[Bug 1842508] Re: motd messaging changes regarding apt updates
Chad Smith
1842508 at bugs.launchpad.net
Mon Oct 7 19:14:28 UTC 2019
Validation complete on trusty with new ua-client:
# 0. Install latest proposed update-notifier-common
ubuntu at dev-t3:~$ apt-cache policy update-notifier-common
update-notifier-common:
Installed: 0.154.1ubuntu8
Candidate: 0.154.1ubuntu8
Version table:
*** 0.154.1ubuntu8 0
500 http://archive.ubuntu.com/ubuntu/ trusty-proposed/main amd64 Packages
100 /var/lib/dpkg/status
# 1. Unattached system with ESM disabled
ubuntu at dev-t3:~$ ua status
SERVICE AVAILABLE DESCRIPTION
cc-eal no Common Criteria EAL2 Provisioning Packages
esm-infra yes UA Infra: Extended Security Maintenance
fips no NIST-certified FIPS modules
fips-updates no Uncertified security updates to FIPS modules
livepatch yes Canonical Livepatch service
This machine is not attached to a UA subscription.
See https://ubuntu.com/advantage
# 2. Force motd update for esm-related packages
sudo /usr/lib/update-notifier/update-motd-updates-available --force
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.
2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status
# 3. ssh as non-root and see dynamic motd
csmith at uptown:~/src$ ssh ubuntu at 10.10.7.119
Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 5.3.0-10-generic x86_64)
* Documentation: https://help.ubuntu.com/
System information as of Mon Oct 7 19:07:46 UTC 2019
System load: 0.76 Processes: 19
Usage of /home: unknown Users logged in: 0
Memory usage: 0% IP address for eth0: 10.10.7.119
Swap usage: 65%
Graph this data and manage this system at:
https://landscape.canonical.com/
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.
2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status
New release '16.04.6 LTS' available.
Run 'do-release-upgrade' to upgrade to it.
Last login: Mon Oct 7 19:07:46 2019 from 10.10.7.1
# Install latest
# On Unattached system with ESM disabled:
ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.
2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status
# On Attached system with ESM enabled. updates are properly listed
ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is enabled.
54 updates can be installed immediately.
52 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
##### Attached system with ESM enabled
# 4. Enabled esm
sudo ua attach <mytoken>
Enabling default service esm-infra
Updating package lists
ESM Infra enabled.
This machine is now attached to 'chad.smith at canonical.com'.
SERVICE ENTITLED STATUS DESCRIPTION
cc-eal no — Common Criteria EAL2 Provisioning Packages
cis-audit no — Center for Internet Security Audit Tools
esm-infra yes enabled UA Infra: Extended Security Maintenance
fips no — NIST-certified FIPS modules
fips-updates no — Uncertified security updates to FIPS modules
livepatch yes n/a Canonical Livepatch service
Enable services with: ua enable <service>
Account: chad.smith at canonical.com
Subscription: chad.smith at canonical.com
# 5. Force motd update for attached machine with ESM enabled
ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/update-motd-updates-available --force
UA Infrastructure Extended Security Maintenance (ESM) is enabled.
54 updates can be installed immediately.
52 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
# 6. ssh Login to see full updated motd
csmith at uptown:~/src$ ssh ubuntu at 10.10.7.119
Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 5.3.0-10-generic x86_64)
* Documentation: https://help.ubuntu.com/
System information as of Mon Oct 7 19:12:07 UTC 2019
System load: 0.9 Processes: 19
Usage of /home: unknown Users logged in: 0
Memory usage: 0% IP address for eth0: 10.10.7.119
Swap usage: 65%
Graph this data and manage this system at:
https://landscape.canonical.com/
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.
2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable
Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status
New release '16.04.6 LTS' available.
Run 'do-release-upgrade' to upgrade to it.
** Tags removed: verification-needed verification-needed-trusty
** Tags added: verification-done verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to update-notifier in Ubuntu.
https://bugs.launchpad.net/bugs/1842508
Title:
motd messaging changes regarding apt updates
Status in update-notifier package in Ubuntu:
Fix Released
Status in update-notifier source package in Trusty:
Fix Committed
Bug description:
[Impact]
Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review.
[Test Case]
test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled).
[Regression Potential]
Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues.
[Notice]
This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1842508/+subscriptions
More information about the foundations-bugs
mailing list