I ran pca -update now root # /pca/pca -v pca 20110805-02
and I am not missing -user I just removed my email address. On Tue, Aug 9, 2011 at 10:46 AM, dpecka <[email protected]> wrote: > 1) you're missing there --user= and perhaps you use some old pca > version. > > regards, daniel > > On Tue, 2011-08-09 at 10:35 -0400, Lois Bennett wrote: >> I have a problem here. I was getting errors and no download and then >> I tried the -V and saw I needed to add >> --wgetopt="--no-check-certificate" after I added that I get the >> output below. I appears that pca downloads the patch as a .tmp file >> instead of a .zip and then can't see that the .tmp is really a .zip so >> it looks for the .tar.Z version and doesn't find it and fails. It >> seems like this may be a bug in pca. Or I am doing something wrong? >> >> Help! >> >> Thanks, >> Lois >> >> gold1:/pca - Tue Aug 09 10:20:10 bash 3.00 pts/9 >> root # /pca/pca -V -X /pca -y --patchdir=/pca/patches --user="user" >> --passwd="PW" --wget=/opt/TWWfsw/bin/wget >> --wgetopt="--no-check-certificate" -d 119813-13 >> Option download: 1 >> Option xrefdir: /pca >> Option nocheckxref: 1 >> Option patchdir: /pca/patches >> Option user: <user> >> Option passwd: <passwd> >> Option wget: /opt/TWWfsw/bin/wget >> Option wgetopt: --no-check-certificate >> Option debug: 1 >> Command: /pca/pca >> ARGV: 119813-13 >> Version: 20110805-02 >> CWD: /pca >> Config files: /pca/../etc/pca.conf >> Found /opt/TWWfsw/bin/wget (1.10.2, 11002, https) >> Using /opt/TWWfsw/bin/wget >> Found /usr/bin/uname >> Prerequisites for threads not met, setting threads to 0 >> Never update >> Expanded patch list: 119813-13 >> osname from uname: SunOS >> Reading from /usr/bin/showrev -p 2>/dev/null >> patchdiag.xref size: 2076618 >> Using /pca/patchdiag.xref from Jul/25/11 >> Bad patch installed: 128307-03 >> All operands are fully qualified patch IDs plus revisions >> Host: gold1 (SunOS 5.10/Generic_142901-09/i386/i86pc) >> List: 119813-13 (1/0) >> >> Patch IR CR RSB Age Synopsis >> ------ -- - -- --- --- >> ------------------------------------------------------- >> 119813 10 < 13 RS- 239 X11 6.6.2_x86: FreeType patch >> >> Looking for 119813-13 (1/1) >> Trying Oracle >> Trying https://getupdates.oracle.com/ (zip) (1/1) >> Adding to /tmp/pca.61684: header=Authorization: Basic <base64-user-passwd> >> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary >> "https://getupdates.oracle.com/all_unsigned/119813-13.zip" >> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp >> --10:23:48-- https://getupdates.oracle.com/all_unsigned/119813-13.zip >> => `/pca/patches/119813-13.tmp' >> Resolving getupdates.oracle.com... 141.146.44.51 >> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected. >> WARNING: Certificate verification error for getupdates.oracle.com: >> certificate signature failure >> HTTP request sent, awaiting response... 301 Moved Permanently >> Location: >> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD91216 >> B9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D651033 >> 37958149588 [following] >> --10:23:48-- >> https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login?site2pstoretoken=v1.2~E4066BF0~2B7ECC84DC6BAEBA90951E8A0096BA6E530BECD3CF06CF4520AB6490CE16B8ED15391FB11EA70AE63135E58397BC146EE41297613D68C2A150185E5D2A08FD9 >> 216CB9C1FF1EADD4327158D572FA6F500D961BAF28B0ADD39AEE14561EA3D9F9E30972F1AC48EB1AEDCC13842532247E491872D811098A36513DCC37F9A85BB41EF99EC523FCE633DF4DE600C3F9DAC5FD27314C3A7C90A66C0FD729CE75CCA2047B33F446C60969C86AAE544BFAF2523B174BC8FACA0D65 >> 033237958149588 >> => `/pca/patches/119813-13.tmp' >> Resolving login.oracle.com... 141.146.8.119 >> Connecting to login.oracle.com|141.146.8.119|:443... connected. >> WARNING: Certificate verification error for login.oracle.com: >> certificate signature failure >> HTTP request sent, awaiting response... 200 OK >> Length: 2,009 (2.0K) [text/html] >> >> 0K 100% 5.53 MB/s >> >> 10:23:49 (5.53 MB/s) - `/pca/patches/119813-13.tmp' saved [2009/2009] >> >> Removing /tmp/pca.61684 >> Unknown Filetype: /pca/patches/119813-13.tmp >> Failed (unknown file type) >> Trying https://getupdates.oracle.com/ (tar.Z) (1/1) >> Adding to /tmp/pca.931599: header=Authorization: Basic <base64-user-passwd> >> /opt/TWWfsw/bin/wget --no-check-certificate --progress=dot:binary >> "https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z" >> --ca-certificate=/pca/pca -O /pca/patches/119813-13.tmp >> --10:23:49-- https://getupdates.oracle.com/all_unsigned/119813-13.tar.Z >> => `/pca/patches/119813-13.tmp' >> Resolving getupdates.oracle.com... 141.146.44.51 >> Connecting to getupdates.oracle.com|141.146.44.51|:443... connected. >> WARNING: Certificate verification error for getupdates.oracle.com: >> certificate signature failure >> HTTP request sent, awaiting response... 404 Not Found >> 10:23:50 ERROR 404: Not Found. >> >> Removing /tmp/pca.931599 >> Failed (Error 404: Not Found) >> Failed (patch not found) >> ------------------------------------------------------------------------------ >> Download Summary: 1 total, 0 successful, 0 skipped, 1 failed >> >> gold1:/pca - Tue Aug 09 10:23:50 bash 3.00 pts/9 >> > -- > Best Regards / S Pozdravem > > Daniel Pecka > -------------------------------------------------- > SunOS Specialist, UNIX Administrator > > www.techniservit.cz > > mailto:<[email protected]> > callto:<+0420603166533> > > > -- Lois Bennett, MSEE Senior System Administrator Channing Laboratory Brigham & Women's Hospital A Teaching Affiliate of Harvard Medical School and Harvard School of Public Health
