Your message dated Thu, 01 Jun 2017 09:18:34 +0000 with message-id <E1dGMFW-0008Rq-Uq@fasolo.debian.org> and subject line Bug#863859: fixed in apt 1.4.6 has caused the Debian Bug report #863859, regarding apt: runs unattended-upgrades in debug mode to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 863859: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863859 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian BTS <submit@bugs.debian.org>
- Subject: apt: runs unattended-upgrades in debug mode
- From: Raphaël Halimi <raphael.halimi@gmail.com>
- Date: Thu, 1 Jun 2017 07:50:40 +0200
- Message-id: <[🔎] 42a2909f-e121-af8d-c355-c7daacdc982b@gmail.com>
Package: apt Version: 1.4.2 Since a few days, my Stretch machine sends an additional daily e-mail with cron output from unattended-upgrades. It seems related to a change introduced in 1.4.2: * Run unattended-upgrade -d in download part ...which dates from May 04 according to the changelog, but hit Stretch only recently (on this machine apt was upgraded on May 27 according to apt logs). This is really annoying. Cron jobs are not supposed to output anything unless there was an error. Now i receive three daily e-mails regarding unattended upgrades: one from apt-listchanges (ok), one from unattended-upgrades itself (ok, I enabled this in the config myself), and one from anacron (not ok, if the upgrade ran without error, cron shouldn't report anything). It would be nice to revert this change before Stretch is released. Regards, -- Raphaël HalimiAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 863859-close@bugs.debian.org
- Subject: Bug#863859: fixed in apt 1.4.6
- From: Julian Andres Klode <jak@debian.org>
- Date: Thu, 01 Jun 2017 09:18:34 +0000
- Message-id: <E1dGMFW-0008Rq-Uq@fasolo.debian.org>
Source: apt Source-Version: 1.4.6 We believe that the bug you reported is fixed in the latest version of apt, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 863859@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julian Andres Klode <jak@debian.org> (supplier of updated apt package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 01 Jun 2017 10:50:26 +0200 Source: apt Binary: apt libapt-pkg5.0 libapt-inst2.0 apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https Architecture: source Version: 1.4.6 Distribution: unstable Urgency: medium Maintainer: APT Development Team <deity@lists.debian.org> Changed-By: Julian Andres Klode <jak@debian.org> Description: apt - commandline package manager apt-doc - documentation for APT apt-transport-https - https download transport for APT apt-utils - package management related utility programs libapt-inst2.0 - deb package format runtime library libapt-pkg-dev - development files for APT's libapt-pkg and libapt-inst libapt-pkg-doc - documentation for APT development libapt-pkg5.0 - package management runtime library Closes: 863859 Changes: apt (1.4.6) unstable; urgency=medium . * apt.systemd.daily: Do not pass -d to unattended-upgrade for the download job. This actually enables debugging. Instead check if unattended-upgrade supports an option --download-only (which is yet to be implemented) and use that (Closes: #863859) Checksums-Sha1: 9994f2a7df5c67ca48bf6a6393a90181032a6606 2549 apt_1.4.6.dsc 156f269258046cd281425fc56c9f59a38d3a42fe 2078376 apt_1.4.6.tar.xz 261129687f1c04078455fc6dbd6c2071857ed416 7605 apt_1.4.6_source.buildinfo Checksums-Sha256: 6ec5f9ab39da1a60d425235117b3275c088d722c6ce0ce7d3e90b81e19ebc4df 2549 apt_1.4.6.dsc 7c202b0ecf3a574ca103e24c6a7245761f38d3d3b25f45f38b0d29f9ecde70e9 2078376 apt_1.4.6.tar.xz 19cbf0dd96fb3ba42c67c18950e7944bc8a166db74e915769fd0ed5156431af4 7605 apt_1.4.6_source.buildinfo Files: 7035035944f4286eae85c22d8de346f3 2549 admin important apt_1.4.6.dsc b4af672a052deb35f55d039b3cf37896 2078376 admin important apt_1.4.6.tar.xz d1d7a94ebc1e2706258d259506c0f1e9 7605 admin important apt_1.4.6_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJDBAEBCgAtFiEEzeVhi4gF/W4gLOnC1zw55WWAs4YFAlkv1kUPHGpha0BkZWJp YW4ub3JnAAoJENc8OeVlgLOGKcAP+wUUGM0YrQuD6djMorDfggh1BsFUkj19PI4p QwvaMNsc6gkulrYr0AT8s+LPj85wkEPPE/ftDi1944YAU9T0RPkauwPA0LcVUv5B oeWnXKXGlQtJvQXRzpXQ4RvQ2mAZWLaX77VPiOIj4A5lvCBNJZbBUOmDuxsVQr3e QNusv8NyO4EKrC2EC4VBnKhBsdtBn4Yp86cu4/X63T0baF0ThJeL2GK4YUE7AfZu edEkaqxc5yVucu7GiA6tow4XBM9iOFHq9/3Y4EZ5W633eBsn5eShC56uoFkueuhu 15o2/DF60yb7vGG1fAgXIU789JKD600K/gB/33KkRGNWoXi3rwPnaGMyVq7NvLpl QJb3aq5+duC5ID3ksC0c/9iI/N94rB0rS8vaWavzsRABE9q/qz6eRbd2LDPJUdmf jVYAbBNvtzgTVmA9M3AyHMRFwyLrhq70hjrHGBUWMHniMcb2PQCfUMzw1BovQoOe CnG+9CcwW8uLKQQbmEF6cB54wYghTENzsPUifNB6OXkAu9wYTNGogwt4rBHpeB+f 63r0yFcNLFmnQz77wvoRnPo7jC537Jpf9SEONBQ8HUkV5AoZq0Y3nf7VgQFwbfBf JpElEY0rHUFHFJkdaCI3rnxwR4649FVirVajRCanrofOiYu+xr5nCWuN8M0sfrmx XBh26I6p =cZbi -----END PGP SIGNATURE-----
--- End Message ---