Your message dated Tue, 24 Apr 2012 07:33:06 +0000
with message-id <e1smafg-0002sm...@franck.debian.org>
and subject line Bug#670131: fixed in unattended-upgrades 0.76.3
has caused the Debian Bug report #670131,
regarding AttributeError: 'Version' object has no attribute 'policy_priority'
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
670131: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670131
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.76.2
Severity: grave
Justification: renders package unusable
Hi,
I upgraded u-a on one 32-bit server to test if another problem is fixed and
found that it doesn't work anymore:
| root@goliath:~# unattended-upgrades --debug
| INFO:root:Initial blacklisted packages: locales libc6-i686 libc-bin libc6
linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free
linux-base libupsclient1 nut nut-cgi squid3-common squid3
| Initial blacklisted packages: locales libc6-i686 libc-bin libc6
linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free
linux-base libupsclient1 nut nut-cgi squid3-common squid3
| INFO:root:Starting unattended upgrades script
| Starting unattended upgrades script
| INFO:root:Allowed origins are: ['o=Debian,a=stable',
'o=Debian,a=stable-updates', 'o=Debian,a=proposed-updates',
'origin=Debian,archive=stable,label=Debian-Security']
| Allowed origins are: ['o=Debian,a=stable', 'o=Debian,a=stable-updates',
'o=Debian,a=proposed-updates',
'origin=Debian,archive=stable,label=Debian-Security']
| Traceback (most recent call last):
| File "/usr/bin/unattended-upgrades", line 920, in <module>
| main(options)
| File "/usr/bin/unattended-upgrades", line 699, in main
| allowed_origins=allowed_origins)
| File "/usr/bin/unattended-upgrades", line 70, in __init__
| self.adjust_candidate_versions()
| File "/usr/bin/unattended-upgrades", line 94, in adjust_candidate_versions
| if ver.policy_priority < 0:
| AttributeError: 'Version' object has no attribute 'policy_priority'
(on this system I do many u-a tests, that's why it has many packages
blacklisted)
Thanks
-- System Information:
Debian Release: 6.0.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500,
'stable')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686-bigmem (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages unattended-upgrades depends on:
ii apt 0.8.10.3+squeeze1 Advanced front-end for dpkg
ii apt-utils 0.8.10.3+squeeze1 APT utility programs
ii debconf [debconf-2.0] 1.5.36.1 Debian configuration management sy
ii lsb-release 3.2-23.2squeeze1 Linux Standard Base version report
ii python 2.6.6-3+squeeze6 interactive high-level object-orie
ii python-apt 0.7.100.1+squeeze1 Python interface to libapt-pkg
ii ucf 3.0025+nmu1 Update Configuration File: preserv
unattended-upgrades recommends no packages.
Versions of packages unattended-upgrades suggests:
pn bsd-mailx <none> (no description available)
-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Automatically upgrade packages from these origin patterns
Unattended-Upgrade::Origins-Pattern {
// Codename based matching:
// This will follow the migration of a release through different
// archives (e.g. from testing to stable and later oldstable).
// "o=Debian,n=squeeze";
// "o=Debian,n=squeeze-updates";
// "o=Debian,n=squeeze-proposed-updates";
// "o=Debian,n=squeeze,l=Debian-Security";
// Archive or Suite based matching:
// Note that this will silently match a different release after
// migration to the specified archive (e.g. testing becomes the
// new stable).
"o=Debian,a=stable";
"o=Debian,a=stable-updates";;
"o=Debian,a=proposed-updates";
"origin=Debian,archive=stable,label=Debian-Security";
};
// List of packages to not update
Unattended-Upgrade::Package-Blacklist {
// "vim";
// "libc6";
// "libc6-dev";
// "libc6-i686";
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run
// dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps "true";
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown "true";
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed.
Unattended-Upgrade::Mail "root";
// Set this value to "true" to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError "true";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies "false";
// Automatically reboot *WITHOUT CONFIRMATION* if a
// the file /var/run/reboot-required is found after the upgrade
//Unattended-Upgrade::Automatic-Reboot "false";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";
-- debconf information:
* unattended-upgrades/enable_auto_updates: true
--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 0.76.3
We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive:
unattended-upgrades_0.76.3.dsc
to main/u/unattended-upgrades/unattended-upgrades_0.76.3.dsc
unattended-upgrades_0.76.3.tar.gz
to main/u/unattended-upgrades/unattended-upgrades_0.76.3.tar.gz
unattended-upgrades_0.76.3_all.deb
to main/u/unattended-upgrades/unattended-upgrades_0.76.3_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 670...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Vogt <m...@debian.org> (supplier of updated unattended-upgrades package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Tue, 24 Apr 2012 09:07:58 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source all
Version: 0.76.3
Distribution: unstable
Urgency: low
Maintainer: Michael Vogt <michael.v...@ubuntu.com>
Changed-By: Michael Vogt <m...@debian.org>
Description:
unattended-upgrades - automatic installation of security upgrades
Closes: 670131
Changes:
unattended-upgrades (0.76.3) unstable; urgency=low
.
* unattended-upgrades:
- check if "apt.package.Version" has "policy_priority" before
using it (closes: #670131)
Checksums-Sha1:
c24df2a6ca906e000db93767a7a48b122487cf5d 994 unattended-upgrades_0.76.3.dsc
68a3cbcadac9d6787975e5642da3e616c549b776 66023
unattended-upgrades_0.76.3.tar.gz
7ac9fcca482191632e2b2fc5bbcd6b506e6d8a08 38726
unattended-upgrades_0.76.3_all.deb
Checksums-Sha256:
e7f21bea59f2d5ee4bce0fe49a7480489adb911c29865145af65b3fa1cbf105d 994
unattended-upgrades_0.76.3.dsc
1ba979e51b9c69bb8896bf3d005fbb7b9c977ce4792fe745ad2084f6701347cb 66023
unattended-upgrades_0.76.3.tar.gz
82425fc5766716829b2c65c603324d764a92559597339680ed1ea8d6385f2a9e 38726
unattended-upgrades_0.76.3_all.deb
Files:
95c61bd7a86fe36a7fe425f3b647de54 994 admin optional
unattended-upgrades_0.76.3.dsc
4ee442850bc1ed5b0a79fefbfa2979bb 66023 admin optional
unattended-upgrades_0.76.3.tar.gz
2f666651f317ea4609c310c8d635ecf6 38726 admin optional
unattended-upgrades_0.76.3_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAk+WUq4ACgkQliSD4VZixzTBlQCfWwj4VK0JhmY6rlyOGIYiwYDV
RYsAn0hsEIDuYo0KI712XVR3YtOwPgQ8
=cprt
-----END PGP SIGNATURE-----
--- End Message ---