Univention Bugzilla – Full Text Bug Listing |
Summary: | univention-upgrade doesn't display anything when called with --help switch | ||
---|---|---|---|
Product: | UCS | Reporter: | Jan Christoph Ebersbach <ebersbach> |
Component: | Update - univention-updater | Assignee: | Philipp Hahn <hahn> |
Status: | RESOLVED DUPLICATE | QA Contact: | |
Severity: | enhancement | ||
Priority: | P5 | CC: | hahn |
Version: | UCS 3.2 | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: |
Description
Jan Christoph Ebersbach
2013-04-30 14:02:48 CEST
This issue has been filed against the UCS version "unstable" which does not really exist. Please change the version value. This is still unfixed as of UCS-3.2-1 ucs-4.1-1@67586 | Bug #40338 up: Allow check without locking # nohup univention-upgrade --ignoressh --ignoreterm --noninteractive </dev/null & # univention-upgrade --help Usage: univention-upgrade [options] Install UCS release and errata updates. Options: -h, --help show this help message and exit --updateto=UPDATETO update up to specified version --check check if updates are available --setucr if set, variable update/available will be updated --ignoressh pass --ignoressh to univention-updater --ignoreterm pass --ignoreterm to univention-updater --noninteractive Perform a non-interactive update --iso=ISO ISO image for the repository update --cdrom=CDROM CDROM device for the repository update App updates: --enable-app-updates Skip updating installed Apps --disable-app-updates Skip updating installed Apps --username=USERNAME Name of the user used for registering the app --pwdfile=PWDFILE Name of the file containing the user password *** This bug has been marked as a duplicate of bug 40338 *** |