-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
highlight security updates #24
Comments
+1. This would be hugely useful to me. I'm responsible for enacting a conservative policy where updates are applied only for security. Apart from just displaying which are security updates with a flag, I'd like to be able to tell apt-dater to update a host only to the extent necessary for security. i.e. much the same as if I use the aptitude curses interface, and hit 'g' on the security updates section. It'd also be useful to have a set of hosts listed under 'Security Updates Pending', much like the 'Updates Pending' section that's there now. |
The following patches/pull requests implement differentiating/displaying of security updates: |
There's a problem with all of this: When you run If you have a packgage "application" and Ubuntu does a security update say for "trusty" of that package, then that package will both show up in the "trusty-updates" and in "trusty-security". This is visible in So "trusty-security" as a repository will not show up in the output of I have not found out how to tell The But we can develop this idea further. What if "trusty-updates" has a newer version (say V1.0.2) than "trusty-security" (say V1.0.1secfix) (which happens if Ubuntu (or maybe more often Debian) releases minor updates to packages)? Then even if you somehow managed to tell apt-dater to prefer "trusty-security" over "trusty-updates", the version from "trusty-updates" will win, because of the higher version number and you will not know, that there's a security update pending. Even if So what are the solutions? One would be to see how Another way further would be to have a look at the In conclusion, I think including this feature has its value and merits inclusion. The problem is however that it yields false negatives (there's a security upgrade pending, but Does anybody have any idea on how to go forward from here? |
Aptitude checks whether the update is available on From
It's not necessary to know that the security update is the latest, (or indeed to update to the latest). We only need to know that a version is available from the security repository which is more recent than the installed version. The output of e.g. |
Hmm. So I have searched further around. My reasoning at this point is:
Strategy 1:
which looks useful (why does it list util-linux:i386?!), however searching for the exact same thing, restricted to the Debian-Security origin:
yields nothing. What is wrong here? However, either way, what we'd need in reality is to be able to do "?section(Security Updates)" but it looks like that's not available. Or we could do the same as aptitude does - match the site, where it'd download the package from, but unfortunately that field doesn't seem to be available in the output formatters [2]. Strategy 2: I can't see how to go about this at the moment. Maybe go and fix aptitude (which seems to be semi-maintained (?)) first? [1] https://www.debian.org/doc/manuals/aptitude/ch02s04s05.en.html |
There is a patch (see https://bugs.debian.org/892983) for aptitude to allow filtering for package release "Label" (in this case "Debian-Security") and a request to be able to filter for package release "Suite" (in this case "xenial-security") (see https://bugs.debian.org/892984). Also it is possible to do this filtering in apt-get like follows. On Debian:
On Ubuntu:
So it should be possible to integrate my patch here: #24 (comment) with the above suggested apt-get parameters to be able to see security updates. There is the request #13 to be able to add sections in apt-dater for different views on the packages, among other pending security updates. I think I will not be looking into that, at least not now (not least because I can't much wrap my head around it how that should work/look like in the UI). If anybody wants to proceed in that direction, then please do. It'd be cool to provide some feedback. @liske - any thought on all this? |
there are comments from @liske in the pull request here: DE-IBH/apt-dater-host#25 |
A new implementation, following along @liske's design suggestion is available here DE-IBH/apt-dater-host#25 (comment) |
I'm testing out apt-dater on Devuan and just wanted to add a comment about the Devuan apt sources. This is an example
Hopefully your proposed changes will work out-of-the-box with Devuan 👍 Further information on Devuan APT sources: |
it would be great to add a
C
flag on host and package level that indicates critical security updates.this might be solved with #13. nevertheless i created a separate issue since this feature might be easier to implement and add to a new release.
The text was updated successfully, but these errors were encountered: