2019-03-29 15:25:56 |
Julian Andres Klode |
bug |
|
|
added bug |
2019-03-29 15:28:13 |
Julian Andres Klode |
update-notifier (Ubuntu): status |
New |
Incomplete |
|
2019-03-29 15:28:15 |
Julian Andres Klode |
update-notifier (Ubuntu): status |
Incomplete |
In Progress |
|
2019-04-02 13:08:49 |
Julian Andres Klode |
summary |
Placeholder bug |
[UIFe] motd messaging rewrite |
|
2019-04-02 13:11:00 |
Julian Andres Klode |
description |
[Impact]
Placeholder bug for SRU
[Test case]
Placeholder
[Regression potential]
Placeholder |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations. |
|
2019-04-02 13:23:42 |
Julian Andres Klode |
description |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations. |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation |
|
2019-04-02 13:24:20 |
Julian Andres Klode |
nominated for series |
|
Ubuntu Trusty |
|
2019-04-02 13:24:20 |
Julian Andres Klode |
bug task added |
|
update-notifier (Ubuntu Trusty) |
|
2019-04-02 13:29:35 |
Julian Andres Klode |
update-notifier (Ubuntu): status |
In Progress |
Fix Committed |
|
2019-04-02 13:29:38 |
Julian Andres Klode |
update-notifier (Ubuntu Trusty): status |
New |
Triaged |
|
2019-04-03 09:19:36 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Release Team |
2019-04-04 07:43:08 |
Julian Andres Klode |
description |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation
[SRU]
We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. |
|
2019-04-04 08:41:29 |
Łukasz Zemczak |
update-notifier (Ubuntu Trusty): status |
Triaged |
Fix Committed |
|
2019-04-04 08:41:30 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2019-04-04 08:41:34 |
Łukasz Zemczak |
bug |
|
|
added subscriber SRU Verification |
2019-04-04 08:41:37 |
Łukasz Zemczak |
tags |
|
verification-needed verification-needed-trusty |
|
2019-04-13 11:41:41 |
Launchpad Janitor |
update-notifier (Ubuntu): status |
Fix Committed |
Fix Released |
|
2019-04-25 11:13:53 |
Julian Andres Klode |
tags |
verification-needed verification-needed-trusty |
verification-done verification-done-trusty |
|
2019-04-25 11:15:48 |
Julian Andres Klode |
update-notifier (Ubuntu): status |
Fix Released |
Fix Committed |
|
2019-04-25 14:45:32 |
Łukasz Zemczak |
tags |
verification-done verification-done-trusty |
verification-needed verification-needed-trusty |
|
2019-04-25 20:35:20 |
Julian Andres Klode |
tags |
verification-needed verification-needed-trusty |
verification-done verification-done-trusty |
|
2019-04-26 15:20:58 |
Launchpad Janitor |
update-notifier (Ubuntu): status |
Fix Committed |
Fix Released |
|
2019-04-29 11:25:32 |
Launchpad Janitor |
update-notifier (Ubuntu Trusty): status |
Fix Committed |
Fix Released |
|
2019-04-29 11:25:38 |
Łukasz Zemczak |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2020-10-05 20:18:25 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391841 |
|
2020-10-05 20:20:19 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391843 |
|
2020-10-12 16:23:42 |
Chad Smith |
description |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation
[SRU]
We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
#!/bin/bash
#
# SRU Verification update-notifier + ubuntu=advantage-tools
# Test procedure:
# - launch container Trusty, Xenial or Bionic
# - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal
# - Attach container to UA subscription (which activates the ESM APT repos
# - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported
# - Upgrade update-notifier to -proposed
# - re-run apt_check --human-readable to assert ESM pkg counts ARE reported
set -e
UA_TOKEN=$1
if [ -z "$1" ]; then
echo "Usage: $0 <contractTOKEN>"
exit 1
fi
# sources:
# ua.proposed:
# source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main
# keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7
cat > test-uru.yaml <<EOF
#cloud-config
ssh_import_id: [chad.smith]
package_update: true
package_upgrade: true
apt:
sources:
ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main
keyid: 6E34E7116C0BC933
EOF
cat > setup_proposed.sh <<EOF
#/bin/bash
mirror=http://archive.ubuntu.com/ubuntu
echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list
apt-get update -q
apt-get install -qy update-notifier
EOF
wait_for_boot() {
local vm=$1 release=$2
echo "--- Wait for cloud-init to finish"
sleep 5
lxc exec ${vm} -- cloud-init status --wait --long
}
for release in xenial bionic focal; do
echo "--- BEGIN $release update-notifier testing"
vm=test-sru-$release
echo "--- Launch cloud-init with ppa:ua-client/proposed enabled"
lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)"
wait_for_boot ${vm} ${release}
echo "--- Attach Ubuntu-Advantage, enabling services"
lxc exec ${vm} -- ua attach ${UA_TOKEN}
echo "--- Check Original MOTD output from apt_check before upgrade"
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable
echo "--- Upgrade update-notifier from -proposed"
lxc file push setup_proposed.sh ${vm}/
lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier
echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade"
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable
done
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation
[SRU]
We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. |
|
2020-10-16 03:45:42 |
Chris Halse Rogers |
update-notifier (Ubuntu Xenial): status |
New |
Fix Committed |
|
2020-10-16 03:45:43 |
Chris Halse Rogers |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2020-10-16 03:45:50 |
Chris Halse Rogers |
tags |
verification-done verification-done-trusty |
verification-done-trusty verification-needed verification-needed-xenial |
|
2020-10-16 04:28:17 |
Chris Halse Rogers |
update-notifier (Ubuntu Bionic): status |
New |
Fix Committed |
|
2020-10-16 04:28:24 |
Chris Halse Rogers |
tags |
verification-done-trusty verification-needed verification-needed-xenial |
verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial |
|
2020-10-19 19:45:35 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/392487 |
|
2020-12-01 15:38:58 |
Chad Smith |
tags |
verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial |
verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial |
|
2020-12-04 17:44:01 |
Timo Aaltonen |
tags |
verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial |
verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic |
|
2020-12-04 17:55:37 |
Timo Aaltonen |
tags |
verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic |
verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial |
|
2021-01-04 18:30:16 |
Chad Smith |
description |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
#!/bin/bash
#
# SRU Verification update-notifier + ubuntu=advantage-tools
# Test procedure:
# - launch container Trusty, Xenial or Bionic
# - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal
# - Attach container to UA subscription (which activates the ESM APT repos
# - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported
# - Upgrade update-notifier to -proposed
# - re-run apt_check --human-readable to assert ESM pkg counts ARE reported
set -e
UA_TOKEN=$1
if [ -z "$1" ]; then
echo "Usage: $0 <contractTOKEN>"
exit 1
fi
# sources:
# ua.proposed:
# source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main
# keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7
cat > test-uru.yaml <<EOF
#cloud-config
ssh_import_id: [chad.smith]
package_update: true
package_upgrade: true
apt:
sources:
ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main
keyid: 6E34E7116C0BC933
EOF
cat > setup_proposed.sh <<EOF
#/bin/bash
mirror=http://archive.ubuntu.com/ubuntu
echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list
apt-get update -q
apt-get install -qy update-notifier
EOF
wait_for_boot() {
local vm=$1 release=$2
echo "--- Wait for cloud-init to finish"
sleep 5
lxc exec ${vm} -- cloud-init status --wait --long
}
for release in xenial bionic focal; do
echo "--- BEGIN $release update-notifier testing"
vm=test-sru-$release
echo "--- Launch cloud-init with ppa:ua-client/proposed enabled"
lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)"
wait_for_boot ${vm} ${release}
echo "--- Attach Ubuntu-Advantage, enabling services"
lxc exec ${vm} -- ua attach ${UA_TOKEN}
echo "--- Check Original MOTD output from apt_check before upgrade"
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable
echo "--- Upgrade update-notifier from -proposed"
lxc file push setup_proposed.sh ${vm}/
lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier
echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade"
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable
done
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation
[SRU]
We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. |
[Impact]
Changes to the motd and update counting to count ESM security upgrades as security upgrades, and show some information about ESM upgrades.
[Test case]
The motd output has unit tests for the various combinations, passing counts of various upgrade types. That said, the actual counting might be wrong.
The regression potential is higher in releases with ESM, as they'll get more messages and have more stuff that could go wrong.
#!/bin/bash
#
# SRU Verification update-notifier + ubuntu=advantage-tools
# Test procedure:
# - launch container Trusty, Xenial or Bionic
# - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal
# - Attach container to UA subscription (which activates the ESM APT repos
# - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported
# - Upgrade update-notifier to -proposed
# - re-run apt_check --human-readable to assert ESM pkg counts ARE reported
set -e
UA_TOKEN=$1
if [ -z "$1" ]; then
echo "Usage: $0 <contractTOKEN>"
exit 1
fi
cat > test-un.yaml <<EOF
#cloud-config
ssh_import_id: [chad.smith]
package_update: true
package_upgrade: true
apt:
sources:
ua.proposed:
source: deb http://ppa.launchpad.net/ua-client/staging/ubuntu \$RELEASE main
keyid: 6E34E7116C0BC933
EOF
cat > setup_proposed.sh <<EOF
#/bin/bash
mirror=http://archive.ubuntu.com/ubuntu
echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list
apt-get update -q
apt-get install -qy update-notifier-common
EOF
wait_for_boot() {
local vm=$1 release=$2
echo "--- Wait for cloud-init to finish"
sleep 5
lxc exec ${vm} -- cloud-init status --wait --long
}
for release in xenial bionic; do
echo "--- BEGIN $release update-notifier testing"
vm=test-sru-$release
echo "--- Launch cloud-init with ppa:ua-client/proposed enabled"
lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)"
wait_for_boot ${vm} ${release}
echo "--- Attach Ubuntu-Advantage, enabling services"
lxc exec ${vm} -- ua attach ${UA_TOKEN}
case "$release" in
xenial)
UPGRADE_MATCH="0 updates are security updates";
downrev_pkg="libkrad0=1.13.2+dfsg-5";;
bionic)
UPGRADE_MATCH="1 update is a security update"
downrev_pkg="libkrad0=1.16-2build1";;
focal)
UPGRADE_MATCH="0 updates are security updates"
downrev_pkg="hello=2.10-2ubuntu2";;
groovy)
UPGRADE_MATCH="1 of these updates is a security update"
downrev_pkg="apport-retrace=2.20.11-0ubuntu50";;
esac
echo "-- Downgrading package to stable ubuntu release $downrev_pkg"
lxc exec ${vm} -- apt-get install $downrev_pkg --yes -q
lxc exec ${vm} -- dpkg-query --show update-notifier
if [ "$release" = "xenial" ]; then
# Xenial-updates have already included esm package updates.
# Drop the xenial-updates apt source so we can be sure we are seeing only
# available esm updates
lxc exec ${vm} -- sed -e "/xenial-updates/ s/^#*/#/" -i /etc/apt/sources.list
lxc exec ${vm} -- sed -e "/xenial-security/ s/^#*/#/" -i /etc/apt/sources.list
lxc exec ${vm} -- apt-get update
fi
MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable`
echo ${MOTD}
POST_UPGRADE_MSG="UA Infra: Extended Security Maintenance (ESM) is enabled"
echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "FAILURE: found ${POST_UPGRADE_MSG}" || echo "SUCCESS: did not find ${POST_UPGRADE_MSG=}"
echo $MOTD | grep -q "${UPGRADE_MATCH}" && echo "SUCCESS: found ${UPGRADE_MATCH} security updates pre-upgrade" || echo "FAILURE: did not find expected ${UPGRADE_MATCH} ESM security updates"
echo "--- Upgrade update-notifier from -proposed"
lxc file push setup_proposed.sh ${vm}/
lxc exec ${vm} -- bash /setup_proposed.sh | grep update-notifier
lxc exec ${vm} -- dpkg-query --show update-notifier
MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable`
echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "SUCCESS: found ${POST_UPGRADE_MSG}" || echo "FAILURE: did not find ${POST_UPGRADE_MSG=}"
echo "--- Expect non-zero upgradable packages for MOTD from apt_check AFTER upgrade"
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable
lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable | grep '1 of these updates is a security update' && echo "SUCCESS: found 1 ESM security updates post-upgrade" || echo "FAILURE: did not find expected 1 ESM security updates post-upgrade"
done
[Regression potential]
Potentially wrong reporting, lost translations.
[disco UIFe]
https://lists.ubuntu.com/archives/ubuntu-translators/2019-April/007534.html
ubuntu-doc held for moderation
[SRU]
We're only SRUing this to trusty, as xenial and bionic will have some more changes, and it would just be a waste of time to SRU the trusty one there. |
|
2021-01-04 18:30:31 |
Chad Smith |
tags |
verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial |
verification-done verification-done-bionic verification-done-trusty verification-done-xenial |
|
2021-01-05 19:22:48 |
Launchpad Janitor |
update-notifier (Ubuntu Xenial): status |
Fix Committed |
Fix Released |
|
2021-01-05 19:25:17 |
Launchpad Janitor |
update-notifier (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2022-09-22 16:48:02 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430317 |
|
2022-09-22 16:48:57 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430318 |
|