Activity log for bug #1687129

Date Who What changed Old value New value Message
2017-04-28 23:19:18 Adam Conrad bug added bug
2017-04-28 23:19:34 Adam Conrad bug added subscriber Steve Langasek
2017-05-02 17:38:45 Brian Murray nominated for series Ubuntu Precise
2017-05-02 17:38:45 Brian Murray bug task added unattended-upgrades (Ubuntu Precise)
2017-05-02 17:38:52 Brian Murray unattended-upgrades (Ubuntu Precise): status New Triaged
2017-05-02 17:38:55 Brian Murray unattended-upgrades (Ubuntu Precise): importance Undecided High
2017-05-03 12:52:42 Adam Conrad unattended-upgrades (Ubuntu Precise): status Triaged Fix Committed
2017-05-03 12:52:44 Adam Conrad bug added subscriber Ubuntu Stable Release Updates Team
2017-05-03 12:52:49 Adam Conrad bug added subscriber SRU Verification
2017-05-03 12:52:55 Adam Conrad tags verification-needed
2017-05-03 13:19:32 Launchpad Janitor unattended-upgrades (Ubuntu): status New Confirmed
2017-05-03 13:19:39 Dominique Poulain bug added subscriber Dominique Poulain
2017-05-03 15:49:00 Steve Langasek description When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. ??
2017-05-03 16:17:16 Mathieu Trudel-Lapierre description [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. ?? [Impact] ESM users relying on unattended upgrades. [Test cases] This requires a system installed with Ubuntu 12.04 and Ubuntu Advantage credentials. 1) install ubuntu-advantage-tools and unattended upgrades 2) run 'sudo ubuntu-advantage enable-esm'; supply credentials for Ubuntu Advantage 3) run 'sudo apt-get update' 4) fake up the contents of /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages to list a newer version of unattended-upgrades 5) run 'sudo unattended-upgrades --debug --apt-debug' [Regression potential] --- When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43
2017-05-03 17:34:50 Steve Langasek description [Impact] ESM users relying on unattended upgrades. [Test cases] This requires a system installed with Ubuntu 12.04 and Ubuntu Advantage credentials. 1) install ubuntu-advantage-tools and unattended upgrades 2) run 'sudo ubuntu-advantage enable-esm'; supply credentials for Ubuntu Advantage 3) run 'sudo apt-get update' 4) fake up the contents of /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages to list a newer version of unattended-upgrades 5) run 'sudo unattended-upgrades --debug --apt-debug' [Regression potential] --- When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --apt-debug' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --aptdebug' and verify that it tries to install a new unattended-upgrades package (though this will fail). [Regression potential] ---
2017-05-03 17:38:53 Steve Langasek description [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --apt-debug' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --aptdebug' and verify that it tries to install a new unattended-upgrades package (though this will fail). [Regression potential] --- [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases.
2017-05-03 21:49:06 Steve Langasek tags verification-needed verification-done-precise
2017-05-04 16:23:12 Launchpad Janitor unattended-upgrades (Ubuntu Precise): status Fix Committed Fix Released
2017-05-04 16:23:19 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2017-05-08 19:17:17 Adam Conrad unattended-upgrades (Ubuntu Trusty): status New Fix Committed
2017-05-08 19:17:22 Adam Conrad bug added subscriber Ubuntu Stable Release Updates Team
2017-05-08 19:17:28 Adam Conrad tags verification-done-precise verification-done-precise verification-needed
2017-05-08 19:24:13 Adam Conrad unattended-upgrades (Ubuntu Xenial): status New Fix Committed
2017-05-08 19:25:22 Adam Conrad unattended-upgrades (Ubuntu Yakkety): status New Fix Committed
2017-05-08 19:26:46 Adam Conrad unattended-upgrades (Ubuntu Zesty): status New Fix Committed
2017-05-12 00:12:59 Steve Langasek description [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases. [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades ca-certificates' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases.
2017-05-12 00:23:51 Steve Langasek description [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades ca-certificates' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 6. install unattended-upgrades from -proposed. 7. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 8. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases. [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades ca-certificates' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. Run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 6. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 7. install unattended-upgrades from -proposed. 8. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 9. Again run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 10. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases.
2017-05-12 00:24:07 Steve Langasek description [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades ca-certificates' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. Run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 6. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 7. install unattended-upgrades from -proposed. 8. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 9. Again run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 10. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases. [SRU Justification] When the dust has settled on the ESM archive Release file format[1], unattended-upgrades needs to be tweaked to match. [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43 Since the ESM archive contains packages updated by the Ubuntu Security team, we should ensure the behavior of unattended-upgrades applies the same default policy to both. [Test case] 1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades ca-certificates' 2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to enable the ESM archive 3. run 'sudo apt-get update' 4. create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 5. run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 6. run 'sudo unattended-upgrades --debug --dry-run' and verify that no unattended-upgrades package is installed. 7. install unattended-upgrades from -proposed. 8. again create a faked-up entry in /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages for the unattended-upgrades package with a higher version number 9. again run 'sudo sed -i -e"s/precise/$(lsb_release -c | cut -f2)/" /var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_InRelease' 10. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers to install a new unattended-upgrades package. [Regression potential] Worst-case scenario is a bug that prevents future security updates from being applied correctly. This is not a concern for precise because there will be no further security updates /except/ those enabled by this SRU, but this SRU should also be included in all later stable releases.
2017-05-12 00:24:22 Steve Langasek tags verification-done-precise verification-needed verification-done-precise verification-done-xenial verification-needed
2017-05-12 00:33:01 Steve Langasek tags verification-done-precise verification-done-xenial verification-needed verification-done-precise verification-done-xenial verification-failed-trusty verification-needed
2017-05-12 00:33:31 Steve Langasek tags verification-done-precise verification-done-xenial verification-failed-trusty verification-needed verification-done-precise verification-done-xenial verification-needed
2017-05-12 00:39:00 Steve Langasek tags verification-done-precise verification-done-xenial verification-needed verification-done-precise verification-done-trusty verification-done-xenial verification-needed
2017-05-12 00:59:47 Steve Langasek tags verification-done-precise verification-done-trusty verification-done-xenial verification-needed verification-done-precise verification-done-trusty verification-done-xenial verification-done-yakkety verification-needed
2017-05-12 01:06:13 Steve Langasek tags verification-done-precise verification-done-trusty verification-done-xenial verification-done-yakkety verification-needed verification-done-precise verification-done-trusty verification-done-xenial verification-done-yakkety verification-done-zesty verification-needed
2017-05-12 01:09:58 Steve Langasek unattended-upgrades (Ubuntu): status Confirmed Fix Committed
2017-05-12 11:37:09 Launchpad Janitor unattended-upgrades (Ubuntu): status Fix Committed Fix Released
2017-05-16 20:16:19 Launchpad Janitor unattended-upgrades (Ubuntu Trusty): status Fix Committed Fix Released
2017-05-18 18:06:15 Launchpad Janitor unattended-upgrades (Ubuntu Yakkety): status Fix Committed Fix Released
2017-05-18 18:11:10 Launchpad Janitor unattended-upgrades (Ubuntu Zesty): status Fix Committed Fix Released
2017-05-18 20:51:30 Launchpad Janitor unattended-upgrades (Ubuntu Xenial): status Fix Committed Fix Released