Unattended upgrades
-------------------

This script can install security upgrades automatically and
unattended. It will not install packages that require dependencies
that can't be fetched from security and it will check for conffile
prompts before the install and holds back the package that creates
them. 

To activate this script you need a current apt and then setup
/etc/apt/apt.conf to include:

APT::Periodic::Update-Package-Lists "1";
APT::Periodic::Unattended-Upgrade "1";

This means that it will check for upates every day and install
them (if that is possible). If you have update-notifier installed,
it will setup /etc/apt/apt.conf.d/10periodic. Just edit this
file then to fit your needs.

By default it will only install only from the the (Debian,
stable) repository. This can be changed with the
"Unattended-Upgrade::Allowed-Origins" apt configuration list.  It can
be configured to allow any (origin, archive) combination. Those values
are taken from the "Release" file on the archive server. It is
recommended to use the default (only stable updates from Debian).

All operations will be logged in /var/log/unattended-upgrades/. This
includes the dpkg output as well.

See https://wiki.ubuntu.com/AutomaticUpdates for more details about
this feature.

The following configuration options are supported via the standard 
apt configuration: 
"APT::UnattendedUpgrades::LogDir"
"APT::UnattendedUpgrades::LogFile"
"Unattended-Upgrade::Allowed-Origins"
"Unattended-Upgrade::Package-Blacklist"
"Unattended-Upgrade::Mail"
See https://wiki.ubuntu.com/AutomaticUpdates for more details about
this feature.
