PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks.
Describe the bug
PF 14.0 and 14.1 is installing all pending packetfence* upgrades immediately after the $ADDS/upgrade/do-upgrade.sh command is executed. It's installing them at the point where only packetfence-upgrade is intended to be installed.
After the upgrades complete it stops services and asks if you also want to upgrade the OS and what version of PF you want to upgrade to. But it's already installed the latest upgrade in the current release train at this point.
To Reproduce
Steps to reproduce the behavior:
On a PF 14.0 or 14.1 server use the upgrade script $ADDS/upgrade/do-upgrade.sh or just issue the command apt install packetfence-upgrade
All pending PacketFence upgrades are installed.
Workaround
Use apt-mark hold to hold the pending upgrades except packetfence-upgrade prior to starting the upgrade script.
Describe the bug PF 14.0 and 14.1 is installing all pending packetfence* upgrades immediately after the $ADDS/upgrade/do-upgrade.sh command is executed. It's installing them at the point where only packetfence-upgrade is intended to be installed.
After the upgrades complete it stops services and asks if you also want to upgrade the OS and what version of PF you want to upgrade to. But it's already installed the latest upgrade in the current release train at this point.
To Reproduce Steps to reproduce the behavior:
$ADDS/upgrade/do-upgrade.sh
or just issue the commandapt install packetfence-upgrade
Workaround
apt-mark hold packetfence-archive-keyring packetfence-config packetfence-golang-daemon packetfence-ntlm-wrapper packetfence-perl packetfence-pfcmd-suid packetfence-redis-cache packetfence-upgrade packetfence
apt-mark unhold packetfence-archive-keyring packetfence-config packetfence-golang-daemon packetfence-ntlm-wrapper packetfence-perl packetfence-pfcmd-suid packetfence-redis-cache packetfence-upgrade packetfence
fg
to resume execution.Expected behavior Fix the underlying issue with the Debian 12 OS or APT scripts that is resulting in this behavior.