Activity log for bug #1822340

Date Who What changed Old value New value Message
2019-03-29 15:25:56 Julian Andres Klode bug added bug
2019-03-29 15:28:13 Julian Andres Klode update-notifier (Ubuntu): status New Incomplete
2019-03-29 15:28:15 Julian Andres Klode update-notifier (Ubuntu): status Incomplete In Progress
2019-04-02 13:08:49 Julian Andres Klode summary Placeholder bug [UIFe] motd messaging rewrite
2019-04-02 13:11:00 Julian Andres Klode description [Impact] Placeholder bug for SRU [Test case] Placeholder [Regression potential] Placeholder [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations.
2019-04-02 13:23:42 Julian Andres Klode description [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations. [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation
2019-04-02 13:24:20 Julian Andres Klode nominated for series Ubuntu Trusty
2019-04-02 13:24:20 Julian Andres Klode bug task added update-notifier (Ubuntu Trusty)
2019-04-02 13:29:35 Julian Andres Klode update-notifier (Ubuntu): status In Progress Fix Committed
2019-04-02 13:29:38 Julian Andres Klode update-notifier (Ubuntu Trusty): status New Triaged
2019-04-03 09:19:36 Łukasz Zemczak bug added subscriber Ubuntu Release Team
2019-04-04 07:43:08 Julian Andres Klode description [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [SRU] We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there.
2019-04-04 08:41:29 Łukasz Zemczak update-notifier (Ubuntu Trusty): status Triaged Fix Committed
2019-04-04 08:41:30 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2019-04-04 08:41:34 Łukasz Zemczak bug added subscriber SRU Verification
2019-04-04 08:41:37 Łukasz Zemczak tags verification-needed verification-needed-trusty
2019-04-13 11:41:41 Launchpad Janitor update-notifier (Ubuntu): status Fix Committed Fix Released
2019-04-25 11:13:53 Julian Andres Klode tags verification-needed verification-needed-trusty verification-done verification-done-trusty
2019-04-25 11:15:48 Julian Andres Klode update-notifier (Ubuntu): status Fix Released Fix Committed
2019-04-25 14:45:32 Łukasz Zemczak tags verification-done verification-done-trusty verification-needed verification-needed-trusty
2019-04-25 20:35:20 Julian Andres Klode tags verification-needed verification-needed-trusty verification-done verification-done-trusty
2019-04-26 15:20:58 Launchpad Janitor update-notifier (Ubuntu): status Fix Committed Fix Released
2019-04-29 11:25:32 Launchpad Janitor update-notifier (Ubuntu Trusty): status Fix Committed Fix Released
2019-04-29 11:25:38 Łukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team
2020-10-05 20:18:25 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391841
2020-10-05 20:20:19 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391843
2020-10-12 16:23:42 Chad Smith description [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [SRU] We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi # sources: # ua.proposed: # source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main # keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7 cat > test-uru.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic focal; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} echo "--- Check Original MOTD output from apt_check before upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable done [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [SRU] We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there.
2020-10-16 03:45:42 Chris Halse Rogers update-notifier (Ubuntu Xenial): status New Fix Committed
2020-10-16 03:45:43 Chris Halse Rogers bug added subscriber Ubuntu Stable Release Updates Team
2020-10-16 03:45:50 Chris Halse Rogers tags verification-done verification-done-trusty verification-done-trusty verification-needed verification-needed-xenial
2020-10-16 04:28:17 Chris Halse Rogers update-notifier (Ubuntu Bionic): status New Fix Committed
2020-10-16 04:28:24 Chris Halse Rogers tags verification-done-trusty verification-needed verification-needed-xenial verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial
2020-10-19 19:45:35 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/392487
2020-12-01 15:38:58 Chad Smith tags verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial
2020-12-04 17:44:01 Timo Aaltonen tags verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic
2020-12-04 17:55:37 Timo Aaltonen tags verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial
2021-01-04 18:30:16 Chad Smith description [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi # sources: # ua.proposed: # source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main # keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7 cat > test-uru.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic focal; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} echo "--- Check Original MOTD output from apt_check before upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable done [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [SRU] We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. [Impact] Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades. [Test case] The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong. The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong. #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi cat > test-un.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: source: deb http://ppa.launchpad.net/ua-client/staging/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier-common EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} case "$release" in xenial) UPGRADE_MATCH="0 updates are security updates"; downrev_pkg="libkrad0=1.13.2+dfsg-5";; bionic) UPGRADE_MATCH="1 update is a security update" downrev_pkg="libkrad0=1.16-2build1";; focal) UPGRADE_MATCH="0 updates are security updates" downrev_pkg="hello=2.10-2ubuntu2";; groovy) UPGRADE_MATCH="1 of these updates is a security update" downrev_pkg="apport-retrace=2.20.11-0ubuntu50";; esac echo "-- Downgrading package to stable ubuntu release $downrev_pkg" lxc exec ${vm} -- apt-get install $downrev_pkg --yes -q lxc exec ${vm} -- dpkg-query --show update-notifier if [ "$release" = "xenial" ]; then # Xenial-updates have already included esm package updates. # Drop the xenial-updates apt source so we can be sure we are seeing only # available esm updates lxc exec ${vm} -- sed -e "/xenial-updates/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- sed -e "/xenial-security/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- apt-get update fi MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo ${MOTD} POST_UPGRADE_MSG="UA Infra: Extended Security Maintenance (ESM) is enabled" echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "FAILURE: found ${POST_UPGRADE_MSG}" || echo "SUCCESS: did not find ${POST_UPGRADE_MSG=}" echo $MOTD | grep -q "${UPGRADE_MATCH}" && echo "SUCCESS: found ${UPGRADE_MATCH} security updates pre-upgrade" || echo "FAILURE: did not find expected ${UPGRADE_MATCH} ESM security updates" echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup_proposed.sh | grep update-notifier lxc exec ${vm} -- dpkg-query --show update-notifier MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "SUCCESS: found ${POST_UPGRADE_MSG}" || echo "FAILURE: did not find ${POST_UPGRADE_MSG=}" echo "--- Expect non-zero upgradable packages for MOTD from apt_check AFTER upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable | grep '1 of these updates is a security update' && echo "SUCCESS: found 1 ESM security updates post-upgrade" || echo "FAILURE: did not find expected 1 ESM security updates post-upgrade" done [Regression potential] Potentially wrong reporting, lost translations. [disco UIFe] https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html ubuntu-doc held for moderation [SRU] We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there.
2021-01-04 18:30:31 Chad Smith tags verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial verification-done verification-done-bionic verification-done-trusty verification-done-xenial
2021-01-05 19:22:48 Launchpad Janitor update-notifier (Ubuntu Xenial): status Fix Committed Fix Released
2021-01-05 19:25:17 Launchpad Janitor update-notifier (Ubuntu Bionic): status Fix Committed Fix Released
2022-09-22 16:48:02 Launchpad Janitor merge proposal linked https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430317
2022-09-22 16:48:57 Launchpad Janitor merge proposal linked https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430318