Hi,

My first advice would be to check your firewall settings.  Oracle
recently moved/changed the IP numbers on some of their update/patch
systems.  Your firewall rules may need updating (mine did).

Jeff Earickson
Colby College



On Tue, Aug 9, 2011 at 10:35 AM, Lois Bennett
<[email protected]> wrote:
> I have a problem here.  I was getting errors and no download and then
> I tried the -V and saw I needed  to add
> --wgetopt="--no-check-certificate"  after I added that I get the
> output below.  I appears that pca downloads the patch as a .tmp file
> instead of a .zip and then can't see that the .tmp is really a .zip so
> it looks for the .tar.Z version and doesn't find it and fails.    It
> seems like this may be a bug in pca.  Or I am doing something wrong?
>
> Help!
>
> Thanks,
> Lois
>
> gold1:/pca - Tue Aug 09 10:20:10 bash 3.00 pts/9
> root # /pca/pca -V  -X /pca -y --patchdir=/pca/patches --user="user"
> --passwd="PW" --wget=/opt/TWWfsw/bin/wget
> --wgetopt="--no-check-certificate"  -d  119813-13
> Option download: 1
> Option xrefdir: /pca
> Option nocheckxref: 1
> Option patchdir: /pca/patches
> Option user: <user>
> Option passwd: <passwd>
> Option wget: /opt/TWWfsw/bin/wget
> Option wgetopt: --no-check-certificate
> Option debug: 1
> Command: /pca/pca
> ARGV: 119813-13
> Version: 20110805-02
> CWD: /pca
> Config files: /pca/../etc/pca.conf
> Found /opt/TWWfsw/bin/wget (1.10.2, 11002, https)
> Using /opt/TWWfsw/bin/wget
> Found /usr/bin/uname
> Prerequisites for threads not met, setting threads to 0
> Never update
> Expanded patch list: 119813-13
> osname from uname: SunOS
> Reading from /usr/bin/showrev -p  2>/dev/null
> patchdiag.xref size: 2076618
> Using /pca/patchdiag.xref from Jul/25/11
> Bad patch installed: 128307-03
> All operands are fully qualified patch IDs plus revisions
> Host: gold1 (SunOS 5.10/Generic_142901-09/i386/i86pc)
> List: 119813-13 (1/0)
>
> Patch  IR   CR RSB Age Synopsis
> ------ -- - -- --- --- -------------------------------------------------------
> 119813 10 < 13 RS- 239 X11 6.6.2_x86: FreeType patch
>
> Looking for 119813-13 (1/1)
> Trying Oracle
> Trying https://getupdates.oracle.com/ (zip) (1/1)
> Adding to /tmp/pca.61684: header=Authorization: Basic <base64-user-passwd>
> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary
> "https://getupdates.oracle.com/all_unsigned/119813-13.zip";
> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp
> --10:23:48--  https://getupdates.oracle.com/all_unsigned/119813-13.zip
>           => `/pca/patches/119813-13.tmp'
> Resolving getupdates.oracle.com... 141.146.44.51
> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected.
> WARNING: Certificate verification error for getupdates.oracle.com:
> certificate signature failure
> HTTP request sent, awaiting response... 301 Moved Permanently
> Location: 
> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD91216
> B9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D651033
> 37958149588 [following]
> --10:23:48--  
> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD9
> 216CB9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D65
> 033237958149588
>           => `/pca/patches/119813-13.tmp'
> Resolving login.oracle.com... 141.146.8.119
> Connecting to login.oracle.com|141.146.8.119|:443... connected.
> WARNING: Certificate verification error for login.oracle.com:
> certificate signature failure
> HTTP request sent, awaiting response... 200 OK
> Length: 2,009 (2.0K) [text/html]
>
>    0K                                                   100%    5.53 MB/s
>
> 10:23:49 (5.53 MB/s) - `/pca/patches/119813-13.tmp' saved [2009/2009]
>
> Removing /tmp/pca.61684
> Unknown Filetype: /pca/patches/119813-13.tmp
> Failed (unknown file type)
> Trying https://getupdates.oracle.com/ (tar.Z) (1/1)
> Adding to /tmp/pca.931599: header=Authorization: Basic <base64-user-passwd>
> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary
> "https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z";
> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp
> --10:23:49--  https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z
>           => `/pca/patches/119813-13.tmp'
> Resolving getupdates.oracle.com... 141.146.44.51
> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected.
> WARNING: Certificate verification error for getupdates.oracle.com:
> certificate signature failure
> HTTP request sent, awaiting response... 404 Not Found
> 10:23:50 ERROR 404: Not Found.
>
> Removing /tmp/pca.931599
> Failed (Error 404: Not Found)
> Failed (patch not found)
> ------------------------------------------------------------------------------
> Download Summary: 1 total, 0 successful, 0 skipped, 1 failed
>
> gold1:/pca - Tue Aug 09 10:23:50 bash 3.00 pts/9
>
>

Reply via email to