From nobody Mon Jun 10 20:11:00 2024 X-Original-To: questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4VyjcL6TJ0z5N3Bf for ; Mon, 10 Jun 2024 20:11:14 +0000 (UTC) (envelope-from paul@gromit.dlib.vt.edu) Received: from gromit.dlib.vt.edu (gromit.dlib.vt.edu [128.173.126.123]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4VyjcL2PFWz4FdM for ; Mon, 10 Jun 2024 20:11:14 +0000 (UTC) (envelope-from paul@gromit.dlib.vt.edu) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=vt.edu (policy=none); spf=none (mx1.freebsd.org: domain of paul@gromit.dlib.vt.edu has no SPF policy when checking 128.173.126.123) smtp.mailfrom=paul@gromit.dlib.vt.edu Received: from smtpclient.apple (unknown [IPv6:2601:5cf:407e:55c1::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gromit.dlib.vt.edu (Postfix) with ESMTPSA id 723043ACC6; Mon, 10 Jun 2024 16:11:11 -0400 (EDT) Content-Type: text/plain; charset=utf-8 List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-questions@freebsd.org Sender: owner-freebsd-questions@FreeBSD.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.600.62\)) Subject: Re: Updating jail /etc from 13.3-RELEASE to 14.1-RELEASE From: Paul Mather In-Reply-To: Date: Mon, 10 Jun 2024 16:11:00 -0400 Cc: questions@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <91643120-A37D-44BF-B615-8FCC465E92B5@gromit.dlib.vt.edu> References: To: freebsd@vanderzwan.org X-Mailer: Apple Mail (2.3774.600.62) X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.53 / 15.00]; NEURAL_HAM_SHORT(-1.00)[-0.999]; NEURAL_HAM_LONG(-0.99)[-0.992]; NEURAL_HAM_MEDIUM(-0.44)[-0.442]; RCVD_IN_DNSWL_MED(-0.20)[128.173.126.123:from]; DMARC_POLICY_SOFTFAIL(0.10)[vt.edu : No valid SPF, No valid DKIM,none]; MIME_GOOD(-0.10)[text/plain]; ONCE_RECEIVED(0.10)[]; ASN(0.00)[asn:1312, ipnet:128.173.0.0/16, country:US]; RCVD_TLS_ALL(0.00)[]; FREEFALL_USER(0.00)[paul]; RCPT_COUNT_TWO(0.00)[2]; RCVD_COUNT_ONE(0.00)[1]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_NA(0.00)[no SPF record]; APPLE_MAILER_COMMON(0.00)[]; TO_DN_NONE(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[questions@freebsd.org]; MID_RHS_MATCH_FROM(0.00)[]; MIME_TRACE(0.00)[0:+] X-Rspamd-Queue-Id: 4VyjcL2PFWz4FdM On Jun 7, 2024, at 7:13=E2=80=AFAM, freebsd@vanderzwan.org wrote: > Hi, > Is there a way to update /etc in a (bastille) jail from one release to = another major release ? > The etcupdate tools seems to need an extracted source tree as far as I = can see=E2=80=A6 > Any other option ? You might try Bastille's own "upgrade" command on the jail. (However, = it uses "freebsd-update" under the hood, I believe, or at least did when = I last used it on a Bastille jail.) Cheers, Paul.