[Bug 1842508] Re: motd messaging changes regarding apt updates

Chad Smith 1842508 at bugs.launchpad.net
Mon Oct 7 19:14:28 UTC 2019


Validation complete on trusty with new ua-client:

# 0. Install latest proposed update-notifier-common
ubuntu at dev-t3:~$ apt-cache policy update-notifier-common
update-notifier-common:
  Installed: 0.154.1ubuntu8
  Candidate: 0.154.1ubuntu8
  Version table:
 *** 0.154.1ubuntu8 0
        500 http://archive.ubuntu.com/ubuntu/ trusty-proposed/main amd64 Packages
        100 /var/lib/dpkg/status


# 1. Unattached system with ESM disabled

ubuntu at dev-t3:~$ ua status

SERVICE      AVAILABLE  DESCRIPTION
cc-eal        no         Common Criteria EAL2 Provisioning Packages
esm-infra     yes        UA Infra: Extended Security Maintenance
fips          no         NIST-certified FIPS modules
fips-updates  no         Uncertified security updates to FIPS modules
livepatch     yes        Canonical Livepatch service

This machine is not attached to a UA subscription.
See https://ubuntu.com/advantage


# 2.  Force motd update for esm-related packages
sudo /usr/lib/update-notifier/update-motd-updates-available --force

UA Infrastructure Extended Security Maintenance (ESM) is not enabled.

2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable

Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status

# 3. ssh as non-root and see dynamic motd
csmith at uptown:~/src$ ssh ubuntu at 10.10.7.119
Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 5.3.0-10-generic x86_64)

 * Documentation:  https://help.ubuntu.com/

  System information as of Mon Oct  7 19:07:46 UTC 2019

  System load:    0.76      Processes:           19
  Usage of /home: unknown   Users logged in:     0
  Memory usage:   0%        IP address for eth0: 10.10.7.119
  Swap usage:     65%

  Graph this data and manage this system at:
    https://landscape.canonical.com/

UA Infrastructure Extended Security Maintenance (ESM) is not enabled.

2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable

Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status

New release '16.04.6 LTS' available.
Run 'do-release-upgrade' to upgrade to it.


Last login: Mon Oct  7 19:07:46 2019 from 10.10.7.1



# Install latest

# On Unattached system with ESM disabled:


ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is not enabled.

2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable

Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status

# On Attached system with ESM enabled. updates are properly listed
ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/apt-check --human-readable
UA Infrastructure Extended Security Maintenance (ESM) is enabled.

54 updates can be installed immediately.
52 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable


##### Attached system with ESM enabled
# 4. Enabled esm
sudo ua attach <mytoken>
Enabling default service esm-infra
Updating package lists
ESM Infra enabled.
This machine is now attached to 'chad.smith at canonical.com'.

SERVICE       ENTITLED  STATUS    DESCRIPTION
cc-eal        no        —         Common Criteria EAL2 Provisioning Packages
cis-audit     no        —         Center for Internet Security Audit Tools
esm-infra     yes       enabled   UA Infra: Extended Security Maintenance
fips          no        —         NIST-certified FIPS modules
fips-updates  no        —         Uncertified security updates to FIPS modules
livepatch     yes       n/a       Canonical Livepatch service

Enable services with: ua enable <service>

     Account: chad.smith at canonical.com
Subscription: chad.smith at canonical.com


# 5.  Force motd update for attached machine with ESM enabled
ubuntu at dev-t3:~$ sudo /usr/lib/update-notifier/update-motd-updates-available --force

UA Infrastructure Extended Security Maintenance (ESM) is enabled.

54 updates can be installed immediately.
52 of these updates are provided through UA Infrastructure ESM.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable


# 6. ssh Login to see full updated motd

csmith at uptown:~/src$ ssh ubuntu at 10.10.7.119
Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 5.3.0-10-generic x86_64)

 * Documentation:  https://help.ubuntu.com/

  System information as of Mon Oct  7 19:12:07 UTC 2019

  System load:    0.9       Processes:           19
  Usage of /home: unknown   Users logged in:     0
  Memory usage:   0%        IP address for eth0: 10.10.7.119
  Swap usage:     65%

  Graph this data and manage this system at:
    https://landscape.canonical.com/

UA Infrastructure Extended Security Maintenance (ESM) is not enabled.

2 updates can be installed immediately.
0 of these updates are security updates.
To see these additional updates run: apt list --upgradable

Enable UA Infrastructure ESM to receive 52 additional security updates.
See https://ubuntu.com/advantage or run: sudo ua status

New release '16.04.6 LTS' available.
Run 'do-release-upgrade' to upgrade to it.



** Tags removed: verification-needed verification-needed-trusty
** Tags added: verification-done verification-done-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to update-notifier in Ubuntu.
https://bugs.launchpad.net/bugs/1842508

Title:
  motd messaging changes regarding apt updates

Status in update-notifier package in Ubuntu:
  Fix Released
Status in update-notifier source package in Trusty:
  Fix Committed

Bug description:
  [Impact]
  Changes to wording regarding the ESM support available for Trusty. Additionally, reorder command output after UX review.

  [Test Case]
  test_motd.py has unit tests for all of the combinations of upgrade types possible. It's also possible to run "/usr/lib/update-notifier/apt-check --human-readable" on a system with ESM configured (enabled or disabled).

  [Regression Potential]
  Only strings are changing in this update and this could be considered a follow up SRU to bug 1822340 which created no issues.

  [Notice]
  This is only being SRU'ed to Ubuntu 14.04 (as with the previous SRU) as Ubuntu 16.04 and Ubuntu 18.04 will have some additional changes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1842508/+subscriptions



More information about the foundations-bugs mailing list