
Mir scheint, dass unattended-upgrades
die in festgelegten Prioritäten nicht befolgt werden /etc/apt/preferences
.
Ich betreue einen Debian-Dateiserver, auf dem unbeaufsichtigte Upgrades eingerichtet sind. rclone
Derzeit ist die Version von aus Testing installiert. Beim Update mit apt
rclone wird aus Testing aktualisiert. Beim Ausführen unattended-upgrades
des Updates im Testing-Repository wird das Update jedoch ignoriert.
Ist dieses Verhalten bei unbeaufsichtigten Upgrades zu erwarten? Ich möchte, dass rclone die Updates im Test-Repository verfolgt. Einzelheiten zur Ausgabe und zum System-Setup sind unten zusammengefasst.
Die Ausgabe beim Ausführen unattended-upgrade --dry-run --debug
ist:
Enabled logging to syslog via daemon facility
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['origin=Debian,codename=stretch,archive=stable',
'origin=Debian,codename=stretch,archive=testing',
'origin=Debian,codename=stretch,label=Debian-Security',
'origin=Debian Backports,codename=stretch-backports,label=Debian Backports',
'origin=Syncthing,archive=syncthing,codename=debian,label=Syncthing,component=stable',
'origin=www.geogebra.net,codename=stable,component=main']
ignoring ver 'rclone=1.45-2+b21' with priority < 0
adjusting candidate version: 'rclone=1.35-1+b3'
pkgs that look like they should be upgraded:
Fetched 0 B in 0s (0 B/s)
fetch.run() result: 0
blacklist: []
whitelist: []
No packages found that can be upgraded unattended and no pending auto-removals
Die Einstellungsdateien /etc/apt/preferences
sind:
Package: *
Pin: release l=Debian-Security
Pin-Priority: 1000
Package: rclone
Pin: release a=testing
Pin-Priority: 950
Package: *
Pin: release a=stable
Pin-Priority: 900
Package: *
Pin: release a=stretch-backports
Pin-Priority: 800
Package: *
Pin: release a=testing
Pin-Priority: -1
Die /etc/apt/sources.list
Datei ist:
deb http://ftp.uk.debian.org/debian/ stretch main non-free contrib
deb-src http://ftp.uk.debian.org/debian/ stretch main non-free contrib
deb http://security.debian.org/debian-security stretch/updates main contrib non-free
deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free
# stretch-updates, previously known as 'volatile'
deb http://ftp.uk.debian.org/debian/ stretch-updates main contrib non-free
deb-src http://ftp.uk.debian.org/debian/ stretch-updates main contrib non-free
# stretch-backports, previously on backports.debian.org
deb http://ftp.uk.debian.org/debian/ stretch-backports main contrib non-free
deb-src http://ftp.uk.debian.org/debian/ stretch-backports main contrib non-free
# testing
deb http://ftp.uk.debian.org/debian/ testing main contrib non-free
deb-src http://ftp.uk.debian.org/debian/ testing main contrib non-free
Die Ursprünge /etc/apt/apt.conf.d/50unattended-upgrades
sind wie folgt konfiguriert:
Unattended-Upgrade::Origins-Pattern {
"origin=${distro_id},codename=${distro_codename},archive=stable";
"origin=${distro_id},codename=${distro_codename},archive=testing";
"origin=${distro_id},codename=${distro_codename},label=Debian-Security";
"origin=${distro_id} Backports,codename=${distro_codename}-backports,label=Debian Backports";
"origin=Syncthing,archive=syncthing,codename=debian,label=Syncthing,component=stable";
"origin=www.geogebra.net,codename=stable,component=main";
};
Antwort1
Zum Testen müssen Sie den entsprechenden Codenamen festlegen:
Unattended-Upgrade::Origins-Pattern {
"origin=${distro_id},codename=${distro_codename},archive=stable";
"origin=${distro_id},codename=buster,archive=testing";
"origin=${distro_id},codename=${distro_codename},label=Debian-Security";
"origin=${distro_id} Backports,codename=${distro_codename}-backports,label=Debian Backports";
"origin=Syncthing,archive=syncthing,codename=debian,label=Syncthing,component=stable";
"origin=www.geogebra.net,codename=stable,component=main";
};