Provided by: ubuntu-pro-client_34~20.04_amd64 bug

NAME

       pro - Manage Ubuntu Pro services from Canonical

SYNOPSIS

       pro <command> [<args>]

DESCRIPTION

       Ubuntu  Pro  is  a collection of services offered by Canonical to Ubuntu users. The Ubuntu
       Pro command line tool is used to attach a system to an Ubuntu Pro contract to then  enable
       and  disable services from Canonical. The available commands and services are described in
       more detail below.

COMMANDS

       api <api-endpoint>
              Calls the Client API endpoints.

              For a list of all of the supported endpoints and their structure, please  refer  to
              the Pro client API reference guide:

              https://canonical-ubuntu-pro-client.readthedocs-
              hosted.com/en/latest/references/api/

       attach [--no-auto-enable] [--attach-config=/path/to/file.yaml] <token>
              Connect an Ubuntu Pro support contract to this machine.

              The --attach-config option can be used  to  provide  a  file  with  the  token  and
              optionally,  a  list  of  services  to  enable after attaching. The token parameter
              should not be used if this option is provided. An attach config file looks like the
              following:
                  token: YOUR_TOKEN_HERE  # required
                  enable_services:        # optional list of service names to auto-enable
                      - esm-infra
                      - esm-apps
                      - cis

              The  optional  --no-auto-enable  flag  will  disable  the  automatic  enablement of
              recommended entitlements which  usually  happens  immediately  after  a  successful
              attach.

              The exit code can be:
                  0: on successful attach
                  1: in case of any error while trying to attach
                  2: if the machine is already attached

       collect-logs[-o<file>|--output<file>]
              Create a tarball with all relevant logs and debug data.

              The  --output  parameter defines the path to the tarball. If not provided, the file
              is saved as pro_logs.tar.gz in the current directory.

       config set/unset <config-name>

              Set/unset one of the available Pro configuration settings:

              http_proxy If set, pro will use the specified  http  proxy  when  making  any  http
              requests

              https_proxy  If  set,  pro will use the specified https proxy when making any https
              requests

              apt_http_proxy [DEPRECATED] If set, pro will configure apt  to  use  the  specified
              http  proxy by writing a apt config file to /etc/apt/apt.conf.d/90ubuntu-advantage-
              aptproxy. (Please use global_apt_http_proxy)

              apt_https_proxy [DEPRECATED] If set, pro will configure apt to  use  the  specified
              https proxy by writing a apt config file to /etc/apt/apt.conf.d/90ubuntu-advantage-
              aptproxy. (Please use global_apt_https_proxy)

              global_apt_http_proxy If set, pro will configure apt  to  use  the  specified  http
              proxy  by  writing  a  apt  config  file to /etc/apt/apt.conf.d/90ubuntu-advantage-
              aptproxy. Set this if you prefer a global proxy for all  resources,  not  just  the
              ones from esm.ubuntu.com

              global_apt_https_proxy  If  set,  pro will configure apt to use the specified https
              proxy by writing  a  apt  config  file  to  /etc/apt/apt.conf.d/90ubuntu-advantage-
              aptproxy.  Set  this  if  you prefer a global proxy for all resources, not just the
              ones from esm.ubuntu.com

              ua_apt_http_proxy If set, pro will configure apt to use the specified http proxy by
              writing  a apt config file to /etc/apt/apt.conf.d/90ubuntu-advantage-aptproxy. This
              proxy is limited to accessing resources from esm.ubuntu.com

              ua_apt_https_proxy If set, pro will configure apt to use the specified https  proxy
              by  writing  a  apt config file to /etc/apt/apt.conf.d/90ubuntu-advantage-aptproxy.
              This proxy is limited to accessing resources from esm.ubuntu.com

              <job_name>_timer Sets  the  timer  running  interval  for  a  specific  job.  Those
              intervals are checked every time the systemd timer runs.

              apt_news  If  set to false, the Pro client will no longer display apt news messages
              on the output of apt upgrade.

              apt_news_url Sets the url where the Pro client will consume  apt  news  information
              from.

              If  needed, authentication to the proxy server can be performed by setting username
              and password in the URL itself, as in:
                http_proxy: http://<username>:<password>@<fqdn>:<port>

       config show <config-name>
              Show customizable configuration settings

              If no config is provided, this command will display all of  the  Pro  configuration
              values

       detach Remove the Ubuntu Pro support contract from this machine.

       disable [anbox-cloud|cc-eal|cis|esm-apps|esm-infra|fips|fips-updates|
               landscape|livepatch|realtime-kernel|ros|ros-updates]

              Disable this machine's access to an Ubuntu Pro service.

       enable [anbox-cloud|cc-eal|cis|esm-apps|esm-infra|fips|fips-updates|
              landscape|livepatch|realtime-kernel|ros|ros-updates]

              Activate and configure this machine's access to an Ubuntu Pro service.

       fix [--dry-run] [--no-related] <security_issue>
              Fix a CVE or USN on the system by upgrading the appropriate package(s).

              The  optional  --dry-run flag will display everything that would be executed by the
              fix command without actually making any changes.

              The optional --no-related flag  will  modify  how  the  fix  command  behaves  when
              handling  a  USN.   With  this  flag,  the command will not attempt to fix any USNs
              related to the target USN.

              <security_issue> can be any of  the  following  formats:  CVE-yyyy-nnnn,  CVE-yyyy-
              nnnnnnn, or USN-nnnn-dd.

              The exit code can be 0, 1, or 2.
                  0:  the  fix  was successfully applied or the security issue doesn't affect the
              system
                  1: the fix cannot be applied
                  2: the fix was applied but requires a reboot before it takes effect

       refresh [contract|config|messages]
              Refresh three distinct Ubuntu Pro related artifacts in the system:

              contract: Update contract details from the server.

              config: Reload the config file.

              messages: Update APT and MOTD messages related to UA.

              You can individually target any of the  three  specific  actions,  by  passing  the
              target  name  to  the  command.   If  no  `target`  is  specified,  all targets are
              refreshed.

       security-status [--thirdparty | --unavailable | --esm-infra | --esm-apps]

              Show security updates for packages in the system, including all available  Expanded
              Security Maintenance (ESM) related content.

              Shows counts of how many packages are supported for security updates in the system.

              The  output  contains  basic information about Ubuntu Pro. For a complete status on
              Ubuntu Pro services, run 'pro status'.

              The optional --thirdparty  flag  will  only  show  information  about  third  party
              packages

              The  optional  --unavailable  flag  will  only  show  information about unavailable
              packages

              The optional --esm-infra flag will only show information about esm-infra packages

              The optional --esm-apps flag will only show information about esm-apps packages

       status [--simulate-with-token TOKEN] [--all]
              Report current status of Ubuntu Pro services on system.

              This shows whether this machine is attached to an Ubuntu Pro support contract. When
              attached,  the  report  includes  the  specific  support contract details including
              contract name, expiry dates, and the status of each service on this system.

              The attached status output has four columns:

              SERVICE: name of the service

              ENTITLED: whether the contract to which this machine is attached  entitles  use  of
              this service. Possible values are: yes or no

              STATUS:  whether  the  service  is  enabled  on this machine.  Possible values are:
              enabled, disabled, n/a (if your contract entitles you to the service, but it  isn't
              available for this machine) or  (if you aren't entitled to this service)

              DESCRIPTION: a brief description of the service

              The unattached status output instead has three columns. SERVICE and DESCRIPTION are
              the same as above, and there is the addition of:

              AVAILABLE: whether this service would be available if this machine  were  attached.
              The possible values are yes or no.

              If  --simulate-with-token  is  used,  then  the  output has five columns.  SERVICE,
              AVAILABLE,  ENTITLED  and  DESCRIPTION  are  the  same  as  mentioned  above,   and
              AUTO_ENABLED  shows  whether  the  service  is set to be enabled when that token is
              attached.

              If the --all flag is set, unavailable services are also listed in the output.

       system reboot-required
              Tells if the system needs to be rebooted

       version
              Show version of the Ubuntu Pro package.

PRO UPGRADE DAEMON

       Ubuntu Pro client sets up a daemon on supported platforms (currently on Azure and GCP)  to
       detect  if an Ubuntu Pro license is purchased for the machine. If an Ubuntu Pro license is
       detected, then the machine is automatically attached.  If you are uninterested  in  Ubuntu
       Pro services, you can safely stop and disable the daemon using systemctl:

       sudo    systemctl   stop   ubuntu-advantage.service   sudo   systemctl   disable   ubuntu-
       advantage.service

TIMER JOBS

       Ubuntu Pro client sets  up  a  systemd  timer  to  run  jobs  that  need  to  be  executed
       recurrently.  The  timer  itself  ticks every 5 minutes on average, and decides which jobs
       need to be executed based on their intervals.

       Jobs are executed by the timer script if the script has not yet run successfully, or their
       interval  since  last successful run is already exceeded.  There is a random delay applied
       to the timer, to desynchronize job execution time on machines spinned at  the  same  time,
       avoiding multiple synchronized calls to the same service.

       Current jobs being checked and executed are:

       update_messaging
              Makes  sure  that the MOTD and APT messages match the available/enabled services on
              the system, showing information about available packages or security updates.

       metering
              If attached, this job will ping the Canonical servers telling  which  services  are
              enabled on the machine.

SERVICES

       Anbox Cloud (anbox-cloud)
              Anbox  Cloud  lets  you  stream  mobile apps securely, at any scale, to any device,
              letting you focus on your apps. Run Android  in  system  containers  on  public  or
              private  clouds  with  ultra low streaming latency. When the anbox-cloud service is
              enabled, by default, the Appliance variant is enabled. Enabling this service allows
              orchestration  to  provision  a  PPA with the Anbox Cloud resources. This step also
              configures the Anbox Management Service  (AMS)  with  the  necessary  image  server
              credentials.

              To learn more about Anbox Cloud, see https://anbox-cloud.io

       Common Criteria EAL2 Provisioning (cc-eal)
              Common  Criteria is an Information Technology Security Evaluation standard (ISO/IEC
              IS 15408) for computer security certification. Ubuntu 16.04 has been  evaluated  to
              assurance  level  EAL2  through CSEC. The evaluation was performed on Intel x86_64,
              IBM Power8 and IBM Z hardware platforms.

       CIS Audit (cis)/Ubuntu Security Guide (usg)
              Ubuntu  Security  Guide  is  a  tool  for  hardening  and  auditing,  allowing  for
              environment-specific  customizations.  It  enables compliance with profiles such as
              DISA-STIG and the CIS benchmarks.

              Find out more at https://ubuntu.com/security/certifications/docs/usg

       Expanded Security Maintenance for Infrastructure (esm-infra)
              Expanded Security Maintenance for Infrastructure provides access to a  private  PPA
              which includes available high and critical CVE fixes for Ubuntu LTS packages in the
              Ubuntu Main repository  between  the  end  of  the  standard  Ubuntu  LTS  security
              maintenance and its end of life. It is enabled by default with Ubuntu Pro.

              You can find out more about the service at https://ubuntu.com/security/esm

       Expanded Security Maintenance for Applications (esm-apps)
              Expanded  Security  Maintenance  for Applications is enabled by default on entitled
              workloads. It provides access to a private PPA which includes  available  high  and
              critical  CVE  fixes for Ubuntu LTS packages in the Ubuntu Main and Ubuntu Universe
              repositories from the Ubuntu LTS release date until its end of life.

              You can find out more about the esm service at https://ubuntu.com/security/esm

       FIPS 140-2 certified modules (fips)
              Installs FIPS 140 crypto packages for FedRAMP,  FISMA  and  compliance  use  cases.
              Note  that  "fips"  does  not provide security patching. For FIPS certified modules
              with security patches please see "fips-updates". If you are unsure,  choose  "fips-
              updates" for maximum security.

              Find out more at https://ubuntu.com/security/fips

       FIPS 140-2 certified modules with updates (fips-updates)
              fips-updates  installs  FIPS 140 crypto packages including all security patches for
              those modules that have been provided since their certification date.

              You can find out more at https://ubuntu.com/security/fips

       Landscape (landscape)
              Landscape Client can be installed on  this  machine  and  enrolled  in  Canonical's
              Landscape   SaaS:   https://landscape.canonical.com  or  a  self-hosted  Landscape:
              https://ubuntu.com/landscape/install

              Landscape allows you to manage many machines as easily as one,  with  an  intuitive
              dashboard and API interface for automation, hardening, auditing, and more.

              Find out more about Landscape at https://ubuntu.com/landscape

       Livepatch Service (livepatch)
              Livepatch  provides  selected  high  and  critical  kernel CVE fixes and other non-
              security bug fixes as kernel livepatches. Livepatches are applied without rebooting
              a  machine which drastically limits the need for unscheduled system reboots. Due to
              the nature of fips  compliance,  livepatches  cannot  be  enabled  on  fips-enabled
              systems.

              You    can   find   out   more   about   Ubuntu   Kernel   Livepatch   service   at
              https://ubuntu.com/security/livepatch

       ROS ESM Security Updates (ros)
              ros provides access to a private PPA which includes  security-related  updates  for
              available  high  and  critical CVE fixes for Robot Operating System (ROS) packages.
              For access to ROS ESM and security updates, both esm-infra  and  esm-apps  services
              will also be enabled. To get additional non-security updates, enable ros-updates.

              You can find out more about the ROS ESM service at https://ubuntu.com/robotics/ros-
              esm

       ROS ESM All Updates (ros-updates)
              ros-updates provides access to a private  PPA  that  includes  non-security-related
              updates  for  Robot  Operating  System  (ROS) packages. For full access to ROS ESM,
              security and non-security updates, the esm-infra, esm-apps, and ros  services  will
              also be enabled.

              You can find out more about the ROS ESM service at https://ubuntu.com/robotics/ros-
              esm

REPORTING BUGS

       Please report bugs either by  running  `ubuntu-bug  ubuntu-advantage-tools`  or  login  to
       Launchpad   and  navigate  to  https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-
       tools/+filebug

COPYRIGHT

       Copyright (C) 2019-2020 Canonical Ltd.