Your message dated Sat, 06 May 2017 18:19:39 +0000
with message-id <e1d74it-0003do...@fasolo.debian.org>
and subject line Bug#809669: fixed in unattended-upgrades 0.93.1+nmu1
has caused the Debian Bug report #809669,
regarding unattended-upgrades: files got created under /var/ mountpoint
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
809669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809669
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.86.5
Severity: normal

Hi,

I usually have / on a cheap SSD and /var & /home on a HDD.

I noticed that files got created in /var/ in the root
partition, thus before /var got mounted or
more likely after /var got unmounted.

/mnt/var/run/unattended-upgrades.lock
/mnt/var/log/unattended-upgrades/unattended-upgrades-shutdown.log

There's a specific systemd option to fix this:
"RequiresMountsFor=/var/log"

This will also fix /var/run,
as this should always be a link to /run.

---

Also, the line "if apt_pkg.config.find_b("Unattended-
Upgrade::InstallOnShutdown", False):" should be duplicated
before the previous paragrah to avoid creating
an always-empty unattended-upgrades-shutdown.log
if this feature is not used.



-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing'), (450, 'unstable'), (400, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.3.0-1-amd64 (SMP w/6 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages unattended-upgrades depends on:
ii  apt                    1.1.10
ii  apt-utils              1.1.10
ii  debconf [debconf-2.0]  1.5.58
ii  init-system-helpers    1.24
ii  lsb-base               9.20150917
ii  lsb-release            9.20150917
ii  python3                3.4.3-7
ii  python3-apt            1.1.0~beta1
ii  ucf                    3.0031
ii  xz-utils               5.1.1alpha+20120614-2.1

Versions of packages unattended-upgrades recommends:
ii  systemd-cron [cron-daemon]  1.5.3-1

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx                          <none>
ii  nullmailer [mail-transport-agent]  1:1.13-1

-- debconf information:
  unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";
* unattended-upgrades/enable_auto_updates: true

--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 0.93.1+nmu1

We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 809...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gaudenz Steinlin <gaud...@debian.org> (supplier of updated unattended-upgrades 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 06 May 2017 19:42:14 +0200
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source all
Version: 0.93.1+nmu1
Distribution: unstable
Urgency: medium
Maintainer: Michael Vogt <m...@debian.org>
Changed-By: Gaudenz Steinlin <gaud...@debian.org>
Description:
 unattended-upgrades - automatic installation of security upgrades
Closes: 809669
Changes:
 unattended-upgrades (0.93.1+nmu1) unstable; urgency=medium
 .
   * Non-maintainer upload.
 .
   [ Louis Bouchard ]
   * Fix the unattended-upgrades.service unit not correctly working:
     - d/rules : Remove the override_dh_installinit. The stop option is no 
longer
       available so the command falls back to default. This is the normal
       behavior so the override is not required
     - d/unattended-upgrades.init : Add Default-Start runlevels, otherwise the
       unattended-upgrades.service unit cannot be enabled on boot
     - d/postinst : Cleanup the stop symlinks created by the wrong
       override_dh_installinit. Without that, the systemd unit cannot be
       enabled correctly.
       Force disable the service before deb-systemd-helper runs so the old
       symlink is not left dangling (workaround for Debian Bug #797108).
       Force enable and start of the systemd unit to work around Debian Bug
       #797108 which fails to enable systemd units correctly when WantedBy=
       statement is changed which is the case here.
     - d/unattended-upgrades.service : Fix the service so it runs correctly on
       shutdown :
         Remove DefaultDependencies=no : Breaks normal shutdown dependencies
         Set After= to network.target and local-fs.target. Since our service is
         now ExecStop, it will run before network and local-fs become
         unavailable. Add RequiresMountsFor=/var/log /var/run /var/lib /boot :
         Necessary if /var is a separate file system. Set WantedBy= to
         multi-user.target
     - Add DEP8 tests to verify the following :
       Verify that the unattended-upgrades.service unit is enabled and started.
       Verify that InstallOnShutdown works when configured.
     (Closes: #809669)
Checksums-Sha1:
 1f280837bf9f42bf9d24a279fd2e04b3a8463c3e 1463 
unattended-upgrades_0.93.1+nmu1.dsc
 da0f8ab65f87663edbc86921a4da201753b0d7d5 91872 
unattended-upgrades_0.93.1+nmu1.tar.xz
 aaeff4cbcbf343e585f84284f7e79db105908897 61690 
unattended-upgrades_0.93.1+nmu1_all.deb
 8d1d70dd227fbec049525ac90d38f06d65afff2f 8253 
unattended-upgrades_0.93.1+nmu1_amd64.buildinfo
Checksums-Sha256:
 3e19a1912c3f9e4a4995229968d0890a00edfa9e4092ded23242c8068ffb33e4 1463 
unattended-upgrades_0.93.1+nmu1.dsc
 753be17e5376f1934c225a3657dd9ca58c2adbd2ffdeb76fa64b5298e90e4900 91872 
unattended-upgrades_0.93.1+nmu1.tar.xz
 90a26aa904b96a1e913c429fda03b3e61a685c2c2cc303a08bc8002474c339c8 61690 
unattended-upgrades_0.93.1+nmu1_all.deb
 260b3ce7eb9788027e3b8b8330d01f716c0a987c0684d3985ccd79c18a946367 8253 
unattended-upgrades_0.93.1+nmu1_amd64.buildinfo
Files:
 4fa33bdb52e199a24befc0bcf03a24de 1463 admin optional 
unattended-upgrades_0.93.1+nmu1.dsc
 059027850baab7320f7319582bb360bc 91872 admin optional 
unattended-upgrades_0.93.1+nmu1.tar.xz
 11b024d695da7bbc3cbc3534b749b0f1 61690 admin optional 
unattended-upgrades_0.93.1+nmu1_all.deb
 9a6dd6a6897e2a531bafffe0525ea3b0 8253 admin optional 
unattended-upgrades_0.93.1+nmu1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEXtjbd32AqFIO1HzsOrL5guAQm9UFAlkOD7MACgkQOrL5guAQ
m9WOfwf/XHSDgouzAMUUMNdzLTiBjvTgUN9u9+U50UYYdVZfJ/N4pJa30zHMKOQM
Qj9W8VLbNB/N219TQUgDLd/MyE+R1pmdIEQ3+I9K8tS4X5X0zkiQe9oPa0rTz9Qh
Smyi/trDEqE142vWToAqemVBrcG2kLVUqxLpTNRpo4ZjqpP9lEWU6yk0fbYETQTc
0IYQ3cJDMlxsDVJqI8M2MGhUhp5sUB3mXuTwE3AX4OSto6hjMgNaRmmRCrxJYkBO
7zT9L5wKkUKujVdxLuzTFNmfFDuf8iMn2ShFfa/qEChbXoUGtUnuc0I9uBimViLw
Gxph2y822qNp8/21Rflmt7CCqjOIYw==
=cDt5
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to