mirror of
https://github.com/cloudpanel-io/cloudpanel-ce.git
synced 2026-04-05 20:31:58 +02:00
Update issues with unattended-upgrades after upgrading from Debian 11 to 12 with Cloudpanel 2.4.2 #236
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @WPSpeedExpert on 5/28/2024
CloudPanel version(s) affected
2.4.2
Description
After upgrading from Debian 11 to 12 I received emails from unattended-upgrades about packages kept back:
When checking for kept-back packages there were no kept-back packages:
dpkg --get-selections | grep hold
apt-mark showhold
After investigation, it appeared the following files have references to bullseye:
/etc/apt/sources.list.d/packages.cloudpanel.io.list
/etc/apt/sources.list.d/percona-mysql.list
I also noticed that when performing regular updates it will use the bullseye packages:
Unpacking cloudpanel (2.4.2-4+clp-bullseye) over (2.4.2-3+clp-bullseye) ...
Setting up cloudpanel (2.4.2-4+clp-bullseye) ...
I am not sure what the impact is of this issue.
How to reproduce
1: Update from Debian 11 to 12 with CLoudpanel 2.4.2 and unattended-upgrades
unattended-upgrades
If configured with email notification you will get an email:
[package on hold] unattended-upgrades result...
dpkg --get-selections | grep hold
apt-mark showhold
/etc/apt/sources.list.d/packages.cloudpanel.io.list
/etc/apt/sources.list.d/percona-mysql.list
Possible Solution
cp /etc/apt/sources.list.d/packages.cloudpanel.io.list /etc/apt/sources.list.d/packages.cloudpanel.io.list.bak
cp /etc/apt/sources.list.d/percona-mysql.list /etc/apt/sources.list.d/percona-mysql.list.bak
rm -rf /var/lib/apt/lists/*
apt update -y && sudo apt upgrade -y && sudo apt dist-upgrade -y && sudo apt autoremove -y && sudo apt autoclean -y
apt-get dist-upgrade
If you get a Percona-server-server interaction screen, choose the default recommended settings: Use strong password encryption (RECOMMENDED)
unattended-upgrades
Additional Context
No response