{
    our $AutoInstallUpdates = $yum{AutoInstallUpdates} || 'disabled';
    $AutoInstallUpdates = ( $AutoInstallUpdates eq "disabled") ? "no" : "yes";
    our $downloadonly = $yum{DownloadOnly} || 'disabled';
    $downloadonly = ($downloadonly eq "disabled") ? "no" : "yes";
    our $check = $yum{check4updates} || 'daily';
    $check = ($check eq "disabled") ? "no" : "yes";
    $check = ($downloadonly eq "yes" || $AutoInstallUpdates eq "yes" ) ? "yes" : $check;
    $OUT = "";
}
[commands]
#  What kind of update to use:
# default                            = yum upgrade
# security                           = yum --security upgrade
# security-severity:Critical         = yum --sec-severity=Critical upgrade
# minimal                            = yum --bugfix update-minimal
# minimal-security                   = yum --security update-minimal
# minimal-security-severity:Critical =  --sec-severity=Critical update-minimal
# Note: CentOS and Koozali SME Server do not provide the necessary information 
# in order to have security and minimal upgrade functionality.
update_cmd = default

# Whether a message should be emitted when updates are available,
# were downloaded, or applied.
update_messages = { $check || "yes" }

# Whether updates should be downloaded when they are available.
download_updates = { $downloadonly || "no" }

# Whether updates should be applied when they are available.  Note
# that download_updates must also be yes for the update to be applied.
apply_updates = { $AutoInstallUpdates }

# Maximum amout of time to randomly sleep, in minutes.  The program
# will sleep for a random amount of time between 0 and random_sleep
# minutes before running.  This is useful for e.g. staggering the
# times that multiple systems will access update servers.  If
# random_sleep is 0 or negative, the program will run immediately.
# 6*60 = 360
random_sleep = { $yum{sleep} || '0' }


