group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #49635
[Bug 2112382] Re: [SRU] ubuntu-advantage-tools (35.1 -> 36) Xenial, Bionic, Focal, Jammy, Noble, Oracular, Plucky
This bug was fixed in the package ubuntu-advantage-tools -
36ubuntu0~25.04
---------------
ubuntu-advantage-tools (36ubuntu0~25.04) plucky; urgency=medium
* Backport 36ubuntu0 to plucky (LP: #2112382)
ubuntu-advantage-tools (36ubuntu0) questing; urgency=medium
* d/apparmor/ubuntu_pro_esm_cache.jinja2: use openssl abstraction in the
apparmor profile
* New upstream release 36: (LP: #2112382)
- api: display all available valid CVEs
- attach: relax the onlySeries directive, so users can attach onlySeries
tokens to all releases older than the target release
- cli:
+ anbox-cloud: update installation instructions
+ collect-logs: do not overwrite the output file if it exists
+ cve/cves:
* return all affected packages for a cve (LP: #2111610)
* handle the case where the vulnerability data doesn't exist for the
Ubuntu release
- fips:
+ enable --access-only for all fips related services (GH: #3441)
+ allow enablement even when the -updates pocket is not available in the
system (GH: #3439)
-- Renan Rodrigo <renanrodrigo@xxxxxxxxxxxxx> Tue, 24 Jun 2025
09:20:16 -0300
** Changed in: ubuntu-advantage-tools (Ubuntu Plucky)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2112382
Title:
[SRU] ubuntu-advantage-tools (35.1 -> 36) Xenial, Bionic, Focal,
Jammy, Noble, Oracular, Plucky
Status in ubuntu-advantage-tools package in Ubuntu:
Fix Released
Status in ubuntu-advantage-tools source package in Xenial:
Fix Released
Status in ubuntu-advantage-tools source package in Bionic:
Fix Released
Status in ubuntu-advantage-tools source package in Focal:
Fix Released
Status in ubuntu-advantage-tools source package in Jammy:
Fix Released
Status in ubuntu-advantage-tools source package in Noble:
Fix Released
Status in ubuntu-advantage-tools source package in Oracular:
Fix Released
Status in ubuntu-advantage-tools source package in Plucky:
Fix Released
Bug description:
[ Impact ]
This release brings both bug-fixes and new features for the Pro
Client, and we would like to make sure all of our supported customers
have access to these improvements on all releases.
The most important change is:
We are relaxing the onlySeries directive interpretation.
This is a special type of token that was designed to allow attach in a single release. For example, a onlySeries Jammy token could only attach to Jammy (not Noble, not Focal, not anything else).
However, this is not how the feature was supposed to work - expectation now is that a onlySeries Jammy token can be used in Jammy *or earlier*. So attaching with it on Focal is fine, but on Noble it should still not work.
[ Test Plan ]
The following development and SRU process was followed:
https://wiki.ubuntu.com/UbuntuAdvantageToolsUpdates
The Pro Client developers will be in charge of attaching the artifacts
of the appropriate test runs to the bug, and will not mark
‘verification-done’ until this has happened.
[ Where problems could occur ]
The change to onlySeries is the one that calls for more attention, as mistakes there could lead to many different unwanted scenarios:
a) Users not being able to use onlySeries tokens at all
b) Users being able to use onlySeries tokens to attach to any series
c) Attached machines getting detached because of the rule change
d) Users not being able to update to a supported release to a subsequent supported release
e) Users being able to update from a supported release to an unsupported release
The unlikeliness of a), c) and d) is based on the code change making
the check for onlySeries less restrictive than the older check. There
seems to be no use case or scenario where a machine would *lose* Pro
access after this change, whether by not being able to attach to being
detached.
b) and e) would be cases where loosening the check would go too far.
Besides manual checking, the scenarios above are tested in the new and
modified integration tests, executed as part of the validation for
this SRU.
Another important implementation decision to be noted is that often times in older releases, there is no registry of the new ones in distro-info-data. For example, on Jammy it's possible to get the data for Xenial or Bionic, but on Xenial there is no information about Jammy. As the restriction to the onlySeries token is for future releases, we consider any release that is *not found* in the distro-info-data as a future release, and block the token usage. This was tested and works as expected, but it relies:
- on distro-info-data correctness, which we can assume given the importance of the distro-info package
- on the backend always setting the correct values for the onlySeries field when defining the tokens. A simple typo there would render the tokens completely useless. Strict validation is in place in the backend to make sure this does not happen.
There is a change in the apparmor profile for esm_cache in this
release, and apparmor is a good suspect of things going in unexpected
ways. However, this change here is to use a proper abstraction for
openssl, which is the correct approach. We have tests for the service,
and will keep an eye on -proposed to make sure no regression happens
there.
FIPS-related services can now be enabled using --access-only, which
means getting access to the repositories without actually installing
the packages. Users can use this without proper care, and think their
systems are FIPS-enabled when it's actually not. To mitigate this
impression, we are adding a warning state to FIPS-related services
when the entitlement itself is enabled but the ubuntu-fips metapackage
(or one of the cloud variants) is not installed.
The above warning won't work (for now) in containers though, where the
FIPS service will still show as enabled even if --access-only was
passed when enabling. We don't consider this a regression in --access-
only because the same happens with realtime-kernel, for instance,
which appears as enabled when the repository access is given and there
is no RT kernel in the system. We don't consider this a regression for
FIPS services because today if you enable FIPS in a container but the
host does not run a FIPS service, you don't actually have FIPS in
place but the status says it's enabled. In the end, in all cases, the
user needs to know what they are doing. Documentation is our best
friend.
[ Changelog ]
ubuntu-advantage-tools (36ubuntu0) questing; urgency=medium
* d/apparmor/ubuntu_pro_esm_cache.jinja2: use openssl abstraction in the
apparmor profile
* New upstream release 36: (LP: #2112382)
- api: display all available valid CVEs
- attach: relax the onlySeries directive, so users can attach onlySeries
tokens to all releases older than the target release
- cli:
+ anbox-cloud: update installation instructions
+ collect-logs: do not overwrite the output file if it exists
+ cve/cves:
* return all affected packages for a cve (LP: #2111610)
* handle the case where the vulnerability data doesn't exist for the
Ubuntu release
- fips:
+ enable --access-only for all fips related services (GH: #3441)
+ allow enablement even when the -updates pocket is not available in the
system (GH: #3439)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2112382/+subscriptions