Scroll to navigation

DNF5-UPGRADE(8) dnf5 DNF5-UPGRADE(8)

NAME

dnf5-upgrade - Upgrade Command

SYNOPSIS

dnf5 upgrade [options] [<package-spec>|@<group-spec>|@<environment-spec>...]

DESCRIPTION

The upgrade command in DNF5 is used for upgrading installed packages, groups or environments to newer available version.

Since groups and environments are not versioned the upgrade basically means a synchronization with the currently available definition. In addition group upgrade also upgrades all packages the group contains and environment upgrade also upgrades all groups the environment contains.

OPTIONS

Upgrade packages only to the lowest available versions that fix advisories of type bugfix, enhancement, security, or
newpackage. In case that any option limiting advisories is used it upgrades packages only to the lowest versions
that fix advisories matching selected advisory properties

Allow removing of installed packages to resolve any potential dependency problems.

Allow skipping packages that are not possible to upgrade. All remaining packages will be upgraded.

Enable downgrade of dependencies when resolving the requested operation.

Disable downgrade of dependencies when resolving the requested operation.

Set directory used for downloading packages to. Default location is to the current working directory.
Automatically sets the downloadonly option.

Only download packages for transaction.

Store the transaction to be performed offline. See dnf5-offline(8), Offline command.

Consider only content contained in advisories with specified name.
This is a list option.
Expected values are advisory IDs, e.g. FEDORA-2201-123.

Consider only content contained in advisories with specified severity.
This is a list option.
Accepted values are: critical, important, moderate, low, none.

Consider only content contained in advisories that fix a ticket of given Bugzilla ID.
This is a list option.
Expected values are numeric IDs, e.g. 123123.

Consider only content contained in advisories that fix a ticket of given CVE (Common Vulnerabilities and Exposures) ID.
This is a list option.
Expected values are string IDs in CVE format, e.g. CVE-2201-0123.

Consider only content contained in security advisories.

Consider only content contained in bugfix advisories.

Consider only content contained in enhancement advisories.

Consider only content contained in newpackage advisories.


EXAMPLES

Upgrade all installed packages to the newest available version.

Upgrade the tito package.


SEE ALSO

dnf5-advisory(8), Advisory command
dnf5-specs(7), Patterns specification



AUTHOR

See AUTHORS.md in dnf5 source distribution.

COPYRIGHT

Contributors to the dnf5 project.

December 8, 2024