ansible/roles/unattended-upgrades/defaults/main.yaml
2019-03-27 07:08:13 +00:00

99 lines
3.8 KiB
YAML

---
unattended_upgrades_mailto: root
unattended_upgrades_package_name: unattended-upgrades
unattended_upgrades_package_state: present
unattended_upgrades_apticron_package_name: apticron
unattended_upgrades_apticron_package_state: present
unattended_upgrades_apticron_email: "{{ unattended_upgrades_mailto }}"
unattended_upgrades_update_package_lists: true
unattended_upgrades_download_upgradable_packages: true
unattended_upgrades_autoclean_interval: 7
unattended_upgrades_unattended_upgrade: true
# Automatically upgrade packages from these (origin:archive) pairs
#
# Note that in Ubuntu security updates may pull in new dependencies
# from non-security sources (e.g. chromium). By allowing the release
# pocket these get automatically pulled in.
unattended_upgrades_allowed_origins:
- "${distro_id}:${distro_codename}"
- "${distro_id}:${distro_codename}-security"
- "${distro_id}ESM:${distro_codename}"
# - "${distro_id}:${distro_codename}-updates"
# - "${distro_id}:${distro_codename}-proposed"
# - "${distro_id}:${distro_codename}-backports"
# List of packages to not update (regexp are supported)
# unattended_upgrades_package_blacklist: []
# This option will controls whether the development release of Ubuntu will be
# upgraded automatically.
unattended_upgrades_dev_release: false
# This option allows you to control if on a unclean dpkg exit
# unattended-upgrades will automatically run
# dpkg --force-confold --configure -a
# The default is true, to ensure updates keep getting installed
# unattended_upgrades_auto_fix_interrupted_dpkg: false
# Split the upgrade into the smallest possible chunks so that
# they can be interrupted with SIGTERM. This makes the upgrade
# a bit slower but it has the benefit that shutdown while a upgrade
# is running is possible (with a small delay)
# unattended_upgrades_minimal_steps: false
# Install all unattended-upgrades when the machine is shutting down
# instead of doing it in the background while the machine is running
# This will (obviously) make shutdown slower
# unattended_upgrades_install_on_shutdown: true
# Send email to this address for problems or packages upgrades
# If empty or unset then no email is sent, make sure that you
# have a working mail setup on your system. A package that provides
# 'mailx' must be installed. E.g. "user@example.com"
unattended_upgrades_mail: "{{ unattended_upgrades_mailto }}"
# Set this value to "true" to get emails only on errors. Default
# is to always send a mail if Unattended-Upgrade::Mail is set
# unattended_upgrades_mail_only_on_error: true
# Remove unused automatically installed kernel-related packages
# (kernel images, kernel headers and kernel version locked tools).
# unattended_upgrades_remove_unused_kernel_packages: false
# Do automatic removal of new unused dependencies after the upgrade
# (equivalent to apt-get autoremove)
# unattended_upgrades_removed_unused_dependencies: false
# Automatically reboot *WITHOUT CONFIRMATION*
# if the file /var/run/reboot-required is found after the upgrade
# unattended_upgrades_automatic_reboot: false
# If automatic reboot is enabled and needed, reboot at the specific
# time instead of immediately
# Default: "now"
# unattended_upgrades_automatic_reboot_time: '02:00'
# Use apt bandwidth limit feature, this example limits the download
# speed to 70kb/sec
# unattended_upgrades_download_limit: 70
# Enable logging to syslog. Default is False
# unattended_upgrades_syslog_enable: false
# Specify syslog facility. Default is daemon
# unattended_upgrades_syslog_facility: daemon
# Download and install upgrades only on AC power
# (i.e. skip or gracefully stop updates on battery)
# unattended_upgrades_only_on_ac_power: true
# Download and install upgrades only on non-metered connection
# (i.e. skip or gracefully stop updates on a metered connection)
# unattended_upgrades_skip_updates_on_metered_connections: true
# vim:ft=yaml.ansible: