[Bug 1679252] Re: Non-Intel architectures are configured with security repos that don't work

Dan Watkins daniel.watkins at canonical.com
Mon Apr 3 18:24:43 UTC 2017


** Description changed:

+ [Impact]
+ 
+ Users who don't get a fresh sources.list written out on first boot (e.g.
+ Docker users) can't install updates from xenial-security on non-Intel
+ architectures.
+ 
+ [Test Case]
+ 
+ Run an ubuntu-cpc livefs build for a non-Intel architecture, unpack one
+ of the produced root tarballs, chroot in to it and perform an `apt-get
+ update`.  You should see no errors.
+ 
+ [Regression Potential]
+ 
+ This change modifies the sources that apt will use for updates, so the
+ biggest risk for regression is that the fix is malformed and systems
+ become un-updateable (either partially or fully).  The test above should
+ catch this.
+ 
+ [Original Report]
+ 
  In the fix for bug 1513529, we[0] modified livecd-rootfs to write out a
  sources.list that matches the sources.list in Ubuntu Server installed
  from an ISO.  We (presumably) compared to an Intel installation, and
  hard-coded security.ubuntu.com as a repo in sources.list.
  
  Unfortunately, packages for non-Intel architectures aren't published to
  security.ubuntu.com; they are instead published at
  http://ports.ubuntu.com/ubuntu-ports/.  That should be the URL that we
  configure as the source for $SUITE-security.
  
- 
  [0] Well, *ahem*, _I_.

** Summary changed:

- Non-Intel architectures are configured with security repos that don't work
+ Cloud image tarballs for non-Intel architectures are configured with security repos that don't work

** Summary changed:

- Cloud image tarballs for non-Intel architectures are configured with security repos that don't work
+ Cloud images for non-Intel architectures are configured with security repos that don't work

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to livecd-rootfs in Ubuntu.
https://bugs.launchpad.net/bugs/1679252

Title:
  Cloud images for non-Intel architectures are configured with security
  repos that don't work

Status in livecd-rootfs:
  Unknown
Status in livecd-rootfs package in Ubuntu:
  Confirmed

Bug description:
  [Impact]

  Users who don't get a fresh sources.list written out on first boot
  (e.g. Docker users) can't install updates from xenial-security on non-
  Intel architectures.

  [Test Case]

  Run an ubuntu-cpc livefs build for a non-Intel architecture, unpack
  one of the produced root tarballs, chroot in to it and perform an
  `apt-get update`.  You should see no errors.

  [Regression Potential]

  This change modifies the sources that apt will use for updates, so the
  biggest risk for regression is that the fix is malformed and systems
  become un-updateable (either partially or fully).  The test above
  should catch this.

  [Original Report]

  In the fix for bug 1513529, we[0] modified livecd-rootfs to write out
  a sources.list that matches the sources.list in Ubuntu Server
  installed from an ISO.  We (presumably) compared to an Intel
  installation, and hard-coded security.ubuntu.com as a repo in
  sources.list.

  Unfortunately, packages for non-Intel architectures aren't published
  to security.ubuntu.com; they are instead published at
  http://ports.ubuntu.com/ubuntu-ports/.  That should be the URL that we
  configure as the source for $SUITE-security.

  [0] Well, *ahem*, _I_.

To manage notifications about this bug go to:
https://bugs.launchpad.net/livecd-rootfs/+bug/1679252/+subscriptions



More information about the foundations-bugs mailing list