This bug was fixed in the package unattended-upgrades - 0.90ubuntu0.6
---
unattended-upgrades (0.90ubuntu0.6) xenial; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Tue, 02 May 2017
21:41:25 -040
This bug was fixed in the package unattended-upgrades - 0.92ubuntu1.5
---
unattended-upgrades (0.92ubuntu1.5) yakkety; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Tue, 02 May 2017
21:43:24 -04
This bug was fixed in the package unattended-upgrades - 0.93.1ubuntu2.2
---
unattended-upgrades (0.93.1ubuntu2.2) zesty; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Tue, 02 May 2017
21:44:58 -
This bug was fixed in the package unattended-upgrades - 0.82.1ubuntu2.5
---
unattended-upgrades (0.82.1ubuntu2.5) trusty; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Tue, 02 May 2017
15:55:13
This bug was fixed in the package unattended-upgrades - 0.93.1ubuntu4
---
unattended-upgrades (0.93.1ubuntu4) artful; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Thu, 11 May 2017
18:08:55 -070
Yakkety output, before:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=yakkety', 'o=Ubuntu,a=yakkety-security']
adjusting candidate version: 'unattended-upgrades=0.92ubun
zesty, output before:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=zesty', 'o=Ubuntu,a=zesty-security']
adjusting candidate version: 'linux-libc-dev=4.10.0-19.21'
adjust
zesty, output before:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=zesty', 'o=Ubuntu,a=zesty-security']
adjusting candidate version: 'linux-libc-dev=4.10.0-19.21'
adju
Yakkety output, before:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=yakkety', 'o=Ubuntu,a=yakkety-security']
adjusting candidate version: 'unattended-upgrades=0.92ub
Output on xenial was much more straightforward:
Allowed origins are: ['o=Ubuntu,a=xenial', 'o=Ubuntu,a=xenial-security',
'o=UbuntuESM,a=xenial']
[...]
Checking: unattended-upgrades ([])
pkgs that look like they should be upgraded: unattended-upgrades
Err https://esm.ubuntu.com/ubuntu precise/main
On trusty, with the faked-up test case I see output such as the
following:
Checking: unattended-upgrades ([])
[...]
matching 'o'='UbuntuESM' against ''
matching 'a'='trusty' against ''
pkg 'unattended-upgrades' is untrusted
sanity check failed
So while unattended-upgrades still doesn't install th
** Description changed:
[SRU Justification]
When the dust has settled on the ESM archive Release file format[1],
unattended-upgrades needs to be tweaked to match.
[1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43
Since the ESM archive contains packages updated by the
'apt -o Debug::Acquire::https=1 update' reveals that the problem is due
to missing ssl certificates. Updated the test case to suit, and moving
forward.
** Description changed:
[SRU Justification]
When the dust has settled on the ESM archive Release file format[1],
unattended-upgrades needs
I'm having difficulty verifying this SRU for later releases, because
even though I'm pointing at the precise release (which is published on
esm.ubuntu.com), and I have valid credentials for the site, I get:
Ign https://esm.ubuntu.com precise InRelease
[...]
Ign https://esm.ubuntu.com precise Relea
Behavior on xenial is even worse:
Ign:5 https://esm.ubuntu.com/ubuntu precise InRelease
Err:6 https://esm.ubuntu.com/ubuntu precise Release
[...]
E: The repository 'https://esm.ubuntu.com/ubuntu precise Release' does not have
a Release file.
N
Hello Adam, or anyone else affected,
Accepted unattended-upgrades into xenial-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source
/unattended-upgrades/0.90ubuntu0.6 in a few hours, and then in the
-proposed repository.
Please help us by testing this new p
Hello Adam, or anyone else affected,
Accepted unattended-upgrades into trusty-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source
/unattended-upgrades/0.82.1ubuntu2.5 in a few hours, and then in the
-proposed repository.
Please help us by testing this new
This bug was fixed in the package unattended-upgrades - 0.76ubuntu1.3
---
unattended-upgrades (0.76ubuntu1.3) precise; urgency=medium
* Add UbuntuESM to the list of sources automatically upgraded from by
default. LP: #1687129.
-- Steve Langasek Tue, 02 May 2017
15:45:12 -04
Output now that the publication change is live on esm.u.c:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=precise-security', 'o=UbuntuESM,a=precise']
Checking: unattended-upgrades ([""])
pkgs that lo
The publication changes are now live on esm.ubuntu.com:
500 https://esm.ubuntu.com/ubuntu/ precise/main i386 Packages
release v=12.04,o=UbuntuESM,a=precise,n=precise,l=UbuntuESM,c=main
origin esm.ubuntu.com
--
You received this bug notification because you are a member of Ubuntu
Bugs,
My output with precise-updates:
$ sudo unattended-upgrades --debug --dry-run
Initial blacklisted packages:
Starting unattended upgrades script
Allowed origins are: ['o=Ubuntu,a=precise-security']
Checking: unattended-upgrades ([""])
pkgs that look like they should be upgraded:
Fetched 0 B in 0s (
Here is a run with the updated unattended-upgrades package against the
staging version of the ESM service which is using the requested changes
to the Release file. It recognises the sample landscape-common update
that is there:
root@precise-esm:~# unattended-upgrades --dry-run -d 2>&1
Initial bla
** Description changed:
- [SRU Justification]
- When the dust has settled on the ESM archive Release file format[1],
unattended-upgrades needs to be tweaked to match.
+ [Impact]
+ ESM users relying on unattended upgrades.
+
+ [Test cases]
+ This requires a system installed with Ubuntu 12.04 and
I think unattended-upgrade with -v and --dry-run will be helpful for
testing this.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1687129
Title:
Needs to allow updates from the ESM archive
To manage
** Description changed:
- When the dust has settled on the ESM archive Release file format[1],
- unattended-upgrades needs to be tweaked to match.
+ [SRU Justification]
+ When the dust has settled on the ESM archive Release file format[1],
unattended-upgrades needs to be tweaked to match.
[1
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: unattended-upgrades (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1687129
Hello Adam, or anyone else affected,
Accepted unattended-upgrades into precise-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source
/unattended-upgrades/0.76ubuntu1.3 in a few hours, and then in the
-proposed repository.
Please help us by testing this new
This is the format we have now (in the staging esm service, soon to be
deployed to production)
500 https://extended.security.staging.ubuntu.com/ubuntu/ precise/main i386
Packages
release v=12.04,o=UbuntuESM,a=precise,n=precise,l=UbuntuESM,c=main
origin extended.security.staging.ubuntu.c
** Also affects: unattended-upgrades (Ubuntu Precise)
Importance: Undecided
Status: New
** Changed in: unattended-upgrades (Ubuntu Precise)
Status: New => Triaged
** Changed in: unattended-upgrades (Ubuntu Precise)
Importance: Undecided => High
--
You received this bug notif
29 matches
Mail list logo