** Description changed:
Binary package hint: update-notifier
While investigating protracted hangs in the remote login process, I
noticed that apt-check is called to update the list of available updates
and print the number of updatable packages in the MOTD. As it so
happens,
** Description changed:
Binary package hint: update-notifier
While investigating protracted hangs in the remote login process, I
noticed that apt-check is called to update the list of available updates
and print the number of updatable packages in the MOTD. As it so
happens,
** Description changed:
Binary package hint: update-notifier
While investigating protracted hangs in the remote login process, I
noticed that apt-check is called to update the list of available updates
and print the number of updatable packages in the MOTD. As it so
happens,
Thank you! Uploaded.
** Changed in: update-notifier (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs, preventing login
** Branch linked: lp:update-notifier
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs, preventing login via SSH
To manage notifications about this bug go
Thank you! Uploaded.
** Changed in: update-notifier (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs,
** Branch linked: lp:update-notifier
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs, preventing login via SSH
To manage notifications about this bug go to:
This bug was fixed in the package update-notifier - 3.164
---
update-notifier (3.164) xenial; urgency=medium
* debian/90-updates-available
- Now directly prints the cached info if available
=> avoid login stalls due to motd updates (LP: #525674)
- Also fixes a former
This bug was fixed in the package update-notifier - 3.164
---
update-notifier (3.164) xenial; urgency=medium
* debian/90-updates-available
- Now directly prints the cached info if available
=> avoid login stalls due to motd updates (LP: #525674)
- Also fixes a former
looks good to me.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs, preventing login via SSH
To manage notifications about this bug go to:
looks good to me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/525674
Title:
apt-check hangs, preventing login via SSH
To manage notifications about this bug go to:
Martin:
- I already removed one indirection with my former patch and love to remove one
more.
Simple code = good code - thanks for the good hint.
- I changed it slightly to use the existing variable so people recognize from
which code
it came and to avoid issues if one ever changes only one
** Patch added: "Enhanced fix for Wily and Upstream (version 3)"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4489492/+files/wily_and_dev_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Patch added: "Enhanced fix for Wily and Upstream (version 3)"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4489492/+files/wily_and_dev_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Martin:
- I already removed one indirection with my former patch and love to remove one
more.
Simple code = good code - thanks for the good hint.
- I changed it slightly to use the existing variable so people recognize from
which code
it came and to avoid issues if one ever changes only one
hey. saw this in my inbox, and very happy! thank you for working on
this.
one note, in update-notifier-3.164/data/update-motd-updates-available
+trap cleanup EXIT
+tmpfile=$(mktemp)
if tmpfile was set in the environment prior to this program running, and
you exited for some reason
hey. saw this in my inbox, and very happy! thank you for working on
this.
one note, in update-notifier-3.164/data/update-motd-updates-available
+trap cleanup EXIT
+tmpfile=$(mktemp)
if tmpfile was set in the environment prior to this program running, and
you exited for some reason
Thanks for working on this! Diff looks good (pitti pointed some minor
things out already).
One more thing, please keep the part:
"DPkg::Post-Invoke {"if [ -d /var/lib/update-notifier ]; then touch
/var/lib/update-notifier/dpkg-run-stamp; fi; "
the part of update-notifier that displays a icon
Thanks for working on this! Diff looks good (pitti pointed some minor
things out already).
One more thing, please keep the part:
"DPkg::Post-Invoke {"if [ -d /var/lib/update-notifier ]; then touch
/var/lib/update-notifier/dpkg-run-stamp; fi; "
the part of update-notifier that displays a icon
FYI - After a discussion I'll likely revamp the patches for wily and upstream
the next days.
Until then we will also decide if this is worth SRUs for trusty/vivid.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
FYI - After a discussion I'll likely revamp the patches for wily and upstream
the next days.
Until then we will also decide if this is worth SRUs for trusty/vivid.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
Here the bigger, but more architecturally complete solution for
wily (which is actually identical at this time).
Summary:
- move the actual updating part out of the pam based trigger completely (avoids
slowdown)
- pam based motd now only prints the cached info (if existing)
- hook into apt with
Thanks Christian! Some remarks:
- The introduction of data/get-motd-updates-available seems like an
unnecessary indirection to me. Instead of checking the executability of
that and run it, debian/90-updates-available could just directly do
cat /var/lib/update-notifier/updates-available
Here the bigger, but more architecturally complete solution for
wily (which is actually identical at this time).
Summary:
- move the actual updating part out of the pam based trigger completely (avoids
slowdown)
- pam based motd now only prints the cached info (if existing)
- hook into apt with
** Patch added: "Enhanced fix for Wily and Upstream"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4487279/+files/wily_and_dev_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the
** Patch added: "Enhanced fix for Wily and Upstream"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4487279/+files/wily_and_dev_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks Christian! Some remarks:
- The introduction of data/get-motd-updates-available seems like an
unnecessary indirection to me. Instead of checking the executability of
that and run it, debian/90-updates-available could just directly do
cat /var/lib/update-notifier/updates-available
** Patch added: "Fix for wily"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486127/+files/wily_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "Fix for upstream"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486128/+files/upstream_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
Other MOTD plugins use caching, for example
/usr/lib/update-notifier/update-motd-reboot-required does:
if [ -f /var/run/reboot-required ]; then
cat /var/run/reboot-required
fi
Actually /usr/lib/update-notifier/update-motd-updates-available already uses
"caching" like the others.
It
** Patch added: "Fix for vivid"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486126/+files/vivid_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
** Patch added: "Fix for trusty"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486125/+files/trusty_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
** Patch added: "Fix for upstream"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486128/+files/upstream_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Other MOTD plugins use caching, for example
/usr/lib/update-notifier/update-motd-reboot-required does:
if [ -f /var/run/reboot-required ]; then
cat /var/run/reboot-required
fi
Actually /usr/lib/update-notifier/update-motd-updates-available already uses
"caching" like the others.
It
** Patch added: "Fix for wily"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486127/+files/wily_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
** Patch added: "Fix for vivid"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486126/+files/vivid_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "Fix for trusty"
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/525674/+attachment/4486125/+files/trusty_package.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The attachment "Fix for trusty" seems to be a debdiff. The ubuntu-
sponsors team has been subscribed to the bug report so that they can
review and hopefully sponsor the debdiff. If the attachment isn't a
patch, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if
The attachment "Fix for trusty" seems to be a debdiff. The ubuntu-
sponsors team has been subscribed to the bug report so that they can
review and hopefully sponsor the debdiff. If the attachment isn't a
patch, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if
(P.S. Even worse is connecting via a stack of SSH tunnels, eg behind a
firewall. It takes almost 30 seconds to get a prompt, and ssh -vvv
doesn't help identify the issue).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
This is really painful - although I don't experience complete hangs, I do
experience 12-second+ delays while
the script 90-updates-available grinds slowly though. So login via SSH is
unpleasantly slow. Furthermore, bash completion for tab completion on scp
commands is also very slow.
The
Interestingly, 14.04 seems to be much better at this than 12.04, takling around
1.5 sec rather than 12.
However, it's interesting how much faster it can still be without this.
Here is a measurement I made. This is 14.04 server on the LAN, with ssh-key
authentication, and I repeated serveral
(P.S. Even worse is connecting via a stack of SSH tunnels, eg behind a
firewall. It takes almost 30 seconds to get a prompt, and ssh -vvv
doesn't help identify the issue).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This is really painful - although I don't experience complete hangs, I do
experience 12-second+ delays while
the script 90-updates-available grinds slowly though. So login via SSH is
unpleasantly slow. Furthermore, bash completion for tab completion on scp
commands is also very slow.
The
Interestingly, 14.04 seems to be much better at this than 12.04, takling around
1.5 sec rather than 12.
However, it's interesting how much faster it can still be without this.
Here is a measurement I made. This is 14.04 server on the LAN, with ssh-key
authentication, and I repeated serveral
What connects loging in to running update-notifier? I'd like to disable
that (especially for SSH logins) without removing update-notifier
completely.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is a direct subscriber.
To answer self, there are pam_motd references in /etc/pam.d/{login,ssh}
(!). 'Cause hey, you never know when you need that important ssh session
or CONSOLE login delayed for a while...
And since the very same friendly developers will be in charge of the
next release (and the next one after that),
What connects loging in to running update-notifier? I'd like to disable
that (especially for SSH logins) without removing update-notifier
completely.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
To answer self, there are pam_motd references in /etc/pam.d/{login,ssh}
(!). 'Cause hey, you never know when you need that important ssh session
or CONSOLE login delayed for a while...
And since the very same friendly developers will be in charge of the
next release (and the next one after that),
I was about to file this bug, so I'll confirm it. I have not seen the
apt-check hang entirely, but it is very slow to run, and blocks initial.
Note, you may have seen what appeared to be a hang due to the very bad
performance of security.ubuntu.com in the past few days. That
performance was due
I was about to file this bug, so I'll confirm it. I have not seen the
apt-check hang entirely, but it is very slow to run, and blocks initial.
Note, you may have seen what appeared to be a hang due to the very bad
performance of security.ubuntu.com in the past few days. That
performance was due
Subscribed Ubuntu Server Team as this is an issue that prevents remote
servicing of Lucid hosts.
--
apt-check hangs, preventing login via SSH
https://bugs.launchpad.net/bugs/525674
You received this bug notification because you are a member of Ubuntu
Server Team, which is a direct subscriber.
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/39522341/Dependencies.txt
--
apt-check hangs, preventing login via SSH
https://bugs.launchpad.net/bugs/525674
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Subscribed Ubuntu Server Team as this is an issue that prevents remote
servicing of Lucid hosts.
--
apt-check hangs, preventing login via SSH
https://bugs.launchpad.net/bugs/525674
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
54 matches
Mail list logo