop did not work when the upgrades
     involved restarting services because systemd blocked other stop/start
     actions making maintainer scripts time out and be killed leaving a broken
     system behind.
     Running unattended-upgrades.service before shutdown.target as a oneshot
     service made it run after unmounting filesystems and scheduling services
     properly on shutdown is a complex problem and adding more services to the
     mix make it even more fragile.
     The solution of monitoring PrepareForShutdown() signal from DBus
     allows Unattended Upgrade to run _before_ the jobs related to shutdown are
     queued thus package upgrades can safely restart services without
     risking causing deadlocks or breaking part of the shutdown actions.
     Also ask running unattended-upgrades to stop when shutdown starts even in
     InstallOnShutdown mode and refactor most of unattended-upgrade-shutdown to
     UnattendedUpgradesShutdown class. (LP: #1778219, LP: #1803137)
   * Handle reverting to WantedBy=multi-user.target
   * Increase logind's InhibitDelayMaxSec to 30s.
     This allows more time for unattended-upgrades to shut down gracefully
     or even install a few packages in InstallOnShutdown mode, but is still a
     big step back from the 30 minutes allowed for InstallOnShutdown previously.
     Users enabling InstallOnShutdown mode are advised to increase
     InhibitDelayMaxSec even further possibly to 30 minutes.
   * Cache polling result for PreparingForShutdown after it becomes true
   * debian/tests/test-systemd.py: Reboot system with dbus call to honor
     inhibitor locks
   * Add NEWS entry about increasing InhibitDelayMaxSec and InstallOnShutdown
     changes
   * Stop using ActionGroups, they interfere with apt.Cache.clear()
     causing all autoremovable packages to be handled as newly autoremovable ones
     and be removed by default. Dropping ActionGroup usage does not slow down the
     most frequent case of not having anything to upgrade and when ther are
     packages to upgrade the gain is small compared to the actual package
     installation.
     Also collect autoremovable packages before adjusting candidates because that
     also changed .is_auto_removable attribute of some of them. (LP: #1803749)
     (Closes: #910874)
Checksums-Sha1:
 b2519b2a71c7b6f7ea2cbf2aeea7d24a9ac1975b 1986 unattended-upgrades_1.5ubuntu3.18.10.0.dsc
 9cfb1308f33efbfcdaff0e7bd9366b8e5aa79b33 107260 unattended-upgrades_1.5ubuntu3.18.10.0.tar.xz
 be8d837ae41e1058cb216835c85a831f98a27779 7881 unattended-upgrades_1.5ubuntu3.18.10.0_source.buildinfo
Checksums-Sha256:
 5803efc39f8b8f412a8a2285666301b4d05914f96799fbbae45a5743e4c7d917 1986 unattended-upgrades_1.5ubuntu3.18.10.0.dsc
 da85031bc5789ed02c97dc2a3ce8f3a08f1e7b7e61efbda72927b6bf7981d9a4 107260 unattended-upgrades_1.5ubuntu3.18.10.0.tar.xz
 a17098b862f060ceabc2e2df42c2aa926ca7a09aedd3ee0b624be43bf0909df9 7881 unattended-upgrades_1.5ubuntu3.18.10.0_source.buildinfo
Files:
 a9d933e5107164f64a1921bdeb36d4ad 1986 admin optional unattended-upgrades_1.5ubuntu3.18.10.0.dsc
 89c6f8ba021c684e696d7d74d7f81a74 107260 admin optional unattended-upgrades_1.5ubuntu3.18.10.0.tar.xz
 0022d529c68d53389666e68d8235a51f 7881 admin optional unattended-upgrades_1.5ubuntu3.18.10.0_source.buildinfo
Original-Maintainer: Michael Vogt <mvo at debian.org>


More information about the Cosmic-changes mailing list