I'm having difficulty verifying this SRU for later releases, because
even though I'm pointing at the precise release (which is published on
esm.ubuntu.com), and I have valid credentials for the site, I get:

Ign https://esm.ubuntu.com precise InRelease
[...]
Ign https://esm.ubuntu.com precise Release.gpg                     
[...]
Ign https://esm.ubuntu.com precise Release                         
[...]
Err https://esm.ubuntu.com precise/main amd64 Packages
[...]
W: Failed to fetch 
https://esm.ubuntu.com/ubuntu/dists/precise/main/binary-amd64/Packages  

It's possible this is due to an apt behavior change in 14.04 and later,
and the fact that the esm Packages files are currently zero bytes in
length.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1687129

Title:
  Needs to allow updates from the ESM archive

Status in unattended-upgrades package in Ubuntu:
  Confirmed
Status in unattended-upgrades source package in Precise:
  Fix Released
Status in unattended-upgrades source package in Trusty:
  Fix Committed
Status in unattended-upgrades source package in Xenial:
  Fix Committed
Status in unattended-upgrades source package in Yakkety:
  Fix Committed
Status in unattended-upgrades source package in Zesty:
  Fix Committed

Bug description:
  [SRU Justification]
  When the dust has settled on the ESM archive Release file format[1], 
unattended-upgrades needs to be tweaked to match.

  [1] https://github.com/CanonicalLtd/archive-auth-mirror/issues/43

  Since the ESM archive contains packages updated by the Ubuntu Security
  team, we should ensure the behavior of unattended-upgrades applies the
  same default policy to both.

  [Test case]
  1. run 'sudo apt-get install ubuntu-advantage-tools unattended-upgrades 
ca-certificates'
  2. run 'sudo ubuntu-advantage enable-esm <creds>' with your private creds to 
enable the ESM archive
  3. run 'sudo apt-get update'
  4. create a faked-up entry in 
/var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages
 for the unattended-upgrades package with a higher version number
  5. run 'sudo unattended-upgrades --debug --dry-run' and verify that no 
unattended-upgrades package is installed.
  6. install unattended-upgrades from -proposed.
  7. again create a faked-up entry in 
/var/lib/apt/lists/esm.ubuntu.com_ubuntu_dists_precise_main_binary-amd64_Packages
 for the unattended-upgrades package with a higher version number
  8. run 'sudo unattended-upgrades --debug --dry-run' and verify that it offers 
to install a new unattended-upgrades package.

  [Regression potential]
  Worst-case scenario is a bug that prevents future security updates from being 
applied correctly.  This is not a concern for precise because there will be no 
further security updates /except/ those enabled by this SRU, but this SRU 
should also be included in all later stable releases.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1687129/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to