Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

unattended-upgrades not considering pin-priority #368

Open
ryaeng opened this issue Aug 9, 2024 · 3 comments
Open

unattended-upgrades not considering pin-priority #368

ryaeng opened this issue Aug 9, 2024 · 3 comments

Comments

@ryaeng
Copy link

ryaeng commented Aug 9, 2024

Hello everyone,

I've run into the issue a few times where unattended-upgrades doesn't take pin-priority into account. When looking through the codebase, I found the following:

That line indicates that it's possible for unattended-upgrades to consider pin-priority but it doesn't by default. Is this the desired effect or a bug?

We utilize pin-priority to tightly couple many nvidia packages together. This is necessary when dealing with a number of packages for AI/ML. When unattended-upgrades is run, it tends to break systems and drivers. Please advise.

@ryaeng
Copy link
Author

ryaeng commented Aug 23, 2024

Update regarding the aforementioned config. Added that to 52unattended-upgrade and set it to true. This did not work. When unattended-upgrade ran after making this change, it upgraded packages without taking pin-priority into account.

My recommendation going forward is to blacklist packages.

@julian-klode
Copy link
Contributor

Pinning works within the confines of the requirements:

Pinning for sources that are not allowed are pinned to "never", overriding any pin configured for then.

If you want to pin a lower version, you also need to add that to the list of allowed origins, achieve the pin by pinning down the versions you don't want, or as you did block the package.

I've explained this in an older issue here that is open, feel free to find and read it for more details.

@ryaeng
Copy link
Author

ryaeng commented Aug 23, 2024

@julian-klode Thanks for the reply. Why is it setup this way? Since users typically use apt upgrade, my thought is that unattended-upgrade would run as close to this as possible.

That did work though. I added our repo to AllowedOrigins via 52unattended-upgrade-local. Running --debug proves that it holds back the proper packages. Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants