-
Notifications
You must be signed in to change notification settings - Fork 696
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[xenial] Reinstate LTS upgrade notification #4104
Comments
There are two ways we could do this, and I want some feedback from the team on how we should do this.
|
For approach 2 (crudini): recall that we have outstanding issue #3376, i.e. we can't actually add an apt dependency unless it's in That means that approach 1 (sed) is the name of the game, i.e. updating the Regarding the OSSEC alert (which would be realllly good to modify as there is a danger that admins see the alert prior to our upgrade guide which will contain additional instructions of what to do), we'd want to add a rule to |
Ah yeah, right about #3376. D'oh. |
Agreed that we should substitute in-line, rather than parse the INI format. We should avoid appending to the file via |
In #3546, we set
Prompt
tonever
in/etc/update-manager/release-upgrades
to suppress premature OSSEC notifications. In order to perform the update to Xenial viado-release-upgrade
, it needs to be reset tolts
. We can do so in postinst so the admin does not have to do it manually.To avoid spurious 18.04 notifications, this should be done on Trusty, while on Xenial
Prompt
should be set tonever
. We can inspectlsb_release -sc
to avoid forking the build logic.As a stretch goal, we should consider customizing the OSSEC notification that will be sent to 14.04 users. The default notification will say:
Ideally, the notification should point to:
https://securedrop.org/xenial-upgrade
This is the redirect also pointed to via #4055. Having the OSSEC alert point to this link will help prevent admins from attempting the upgrade without following the documentation.
Part of #3204.
The text was updated successfully, but these errors were encountered: