← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1990378] Re: apt-get will start failing for some users when Bionic reaches ESM

 

This bug was fixed in the package ubuntu-advantage-tools -
27.13.1~20.04.1

---------------
ubuntu-advantage-tools (27.13.1~20.04.1) focal; urgency=medium

  * Backport new upstream release: (LP: #2003018) to focal

ubuntu-advantage-tools (27.13.1~23.04.1) lunar; urgency=medium

  * apt: better isolate apt esm cache by only fetching necessary
    configuration from the system apt

ubuntu-advantage-tools (27.13~23.04.1) lunar; urgency=medium

  * d/bash-completion:
    - enable autocomplete for the 'pro' command (GH: #2280)
  * d/control:
    - update the package description
  * d/postinst:
    - remove unauthenticated esm repos from Xenial systems (LP: #1990378)
  * New upstream release 27.13 (LP: #2003018)
    - apt:
      + remove logic which added repositories and pinned them to 'never' to
        enable access to esm package lists
      + add functionality to create and update a local apt esm cache with
        the lists for esm-infra and esm-apps
    - apt-hook: update the cpp hook to use the local esm apt cache
    - apt-news:
      + fetch and display APT News in apt upgrade
      + show contract expiration notices in the apt news output
    - attach: support attaching without being able to install snapd
      (LP: #1997514)
    - cli:
      + do not show invalid subcommands in autocomplete (GH: #2279)
      + add support for attaching through the web portal, without a token
    - config: add apt_news_url option
    - docs: reorganize documentation and correct information
    - esm-apps: release the service as GA
    - jobs:
      + remove the update_status job
      + remove unused job which checks for the system EOL
    - messaging: do not fail if the apt-hook executable is not present
      (LP: #1994480)
    - motd: announce esm-apps as GA
    - security-status:
      + use the local esm cache to report updates when the services are
        disabled
      + redesign output to properly show support (LP: #2002407)
    - services: add new service to update the local esm caches
    - ros: release the service as GA
    - bug fixes:
      + report reboot_required even if 'livepatch status' fails
      + do not create unexpected environment variables when the autocomplete
        script runs
      + contract requests do not cause 'pro status' to fail
      + remove auto-attach motd message if any failure happens
      + log when 'cloud-id' fails
      + always honor the metering job timer config
      + write files atomically

 -- Lucas Moura <lucas.moura@xxxxxxxxxxxxx>  Mon, 23 Jan 2023 12:28:43
-0300

** Changed in: ubuntu-advantage-tools (Ubuntu Bionic)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1990378

Title:
  apt-get will start failing for some users when Bionic reaches ESM

Status in ubuntu-advantage-tools package in Ubuntu:
  Fix Released
Status in ubuntu-advantage-tools source package in Xenial:
  Fix Released
Status in ubuntu-advantage-tools source package in Bionic:
  Fix Released
Status in ubuntu-advantage-tools source package in Focal:
  Fix Released
Status in ubuntu-advantage-tools source package in Jammy:
  Fix Released
Status in ubuntu-advantage-tools source package in Kinetic:
  Fix Released

Bug description:
  [Impact]
  [Original Description]
  As discussed in https://code.launchpad.net/~renanrodrigo/ubuntu/+source/ubuntu-advantage-tools/+git/ubuntu-advantage-tools/+merge/429778, there's already code in the postinst that will unconditionally add (pinned to be ignored) ESM repositories to sources.list if run after Bionic's ESM date (April 2023), in order to detect and report what ESM updates are available.

  It appears that this will be problematic for users who run in an
  isolated network environment with their own local apt mirrors or
  managed apt repositories. For them, "apt-get update" will start to
  fail on this date, whereas previously it worked. Effectively, for
  those users, this is a time bomb.

  Following discussion we think that we must find a way that does not
  change users' system apt configuration except when they explicitly
  opt-in to that.

  This bug has an obvious hard deadline, but really needs fixing well in
  advance to prevent inadvertent triggering of the bug before users have
  picked up the fix.

  [Test Case]
  It is important to notice that this 'time bomb' described above will be triggered not only by Bionic reaching ESM (trigger for esm-infra), but also can be triggered by esm-apps as it goes out of beta. This will happen in the exact release where this bug is fixed.

  For the functionality: on a Xenial system:
  - verify that there is a unauthenticated .lists file for esm-infra
  - run security-status and see there are package counts for esm, advertising possible updates
  - install ubuntu-advantage-tools >= 27.13
  - verify that there are no unauthenticated esm-infra files
  - run apt update
  - run security-status and see there are package counts for esm, advertising possible updates

  For this particular bug fix: on a Bionic system:
  - install ubuntu-advantage-tools >= 27.13
  - verify that there are no unauthenticated esm-apps files, or esm-infra files
  - run apt update
  - run security-status and see there are package counts for esm, advertising possible updates

  [Regression Potential]
  This should be a 'refactor' from the functionality point of view - all integration/acceptance tests are passing following the exact same steps as before, both for security-status and for the apt esm hook. Users are expected to see exactly what they do see today, but without their system configuration being changed.

  If we have a gap in our unit/integration tests, then this gap may
  contain errors that we did not catch yet. We have also tested this
  change taking into consideration all of the common scenarios where it
  would run to avoid surprises.

  A review from juliank was most helpful to make sure we didn't
  implement anything wrong with the available apt libraries.

  [Discussion]
  As discussed in https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2003018, there were pre-SRU reviews for the change that fixes this bug.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1990378/+subscriptions