Merge ~lamoura/ubuntu/+source/ubuntu-advantage-tools:upload-29.4-mantic into ubuntu/+source/ubuntu-advantage-tools:ubuntu/devel

Proposed by Lucas Albuquerque Medeiros de Moura
Status: Merged
Merged at revision: 1bec70b5ccbe93ecdc479cae9563d1746823c51f
Proposed branch: ~lamoura/ubuntu/+source/ubuntu-advantage-tools:upload-29.4-mantic
Merge into: ubuntu/+source/ubuntu-advantage-tools:ubuntu/devel
Diff against target: 929 lines (+112/-133)
19 files modified
debian/changelog (+7/-0)
dev/null (+0/-10)
features/airgapped.feature (+2/-2)
features/anbox.feature (+0/-14)
features/api_packages.feature (+1/-1)
features/attach_validtoken.feature (+4/-3)
features/attached_commands.feature (+1/-1)
features/attached_enable.feature (+20/-24)
features/attached_status.feature (+5/-1)
features/cloud.py (+2/-2)
features/enable_fips_vm.feature (+6/-6)
features/livepatch.feature (+2/-0)
features/proxy_config.feature (+6/-0)
features/ubuntu_pro.feature (+21/-21)
features/ubuntu_pro_fips.feature (+24/-24)
features/unattached_status.feature (+9/-21)
setup.py (+0/-1)
tools/run-integration-tests.py (+1/-1)
uaclient/version.py (+1/-1)
Reviewer Review Type Date Requested Status
Andreas Hasenack Approve
Canonical Server Reporter Pending
Review via email: mp+451117@code.launchpad.net

Description of the change

Release 29.4 of the Pro client. This release only removes the pin files for the ESM services

To post a comment you must log in.
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

The diff is comprised of the reverts, and some test changes.

The package builds find, and I checked upgrades. In mantic, we get the expected conf file prompt when upgrading to the current version in mantic, and when upgrading further to this branch's version, no further prompts and things are left as they were.

The sru/release-29 directory still contains a test for the pinning that is being dropped here, but the tests in the sru directory are not part of an automated test suite, and are only run manually when the SRU verification time comes, so this particular test can be skipped this time without issues.

+1

I will hold off on the mantic upload because the cpc team still needs the 29.3 version in the archive to test their fix for LP: #2033308.

review: Approve
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Uploaded to lunar, jammy, focal, bionic, and xenial, with .changes file starting on version 29.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 308c1d7..e37337b 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,10 @@
6+ubuntu-advantage-tools (29.4) mantic; urgency=medium
7+
8+ * esm: remove static config file that pin packages from esm-infra
9+ and esm-apps
10+
11+ -- Lucas Moura <lucas.moura@canonical.com> Wed, 06 Sep 2023 10:50:50 -0300
12+
13 ubuntu-advantage-tools (29.3) mantic; urgency=medium
14
15 * api: fix circular import that prevents enabled_services
16diff --git a/features/airgapped.feature b/features/airgapped.feature
17index 2f7d806..0547b74 100644
18--- a/features/airgapped.feature
19+++ b/features/airgapped.feature
20@@ -41,11 +41,11 @@ Feature: Performing attach using ua-airgapped
21 When I run `apt-cache policy hello` with sudo
22 Then stdout matches regexp:
23 """
24- 510 .*:9000/ubuntu jammy-apps-security/main
25+ 500 .*:9000/ubuntu jammy-apps-security/main
26 """
27 And stdout matches regexp:
28 """
29- 510 .*:8000/ubuntu jammy-infra-security/main
30+ 500 .*:8000/ubuntu jammy-infra-security/main
31 """
32 Then I verify that running `pro refresh` `with sudo` exits `0`
33
34diff --git a/features/anbox.feature b/features/anbox.feature
35index 424b575..4c4db4d 100644
36--- a/features/anbox.feature
37+++ b/features/anbox.feature
38@@ -74,20 +74,6 @@ Feature: Enable anbox on Ubuntu
39 Given a `<release>` machine with ubuntu-advantage-tools installed
40 When I attach `contract_token` with sudo and options `--no-auto-enable`
41 And I run `snap remove lxd` with sudo
42- And I set the machine token overlay to the following yaml
43- """
44- machineTokenInfo:
45- contractInfo:
46- resourceEntitlements:
47- - type: anbox-cloud
48- directives:
49- requiredSnaps:
50- - name: lxd
51- channel: 5.0/stable
52- - name: amc
53- - name: anbox-cloud-appliance
54- classicConfinementSupport: true
55- """
56 And I run `pro enable anbox-cloud --access-only --assume-yes` with sudo
57 Then I will see the following on stdout:
58 """
59diff --git a/features/api_packages.feature b/features/api_packages.feature
60index daef767..3123d62 100644
61--- a/features/api_packages.feature
62+++ b/features/api_packages.feature
63@@ -35,4 +35,4 @@ Feature: Package related API endpoints
64 | bionic | libcurl4 | 7.58.0-2ubuntu3 | standard-security |
65 | focal | libcurl4 | 7.68.0-1ubuntu2 | standard-security |
66 | jammy | libcurl4 | 7.81.0-1 | standard-security |
67- | lunar | libcurl4 | 7.88.1-8ubuntu1 | standard-updates |
68+ | lunar | libcurl4 | 7.88.1-8ubuntu1 | standard-security |
69diff --git a/features/attach_validtoken.feature b/features/attach_validtoken.feature
70index d987db0..77da4b3 100644
71--- a/features/attach_validtoken.feature
72+++ b/features/attach_validtoken.feature
73@@ -28,6 +28,7 @@ Feature: Command behaviour when attaching a machine to an Ubuntu Pro
74 esm-infra +yes +n/a +Expanded Security Maintenance for Infrastructure
75 fips +yes +n/a +NIST-certified core packages
76 fips-updates +yes +n/a +NIST-certified core packages with priority security updates
77+ landscape +yes +<landscape> +Management and administration tool for Ubuntu
78 livepatch +yes +n/a +Canonical Livepatch service
79 """
80 And stdout does not match regexp:
81@@ -36,9 +37,9 @@ Feature: Command behaviour when attaching a machine to an Ubuntu Pro
82 """
83
84 Examples: ubuntu release
85- | release |
86- | lunar |
87- | mantic |
88+ | release | landscape |
89+ | lunar | n/a |
90+ | mantic | yes |
91
92 @series.lts
93 @uses.config.machine_type.lxd-container
94diff --git a/features/attached_commands.feature b/features/attached_commands.feature
95index 932ffce..6f5c45f 100644
96--- a/features/attached_commands.feature
97+++ b/features/attached_commands.feature
98@@ -263,7 +263,7 @@ Feature: Command behaviour when attached to an Ubuntu Pro subscription
99 Examples: ubuntu release
100 | release | anbox | esm-apps | cc-eal | cis | fips | fips-update | ros | cis_or_usg | realtime-kernel |
101 | xenial | no | yes | yes | yes | yes | yes | yes | cis | no |
102- | bionic | yes | yes | yes | yes | yes | yes | yes | cis | no |
103+ | bionic | no | yes | yes | yes | yes | yes | yes | cis | no |
104 | focal | yes | yes | no | yes | yes | yes | no | usg | no |
105 | jammy | yes | yes | no | yes | no | no | no | usg | yes |
106
107diff --git a/features/attached_enable.feature b/features/attached_enable.feature
108index a779da4..7501b19 100644
109--- a/features/attached_enable.feature
110+++ b/features/attached_enable.feature
111@@ -233,20 +233,16 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
112 See: sudo pro status
113 """
114 When I run `apt-cache policy` with sudo
115- Then apt-cache policy for the following url has permission `510`
116+ Then apt-cache policy for the following url has permission `500`
117 """
118 <esm-infra-url> <release>-infra-updates/main amd64 Packages
119 """
120- And apt-cache policy for the following url has permission `510`
121- """
122- <esm-infra-url> <release>-infra-security/main amd64 Packages
123- """
124 And I verify that running `apt update` `with sudo` exits `0`
125 When I run `apt install -y <infra-pkg>` with sudo, retrying exit [100]
126 And I run `apt-cache policy <infra-pkg>` as non-root
127 Then stdout matches regexp:
128 """
129- \s*510 <esm-infra-url> <release>-infra-security/main amd64 Packages
130+ \s*500 <esm-infra-url> <release>-infra-security/main amd64 Packages
131 """
132
133 Examples: ubuntu release
134@@ -573,7 +569,7 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
135 esm-infra +yes +enabled +Expanded Security Maintenance for Infrastructure
136 fips +yes +disabled +NIST-certified core packages
137 fips-updates +yes +disabled +NIST-certified core packages with priority security updates
138- livepatch +yes +enabled +Canonical Livepatch service
139+ livepatch +yes +<livepatch_status> +Canonical Livepatch service
140 """
141 When I run `pro disable livepatch` with sudo
142 Then I verify that running `canonical-livepatch status` `with sudo` exits `1`
143@@ -599,9 +595,9 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
144 """
145
146 Examples: ubuntu release
147- | release |
148- | xenial |
149- | bionic |
150+ | release | livepatch_status |
151+ | xenial | warning |
152+ | bionic | enabled |
153
154 @series.xenial
155 @series.bionic
156@@ -661,7 +657,7 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
157 When I run `pro status` with sudo
158 Then stdout matches regexp:
159 """
160- livepatch +yes +enabled
161+ livepatch +yes +<livepatch_status>
162 """
163 When I run `canonical-livepatch status` with sudo
164 Then stdout matches regexp:
165@@ -670,9 +666,9 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
166 """
167
168 Examples: ubuntu release
169- | release |
170- | xenial |
171- | bionic |
172+ | release | livepatch_status |
173+ | xenial | warning |
174+ | bionic | enabled |
175
176 @series.xenial
177 @uses.config.machine_type.lxd-vm
178@@ -687,12 +683,12 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
179 When I run `pro status` with sudo
180 Then stdout matches regexp:
181 """
182- livepatch +yes +enabled
183+ livepatch +yes +warning
184 """
185 When I run `pro api u.pro.security.status.reboot_required.v1` with sudo
186 Then stdout matches regexp:
187 """
188- {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "supported", "reboot_required": "no", "reboot_required_packages": {"kernel_packages": null, "standard_packages": null}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
189+ {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "kernel-upgrade-required", "reboot_required": "no", "reboot_required_packages": {"kernel_packages": null, "standard_packages": null}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
190 """
191 When I run `pro system reboot-required` as non-root
192 Then I will see the following on stdout:
193@@ -703,7 +699,7 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
194 And I run `pro api u.pro.security.status.reboot_required.v1` as non-root
195 Then stdout matches regexp:
196 """
197- {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "supported", "reboot_required": "yes", "reboot_required_packages": {"kernel_packages": \[\], "standard_packages": \["libc6"\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
198+ {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "kernel-upgrade-required", "reboot_required": "yes", "reboot_required_packages": {"kernel_packages": \[\], "standard_packages": \["libc6"\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
199 """
200 When I run `pro system reboot-required` as non-root
201 Then I will see the following on stdout:
202@@ -720,18 +716,18 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
203 And I run `pro api u.pro.security.status.reboot_required.v1` as non-root
204 Then stdout matches regexp:
205 """
206- {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "supported", "reboot_required": "yes-kernel-livepatches-applied", "reboot_required_packages": {"kernel_packages": \["linux-base"\], "standard_packages": \[\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
207+ {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "kernel-upgrade-required", "reboot_required": "yes", "reboot_required_packages": {"kernel_packages": \["linux-base"\], "standard_packages": \[\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
208 """
209 When I run `pro system reboot-required` as non-root
210 Then I will see the following on stdout:
211 """
212- yes-kernel-livepatches-applied
213+ yes
214 """
215 When I run `apt-get install dbus -y` with sudo
216 And I run `pro api u.pro.security.status.reboot_required.v1` with sudo
217 Then stdout matches regexp:
218 """
219- {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "supported", "reboot_required": "yes", "reboot_required_packages": {"kernel_packages": \["linux-base"\], "standard_packages": \["dbus"\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
220+ {"_schema_version": "v1", "data": {"attributes": {"livepatch_enabled": true, "livepatch_enabled_and_kernel_patched": true, "livepatch_state": "applied", "livepatch_support": "kernel-upgrade-required", "reboot_required": "yes", "reboot_required_packages": {"kernel_packages": \["linux-base"\], "standard_packages": \["dbus"\]}}, "meta": {"environment_vars": \[\]}, "type": "RebootRequired"}, "errors": \[\], "result": "success", "version": ".*", "warnings": \[\]}
221 """
222 When I run `pro system reboot-required` as non-root
223 Then I will see the following on stdout:
224@@ -1128,11 +1124,11 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
225 """
226 And I verify that running `apt update` `with sudo` exits `0`
227 When I run `apt-cache policy` as non-root
228- Then apt-cache policy for the following url has permission `510`
229+ Then apt-cache policy for the following url has permission `500`
230 """
231 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
232 """
233- And apt-cache policy for the following url has permission `510`
234+ And apt-cache policy for the following url has permission `500`
235 """
236 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
237 """
238@@ -1142,8 +1138,8 @@ Feature: Enable command behaviour when attached to an Ubuntu Pro subscription
239 Then stdout matches regexp:
240 """
241 Version table:
242- \s*\*\*\* .* 510
243- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
244+ \s*\*\*\* .* 500
245+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
246 """
247 When I verify that running `pro enable esm-apps` `with sudo` exits `1`
248 Then stdout matches regexp
249diff --git a/features/attached_status.feature b/features/attached_status.feature
250index b59f0bd..a6bcd07 100644
251--- a/features/attached_status.feature
252+++ b/features/attached_status.feature
253@@ -116,6 +116,7 @@ Feature: Attached status
254 esm-infra +yes +enabled +Expanded Security Maintenance for Infrastructure
255 fips +yes +disabled +NIST-certified core packages
256 fips-updates +yes +disabled +NIST-certified core packages with priority security updates
257+ landscape +yes +n/a +Management and administration tool for Ubuntu
258 livepatch +yes +n/a +Canonical Livepatch service
259 realtime-kernel +yes +n/a +Ubuntu kernel with PREEMPT_RT patches integrated
260 ros +yes +disabled +Security Updates for the Robot Operating System
261@@ -139,6 +140,7 @@ Feature: Attached status
262 Then stdout matches regexp:
263 """
264 SERVICE +ENTITLED +STATUS +DESCRIPTION
265+ anbox-cloud +yes +disabled +.*
266 esm-apps +yes +enabled +Expanded Security Maintenance for Applications
267 esm-infra +yes +enabled +Expanded Security Maintenance for Infrastructure
268 fips +yes +disabled +NIST-certified core packages
269@@ -153,12 +155,13 @@ Feature: Attached status
270 Then stdout matches regexp:
271 """
272 SERVICE +ENTITLED +STATUS +DESCRIPTION
273- anbox-cloud +yes +n/a +.*
274+ anbox-cloud +yes +disabled +.*
275 cc-eal +yes +n/a +Common Criteria EAL2 Provisioning Packages
276 esm-apps +yes +enabled +Expanded Security Maintenance for Applications
277 esm-infra +yes +enabled +Expanded Security Maintenance for Infrastructure
278 fips +yes +disabled +NIST-certified core packages
279 fips-updates +yes +disabled +NIST-certified core packages with priority security updates
280+ landscape +yes +n/a +Management and administration tool for Ubuntu
281 livepatch +yes +n/a +Canonical Livepatch service
282 realtime-kernel +yes +n/a +Ubuntu kernel with PREEMPT_RT patches integrated
283 ros +yes +n/a +Security Updates for the Robot Operating System
284@@ -201,6 +204,7 @@ Feature: Attached status
285 esm-infra +yes +enabled +Expanded Security Maintenance for Infrastructure
286 fips +yes +n/a +NIST-certified core packages
287 fips-updates +yes +n/a +NIST-certified core packages with priority security updates
288+ landscape +yes +n/a +Management and administration tool for Ubuntu
289 livepatch +yes +n/a +Canonical Livepatch service
290 realtime-kernel +yes +n/a +Ubuntu kernel with PREEMPT_RT patches integrated
291 ├ generic +yes +n/a +Generic version of the RT kernel \(default\)
292diff --git a/features/cloud.py b/features/cloud.py
293index 8f3bcb0..cef4719 100644
294--- a/features/cloud.py
295+++ b/features/cloud.py
296@@ -327,9 +327,9 @@ class EC2(Cloud):
297 An AWS cloud provider instance
298 """
299 if not image_name:
300- if series == "xenial" and "pro" not in machine_type:
301+ if series in ("xenial", "bionic") and "pro" not in machine_type:
302 logging.debug(
303- "defaulting to non-daily image for awsgeneric-16.04"
304+ "defaulting to non-daily image for awsgeneric-[16|18].04"
305 )
306 daily = False
307 else:
308diff --git a/features/enable_fips_vm.feature b/features/enable_fips_vm.feature
309index f27a5e9..5724375 100644
310--- a/features/enable_fips_vm.feature
311+++ b/features/enable_fips_vm.feature
312@@ -285,7 +285,7 @@ Feature: FIPS enablement in lxd VMs
313 """
314 Then stdout matches regexp:
315 """
316- livepatch +yes enabled
317+ livepatch +yes +<livepatch_status>
318 """
319 When I run `pro enable fips-updates --assume-yes` with sudo
320 Then stdout matches regexp:
321@@ -302,7 +302,7 @@ Feature: FIPS enablement in lxd VMs
322 """
323 Then stdout matches regexp:
324 """
325- livepatch +yes enabled
326+ livepatch +yes +<livepatch_status>
327 """
328 When I reboot the machine
329 And I run `uname -r` as non-root
330@@ -322,12 +322,12 @@ Feature: FIPS enablement in lxd VMs
331 """
332 Then stdout matches regexp:
333 """
334- livepatch +yes enabled
335+ livepatch +yes +enabled
336 """
337 Examples: ubuntu release
338- | release |
339- | xenial |
340- | bionic |
341+ | release | livepatch_status |
342+ | xenial | warning |
343+ | bionic | enabled |
344
345 @slow
346 @series.focal
347diff --git a/features/livepatch.feature b/features/livepatch.feature
348index 4899ce0..7388ea1 100644
349--- a/features/livepatch.feature
350+++ b/features/livepatch.feature
351@@ -8,6 +8,8 @@ Feature: Livepatch
352 Given a `<release>` `<machine_type>` machine with ubuntu-advantage-tools installed
353 When I change config key `livepatch_url` to use value `<livepatch_url>`
354 Then I verify that no files exist matching `/home/ubuntu/.cache/ubuntu-pro/livepatch-kernel-support-cache.json`
355+ # This is needed because `apt update` creates this file before, and we need to make sure it is created correctly later
356+ When I delete the file `/run/ubuntu-advantage/livepatch-kernel-support-cache.json`
357 When I run `pro status` as non-root
358 Then I verify that files exist matching `/home/ubuntu/.cache/ubuntu-pro/livepatch-kernel-support-cache.json`
359 Then I verify that no files exist matching `/run/ubuntu-advantage/livepatch-kernel-support-cache.json`
360diff --git a/features/proxy_config.feature b/features/proxy_config.feature
361index 755f5dc..73f432e 100644
362--- a/features/proxy_config.feature
363+++ b/features/proxy_config.feature
364@@ -123,6 +123,7 @@ Feature: Proxy configuration
365 """
366 \"http://host:port\" is not a valid url. Not setting as proxy
367 """
368+ When I run `apt install python3-pycurl -y` with sudo
369 And I verify that running `pro config set ua_apt_https_proxy=https://localhost:12345` `with sudo` exits `1`
370 Then stderr matches regexp:
371 """
372@@ -231,6 +232,7 @@ Feature: Proxy configuration
373 "https_proxy": "invalidurls"
374 }
375 """
376+ And I run `apt install python3-pycurl -y` with sudo
377 And I verify that running `pro refresh config` `with sudo` exits `1`
378 Then stderr matches regexp:
379 """
380@@ -509,6 +511,7 @@ Feature: Proxy configuration
381 "ua_apt_https_proxy": "https://localhost:12345"
382 }
383 """
384+ And I run `apt install python3-pycurl -y` with sudo
385 And I verify that running `pro refresh config` `with sudo` exits `1`
386 Then stderr matches regexp:
387 """
388@@ -604,6 +607,7 @@ Feature: Proxy configuration
389 "ua_apt_https_proxy": "http://wronguser:wrongpassword@$behave_var{machine-ip proxy}:3128"
390 }
391 """
392+ And I run `apt install python3-pycurl -y` with sudo
393 And I verify that running `pro refresh config` `with sudo` exits `1`
394 Then stderr matches regexp:
395 """
396@@ -745,6 +749,7 @@ Feature: Proxy configuration
397 """
398 \"http://host:port\" is not a valid url. Not setting as proxy
399 """
400+ When I run `apt install python3-pycurl -y` with sudo
401 And I verify that running `pro config set global_apt_https_proxy=https://localhost:12345` `with sudo` exits `1`
402 Then stderr matches regexp:
403 """
404@@ -1151,6 +1156,7 @@ Feature: Proxy configuration
405 Acquire::http::Proxy \".*:3128\";
406 Acquire::https::Proxy \".*:3128\";
407 """
408+ When I run `apt install python3-pycurl -y` with sudo
409 And I verify that running `pro config set apt_https_proxy=https://localhost:12345` `with sudo` exits `1`
410 Then stdout matches regexp:
411 """
412diff --git a/features/ubuntu_pro.feature b/features/ubuntu_pro.feature
413index d7578d4..a5f1b98 100644
414--- a/features/ubuntu_pro.feature
415+++ b/features/ubuntu_pro.feature
416@@ -289,19 +289,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
417 To use a different subscription first run: sudo pro detach.
418 """
419 When I run `apt-cache policy` with sudo
420- Then apt-cache policy for the following url has permission `510`
421+ Then apt-cache policy for the following url has permission `500`
422 """
423 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
424 """
425- And apt-cache policy for the following url has permission `510`
426+ And apt-cache policy for the following url has permission `500`
427 """
428 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
429 """
430- And apt-cache policy for the following url has permission `510`
431+ And apt-cache policy for the following url has permission `500`
432 """
433 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
434 """
435- And apt-cache policy for the following url has permission `510`
436+ And apt-cache policy for the following url has permission `500`
437 """
438 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
439 """
440@@ -310,7 +310,7 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
441 And I run `apt-cache policy <infra-pkg>` as non-root
442 Then stdout matches regexp:
443 """
444- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
445+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
446 """
447 And stdout matches regexp:
448 """
449@@ -321,8 +321,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
450 Then stdout matches regexp:
451 """
452 Version table:
453- \s*\*\*\* .* 510
454- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
455+ \s*\*\*\* .* 500
456+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
457 """
458 When I create the file `/var/lib/ubuntu-advantage/marker-reboot-cmds-required` with the following:
459 """
460@@ -416,19 +416,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
461 To use a different subscription first run: sudo pro detach.
462 """
463 When I run `apt-cache policy` with sudo
464- Then apt-cache policy for the following url has permission `510`
465+ Then apt-cache policy for the following url has permission `500`
466 """
467 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
468 """
469- And apt-cache policy for the following url has permission `510`
470+ And apt-cache policy for the following url has permission `500`
471 """
472 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
473 """
474- And apt-cache policy for the following url has permission `510`
475+ And apt-cache policy for the following url has permission `500`
476 """
477 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
478 """
479- And apt-cache policy for the following url has permission `510`
480+ And apt-cache policy for the following url has permission `500`
481 """
482 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
483 """
484@@ -437,7 +437,7 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
485 And I run `apt-cache policy <infra-pkg>` as non-root
486 Then stdout matches regexp:
487 """
488- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
489+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
490 """
491 And stdout matches regexp:
492 """
493@@ -448,8 +448,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
494 Then stdout matches regexp:
495 """
496 Version table:
497- \s*\*\*\* .* 510
498- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
499+ \s*\*\*\* .* 500
500+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
501 """
502 When I create the file `/var/lib/ubuntu-advantage/marker-reboot-cmds-required` with the following:
503 """
504@@ -542,19 +542,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
505 To use a different subscription first run: sudo pro detach.
506 """
507 When I run `apt-cache policy` with sudo
508- Then apt-cache policy for the following url has permission `510`
509+ Then apt-cache policy for the following url has permission `500`
510 """
511 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
512 """
513- And apt-cache policy for the following url has permission `510`
514+ And apt-cache policy for the following url has permission `500`
515 """
516 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
517 """
518- And apt-cache policy for the following url has permission `510`
519+ And apt-cache policy for the following url has permission `500`
520 """
521 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
522 """
523- And apt-cache policy for the following url has permission `510`
524+ And apt-cache policy for the following url has permission `500`
525 """
526 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
527 """
528@@ -563,7 +563,7 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
529 And I run `apt-cache policy <infra-pkg>` as non-root
530 Then stdout matches regexp:
531 """
532- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
533+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
534 """
535 And stdout matches regexp:
536 """
537@@ -574,8 +574,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO image
538 Then stdout matches regexp:
539 """
540 Version table:
541- \s*\*\*\* .* 510
542- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
543+ \s*\*\*\* .* 500
544+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
545 """
546 When I create the file `/var/lib/ubuntu-advantage/marker-reboot-cmds-required` with the following:
547 """
548diff --git a/features/ubuntu_pro_fips.feature b/features/ubuntu_pro_fips.feature
549index df764cf..729e5f4 100644
550--- a/features/ubuntu_pro_fips.feature
551+++ b/features/ubuntu_pro_fips.feature
552@@ -60,19 +60,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
553 To use a different subscription first run: sudo pro detach.
554 """
555 When I run `apt-cache policy` with sudo
556- Then apt-cache policy for the following url has permission `510`
557+ Then apt-cache policy for the following url has permission `500`
558 """
559 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
560 """
561- And apt-cache policy for the following url has permission `510`
562+ And apt-cache policy for the following url has permission `500`
563 """
564 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
565 """
566- And apt-cache policy for the following url has permission `510`
567+ And apt-cache policy for the following url has permission `500`
568 """
569 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
570 """
571- And apt-cache policy for the following url has permission `510`
572+ And apt-cache policy for the following url has permission `500`
573 """
574 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
575 """
576@@ -85,11 +85,11 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
577 And I run `apt-cache policy <infra-pkg>` as non-root
578 Then stdout matches regexp:
579 """
580- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
581+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
582 """
583 Then stdout matches regexp:
584 """
585- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
586+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
587 """
588 And stdout matches regexp:
589 """
590@@ -100,8 +100,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
591 Then stdout matches regexp:
592 """
593 Version table:
594- \s*\*\*\* .* 510
595- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
596+ \s*\*\*\* .* 500
597+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
598 """
599 When I run `pro enable fips-updates --assume-yes` with sudo
600 Then I will see the following on stdout:
601@@ -280,19 +280,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
602 To use a different subscription first run: sudo pro detach.
603 """
604 When I run `apt-cache policy` with sudo
605- Then apt-cache policy for the following url has permission `510`
606+ Then apt-cache policy for the following url has permission `500`
607 """
608 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
609 """
610- And apt-cache policy for the following url has permission `510`
611+ And apt-cache policy for the following url has permission `500`
612 """
613 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
614 """
615- And apt-cache policy for the following url has permission `510`
616+ And apt-cache policy for the following url has permission `500`
617 """
618 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
619 """
620- And apt-cache policy for the following url has permission `510`
621+ And apt-cache policy for the following url has permission `500`
622 """
623 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
624 """
625@@ -305,11 +305,11 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
626 And I run `apt-cache policy <infra-pkg>` as non-root
627 Then stdout matches regexp:
628 """
629- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
630+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
631 """
632 Then stdout matches regexp:
633 """
634- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
635+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
636 """
637 And stdout matches regexp:
638 """
639@@ -320,8 +320,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
640 Then stdout matches regexp:
641 """
642 Version table:
643- \s*\*\*\* .* 510
644- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
645+ \s*\*\*\* .* 500
646+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
647 """
648 When I run `pro enable fips-updates --assume-yes` with sudo
649 Then I will see the following on stdout:
650@@ -553,19 +553,19 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
651 To use a different subscription first run: sudo pro detach.
652 """
653 When I run `apt-cache policy` with sudo
654- Then apt-cache policy for the following url has permission `510`
655+ Then apt-cache policy for the following url has permission `500`
656 """
657 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
658 """
659- And apt-cache policy for the following url has permission `510`
660+ And apt-cache policy for the following url has permission `500`
661 """
662 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
663 """
664- And apt-cache policy for the following url has permission `510`
665+ And apt-cache policy for the following url has permission `500`
666 """
667 https://esm.ubuntu.com/apps/ubuntu <release>-apps-updates/main amd64 Packages
668 """
669- And apt-cache policy for the following url has permission `510`
670+ And apt-cache policy for the following url has permission `500`
671 """
672 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
673 """
674@@ -578,11 +578,11 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
675 And I run `apt-cache policy <infra-pkg>` as non-root
676 Then stdout matches regexp:
677 """
678- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
679+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-security/main amd64 Packages
680 """
681 Then stdout matches regexp:
682 """
683- \s*510 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
684+ \s*500 https://esm.ubuntu.com/infra/ubuntu <release>-infra-updates/main amd64 Packages
685 """
686 And stdout matches regexp:
687 """
688@@ -593,8 +593,8 @@ Feature: Command behaviour when auto-attached in an ubuntu PRO fips image
689 Then stdout matches regexp:
690 """
691 Version table:
692- \s*\*\*\* .* 510
693- \s*510 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
694+ \s*\*\*\* .* 500
695+ \s*500 https://esm.ubuntu.com/apps/ubuntu <release>-apps-security/main amd64 Packages
696 """
697 When I run `pro enable fips-updates --assume-yes` with sudo
698 Then I will see the following on stdout:
699diff --git a/features/unattached_status.feature b/features/unattached_status.feature
700index 6eea754..80a35e9 100644
701--- a/features/unattached_status.feature
702+++ b/features/unattached_status.feature
703@@ -58,7 +58,6 @@ Feature: Unattached status
704 esm-infra +yes +Expanded Security Maintenance for Infrastructure
705 fips +yes +NIST-certified core packages
706 fips-updates +yes +NIST-certified core packages with priority security updates
707- landscape +yes +Management and administration tool for Ubuntu
708 livepatch +yes +(Canonical Livepatch service|Current kernel is not supported)
709 ros +yes +Security Updates for the Robot Operating System
710 ros-updates +yes +All Updates for the Robot Operating System
711@@ -80,7 +79,7 @@ Feature: Unattached status
712 esm-infra +yes +Expanded Security Maintenance for Infrastructure
713 fips +yes +NIST-certified core packages
714 fips-updates +yes +NIST-certified core packages with priority security updates
715- landscape +yes +Management and administration tool for Ubuntu
716+ landscape +no +Management and administration tool for Ubuntu
717 livepatch +yes +(Canonical Livepatch service|Current kernel is not supported)
718 realtime-kernel +no +Ubuntu kernel with PREEMPT_RT patches integrated
719 ros +yes +Security Updates for the Robot Operating System
720@@ -106,7 +105,6 @@ Feature: Unattached status
721 esm-infra +yes +Expanded Security Maintenance for Infrastructure
722 fips +yes +NIST-certified core packages
723 fips-updates +yes +NIST-certified core packages with priority security updates
724- landscape +yes +Management and administration tool for Ubuntu
725 livepatch +yes +(Canonical Livepatch service|Current kernel is not supported)
726 ros +yes +Security Updates for the Robot Operating System
727 ros-updates +yes +All Updates for the Robot Operating System
728@@ -139,7 +137,6 @@ Feature: Unattached status
729 esm-infra +yes +Expanded Security Maintenance for Infrastructure
730 fips +yes +NIST-certified core packages
731 fips-updates +yes +NIST-certified core packages with priority security updates
732- landscape +yes +Management and administration tool for Ubuntu
733 livepatch +yes +Canonical Livepatch service
734 usg +yes +Security compliance and audit tools
735
736@@ -159,7 +156,7 @@ Feature: Unattached status
737 esm-infra +yes +Expanded Security Maintenance for Infrastructure
738 fips +yes +NIST-certified core packages
739 fips-updates +yes +NIST-certified core packages with priority security updates
740- landscape +yes +Management and administration tool for Ubuntu
741+ landscape +no +Management and administration tool for Ubuntu
742 livepatch +yes +Canonical Livepatch service
743 realtime-kernel +no +Ubuntu kernel with PREEMPT_RT patches integrated
744 ros +no +Security Updates for the Robot Operating System
745@@ -184,7 +181,6 @@ Feature: Unattached status
746 esm-infra +yes +Expanded Security Maintenance for Infrastructure
747 fips +yes +NIST-certified core packages
748 fips-updates +yes +NIST-certified core packages with priority security updates
749- landscape +yes +Management and administration tool for Ubuntu
750 livepatch +yes +Canonical Livepatch service
751 usg +yes +Security compliance and audit tools
752
753@@ -213,7 +209,6 @@ Feature: Unattached status
754 anbox-cloud +yes +.*
755 esm-apps +yes +Expanded Security Maintenance for Applications
756 esm-infra +yes +Expanded Security Maintenance for Infrastructure
757- landscape +yes +Management and administration tool for Ubuntu
758 livepatch +yes +Canonical Livepatch service
759 realtime-kernel +yes +Ubuntu kernel with PREEMPT_RT patches integrated
760 usg +yes +Security compliance and audit tools
761@@ -234,7 +229,7 @@ Feature: Unattached status
762 esm-infra +yes +Expanded Security Maintenance for Infrastructure
763 fips +no +NIST-certified core packages
764 fips-updates +no +NIST-certified core packages with priority security updates
765- landscape +yes +Management and administration tool for Ubuntu
766+ landscape +no +Management and administration tool for Ubuntu
767 livepatch +yes +Canonical Livepatch service
768 realtime-kernel +yes +Ubuntu kernel with PREEMPT_RT patches integrated
769 ros +no +Security Updates for the Robot Operating System
770@@ -257,7 +252,6 @@ Feature: Unattached status
771 anbox-cloud +yes +.*
772 esm-apps +yes +Expanded Security Maintenance for Applications
773 esm-infra +yes +Expanded Security Maintenance for Infrastructure
774- landscape +yes +Management and administration tool for Ubuntu
775 livepatch +yes +Canonical Livepatch service
776 realtime-kernel +yes +Ubuntu kernel with PREEMPT_RT patches integrated
777 usg +yes +Security compliance and audit tools
778@@ -292,7 +286,6 @@ Feature: Unattached status
779 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
780 fips +yes +yes +no +NIST-certified core packages
781 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
782- landscape +yes +yes +no +Management and administration tool for Ubuntu
783 livepatch +yes +yes +yes +Canonical Livepatch service
784 """
785 When I do a preflight check for `contract_token` with the all flag
786@@ -306,7 +299,7 @@ Feature: Unattached status
787 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
788 fips +yes +yes +no +NIST-certified core packages
789 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
790- landscape +yes +yes +no +Management and administration tool for Ubuntu
791+ landscape +no +yes +no +Management and administration tool for Ubuntu
792 livepatch +yes +yes +yes +Canonical Livepatch service
793 realtime-kernel +no +yes +no +Ubuntu kernel with PREEMPT_RT patches integrated
794 ros +yes +yes +no +Security Updates for the Robot Operating System
795@@ -355,7 +348,6 @@ Feature: Unattached status
796 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
797 fips +yes +yes +no +NIST-certified core packages
798 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
799- landscape +yes +yes +no +Management and administration tool for Ubuntu
800 livepatch +yes +yes +yes +Canonical Livepatch service
801 usg +yes +yes +no +Security compliance and audit tools
802 """
803@@ -369,7 +361,7 @@ Feature: Unattached status
804 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
805 fips +yes +yes +no +NIST-certified core packages
806 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
807- landscape +yes +yes +no +Management and administration tool for Ubuntu
808+ landscape +no +yes +no +Management and administration tool for Ubuntu
809 livepatch +yes +yes +yes +Canonical Livepatch service
810 realtime-kernel +no +yes +no +Ubuntu kernel with PREEMPT_RT patches integrated
811 ros +no +yes +no +Security Updates for the Robot Operating System
812@@ -417,7 +409,6 @@ Feature: Unattached status
813 anbox-cloud +yes +.*
814 esm-apps +yes +yes +yes +Expanded Security Maintenance for Applications
815 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
816- landscape +yes +yes +no +Management and administration tool for Ubuntu
817 livepatch +yes +yes +yes +Canonical Livepatch service
818 realtime-kernel +yes +yes +no +Ubuntu kernel with PREEMPT_RT patches integrated
819 usg +yes +yes +no +Security compliance and audit tools
820@@ -432,7 +423,7 @@ Feature: Unattached status
821 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
822 fips +no +yes +no +NIST-certified core packages
823 fips-updates +no +yes +no +NIST-certified core packages with priority security updates
824- landscape +yes +yes +no +Management and administration tool for Ubuntu
825+ landscape +no +yes +no +Management and administration tool for Ubuntu
826 livepatch +yes +yes +yes +Canonical Livepatch service
827 realtime-kernel +yes +yes +no +Ubuntu kernel with PREEMPT_RT patches integrated
828 ros +no +yes +no +Security Updates for the Robot Operating System
829@@ -507,8 +498,7 @@ Feature: Unattached status
830 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
831 fips +yes +yes +no +NIST-certified core packages
832 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
833- (landscape +(yes|no) +yes +no +Management and administration tool for Ubuntu)?
834- ?livepatch +yes +yes +yes +Canonical Livepatch service
835+ livepatch +yes +yes +yes +Canonical Livepatch service
836 ros +yes +no +no +Security Updates for the Robot Operating System
837 ros-updates +yes +no +no +All Updates for the Robot Operating System
838 """
839@@ -553,8 +543,7 @@ Feature: Unattached status
840 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
841 fips +yes +yes +no +NIST-certified core packages
842 fips-updates +yes +yes +no +NIST-certified core packages with priority security updates
843- (landscape +(yes|no) +yes +no +Management and administration tool for Ubuntu)?
844- ?livepatch +yes +yes +yes +Canonical Livepatch service
845+ livepatch +yes +yes +yes +Canonical Livepatch service
846 usg +yes +yes +no +Security compliance and audit tools
847 """
848
849@@ -596,8 +585,7 @@ Feature: Unattached status
850 esm-apps +yes +no +no +Expanded Security Maintenance for Applications
851 esm-infra +yes +yes +yes +Expanded Security Maintenance for Infrastructure
852 fips +yes +yes +no +NIST-certified core packages
853- (landscape +(yes|no) +yes +no +Management and administration tool for Ubuntu)?
854- ?livepatch +yes +yes +yes +Canonical Livepatch service
855+ livepatch +yes +yes +yes +Canonical Livepatch service
856 """
857
858 Examples: ubuntu release
859diff --git a/preferences.d/ubuntu-pro-esm-apps b/preferences.d/ubuntu-pro-esm-apps
860deleted file mode 100644
861index 5ded6f8..0000000
862--- a/preferences.d/ubuntu-pro-esm-apps
863+++ /dev/null
864@@ -1,11 +0,0 @@
865-# This file is used by Ubuntu Pro and supplied by the ubuntu-advantage-tools
866-# package. It has no effect if Ubuntu Pro services are not in use since no
867-# other apt repositories are expected to match o=UbuntuESMApps.
868-#
869-# Pin esm-apps packages to a slightly higher value than the default,
870-# so those are preferred over a non-ESM package from the archive when the
871-# service is enabled.
872-
873-Package: *
874-Pin: release o=UbuntuESMApps
875-Pin-Priority: 510
876diff --git a/preferences.d/ubuntu-pro-esm-infra b/preferences.d/ubuntu-pro-esm-infra
877deleted file mode 100644
878index e956e0a..0000000
879--- a/preferences.d/ubuntu-pro-esm-infra
880+++ /dev/null
881@@ -1,10 +0,0 @@
882-# This file is used by Ubuntu Pro and supplied by the ubuntu-advantage-tools
883-# package. It has no effect if Ubuntu Pro services are not in use since no
884-# other apt repositories are expected to match o=UbuntuESM.
885-#
886-# Pin esm-infra packages to a slightly higher value than the default,
887-# so those are preferred over a non-ESM package from the archive when the
888-# service is enabled.
889-Package: *
890-Pin: release o=UbuntuESM
891-Pin-Priority: 510
892diff --git a/setup.py b/setup.py
893index bccdfed..a1105f2 100644
894--- a/setup.py
895+++ b/setup.py
896@@ -40,7 +40,6 @@ def _get_data_files():
897 "/etc/update-manager/release-upgrades.d/",
898 ["release-upgrades.d/ubuntu-advantage-upgrades.cfg"],
899 ),
900- ("/etc/apt/preferences.d", glob.glob("preferences.d/*")),
901 (defaults.CONFIG_DEFAULTS["data_dir"], []),
902 ("/lib/systemd/system", glob.glob("systemd/*")),
903 (
904diff --git a/tools/run-integration-tests.py b/tools/run-integration-tests.py
905index ed16645..cc373ce 100644
906--- a/tools/run-integration-tests.py
907+++ b/tools/run-integration-tests.py
908@@ -24,7 +24,7 @@ TOKEN_TO_ENVVAR = {
909 }
910
911 PLATFORM_SERIES_TESTS = {
912- "azuregeneric": ["xenial", "bionic", "focal", "jammy"],
913+ "azuregeneric": ["xenial", "bionic", "focal", "jammy", "lunar"],
914 "azurepro": ["xenial", "bionic", "focal", "jammy"],
915 "azurepro-fips": ["xenial", "bionic", "focal"],
916 "awsgeneric": ["xenial", "bionic", "focal", "jammy"],
917diff --git a/uaclient/version.py b/uaclient/version.py
918index 4d61635..fc599da 100644
919--- a/uaclient/version.py
920+++ b/uaclient/version.py
921@@ -15,7 +15,7 @@ from uaclient.defaults import CANDIDATE_CACHE_PATH, UAC_RUN_PATH
922 from uaclient.exceptions import ProcessExecutionError
923 from uaclient.system import subp
924
925-__VERSION__ = "29.3"
926+__VERSION__ = "29.4"
927 PACKAGED_VERSION = "@@PACKAGED_VERSION@@"
928
929 CANDIDATE_REGEX = r"Candidate: (?P<candidate>.*?)\n"

Subscribers

People subscribed via source and target branches

to status/vote changes: