Activity log for bug #1842508

Date Who What changed Old value New value Message
2019-09-03 19:56:14 Brian Murray bug added bug
2019-09-03 23:18:12 Brian Murray update-notifier (Ubuntu): status New In Progress
2019-09-03 23:18:14 Brian Murray update-notifier (Ubuntu): importance Undecided Medium
2019-09-03 23:18:16 Brian Murray update-notifier (Ubuntu): assignee Brian Murray (brian-murray)
2019-09-03 23:18:20 Brian Murray nominated for series Ubuntu Trusty
2019-09-03 23:18:20 Brian Murray bug task added update-notifier (Ubuntu Trusty)
2019-09-03 23:18:27 Brian Murray update-notifier (Ubuntu Trusty): status New In Progress
2019-09-03 23:18:29 Brian Murray update-notifier (Ubuntu Trusty): importance Undecided Medium
2019-09-03 23:18:32 Brian Murray update-notifier (Ubuntu Trusty): assignee Brian Murray (brian-murray)
2019-09-04 05:53:27 Launchpad Janitor update-notifier (Ubuntu): status In Progress Fix Released
2019-09-04 09:39:27 Łukasz Zemczak update-notifier (Ubuntu Trusty): status In Progress Fix Committed
2019-09-04 09:39:30 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2019-09-04 09:39:34 Łukasz Zemczak bug added subscriber SRU Verification
2019-09-04 09:39:37 Łukasz Zemczak tags verification-needed verification-needed-trusty
2019-09-04 15:28:16 Joshua Powers bug added subscriber Joshua Powers
2019-09-04 16:00:53 Eric Desrochers bug added subscriber Eric Desrochers
2019-09-26 18:01:05 Brian Murray tags verification-needed verification-needed-trusty verification-failed verification-failed-trusty
2019-09-27 15:12:58 Steve Langasek tags verification-failed verification-failed-trusty verification-needed verification-needed-trusty
2019-10-07 19:14:57 Chad Smith tags verification-needed verification-needed-trusty verification-done verification-done-trusty
2019-10-08 15:20:00 Launchpad Janitor update-notifier (Ubuntu Trusty): status Fix Committed Fix Released
2019-10-08 15:20:09 Steve Langasek removed subscriber Ubuntu Stable Release Updates Team
2020-10-05 20:18:25 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391841
2020-10-05 20:20:19 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/391843
2020-10-12 16:23:06 Chad Smith description [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes. [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi # sources: # ua.proposed: # source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main # keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7 cat > test-uru.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic focal; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} echo "--- Check Original MOTD output from apt_check before upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable done [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes.
2020-10-16 03:45:57 Chris Halse Rogers update-notifier (Ubuntu Xenial): status New Fix Committed
2020-10-16 03:45:58 Chris Halse Rogers bug added subscriber Ubuntu Stable Release Updates Team
2020-10-16 03:46:04 Chris Halse Rogers tags verification-done verification-done-trusty verification-done-trusty verification-needed verification-needed-xenial
2020-10-16 04:28:31 Chris Halse Rogers update-notifier (Ubuntu Bionic): status New Fix Committed
2020-10-16 04:28:39 Chris Halse Rogers tags verification-done-trusty verification-needed verification-needed-xenial verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial
2020-10-19 19:45:35 Launchpad Janitor merge proposal linked https://code.launchpad.net/~chad.smith/ubuntu/+source/update-notifier/+git/update-notifier/+merge/392487
2020-12-01 15:40:06 Chad Smith tags verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial
2020-12-04 17:44:16 Timo Aaltonen tags verification-done-trusty verification-failed verification-failed-bionic verification-failed-xenial verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic
2020-12-04 17:55:46 Timo Aaltonen tags verification-done-trusty verification-failed-xenial verification-needed verification-needed-bionic verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial
2021-01-04 18:12:35 Chad Smith description [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi # sources: # ua.proposed: # source: deb http://ppa.launchpad.net/canonical-server/ua-client-daily/ubuntu \$RELEASE main # keyid: 94E187AD53A59D1847E4880F8A295C4FB8B190B7 cat > test-uru.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: deb http://ppa.launchpad.net/ua-client/proposed/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic focal; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} echo "--- Check Original MOTD output from apt_check before upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup-proposed.sh | grep update-notifier echo "--- Check upadate-notifier(-proposed) MOTD output from apt_check after upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable done [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes. [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). #!/bin/bash #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi cat > test-un.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: source: deb http://ppa.launchpad.net/ua-client/staging/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier-common EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} case "$release" in xenial) UPGRADE_MATCH="0 updates are security updates"; downrev_pkg="libkrad0=1.13.2+dfsg-5";; bionic) UPGRADE_MATCH="1 update is a security update" downrev_pkg="libkrad0=1.16-2build1";; focal) UPGRADE_MATCH="0 updates are security updates" downrev_pkg="hello=2.10-2ubuntu2";; groovy) UPGRADE_MATCH="1 of these updates is a security update" downrev_pkg="apport-retrace=2.20.11-0ubuntu50";; esac echo "-- Downgrading package to stable ubuntu release $downrev_pkg" lxc exec ${vm} -- apt-get install $downrev_pkg --yes -q lxc exec ${vm} -- dpkg-query --show update-notifier if [ "$release" = "xenial" ]; then # Xenial-updates have already included esm package updates. # Drop the xenial-updates apt source so we can be sure we are seeing only # available esm updates lxc exec ${vm} -- sed -e "/xenial-updates/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- sed -e "/xenial-security/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- apt-get update fi MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo ${MOTD} POST_UPGRADE_MSG="UA Infra: Extended Security Maintenance (ESM) is enabled" echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "FAILURE: found ${POST_UPGRADE_MSG}" || echo "SUCCESS: did not find ${POST_UPGRADE_MSG=}" echo $MOTD | grep -q "${UPGRADE_MATCH}" && echo "SUCCESS: found ${UPGRADE_MATCH} security updates pre-upgrade" || echo "FAILURE: did not find expected ${UPGRADE_MATCH} ESM security updates" echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup_proposed.sh | grep update-notifier lxc exec ${vm} -- dpkg-query --show update-notifier MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "SUCCESS: found ${POST_UPGRADE_MSG}" || echo "FAILURE: did not find ${POST_UPGRADE_MSG=}" echo "--- Expect non-zero upgradable packages for MOTD from apt_check AFTER upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable | grep '1 of these updates is a security update' && echo "SUCCESS: found 1 ESM security updates pre-upgrade" || echo "FAILURE: did not find expected 1 ESM security updates" done [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes.
2021-01-04 18:22:18 Chad Smith description [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). #!/bin/bash #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then echo "Usage: $0 <contractTOKEN>" exit 1 fi cat > test-un.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt: sources: ua.proposed: source: deb http://ppa.launchpad.net/ua-client/staging/ubuntu \$RELEASE main keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier-common EOF wait_for_boot() { local vm=$1 release=$2 echo "--- Wait for cloud-init to finish" sleep 5 lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic; do echo "--- BEGIN $release update-notifier testing" vm=test-sru-$release echo "--- Launch cloud-init with ppa:ua-client/proposed enabled" lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)" wait_for_boot ${vm} ${release} echo "--- Attach Ubuntu-Advantage, enabling services" lxc exec ${vm} -- ua attach ${UA_TOKEN} case "$release" in xenial) UPGRADE_MATCH="0 updates are security updates"; downrev_pkg="libkrad0=1.13.2+dfsg-5";; bionic) UPGRADE_MATCH="1 update is a security update" downrev_pkg="libkrad0=1.16-2build1";; focal) UPGRADE_MATCH="0 updates are security updates" downrev_pkg="hello=2.10-2ubuntu2";; groovy) UPGRADE_MATCH="1 of these updates is a security update" downrev_pkg="apport-retrace=2.20.11-0ubuntu50";; esac echo "-- Downgrading package to stable ubuntu release $downrev_pkg" lxc exec ${vm} -- apt-get install $downrev_pkg --yes -q lxc exec ${vm} -- dpkg-query --show update-notifier if [ "$release" = "xenial" ]; then # Xenial-updates have already included esm package updates. # Drop the xenial-updates apt source so we can be sure we are seeing only # available esm updates lxc exec ${vm} -- sed -e "/xenial-updates/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- sed -e "/xenial-security/ s/^#*/#/" -i /etc/apt/sources.list lxc exec ${vm} -- apt-get update fi MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo ${MOTD} POST_UPGRADE_MSG="UA Infra: Extended Security Maintenance (ESM) is enabled" echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "FAILURE: found ${POST_UPGRADE_MSG}" || echo "SUCCESS: did not find ${POST_UPGRADE_MSG=}" echo $MOTD | grep -q "${UPGRADE_MATCH}" && echo "SUCCESS: found ${UPGRADE_MATCH} security updates pre-upgrade" || echo "FAILURE: did not find expected ${UPGRADE_MATCH} ESM security updates" echo "--- Upgrade update-notifier from -proposed" lxc file push setup_proposed.sh ${vm}/ lxc exec ${vm} -- bash /setup_proposed.sh | grep update-notifier lxc exec ${vm} -- dpkg-query --show update-notifier MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable` echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "SUCCESS: found ${POST_UPGRADE_MSG}" || echo "FAILURE: did not find ${POST_UPGRADE_MSG=}" echo "--- Expect non-zero upgradable packages for MOTD from apt_check AFTER upgrade" lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable | grep '1 of these updates is a security update' && echo "SUCCESS: found 1 ESM security updates pre-upgrade" || echo "FAILURE: did not find expected 1 ESM security updates" done [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes. [Impact] Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review. [Test Case] test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled). #!/bin/bash #!/bin/bash # # SRU Verification update-notifier + ubuntu=advantage-tools # Test procedure: # - launch container Trusty, Xenial or Bionic # - Install ubuntu-advantage-tools from https://launchpad.net/~ua-client/+archive/ubuntu/proposed which supports esm on trusty, xenial, bionic, and focal # - Attach container to UA subscription (which activates the ESM APT repos # - run apt_check --human-readable to assert ESM pkg counts ARE NOT reported # - Upgrade update-notifier to -proposed # - re-run apt_check --human-readable to assert ESM pkg counts ARE reported set -e UA_TOKEN=$1 if [ -z "$1" ]; then  echo "Usage: $0 <contractTOKEN>"  exit 1 fi cat > test-un.yaml <<EOF #cloud-config ssh_import_id: [chad.smith] package_update: true package_upgrade: true apt:   sources:       ua.proposed:           source: deb http://ppa.launchpad.net/ua-client/staging/ubuntu \$RELEASE main           keyid: 6E34E7116C0BC933 EOF cat > setup_proposed.sh <<EOF #/bin/bash mirror=http://archive.ubuntu.com/ubuntu echo deb \$mirror \$(lsb_release -sc)-proposed main | tee /etc/apt/sources.list.d/proposed.list apt-get update -q apt-get install -qy update-notifier-common EOF wait_for_boot() {   local vm=$1 release=$2   echo "--- Wait for cloud-init to finish"   sleep 5     lxc exec ${vm} -- cloud-init status --wait --long } for release in xenial bionic; do   echo "--- BEGIN $release update-notifier testing"   vm=test-sru-$release   echo "--- Launch cloud-init with ppa:ua-client/proposed enabled"   lxc launch ubuntu-daily:${release} ${vm} -c user.user-data="$(cat test-un.yaml)"   wait_for_boot ${vm} ${release}   echo "--- Attach Ubuntu-Advantage, enabling services"   lxc exec ${vm} -- ua attach ${UA_TOKEN}   case "$release" in         xenial)             UPGRADE_MATCH="0 updates are security updates";             downrev_pkg="libkrad0=1.13.2+dfsg-5";;         bionic)             UPGRADE_MATCH="1 update is a security update"             downrev_pkg="libkrad0=1.16-2build1";;         focal)             UPGRADE_MATCH="0 updates are security updates"             downrev_pkg="hello=2.10-2ubuntu2";;         groovy)             UPGRADE_MATCH="1 of these updates is a security update"             downrev_pkg="apport-retrace=2.20.11-0ubuntu50";;   esac   echo "-- Downgrading package to stable ubuntu release $downrev_pkg"   lxc exec ${vm} -- apt-get install $downrev_pkg --yes -q   lxc exec ${vm} -- dpkg-query --show update-notifier   if [ "$release" = "xenial" ]; then       # Xenial-updates have already included esm package updates.       # Drop the xenial-updates apt source so we can be sure we are seeing only       # available esm updates       lxc exec ${vm} -- sed -e "/xenial-updates/ s/^#*/#/" -i /etc/apt/sources.list       lxc exec ${vm} -- sed -e "/xenial-security/ s/^#*/#/" -i /etc/apt/sources.list       lxc exec ${vm} -- apt-get update   fi   MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable`   echo ${MOTD}   POST_UPGRADE_MSG="UA Infra: Extended Security Maintenance (ESM) is enabled"   echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "FAILURE: found ${POST_UPGRADE_MSG}" || echo "SUCCESS: did not find ${POST_UPGRADE_MSG=}"   echo $MOTD | grep -q "${UPGRADE_MATCH}" && echo "SUCCESS: found ${UPGRADE_MATCH} security updates pre-upgrade" || echo "FAILURE: did not find expected ${UPGRADE_MATCH} ESM security updates"   echo "--- Upgrade update-notifier from -proposed"   lxc file push setup_proposed.sh ${vm}/   lxc exec ${vm} -- bash /setup_proposed.sh | grep update-notifier   lxc exec ${vm} -- dpkg-query --show update-notifier    MOTD=`lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable`   echo $MOTD | grep -q "${POST_UPGRADE_MSG}" && echo "SUCCESS: found ${POST_UPGRADE_MSG}" || echo "FAILURE: did not find ${POST_UPGRADE_MSG=}"   echo "--- Expect non-zero upgradable packages for MOTD from apt_check AFTER upgrade"   lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable   lxc exec ${vm} -- /usr/lib/update-notifier/apt-check --human-readable | grep '1 of these updates is a security update' && echo "SUCCESS: found 1 ESM security updates post-upgrade" || echo "FAILURE: did not find expected 1 ESM security updates post-upgrade" done [Regression Potential] Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues. [Notice] This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes.
2021-01-04 18:22:31 Chad Smith tags verification-done-trusty verification-needed verification-needed-bionic verification-needed-xenial verification-done verification-done-bionic verification-done-trusty verification-done-xenial
2021-01-05 19:22:48 Launchpad Janitor update-notifier (Ubuntu Xenial): status Fix Committed Fix Released
2021-01-05 19:25:17 Launchpad Janitor update-notifier (Ubuntu Bionic): status Fix Committed Fix Released
2022-09-22 16:48:02 Launchpad Janitor merge proposal linked https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430317
2022-09-22 16:48:57 Launchpad Janitor merge proposal linked https://code.launchpad.net/~lamoura/ubuntu/+source/update-notifier/+git/update-notifier/+merge/430318