I ran pca -update now

root # /pca/pca -v
pca 20110805-02

and I am not missing  -user

I just removed my email address.

On Tue, Aug 9, 2011 at 10:46 AM, dpecka <[email protected]> wrote:
> 1) you're missing there --user= and perhaps you use some old pca
> version.
>
> regards, daniel
>
> On Tue, 2011-08-09 at 10:35 -0400, Lois Bennett wrote:
>> I have a problem here.  I was getting errors and no download and then
>> I tried the -V and saw I needed  to add
>> --wgetopt="--no-check-certificate"  after I added that I get the
>> output below.  I appears that pca downloads the patch as a .tmp file
>> instead of a .zip and then can't see that the .tmp is really a .zip so
>> it looks for the .tar.Z version and doesn't find it and fails.    It
>> seems like this may be a bug in pca.  Or I am doing something wrong?
>>
>> Help!
>>
>> Thanks,
>> Lois
>>
>> gold1:/pca - Tue Aug 09 10:20:10 bash 3.00 pts/9
>> root # /pca/pca -V  -X /pca -y --patchdir=/pca/patches --user="user"
>> --passwd="PW" --wget=/opt/TWWfsw/bin/wget
>> --wgetopt="--no-check-certificate"  -d  119813-13
>> Option download: 1
>> Option xrefdir: /pca
>> Option nocheckxref: 1
>> Option patchdir: /pca/patches
>> Option user: <user>
>> Option passwd: <passwd>
>> Option wget: /opt/TWWfsw/bin/wget
>> Option wgetopt: --no-check-certificate
>> Option debug: 1
>> Command: /pca/pca
>> ARGV: 119813-13
>> Version: 20110805-02
>> CWD: /pca
>> Config files: /pca/../etc/pca.conf
>> Found /opt/TWWfsw/bin/wget (1.10.2, 11002, https)
>> Using /opt/TWWfsw/bin/wget
>> Found /usr/bin/uname
>> Prerequisites for threads not met, setting threads to 0
>> Never update
>> Expanded patch list: 119813-13
>> osname from uname: SunOS
>> Reading from /usr/bin/showrev -p  2>/dev/null
>> patchdiag.xref size: 2076618
>> Using /pca/patchdiag.xref from Jul/25/11
>> Bad patch installed: 128307-03
>> All operands are fully qualified patch IDs plus revisions
>> Host: gold1 (SunOS 5.10/Generic_142901-09/i386/i86pc)
>> List: 119813-13 (1/0)
>>
>> Patch  IR   CR RSB Age Synopsis
>> ------ -- - -- --- --- 
>> -------------------------------------------------------
>> 119813 10 < 13 RS- 239 X11 6.6.2_x86: FreeType patch
>>
>> Looking for 119813-13 (1/1)
>> Trying Oracle
>> Trying https://getupdates.oracle.com/ (zip) (1/1)
>> Adding to /tmp/pca.61684: header=Authorization: Basic <base64-user-passwd>
>> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary
>> "https://getupdates.oracle.com/all_unsigned/119813-13.zip";
>> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp
>> --10:23:48--  https://getupdates.oracle.com/all_unsigned/119813-13.zip
>>            => `/pca/patches/119813-13.tmp'
>> Resolving getupdates.oracle.com... 141.146.44.51
>> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected.
>> WARNING: Certificate verification error for getupdates.oracle.com:
>> certificate signature failure
>> HTTP request sent, awaiting response... 301 Moved Permanently
>> Location: 
>> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD91216
>> B9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D651033
>> 37958149588 [following]
>> --10:23:48--  
>> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD9
>> 216CB9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D65
>> 033237958149588
>>            => `/pca/patches/119813-13.tmp'
>> Resolving login.oracle.com... 141.146.8.119
>> Connecting to login.oracle.com|141.146.8.119|:443... connected.
>> WARNING: Certificate verification error for login.oracle.com:
>> certificate signature failure
>> HTTP request sent, awaiting response... 200 OK
>> Length: 2,009 (2.0K) [text/html]
>>
>>     0K                                                   100%    5.53 MB/s
>>
>> 10:23:49 (5.53 MB/s) - `/pca/patches/119813-13.tmp' saved [2009/2009]
>>
>> Removing /tmp/pca.61684
>> Unknown Filetype: /pca/patches/119813-13.tmp
>> Failed (unknown file type)
>> Trying https://getupdates.oracle.com/ (tar.Z) (1/1)
>> Adding to /tmp/pca.931599: header=Authorization: Basic <base64-user-passwd>
>> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary
>> "https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z";
>> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp
>> --10:23:49--  https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z
>>            => `/pca/patches/119813-13.tmp'
>> Resolving getupdates.oracle.com... 141.146.44.51
>> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected.
>> WARNING: Certificate verification error for getupdates.oracle.com:
>> certificate signature failure
>> HTTP request sent, awaiting response... 404 Not Found
>> 10:23:50 ERROR 404: Not Found.
>>
>> Removing /tmp/pca.931599
>> Failed (Error 404: Not Found)
>> Failed (patch not found)
>> ------------------------------------------------------------------------------
>> Download Summary: 1 total, 0 successful, 0 skipped, 1 failed
>>
>> gold1:/pca - Tue Aug 09 10:23:50 bash 3.00 pts/9
>>
> --
> Best Regards / S Pozdravem
>
> Daniel Pecka
> --------------------------------------------------
> SunOS Specialist, UNIX Administrator
>
> www.techniservit.cz
>
> mailto:<[email protected]>
> callto:<+0420603166533>
>
>
>



-- 
Lois Bennett, MSEE
Senior System Administrator
Channing Laboratory
Brigham & Women's Hospital
A Teaching Affiliate of
Harvard Medical School and
Harvard School of Public Health

Reply via email to