Public bug reported:

Hello, I tried to upgrade a jammy machine to noble with do-release-
upgrade and got a failure very early in the process. After the failure,
my apt sources were left pointing to the new release, they weren't
rolled back to the currently running release.

These are the sources that the upgrader left for me:

$ cat /etc/apt/sources.list
# deb http://mirrors.kernel.org/ubuntu/ xenial main restricted
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted
# deb http://mirrors.kernel.org/ubuntu/ xenial universe
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates universe
# deb http://mirrors.kernel.org/ubuntu/ xenial multiverse
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse
# deb-src http://mirrors.kernel.org/ubuntu/ xenial main restricted
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted
# deb-src http://mirrors.kernel.org/ubuntu/ xenial universe
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates universe
# deb-src http://mirrors.kernel.org/ubuntu/ xenial multiverse
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse
# deb file:///srv/mirror/ubuntu/ bionic main restricted
# deb file:///srv/mirror/ubuntu/ bionic-updates main restricted
# deb file:///srv/mirror/ubuntu/ bionic universe
# deb file:///srv/mirror/ubuntu/ bionic-updates universe
# deb file:///srv/mirror/ubuntu/ bionic multiverse
# deb file:///srv/mirror/ubuntu/ bionic-updates multiverse
# deb-src file:///srv/mirror/ubuntu/ bionic main restricted
# deb-src file:///srv/mirror/ubuntu/ bionic-updates main restricted
# deb-src file:///srv/mirror/ubuntu/ bionic universe
# deb-src file:///srv/mirror/ubuntu/ bionic-updates universe
# deb-src file:///srv/mirror/ubuntu/ bionic multiverse
# deb-src file:///srv/mirror/ubuntu/ bionic-updates multiverse

## # deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 
(20160325)]/ xenial main restricted
## 
## #deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 (20160325)]/ 
xenial main restricted
## 
## # See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
## # newer versions of the distribution.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial main restricted
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial main restricted
## 
## ## Major bug fix updates produced after the final release of the
## ## distribution.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted
## 
## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
## ## team, and may not be under a free licence. Please satisfy yourself as to
## ## your rights to use the software. Also, please note that software in
## ## universe WILL NOT receive any review or updates from the Ubuntu security
## ## team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial universe
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial universe
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe
## 
## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu 
## ## team, and may not be under a free licence. Please satisfy yourself as to 
## ## your rights to use the software. Also, please note that software in 
## ## multiverse WILL NOT receive any review or updates from the Ubuntu
## ## security team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial multiverse
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse
## 
## ## N.B. software from this repository may not have been tested as
## ## extensively as that contained in the main release, although it includes
## ## newer versions of some applications which may provide useful features.
## ## Also, please note that software in backports WILL NOT receive any review
## ## or updates from the Ubuntu security team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-backports main restricted 
universe multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-backports main 
restricted universe multiverse
## 
## ## Uncomment the following two lines to add software from Canonical's
## ## 'partner' repository.
## ## This software is not part of Ubuntu, but is offered by Canonical and the
## ## respective vendors as a service to Ubuntu users.

deb http://security.ubuntu.com/ubuntu noble-security main restricted multiverse 
universe
# deb file:///srv/mirror/ubuntu/ noble main restricted multiverse universe # 
disabled on upgrade to noble
# deb file:///srv/mirror/ubuntu/ jammy-updates main restricted multiverse 
universe # disabled on upgrade to noble
# deb file:///srv/mirror/ubuntu/ jammy-security main restricted multiverse 
universe # disabled on upgrade to noble

deb-src http://security.ubuntu.com/ubuntu noble-security main restricted 
multiverse universe
# deb-src file:///srv/mirror/ubuntu/ noble main restricted multiverse universe 
# disabled on upgrade to noble
# deb-src file:///srv/mirror/ubuntu/ jammy-updates main restricted multiverse 
universe # disabled on upgrade to noble
# deb-src file:///srv/mirror/ubuntu/ jammy-security main restricted multiverse 
universe # disabled on upgrade to noble


Unfortunately, the contents of the terminal weren't very well preserved. A 
partial amount of what was visible is:

Reading cache

Checking package manager

Continue running under SSH?

This session appears to be running under ssh. It is not recommended
to perform a upgrade over ssh currently because in case of failure it
is harder to recover.

If you continue, an additional ssh daemon will be started at port
'1022'.
Do you want to continue?

Continue [yN] y

Starting additional sshd

To make recovery in case of failure easier, an additional sshd will
be started on port '1022'. If anything goes wrong with the running
ssh you can still connect to the additional one.
If you run a firewall, you may need to temporarily open this port. As
this is potentially dangerous it's not done automatically. You can
open the port with e.g.:
'iptables -I INPUT -p tcp --dport 1022 -j ACCEPT'

To continue please press [ENTER]

Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Get:1 file:/srv/mirror/ubuntu jammy InRelease [270 kB]
Get:2 file:/srv/mirror/ubuntu jammy InRelease [270 kB]
Get:3 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB]
Get:4 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB]
Get:5 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB]
Get:6 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB]
Hit http://security.ubuntu.com/ubuntu jammy-security InRelease
Get:7 http://ddebs.ubuntu.com jammy InRelease [41.3 kB]
Hit https://esm.ubuntu.com/apps/ubuntu jammy-apps-security InRelease
Hit https://esm.ubuntu.com/apps/ubuntu jammy-apps-updates InRelease
Hit http://ddebs.ubuntu.com jammy-updates InRelease
Hit https://esm.ubuntu.com/infra/ubuntu jammy-infra-security InRelease
Hit http://ddebs.ubuntu.com jammy-proposed InRelease
Hit https://esm.ubuntu.com/infra/ubuntu jammy-infra-updates InRelease
Fetched 41.3 kB in 0s (0 B/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done

Checking for installed snaps

Calculating snap size requirements

Updating repository information

Third party sources disabled

Some third party entries in your sources.list were disabled. You can
re-enable them after the upgrade with the 'software-properties' tool
or your package manager.

To continue please press [ENTER]

Get:1 http://security.ubuntu.com/ubuntu noble-security InRelease [126 kB]
Get:2 http://ddebs.ubuntu.com noble InRelease [41.3 kB]
Get:3 https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease [7,532 B]
Get:4 https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease [7,468 B]
Get:5 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB]
Get:6 https://esm.ubuntu.com/infra/ubuntu noble-infra-security InRelease [7,462 
B]
Get:7 https://esm.ubuntu.com/infra/ubuntu noble-infra-updates InRelease [7,461 
B]
Get:8 http://ddebs.ubuntu.com noble-proposed InRelease [41.4 kB]
Get:9 https://esm.ubuntu.com/apps/ubuntu noble-apps-security/main i386 Packages 
[10.4 kB]
Get:10 http://security.ubuntu.com/ubuntu noble-security/universe Sources [252 
kB]
Get:11 https://esm.ubuntu.com/apps/ubuntu noble-apps-security/main amd64 
Packages [17.0 kB]
Get:12 https://esm.ubuntu.com/apps/ubuntu noble-apps-updates/main amd64 
Packages [623 B]
Get:13 http://ddebs.ubuntu.com noble/main i386 Packages [316 kB]
Get:14 https://esm.ubuntu.com/infra/ubuntu noble-infra-security/main amd64 
Packages [658 B]
Get:15 https://esm.ubuntu.com/infra/ubuntu noble-infra-updates/main amd64 
Packages [658 B]
Get:16 http://security.ubuntu.com/ubuntu noble-security/main Sources [102 kB]
Get:17 http://security.ubuntu.com/ubuntu noble-security/multiverse Sources 
[6,304 B]
Get:18 http://security.ubuntu.com/ubuntu noble-security/restricted Sources 
[19.4 kB]
Get:19 http://security.ubuntu.com/ubuntu noble-security/main amd64 Packages 
[380 kB]
Get:20 http://security.ubuntu.com/ubuntu noble-security/main i386 Packages [160 
kB]
Get:21 http://security.ubuntu.com/ubuntu noble-security/main Translation-en 
[83.1 kB]
Get:22 http://ddebs.ubuntu.com noble/main amd64 Packages [569 kB]
Get:23 http://security.ubuntu.com/ubuntu noble-security amd64 Contents (deb) 
[10.9 MB]
Get:24 http://ddebs.ubuntu.com noble/restricted amd64 Packages [884 B]
Get:25 http://ddebs.ubuntu.com noble/restricted i386 Packages [716 B]
Get:26 http://ddebs.ubuntu.com noble/universe i386 Packages [453 kB]
Get:27 http://ddebs.ubuntu.com noble/universe amd64 Packages [5,115 kB]
Get:28 http://security.ubuntu.com/ubuntu noble-security i386 Contents (deb) 
[5,541 kB]
Get:29 http://ddebs.ubuntu.com noble/multiverse amd64 Packages [86.0 kB]
Get:30 http://ddebs.ubuntu.com noble/multiverse i386 Packages [2,616 B]
Get:31 http://ddebs.ubuntu.com noble-updates/main i386 Packages [78.5 kB]
Get:32 http://ddebs.ubuntu.com noble-updates/main amd64 Packages [170 kB]
Get:33 http://ddebs.ubuntu.com noble-updates/restricted amd64 Packages [888 B]
Get:34 http://ddebs.ubuntu.com noble-updates/universe amd64 Packages [224 kB]
Get:35 http://ddebs.ubuntu.com noble-updates/universe i386 Packages [53.2 kB]
Get:36 http://ddebs.ubuntu.com noble-updates/multiverse amd64 Packages [2,696 B]
Get:37 http://ddebs.ubuntu.com noble-proposed/main i386 Packages [15.2 kB]
Get:38 http://security.ubuntu.com/ubuntu noble-security/main amd64 c-n-f 
Metadata [4,576 B]
Get:39 http://security.ubuntu.com/ubuntu noble-security/restricted i386 
Packages [13.7 kB]
Get:40 http://security.ubuntu.com/ubuntu noble-security/restricted amd64 
Packages [353 kB]
Get:41 http://security.ubuntu.com/ubuntu noble-security/restricted 
Translation-en [68.1 kB]
Get:42 http://security.ubuntu.com/ubuntu noble-security/restricted amd64 c-n-f 
Metadata [428 B]
Get:43 http://security.ubuntu.com/ubuntu noble-security/multiverse amd64 
Packages [10.9 kB]
Get:44 http://security.ubuntu.com/ubuntu noble-security/multiverse i386 
Packages [2,392 B]
Get:45 http://security.ubuntu.com/ubuntu noble-security/multiverse 
Translation-en [2,808 B]
Get:46 http://security.ubuntu.com/ubuntu noble-security/multiverse amd64 c-n-f 
Metadata [344 B]
Get:47 http://security.ubuntu.com/ubuntu noble-security/universe i386 Packages 
[107 kB]
Get:48 http://security.ubuntu.com/ubuntu noble-security/universe amd64 Packages 
[275 kB]
Get:49 http://security.ubuntu.com/ubuntu noble-security/universe Translation-en 
[116 kB]
Get:50 http://ddebs.ubuntu.com noble-proposed/main amd64 Packages [37.9 kB]
Get:51 http://security.ubuntu.com/ubuntu noble-security/universe amd64 c-n-f 
Metadata [10.4 kB]
Get:52 http://ddebs.ubuntu.com noble-proposed/universe i386 Packages [10.5 kB]
Ign http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
Ign http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
Ign http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
Ign http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
Ign http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
Ign http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
Err http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Err http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Err http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Err http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Err http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Err http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages
  429  Too Many Requests [IP: 185.125.190.17 80]
Fetched 25.8 MB in 6s (0 B/s)
Hit http://security.ubuntu.com/ubuntu noble-security InRelease
Get:1 http://ddebs.ubuntu.com noble InRelease [41.3 kB]
Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease
Get:2 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB]
Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease
Hit https://esm.ubuntu.com/infra/ubuntu noble-infra-security InRelease
Hit https://esm.ubuntu.com/infra/ubuntu noble-infra-updates InRelease
Get:3 http://ddebs.ubuntu.com noble-proposed InRelease [41.4 kB]
Get:4 http://ddebs.ubuntu.com noble-proposed/main amd64 Packages [37.9 kB]
Get:5 http://ddebs.ubuntu.com noble-proposed/main i386 Packages [15.2 kB]
Get:6 http://ddebs.ubuntu.com noble-proposed/universe i386 Packages [10.5 kB]
Get:7 http://ddebs.ubuntu.com noble-proposed/universe amd64 Packages [50.4 kB]
Get:8 http://ddebs.ubuntu.com noble-proposed/multiverse amd64 Packages [2,696 B]
Fetched 136 kB in 0s (0 B/s)

Checking package manager
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/apt/cache.py", line 281, in __getitem__
    rawpkg = self._cache[key]
KeyError: 'ubuntu-minimal'

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: ubuntu-release-upgrader-core 1:22.04.20 [origin: unknown]
ProcVersionSignature: Ubuntu 5.15.0-113.123-generic 5.15.152
Uname: Linux 5.15.0-113-generic x86_64
NonfreeKernelModules: lkp_Ubuntu_5_15_0_113_123_generic_106 zfs zunicode zavl 
icp zcommon znvpair
ApportVersion: 2.20.11-0ubuntu82.6
Architecture: amd64
CasperMD5CheckResult: unknown
CrashDB: ubuntu
CrashReports:
 640:0:0:30866:2024-10-01 16:01:50.626541614 -0700:2024-10-01 
16:01:51.626541614 -0700:/var/crash/_usr_sbin_tcptop-bpfcc.0.crash
 640:0:0:1095175:2024-10-02 17:30:47.399752140 -0700:2024-10-02 
17:30:48.399752140 -0700:/var/crash/_usr_bin_do-release-upgrade.0.crash
Date: Wed Oct  2 17:37:31 2024
InstallationDate: Installed on 2016-04-04 (3103 days ago)
InstallationMedia: Ubuntu-Server 16.04 LTS "Xenial Xerus" - Beta amd64 
(20160325)
PackageArchitecture: all
ProcEnviron:
 LC_TIME=C
 TERM=rxvt-unicode-256color
 PATH=(custom, no user)
 LANG=en_US.UTF-8
 SHELL=/bin/bash
RebootRequiredPkgs: Error: path contained symlinks.
SourcePackage: ubuntu-release-upgrader
UpgradeStatus: Upgraded to jammy on 2024-10-03 (0 days ago)
VarLogDistupgradeAptlog:
 Log time: 2024-10-02 17:29:48.619815
 Log time: 2024-10-02 17:29:52.064943
 Log time: 2024-10-02 17:30:48.248136

** Affects: ubuntu-release-upgrader (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug dist-upgrade jammy third-party-packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083575

Title:
  failed upgrade left apt sources on wrong release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2083575/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to