J’ai jamais ressenti le besoin d’un avoir un.
Je fais un apt-get update && apt get dist-upgrade une fois par semaine.
Pourquoi avez vous besoin d’un update manager ?
J’ai jamais ressenti le besoin d’un avoir un.
Je fais un apt-get update && apt get dist-upgrade une fois par semaine.
Pourquoi avez vous besoin d’un update manager ?
[quote=“Horigo”]J’ai jamais ressenti le besoin d’un avoir un.
Je fais un apt-get update && apt get dist-upgrade une fois par semaine.
Pourquoi avez vous besoin d’un update manager ?[/quote]
En passant , tu n’as pas à faire : ( apt-get update && apt get dist-upgrade ) une fois par semaine.
mais plutot faire : ( apt-get update && upgrade ) … je pense …
l’icône sur ma barre de travail me rapelle faire mes updates de sécurité par rapport aux hackers …
très régulièrement j’aime bien faire :
angel@debian:~$ su
Mot de passe :
root@debian:/home/angel# apt-get update
Atteint ftp.fr.debian.org wheezy Release.gpg
Atteint security.debian.org wheezy/updates Release.gpg
Atteint ftp.fr.debian.org wheezy-updates Release.gpg
Atteint security.debian.org wheezy/updates Release
Atteint ftp.fr.debian.org wheezy Release
Atteint security.debian.org wheezy/updates/main i386 Packages
Atteint ftp.fr.debian.org wheezy-updates Release
Atteint security.debian.org wheezy/updates/main Translation-en
Atteint ftp.fr.debian.org wheezy/main i386 Packages
Atteint ftp.fr.debian.org wheezy/main Translation-fr
Atteint ftp.fr.debian.org wheezy/main Translation-en
Atteint ftp.fr.debian.org wheezy-updates/main i386 Packages/DiffIndex
Atteint ftp.fr.debian.org wheezy-updates/main Translation-en
Lecture des listes de paquets… Fait
root@debian:/home/angel# /usr/lib/update-notifier/apt-check --human-readable
0 paquet peut être mis à jour.
0 mise à jour de sécurité.
root@debian:/home/angel# si besoin apt-get -V upgrade pour voir quoi !
[quote=“grandtoubab”]Salut,
Pas trouvé non plus.
Il faut se résoudre à installer gnome packagekit
Il y a aussi unattended-upgrades pour automatiser la mise a jour des mise à jour de sécurité.
cf
https://debian-handbook.info/browse/fr-FR/stable/
chapitre
https://debian-handbook.info/browse/fr-FR/stable/sect.regular-upgrades.html
Avec gnome packagekit je ne recevais pas les notifications sur le bureau XFCE donc je l’ai desinstallé.
Personnellement j’ai tout automatisé sans installer le gnome packagekit, uniquement avec unattended upgrades.
root@desktop:/etc/apt/apt.conf.d# cat 20auto-upgrades
APT::Periodic::Update-Package-Lists "1";
APT::Periodic::Download-Upgradeable-Packages "1";
APT::Periodic::AutocleanInterval "7";
APT::Periodic::Unattended-Upgrade "1";
APT::Periodic::Verbose "1";
[code]
root@desktop:/etc/apt/apt.conf.d# cat 50unattended-upgrades
// Unattended-Upgrade::Origins-Pattern controls which packages are
// upgraded.
//
// Lines below have the format format is “keyword=value,…”. A
// package will be upgraded only if the values in its metadata match
// all the supplied keywords in a line. (In other words, omitted
// keywords are wild cards.) The keywords originate from the Release
// file, but several aliases are accepted. The accepted keywords are:
// a,archive,suite (eg, “stable”)
// c,component (eg, “main”, “crontrib”, “non-free”)
// l,label (eg, “Debian”, “Debian-Security”)
// o,origin (eg, “Debian”, “Unofficial Multimedia Packages”)
// n,codename (eg, “jessie”, “jessie-updates”)
// site (eg, “http.debian.net”)
// The available values on the system are printed by the command
// “apt-cache policy”, and can be debugged by running
// “unattended-upgrades -d” and looking at the log file.
//
// Within lines unattended-upgrades allows 2 macros whose values are
// derived from /etc/debian_version:
// ${distro_id} Installed origin.
// ${distro_codename} Installed codename (eg, “jessie”)
Unattended-Upgrade::Origins-Pattern {
// Codename based matching:
// This will follow the migration of a release through different
// archives (e.g. from testing to stable and later oldstable).
“o=Debian,n=jessie”;
“o=Debian,n=jessie-updates”;
“o=Debian,n=jessie-proposed-updates”;
“o=Debian,n=jessie,l=Debian-Security”;
// Archive or Suite based matching:
// Note that this will silently match a different release after
// migration to the specified archive (e.g. testing becomes the
// new stable).
// “o=Debian,a=stable”;
// “o=Debian,a=stable-updates”;
// “o=Debian,a=proposed-updates”;
“origin=Debian,codename=${distro_codename},label=Debian-Security”;
};
// List of packages to not update (regexp are supported)
Unattended-Upgrade::Package-Blacklist {
// “vim”;
// “libc6”;
// “libc6-dev”;
// “libc6-i686”;
};
// This option allows you to control if on a unclean dpkg exit
// unattended-upgrades will automatically run
// dpkg --force-confold --configure -a
// The default is true, to ensure updates keep getting installed
//Unattended-Upgrade::AutoFixInterruptedDpkg “false”;
// Split the upgrade into the smallest possible chunks so that
// they can be interrupted with SIGUSR1. This makes the upgrade
// a bit slower but it has the benefit that shutdown while a upgrade
// is running is possible (with a small delay)
//Unattended-Upgrade::MinimalSteps “true”;
// Install all unattended-upgrades when the machine is shuting down
// instead of doing it in the background while the machine is running
// This will (obviously) make shutdown slower
//Unattended-Upgrade::InstallOnShutdown “true”;
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// ‘mailx’ must be installed. E.g. "user@example.com"
Unattended-Upgrade::Mail “root”;
// Set this value to “true” to get emails only on errors. Default
// is to always send a mail if Unattended-Upgrade::Mail is set
//Unattended-Upgrade::MailOnlyOnError “true”;
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies “false”;
// Automatically reboot WITHOUT CONFIRMATION if
// the file /var/run/reboot-required is found after the upgrade
//Unattended-Upgrade::Automatic-Reboot “false”;
// If automatic reboot is enabled and needed, reboot at the specific
// time instead of immediately
// Default: “now”
//Unattended-Upgrade::Automatic-Reboot-Time “02:00”;
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit “70”;
root@desktop:/etc/apt/apt.conf.d#[/code]
Dans ce fichier il faut retirer les // pour activer le parametre donc pour moi:
Unattended-Upgrade::Origins-Pattern {
// Codename based matching:
// This will follow the migration of a release through different
// archives (e.g. from testing to stable and later oldstable).
"o=Debian,n=jessie";
"o=Debian,n=jessie-updates";
"o=Debian,n=jessie-proposed-updates";
"o=Debian,n=jessie,l=Debian-Security";
et
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. A package that provides
// 'mailx' must be installed. E.g. "user@example.com"
Unattended-Upgrade::Mail "root";
Il y a aussi une trace dans les log:
root@desktop:/var/log/unattended-upgrades# cat unattended-upgrades.log
2015-12-20 09:55:35,995 INFO Paquets initialement sur la liste noire :
2015-12-20 09:55:36,006 INFO Initial whitelisted packages:
2015-12-20 09:55:36,007 INFO Démarrage du script de mise à niveau automatique
2015-12-20 09:55:36,008 INFO Les origines permises sont : ['o=Debian,n=jessie', 'o=Debian,n=jessie-updates', 'o=Debian,n=jessie-proposed-updates', 'o=Debian,n=jessie,l=Debian-Security', 'origin=Debian,codename=jessie,label=Debian-Security']
2015-12-20 09:55:43,897 INFO Aucun paquet à mettre à niveau automatiquement
[/quote]
Et voila, le mail de la première mise à jour 2016
[code]Sujet :
unattended-upgrades result for ‘desktop’: 'True’
De :
root root@localhost.localdomain
Date :
02/01/2016 09:23
Pour :
root@localhost.localdomain
La mise à niveau automatique a renvoyé : True
Packages that were upgraded:
calendar-google-provider icedove iceowl-extension intel-microcode
libc-bin libc-dev-bin libc6 libc6-dev libc6-i686 locales
multiarch-support
Journal de unattended-upgrades :
Paquets initialement sur la liste noire :
Initial whitelisted packages:
Démarrage du script de mise à niveau automatique
Les origines permises sont : [‘o=Debian,n=jessie’, ‘o=Debian,n=jessie-updates’, ‘o=Debian,n=jessie-proposed-updates’, ‘o=Debian,n=jessie,l=Debian-Security’, ‘origin=Debian,codename=jessie,label=Debian-Security’]
Packages that will be upgraded: calendar-google-provider icedove iceowl-extension intel-microcode libc-bin libc-dev-bin libc6 libc6-dev libc6-i686 locales multiarch-support
Écriture du journal de dpkg dans « /var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
Toutes les mises à niveau ont été installées[/code]
Ou alors, pour les mises à jour, il y a [mono]apt[/mono] :
michel@deb1005PE:~$ su -c 'apt update'
Mot de passe :
Ign http://ftp.fr.debian.org jessie InRelease
Réception de : 1 http://security.debian.org jessie/updates InRelease [63,1 kB]
Réception de : 2 http://ftp.fr.debian.org jessie-updates InRelease [136 kB]
Atteint http://ftp.fr.debian.org jessie Release.gpg
Atteint http://ftp.fr.debian.org jessie Release
Réception de : 3 http://ftp.fr.debian.org jessie-updates/main Sources [2 296 B]
Réception de : 4 http://security.debian.org jessie/updates/main Sources [111 kB]
Réception de : 5 http://ftp.fr.debian.org jessie-updates/main amd64 Packages/DiffIndex [367 B]
Réception de : 6 http://ftp.fr.debian.org jessie-updates/main Translation-en [2 506 B]
Atteint http://ftp.fr.debian.org jessie/main Sources
Atteint http://ftp.fr.debian.org jessie/main amd64 Packages
Atteint http://ftp.fr.debian.org jessie/main Translation-fr
Atteint http://ftp.fr.debian.org jessie/main Translation-en
Réception de : 7 http://security.debian.org jessie/updates/main amd64 Packages [180 kB]
Réception de : 8 http://security.debian.org jessie/updates/main Translation-en [95,7 kB]
590 ko réceptionnés en 7s (76,4 ko/s)
Lecture des listes de paquets... Fait
Construction de l'arbre des dépendances
Lecture des informations d'état... Fait
4 packages can be upgraded. Run 'apt list --upgradable' to see them.
michel@deb1005PE:~$
Donc :
michel@deb1005PE:~$ su -c 'apt list --upgradable'
Mot de passe :
En train de lister... Fait
libldb1/stable 2:1.1.17-2+deb8u1 amd64 [upgradable from: 2:1.1.17-2]
libsmbclient/stable 2:4.1.17+dfsg-2+deb8u1 amd64 [upgradable from: 2:4.1.17+dfsg-2]
libwbclient0/stable 2:4.1.17+dfsg-2+deb8u1 amd64 [upgradable from: 2:4.1.17+dfsg-2]
samba-libs/stable 2:4.1.17+dfsg-2+deb8u1 amd64 [upgradable from: 2:4.1.17+dfsg-2]
michel@deb1005PE:~$
et :
Et voilà mise à jour automatique de ce dimanche, c’est a dire que je n’ai plus besoin de passer des lignes de commandes…
[code]Sujet :
unattended-upgrades result for ‘desktop’: 'True’
De :
root root@localhost.localdomain
Date :
03/01/2016 08:17
Pour :
root@localhost.localdomain
La mise à niveau automatique a renvoyé : True
Packages that were upgraded:
libldb1 libsmbclient libwbclient0 samba-libs
Journal de unattended-upgrades :
Paquets initialement sur la liste noire :
Initial whitelisted packages:
Démarrage du script de mise à niveau automatique
Les origines permises sont : [‘o=Debian,n=jessie’, ‘o=Debian,n=jessie-updates’, ‘o=Debian,n=jessie-proposed-updates’, ‘o=Debian,n=jessie,l=Debian-Security’, ‘origin=Debian,codename=jessie,label=Debian-Security’]
Packages that will be upgraded: libldb1 libsmbclient libwbclient0 samba-libs
Écriture du journal de dpkg dans « /var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
Toutes les mises à niveau ont été installées[/code]
bonjour, je suis sous Xfce mais en ayant installé le version 7 de Debian
Et voilà ce matin un nouveau noyau.
Le mail m’indique même qu’il faut redémarrer pour le prendre en compte.
c’est pas beau ça?
[code]Sujet :
[reboot required] unattended-upgrades result for ‘desktop’: True
De :
root root@localhost.localdomain
Date :
06/01/2016 09:31
Pour :
root@localhost.localdomain
La mise à niveau automatique a renvoyé : True
Avertissement : un redémarrage est requis afin de compléter cette mise à niveau.
Packages that were upgraded:
ca-certificates git git-man libwebkitgtk-1.0-common
libwebkitgtk-3.0-common linux-compiler-gcc-4.8-x86
linux-headers-3.16.0-4-686-pae linux-headers-3.16.0-4-common
linux-image-3.16.0-4-686-pae linux-libc-dev
Paquets susceptibles d’une mise à niveau mais maintenus dans leur état actuel :
vlc-data
Journal de unattended-upgrades :
Paquets initialement sur la liste noire :
Initial whitelisted packages:
Démarrage du script de mise à niveau automatique
Les origines permises sont : [‘o=Debian,n=jessie’, ‘o=Debian,n=jessie-updates’, ‘o=Debian,n=jessie-proposed-updates’, ‘o=Debian,n=jessie,l=Debian-Security’, ‘origin=Debian,codename=jessie,label=Debian-Security’]
Packages that will be upgraded: ca-certificates git git-man libwebkitgtk-1.0-common libwebkitgtk-3.0-common linux-compiler-gcc-4.8-x86 linux-headers-3.16.0-4-686-pae linux-headers-3.16.0-4-common linux-image-3.16.0-4-686-pae linux-libc-dev
Écriture du journal de dpkg dans « /var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
Toutes les mises à niveau ont été installées[/code]
salut,
Cas sur un portable pour notification de mise à jour.
Un petit bilan parce que ça ne marchait pas systématiquement:
paquets installés:
apt:
Installé : 1.2.12
Candidat : 1.2.12
Table de version :
*** 1.2.12 500
500 http://httpredir.debian.org/debian stretch/main amd64 Packages
100 /var/lib/dpkg/status
packagekit:
Installé : 1.1.1-1
Candidat : 1.1.1-1
Table de version :
*** 1.1.1-1 500
500 http://httpredir.debian.org/debian stretch/main amd64 Packages
100 /var/lib/dpkg/status
gnome-packagekit:
Installé : 3.18.0-1
Candidat : 3.18.0-1
Table de version :
*** 3.18.0-1 500
500 http://httpredir.debian.org/debian stretch/main amd64 Packages
100 /var/lib/dpkg/status
pk-update-icon:
Installé : 2.0.0-1
Candidat : 2.0.0-1
Table de version :
*** 2.0.0-1 500
500 http://httpredir.debian.org/debian stretch/main amd64 Packages
100 /var/lib/dpkg/status
configuration:
env | grep XDG
XDG_SESSION_DESKTOP=xfce
XDG_DATA_DIRS=/usr/share/xfce4:/usr/local/share/:/usr/share/:/usr/share
XDG_RUNTIME_DIR=/run/user/1001
XDG_CURRENT_DESKTOP=XFCE
root@debian:/etc/apt/apt.conf.d# ls
00CDMountPoint 10periodic 20listchanges 99synaptic
00trustcdrom 15update-stamp 20packagekit
01autoremove 20apt-show-versions 50apt-file.conf
01autoremove-kernels 20archive 70debconf
root@debian:/etc/apt/apt.conf.d# cat 10periodic
APT::Periodic::Enable “1”;
APT::Periodic::Update-Package-Lists “1”;
APT::Periodic::Download-Upgradeable-Packages “1”;
APT::Periodic::AutocleanInterval “7”;
APT::Periodic::Verbose “1”;
APT::Periodic::RandomSleep 15;
Vérification
le pc portable doit être en alimentation sur secteur.
déclenchement manuel:
exec /usr/lib/apt/apt.systemd.daily
contrôle des stamp:
root@debian:/var/lib/apt/periodic# ls -alrt
total 8
-rw-r–r-- 1 root root 0 mai 20 18:02 autoclean-stamp
-rw-r–r-- 1 root root 0 mai 21 10:54 update-success-stamp
-rw-r–r-- 1 root root 0 mai 21 10:54 update-stamp
-rw-r–r-- 1 root root 0 mai 21 10:54 download-upgradeable-stamp
drwxr-xr-x 2 root root 4096 mai 21 10:54 .
drwxr-xr-x 5 root root 4096 mai 21 11:03 …
Au bout de la tempo par défaut de 5 mn pk-update-icon fait son job:
root@debian:/var/log# grep PackageKit /var/log/syslog
May 21 10:47:35 debian dbus[1336]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service'
May 21 10:47:35 debian systemd[1]: Starting PackageKit Daemon...
May 21 10:47:35 debian PackageKit: daemon start
May 21 10:47:35 debian dbus[1336]: [system] Successfully activated service 'org.freedesktop.PackageKit'
May 21 10:47:35 debian systemd[1]: Started PackageKit Daemon.
May 21 10:47:36 debian PackageKit: get-updates transaction /6_ddedaceb from uid 1001 finished with success after 1091ms
May 21 11:00:29 debian PackageKit: get-updates transaction /7_bdbbebdb from uid 1001 finished with success after 1100ms
May 21 11:01:28 debian PackageKit: get-updates transaction /8_ceedbabd from uid 1001 finished with success after 1103ms
May 21 11:01:29 debian PackageKit: get-update-detail transaction /9_cbebbadc from uid 1001 finished with success after 1323ms
May 21 11:01:30 debian PackageKit: get-details transaction /10_eecaecce from uid 1001 finished with success after 633ms
May 21 11:01:34 debian PackageKit: new update-packages transaction /11_ecdcbbbb scheduled from uid 1001
May 21 11:01:35 debian PackageKit: in /11_ecdcbbbb for update-packages package libinput-bin;1.3.0-2;amd64;debian-testing-main was installing for uid 1001
May 21 11:01:35 debian PackageKit: in /11_ecdcbbbb for update-packages package libdca0;0.0.5-10;amd64;debian-testing-main was updating for uid 1001
May 21 11:01:35 debian PackageKit: in /11_ecdcbbbb for update-packages package libinput10;1.3.0-2;amd64;debian-testing-main was updating for uid 1001
May 21 11:01:35 debian PackageKit: update-packages transaction /11_ecdcbbbb from uid 1001 finished with success after 992ms
May 21 11:02:55 debian PackageKit: new update-packages transaction /12_bdebbbbb scheduled from uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libdca0;0.0.5-10;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libinput-bin;1.3.0-2;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libinput10;1.3.0-2;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libdca0;0.0.5-10;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libinput-bin;1.3.0-2;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: in /12_bdebbbbb for update-packages package libinput10;1.3.0-2;amd64;debian-testing-main was installing for uid 1001
May 21 11:03:09 debian PackageKit: update-packages transaction /12_bdebbbbb from uid 1001 finished with success after 14412ms
May 21 11:03:10 debian PackageKit: get-updates transaction /13_ddabaaea from uid 1001 finished with success after 1097ms
May 21 11:03:13 debian PackageKit: get-updates transaction /14_aacecaba from uid 1001 finished with success after 1093ms
May 21 11:03:38 debian PackageKit: get-updates transaction /15_bdcdcdbe from uid 1001 finished with success after 1109ms
il y a vraiment un soucis avec le script /etc/cron.daily/apt-compat
il ne déclenche rien
Au debut il y a ce test qui fait exit
if [ -d /run/systemd/system ]; then
exit 0
fi
je veux que le script de maj soit lancé sans tempo donc ça devient
root@debian:/etc/cron.daily# cat apt-compat
#!/bin/sh
set -e
set -x
# Systemd systems use a systemd timer unit which is preferable to
# run. We want to randomize the apt update and unattended-upgrade
# runs as much as possible to avoid hitting the mirrors all at the
# same time. The systemd time is better at this than the fixed
# cron.daily time
#if [ -d /run/systemd/system ]; then
# exit 0
#fi
# sleep for a random interval of time (default 30min)
# (some code taken from cron-apt, thanks)
random_sleep()
{
RandomSleep=1800
eval $(apt-config shell RandomSleep APT::Periodic::RandomSleep)
if [ $RandomSleep -eq 0 ]; then
return
fi
if [ -z "$RANDOM" ] ; then
# A fix for shells that do not have this bash feature.
RANDOM=$(( $(dd if=/dev/urandom bs=2 count=1 2> /dev/null | cksum | cut -d' ' -f1) % 32767 ))
fi
TIME=$(($RANDOM % $RandomSleep))
sleep $TIME
}
# run daily job
# random_sleep
exec /usr/lib/apt/apt.systemd.daily
et ça marche beaucoup mieux
root@debian:/etc/cron.daily# ./apt-compat
+ exec /usr/lib/apt/apt.systemd.daily
verbose level 1
system is on main power.
system is on main power.
check_stamp: interval=86400, now=1463954400, stamp=1463954400, delta=0 (sec)
download updated metadata (not run).
download upgradable (not run)
unattended-upgrade (not run)
check_stamp: interval=0
clean (not run)
check_stamp: interval=604800, now=1463954400, stamp=1463868000, delta=86400 (sec)
autoclean (not run)
aged: ctime <30 and mtime <30 and ctime>2 and mtime>2
end remove by archive size: size=79916 < 512000
je remasque les traces
root@debian:/etc/cron.daily# cat apt-compat
#!/bin/sh
set -e
#set -x
jz véeifierai au reboot
oot@debian:/var/lib/apt/periodic# ls -alrt /var/lib/apt/periodic
total 8
-rw-r--r-- 1 root root 0 mai 22 15:59 autoclean-stamp
drwxr-xr-x 2 root root 4096 mai 22 15:59 .
drwxr-xr-x 5 root root 4096 mai 22 20:38 ..
-rw-r--r-- 1 root root 0 mai 23 10:37 update-success-stamp
-rw-r--r-- 1 root root 0 mai 23 10:37 update-stamp
-rw-r--r-- 1 root root 0 mai 23 10:38 download-upgradeable-stamp
Autre modification après celle de apt-compat pour forcer le lancement des update au démarrage de l’ordinateur
1 jour = 86400 secondes donc faire croire au système qu’un jour s’est écoulé
Dans /usr/lib/apt/apt.systemd.daily
Ligne 114 delta=$(($now+86400-$stamp))
et voila
+ date -r /var/lib/apt/periodic/download-upgradeable-stamp --iso-8601
+ date --date=2016-06-02 +%s
+ stamp=1464818400
+ [ 0 != 0 ]
+ date --iso-8601
+ date --date=2016-06-02 +%s
+ now=1464818400
+ [ 0 != 0 ]
+ delta=86400
+ interval=86400
+ debug_echo check_stamp: interval=86400, now=1464818400, stamp=1464818400, delta=86400 (sec)
+ [ 1 -ge 1 ]
+ echo check_stamp: interval=86400, now=1464818400, stamp=1464818400, delta=86400 (sec)
check_stamp: interval=86400, now=1464818400, stamp=1464818400, delta=86400 (sec)
+ [ 1464818400 -gt 1464904800 ]
+ [ 86400 -ge 86400 ]
+ return 0
+ [ 1 -eq 1 ]
+ debdelta-upgrade
+ true
+ eval apt-get -qq -y -d dist-upgrade 2>/dev/null
+ apt-get -qq -y -d dist-upgrade
+ update_stamp /var/lib/apt/periodic/download-upgradeable-stamp
+ stamp=/var/lib/apt/periodic/download-upgradeable-stamp
+ touch /var/lib/apt/periodic/download-upgradeable-stamp
+ debug_echo download upgradable (success)
+ [ 1 -ge 1 ]
+ echo download upgradable (success)
download upgradable (success)
+ UPGRADE_STAMP=/var/lib/apt/periodic/upgrade-stamp