aboutsummaryrefslogtreecommitdiff
path: root/files/squeeze/50unattended-upgrades
diff options
context:
space:
mode:
authorintrigeri <intrigeri@boum.org>2013-01-08 13:54:57 +0100
committerintrigeri <intrigeri@boum.org>2013-01-08 14:05:49 +0100
commit354283d54ea4f03a4ecdb53db2868ec1ced87dbc (patch)
tree13dc58b9892f196d954c98ffa60b08ecdb393b3c /files/squeeze/50unattended-upgrades
parent2fe3df225c1144d108a7f33f90344310b55687a4 (diff)
parentf3daf58b9eb14aba385c20abb73191c0c408f367 (diff)
downloadpuppet-apt-354283d54ea4f03a4ecdb53db2868ec1ced87dbc.tar.gz
puppet-apt-354283d54ea4f03a4ecdb53db2868ec1ced87dbc.tar.bz2
Merge remote-tracking branch 'leap/feature/unattended_upgrades' into review
Conflicts: files/lenny/50unattended-upgrades
Diffstat (limited to 'files/squeeze/50unattended-upgrades')
-rw-r--r--files/squeeze/50unattended-upgrades56
1 files changed, 6 insertions, 50 deletions
diff --git a/files/squeeze/50unattended-upgrades b/files/squeeze/50unattended-upgrades
index 46fc0dc..0901ad3 100644
--- a/files/squeeze/50unattended-upgrades
+++ b/files/squeeze/50unattended-upgrades
@@ -1,58 +1,14 @@
// this file is managed by puppet !
-//
-//See https://wiki.ubuntu.com/AutomaticUpdates for more details about this feature.
-// allowed (origin, archive) pairs
Unattended-Upgrade::Allowed-Origins {
- "Debian stable";
- "Debian-Security stable";
-// "Debian testing";
+ "${distro_id}:stable";
+ "${distro_id}:${distro_codename}-security";
+ "${distro_id}:${distro_codename}-updates";
+ "${distro_id} Backports:${distro_codename}-backports";
};
APT::Periodic::Update-Package-Lists "1";
+APT::Periodic::Download-Upgradeable-Packages "1";
APT::Periodic::Unattended-Upgrade "1";
-Unattended-Upgrade::Mail "root";
-Unattended-Upgrade::MailOnlyOnError "true";
-
-APT::UnattendedUpgrades::LogDir "/var/log/";
-APT::UnattendedUpgrades::LogFile "unattended_upgrades.log";
-
-Unattended-Upgrade::Package-Blacklist {
- // we don't want the kernel to be updated so nagios still can give a warning if there is
- // a manual update (and reboot) left
-
- "linux-image-*";
-
- // unfortunately there seems to be a bug in unattended-upgrades <= 0.62 that wildcards aren't recognized:
- //2009-12-11 13:41:43,267 INFO Initial blacklisted packages: linux-image-*
- //2009-12-11 13:41:43,267 INFO Starting unattended upgrades script
- //2009-12-11 13:41:43,267 INFO Allowed origins are: ["['Debian', 'stable']", "['Debian-Security', 'stable']"]
- //2009-12-11 13:41:45,233 INFO Packages that are upgraded: linux-image-2.6.26-2-amd64
- //2009-12-11 13:41:45,233 INFO Writing dpkg log to '/var/log/unattended-upgrades-dpkg_2009-12-11_13:41:45.233713.log'
- //2009-12-11 13:42:11,988 INFO All upgrades installed
-
- // lenny
- "linux-image-2.6.26-1-686";
- "linux-image-2.6.26-1-amd64";
- "linux-image-2.6.26-1-xen-686";
- "linux-image-2.6.26-1-xen-amd64";
- "linux-image-2.6.26-1-vserver-686";
- "linux-image-2.6.26-1-vserver-amd64";
-
- "linux-image-2.6.26-2-686";
- "linux-image-2.6.26-2-amd64";
- "linux-image-2.6.26-2-xen-686";
- "linux-image-2.6.26-2-xen-amd64";
- "linux-image-2.6.26-2-vserver-686";
- "linux-image-2.6.26-2-vserver-amd64";
-
- // squeeze
- "linux-image-2.6.32-5-686";
- "linux-image-2.6.32-5-amd64";
- "linux-image-2.6.32-5-xen-686";
- "linux-image-2.6.32-5-xen-amd64";
- "linux-image-2.6.32-5-vserver-686";
- "linux-image-2.6.32-5-vserver-amd64";
-
-};
+Unattended-Upgrade::Mail "root";