[Bug 1663280] Re: Serious performance degradation of math functions in 16.04/16.10/17.04 due to known Glibc bug

2017-02-11 Thread Oleg Strikov
Bug description has been updated to include the following information:

@strikov: According to a quite reliable source [5] all AMD CPUs and
latest Intel CPUs (Skylake and Knights Landing) don't suffer from
AVX/SSE transition penalty. It means that the scope of this bug becomes
smaller and includes only the following generations of Intel's CPUs:
Sandy Bridge, Ivy Bridge, Haswell, and Broadwell. Scope still remains
quite large though.

@strikov: Ubuntu 16.10/17.04 which use Glibc 2.24 may recieve the fix
from upstream 2.24 branch (as Marcel pointed out, fix has been
backported to 2.24 branch where Fedora took it successfully) if such
synchronization will take place. Ubuntu 16.04 (the main target of this
bug) uses Glibc 2.23 which hasn't been patched upstream and will suffer
from performance degradation until we fix it manually.

** Description changed:

  Bug [0] has been introduced in Glibc 2.23 [1] and fixed in Glibc 2.25
  [2]. All Ubuntu versions starting from 16.04 are affected because they
  use either Glibc 2.23 or 2.24. Bug introduces serious (2x-4x)
  performance degradation of math functions (pow, exp/exp2/exp10,
  log/log2/log10, sin/cos/sincos/tan, asin/acos/atan/atan2,
  sinh/cosh/tanh, asinh/acosh/atanh) provided by libm. Bug can be
  reproduced on any AVX-capable x86-64 machine.
+ 
+ @strikov: According to a quite reliable source [5] all AMD CPUs and
+ latest Intel CPUs (Skylake and Knights Landing) don't suffer from
+ AVX/SSE transition penalty. It means that the scope of this bug becomes
+ smaller and includes only the following generations of Intel's CPUs:
+ Sandy Bridge, Ivy Bridge, Haswell, and Broadwell. Scope still remains
+ quite large though.
+ 
+ @strikov: Ubuntu 16.10/17.04 which use Glibc 2.24 may recieve the fix
+ from upstream 2.24 branch (as Marcel pointed out, fix has been
+ backported to 2.24 branch where Fedora took it successfully) if such
+ synchronization will take place. Ubuntu 16.04 (the main target of this
+ bug) uses Glibc 2.23 which hasn't been patched upstream and will suffer
+ from performance degradation until we fix it manually.
  
  This bug is all about AVX-SSE transition penalty [3]. 256-bit YMM
  registers used by AVX-256 instructions extend 128-bit registers used by
  SSE (XMM0 is a low half of YMM0 and so on). Every time CPU executes SSE
  instruction after AVX-256 instruction it has to store upper half of the
  YMM register to the internal buffer and then restore it when execution
  returns back to AVX instructions. Store/restore is required because old-
  fashioned SSE knows nothing about the upper halves of its registers and
  may damage them. This store/restore operation is time consuming (several
  tens of clock cycles for each operation). To deal with this issue, Intel
  introduced AVX-128 instructions which operate on the same 128-bit XMM
  register as SSE but take into account upper halves of YMM registers.
  Hence, no store/restore required. Practically speaking, AVX-128
  instructions is a new smart form of SSE instructions which can be used
  together with full-size AVX-256 instructions without any penalty. Intel
  recommends to use AVX-128 instructions instead of SSE instructions
  wherever possible. To sum things up, it's okay to mix SSE with AVX-128
  and AVX-128 with AVX-256. Mixing AVX-128 with AVX-256 is allowed because
  both types of instructions are aware of 256-bit YMM registers. Mixing
  SSE with AVX-128 is okay because CPU can guarantee that the upper halves
  of YMM registers don't contain any meaningful data (how one can put it
  there without using AVX-256 instructions) and avoid doing store/restore
  operation (why to care about random trash in the upper halves of the YMM
  registers). It's not okay to mix SSE with AVX-256 due to the transition
  penalty. Scalar floating-point instructions used by routines mentioned
  above are implemented as a subset of SSE and AVX-128 instructions. They
  operate on a small fraction of 128-bit register but still considered
  SSE/AVX-128 instruction. And they suffer from SSE/AVX transition penalty
  as well.
  
  Glibc inadvertently triggers a chain of AVX/SSE transition penalties due
  to inappropriate use of AVX-256 instructions inside
  _dl_runtime_resolve() procedure. By using AVX-256 instructions to
  push/pop YMM registers [4], Glibc makes CPU think that the upper halves
  of XMM registers contain meaningful data which needs to be preserved
  during execution of SSE instructions. With such a 'dirty' flag set every
  switch between SSE and AVX instructions (AVX-128 or AVX-256) leads to a
  time consuming store/restore procedure. This 'dirty' flag never gets
  cleared during the whole program execution which leads to a serious
  overall slowdown. Fixed implementation [2] of _dl_runtime_resolve()
  procedure tries to avoid using AVX-256 instructions if possible.
  
  Buggy _dl_runtime_resolve() gets called every time when dynamic linker
  tries to resolve a symbol (any symbol, not just ones 

[Bug 1663280] [NEW] Serious performance degradation of math functions in 16.04/16.10/17.04 due to known Glibc bug

2017-02-09 Thread Oleg Strikov
Public bug reported:

Bug [0] has been introduced in Glibc 2.23 [1] and fixed in Glibc 2.25
[2]. All Ubuntu versions starting from 16.04 are affected because they
use either Glibc 2.23 or 2.24. Bug introduces serious (2x-4x)
performance degradation of math functions (pow, exp/exp2/exp10,
log/log2/log10, sin/cos/sincos/tan, asin/acos/atan/atan2,
sinh/cosh/tanh, asinh/acosh/atanh) provided by libm. Bug can be
reproduced on any AVX-capable x86-64 machine.

This bug is all about AVX-SSE transition penalty [3]. 256-bit YMM
registers used by AVX-256 instructions extend 128-bit registers used by
SSE (XMM0 is a low half of YMM0 and so on). Every time CPU executes SSE
instruction after AVX-256 instruction it has to store upper half of the
YMM register to the internal buffer and then restore it when execution
returns back to AVX instructions. Store/restore is required because old-
fashioned SSE knows nothing about the upper halves of its registers and
may damage them. This store/restore operation is time consuming (several
tens of clock cycles for each operation). To deal with this issue, Intel
introduced AVX-128 instructions which operate on the same 128-bit XMM
register as SSE but take into account upper halves of YMM registers.
Hence, no store/restore required. Practically speaking, AVX-128
instructions is a new smart form of SSE instructions which can be used
together with full-size AVX-256 instructions without any penalty. Intel
recommends to use AVX-128 instructions instead of SSE instructions
wherever possible. To sum things up, it's okay to mix SSE with AVX-128
and AVX-128 with AVX-256. Mixing AVX-128 with AVX-256 is allowed because
both types of instructions are aware of 256-bit YMM registers. Mixing
SSE with AVX-128 is okay because CPU can guarantee that the upper halves
of YMM registers don't contain any meaningful data (how one can put it
there without using AVX-256 instructions) and avoid doing store/restore
operation (why to care about random trash in the upper halves of the YMM
registers). It's not okay to mix SSE with AVX-256 due to the transition
penalty. Scalar floating-point instructions used by routines mentioned
above are implemented as a subset of SSE and AVX-128 instructions. They
operate on a small fraction of 128-bit register but still considered
SSE/AVX-128 instruction. And they suffer from SSE/AVX transition penalty
as well.

Glibc inadvertently triggers a chain of AVX/SSE transition penalties due
to inappropriate use of AVX-256 instructions inside
_dl_runtime_resolve() procedure. By using AVX-256 instructions to
push/pop YMM registers [4], Glibc makes CPU think that the upper halves
of XMM registers contain meaningful data which needs to be preserved
during execution of SSE instructions. With such a 'dirty' flag set every
switch between SSE and AVX instructions (AVX-128 or AVX-256) leads to a
time consuming store/restore procedure. This 'dirty' flag never gets
cleared during the whole program execution which leads to a serious
overall slowdown. Fixed implementation [2] of _dl_runtime_resolve()
procedure tries to avoid using AVX-256 instructions if possible.

Buggy _dl_runtime_resolve() gets called every time when dynamic linker
tries to resolve a symbol (any symbol, not just ones mentioned above).
It's enough for _dl_runtime_resolve() to be called just once to touch
the upper halves of the YMM registers and provoke AVX/SSE transition
penalty in the future. It's safe to say that all dynamically linked
application call _dl_runtime_resolve() at least once which means that
all of them may experience slowdown. Performance degradation takes place
when such application mixes AVX and SSE instructions (switches from AVX
to SSE or back).

There are two types of math routines provided by libm:
(a) ones that have AVX-optimized version (exp, sin/cos, tan, atan, log and 
other)
(b) ones that don't have AVX-optimized version and rely on general purpose SSE 
implementation (pow, exp2/exp10, asin/acos, sinh/cosh/tanh, asinh/acosh/atanh 
and others)

For the former group of routines slowdown happens when they get called
from SSE code (i.e. from the application compiled with -mno-avx) because
SSE -> AVX transition takes place. For the latter one slowdown happens
when routines get called from AVX code (i.e. from the application
compiled with -mavx) because AVX -> SSE transition takes place. Both
situations look realistic. SSE code gets generated by gcc to target
x86-64 and AVX-optimized code gets generated by gcc -march=native on
AVX-capable machines.



Let's take one routine from the group (a) and try to reproduce the
slowdown.

#include 
#include 

int main () {
  double a, b;
  for (a = b = 0.0; b < 2.0; b += 0.0005) a += exp(b);
  printf("%f\n", a);
  return 0;
}

$ gcc -O3 -march=x86-64 -o exp exp.c -lm

$ time ./exp
<..> 2.801s <..>

$ time LD_BIND_NOW=1 ./exp
<..> 0.660s <..>

You can see that application demonstrates 4x 

[Bug 1443542] Re: curtin race on vivid when /dev/sda1 doesn't exist

2015-05-14 Thread Oleg Strikov
Execution of blockdev --rereadpt simply issues a call to
ioctl(BLKRRPART) which forces kernel to re-initialize its metadata.
Kernel adds information about newly created partition here:
http://lxr.linux.no/#linux+v3.19.1/block/partition-generic.c#L269 You
can see a call to kobject_uevent() which puts event to udev's queue. So
to me it looks like udev settle should have all the information
available. Only if blockdev succeeds though. We don't check its return
code if I got it correctly.

Another interesting point is that there are two popular ways to re-read
the partition table: BLKRRPAR ioctl (used by blockdev) and BLKPG ioctl
(used by partprobe). They are very different. While BLKRRPAR lets kernel
know that partition table needs to be re-read, BLKPG tells kernel the
exact partitioning layout (parted does this because it wants to have
ultimate control over things). BLKPG may be more udev-friendly because
parted-based tools are more popular. We may want to try partprobe
instead of blockdev and see if it solves the issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1443542

Title:
  curtin race on vivid when /dev/sda1 doesn't exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curtin/+bug/1443542/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1443542] Re: curtin race on vivid when /dev/sda1 doesn't exist

2015-05-14 Thread Oleg Strikov
Execution of blockdev --rereadpt simply issues a call to
ioctl(BLKRRPART) which forces kernel to re-initialize its metadata.
Kernel adds information about newly created partition here:
http://lxr.linux.no/#linux+v3.19.1/block/partition-generic.c#L269 You
can see a call to kobject_uevent() which puts event to udev's queue. So
to me it looks like udev settle should have all the information
available. Only if blockdev succeeds though. We don't check its return
code if I got it correctly.

Another interesting point is that there are two popular ways to re-read
the partition table: BLKRRPAR ioctl (used by blockdev) and BLKPG ioctl
(used by partprobe). They are very different. While BLKRRPAR lets kernel
know that partition table needs to be re-read, BLKPG tells kernel the
exact partitioning layout (parted does this because it wants to have
ultimate control over things). BLKPG may be more udev-friendly because
parted-based tools are more popular. We may want to try partprobe
instead of blockdev and see if it solves the issue.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to curtin in Ubuntu.
https://bugs.launchpad.net/bugs/1443542

Title:
  curtin race on vivid when /dev/sda1 doesn't exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curtin/+bug/1443542/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-14 Thread Oleg Strikov
Adding verification-failed based on #14

** Tags removed: verification-done
** Tags added: verification-failed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-14 Thread Oleg Strikov
Adding verification-failed based on #14

** Tags removed: verification-done
** Tags added: verification-failed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-13 Thread Oleg Strikov
Hi Curtis,

To my understanding juju-1.22.1 is not in -updates yet not because we
don't want this but because it needs to be in -proposed for 7 days
before reaching -updates. This is a standard practice for SRUs. I expect
to see it landed into -updates until the end of this week. If juju team
wants to have it landed *right now* -- please let us now and we'll
discuss it with the SRU team.

Taking into account that 1.22.4 we'll be in -proposed for 7 days as
well, I think that we may want to land 1.22.1 first. What is your
opinion?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-13 Thread Oleg Strikov
Hi Curtis,

To my understanding juju-1.22.1 is not in -updates yet not because we
don't want this but because it needs to be in -proposed for 7 days
before reaching -updates. This is a standard practice for SRUs. I expect
to see it landed into -updates until the end of this week. If juju team
wants to have it landed *right now* -- please let us now and we'll
discuss it with the SRU team.

Taking into account that 1.22.4 we'll be in -proposed for 7 days as
well, I think that we may want to land 1.22.1 first. What is your
opinion?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-08 Thread Oleg Strikov
Thanks Curtis! Adding 'verification-done' tag based on your comments.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-08 Thread Oleg Strikov
There was a typo in the message #8 from Curtis. Juju 1.22.1 has been certified 
not 1.20.1.
sinzui strikov, oops, yes, I do mean *1.22.1*

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-08 Thread Oleg Strikov
Thanks Curtis! Adding 'verification-done' tag based on your comments.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-05-08 Thread Oleg Strikov
There was a typo in the message #8 from Curtis. Juju 1.22.1 has been certified 
not 1.20.1.
sinzui strikov, oops, yes, I do mean *1.22.1*

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438745] Re: package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 2

2015-04-24 Thread Oleg Strikov
Verification done. Logs: http://pastebin.ubuntu.com/10880409/

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1438745

Title:
  package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade:
  subprocess installed post-installation script returned error exit
  status 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1438745] Re: package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 2

2015-04-24 Thread Oleg Strikov
Verification done. Logs: http://pastebin.ubuntu.com/10880409/

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438745

Title:
  package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade:
  subprocess installed post-installation script returned error exit
  status 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438745] Re: package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 2

2015-04-24 Thread Oleg Strikov
Debdiff attached.

[SRU]

[Impact]

Bug shows up when user tries to upgrade any previous version of clamav
to the version which is currently available inside vivid repo. Apt
crashes with the following error message:

/var/lib/dpkg/info/clamav-daemon.postinst: 626: 
/var/lib/dpkg/info/clamav-daemon.postinst: cannot create : Directory nonexistent
dpkg: error processing package clamav-daemon (--install):
 subprocess installed post-installation script returned error exit status 2

This happens due to a typo inside postinst script. Variable $DEBCONFILE
is used incorrectly instead of $DEBCONFFILE (note double F) which leads
to generation of the incorrect output path.

This typo is on the path which gets executed only when debconf
information is available for the package. It means that the issue
doesn't show up during regular installation but crashes apt during
updates.

This issue is important because all clamav users will observe the issue
while upgrading from Utopic to Vivid.

[Test Case]

How to reproduce the issue and make sure that debdiff resolves it:
http://pastebin.ubuntu.com/10879650/

[Regression Potential]

Change is minor and fixes obvious issue. We can't avoid fixing it
because with this issue in place we won't be able to upgrade clamav in
the future (all vivid users will meet this issue if we upload an updated
package without this change).

** Patch added: clamav-sru-1438745.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+attachment/4383128/+files/clamav-sru-1438745.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438745

Title:
  package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade:
  subprocess installed post-installation script returned error exit
  status 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438745] Re: package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade: subprocess installed post-installation script returned error exit status 2

2015-04-24 Thread Oleg Strikov
Debdiff attached.

[SRU]

[Impact]

Bug shows up when user tries to upgrade any previous version of clamav
to the version which is currently available inside vivid repo. Apt
crashes with the following error message:

/var/lib/dpkg/info/clamav-daemon.postinst: 626: 
/var/lib/dpkg/info/clamav-daemon.postinst: cannot create : Directory nonexistent
dpkg: error processing package clamav-daemon (--install):
 subprocess installed post-installation script returned error exit status 2

This happens due to a typo inside postinst script. Variable $DEBCONFILE
is used incorrectly instead of $DEBCONFFILE (note double F) which leads
to generation of the incorrect output path.

This typo is on the path which gets executed only when debconf
information is available for the package. It means that the issue
doesn't show up during regular installation but crashes apt during
updates.

This issue is important because all clamav users will observe the issue
while upgrading from Utopic to Vivid.

[Test Case]

How to reproduce the issue and make sure that debdiff resolves it:
http://pastebin.ubuntu.com/10879650/

[Regression Potential]

Change is minor and fixes obvious issue. We can't avoid fixing it
because with this issue in place we won't be able to upgrade clamav in
the future (all vivid users will meet this issue if we upload an updated
package without this change).

** Patch added: clamav-sru-1438745.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+attachment/4383128/+files/clamav-sru-1438745.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1438745

Title:
  package clamav-daemon 0.98.6+dfsg-1ubuntu2 failed to install/upgrade:
  subprocess installed post-installation script returned error exit
  status 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1438745/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1447200] [NEW] juju-core 1.23.1 is not packaged in Ubuntu

2015-04-22 Thread Oleg Strikov
Public bug reported:

We're now in a position to have 1.23.1 enter trusty-proposed and vivid-
proposed, but it should not land in trusty or vivid until upstream
passes QA on our proposed binaries, published the tools in their stable
simplestream and announces the release for general production use.

[SRU Information]

juju-core has a stable release exception in
https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions,
including for major version updates.

[Development Fix]

Upload of new upstream release with packaging review. [strikov] will
remove the block-proposed tag when verification has passed, and then
this update should migrate to vivid.

[Stable Fix]

Full backport of new upstream release.

[Pre-QA tasks]

[strikov] Upload to the development release (vivid-proposed): TODO
[strikov] Upload to the current LTS release (trusty-proposed): TODO

[QA Status]

Since there are multiple verifications required, they are listed here as
a work item whiteboard status type thing rather than try and track them
in a single tag. Please do not mark verification-done or remove block-
proposed until all following items have passed. If any of these items
fail, this bug should be marked verification-failed immediately.

[sinzui] Upsteam QA test against Vivid: TODO
[sinzui] Upstream QA test against Trusty: TODO
[sinzui] Upstream release process complete: TODO

Manual tests required:

[sinzui] Test juju-quickstart against vivid-proposed: TODO
[sinzui] Test juju-quickstart against trusty-proposed: TODO

The following stakeholders have expressed an interest in performing
their own tests and we will wait for a (timely) acknowledgement from
them before removing the -proposed blocks. If you also have an interest
in testing new Juju releases before they land in an SRU, then please
comment in this bug.

Landscape team QA: TODO

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1447200

Title:
  juju-core 1.23.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1447200/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1447200] [NEW] juju-core 1.23.1 is not packaged in Ubuntu

2015-04-22 Thread Oleg Strikov
Public bug reported:

We're now in a position to have 1.23.1 enter trusty-proposed and vivid-
proposed, but it should not land in trusty or vivid until upstream
passes QA on our proposed binaries, published the tools in their stable
simplestream and announces the release for general production use.

[SRU Information]

juju-core has a stable release exception in
https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions,
including for major version updates.

[Development Fix]

Upload of new upstream release with packaging review. [strikov] will
remove the block-proposed tag when verification has passed, and then
this update should migrate to vivid.

[Stable Fix]

Full backport of new upstream release.

[Pre-QA tasks]

[strikov] Upload to the development release (vivid-proposed): TODO
[strikov] Upload to the current LTS release (trusty-proposed): TODO

[QA Status]

Since there are multiple verifications required, they are listed here as
a work item whiteboard status type thing rather than try and track them
in a single tag. Please do not mark verification-done or remove block-
proposed until all following items have passed. If any of these items
fail, this bug should be marked verification-failed immediately.

[sinzui] Upsteam QA test against Vivid: TODO
[sinzui] Upstream QA test against Trusty: TODO
[sinzui] Upstream release process complete: TODO

Manual tests required:

[sinzui] Test juju-quickstart against vivid-proposed: TODO
[sinzui] Test juju-quickstart against trusty-proposed: TODO

The following stakeholders have expressed an interest in performing
their own tests and we will wait for a (timely) acknowledgement from
them before removing the -proposed blocks. If you also have an interest
in testing new Juju releases before they land in an SRU, then please
comment in this bug.

Landscape team QA: TODO

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1447200

Title:
  juju-core 1.23.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1447200/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-17 Thread Oleg Strikov
Here is the changelog for the package I'm asking SRU for:

juju-core (1.22.1-0ubuntu0.14.04.1) trusty; urgency=medium

  * New upstream release (LP: #1444037).
  * Packaging changes required by the new release and cherry-picked from Vivid:
- d/tests/fake-future.sh: New ability to generate fake /etc/os-release.
  Change is needed to provide Juju 1.22.1 with an appropriate testbed.
- d/control: Juju-local now depends on cloud-image-utils | cloud-utils.
  Juju uses ubuntu-cloud template which in turn uses cloud-image-utils.
  Package lxc-templates only recommends cloud-image-utils hence Juju needs
  to require this package directly. Package cloud-utils is mentioned as an
  alternative because cloud-image-utils is not available on precise but we
  want to unify Juju packaging for all supported releases.
- d/copyright: Updated to reflect changes in the codebase.
  * Compliance to Debian Policy 3.9.6 was declared.

Few comments about the changes:

(1) d/tests/fake-future.sh change is absolutely required by the new
release. Without this change future-local-provider and future-manual-
provider autopkgtests fail. These tests check if Juju can live inside
new development release (when version and codename change) and proposed
change extends emulation layer by generating fake /etc/os-release. Juju
didn't process /etc/os-release before hence we need this change only for
1.22+.

(2) d/control change has been cherry-picked from Vivid because (a) not
fixing this bug will lead to issues with juju when lxc-templates package
have been installed w/o recommends (b) we want to minimize packaging
delta between supported releases.

(3) d/copyright change is needed because code base changed and we have
to react by providing up-to-date d/copyright. It also helps to minimize
packaging delta.

(4) Compliance to Debian Policy 3.9.6 has been declared to minimize
packaging delta. I don't see any regression potential here.

We still have some delta between 1.22.1 in Vivid and Trusty:

(1) Version in Trusty has explicit build dependency on libgo5 (= 
4.9.1-0ubuntu1) [!amd64 !i386 !armhf]
This change addressed the following issue: 
https://bugs.launchpad.net/juju-core/+bug/1377325
While 4.9.1-0ubuntu1 is the current version of the package in Trusty I don't 
see any reason to remove this explicit versioned dependency. It minimizes SRU 
delta and potential regression risk.

(2) Version in Vivid have autopkgtests modified to revert back to
upstart before running tests. This is needed because Juju 1.22.* doesn't
support systemd which is default init system in Vivid. This delta will
be removed with Juju 1.23 release which supports systemd.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-17 Thread Oleg Strikov
Here is the changelog for the package I'm asking SRU for:

juju-core (1.22.1-0ubuntu0.14.04.1) trusty; urgency=medium

  * New upstream release (LP: #1444037).
  * Packaging changes required by the new release and cherry-picked from Vivid:
- d/tests/fake-future.sh: New ability to generate fake /etc/os-release.
  Change is needed to provide Juju 1.22.1 with an appropriate testbed.
- d/control: Juju-local now depends on cloud-image-utils | cloud-utils.
  Juju uses ubuntu-cloud template which in turn uses cloud-image-utils.
  Package lxc-templates only recommends cloud-image-utils hence Juju needs
  to require this package directly. Package cloud-utils is mentioned as an
  alternative because cloud-image-utils is not available on precise but we
  want to unify Juju packaging for all supported releases.
- d/copyright: Updated to reflect changes in the codebase.
  * Compliance to Debian Policy 3.9.6 was declared.

Few comments about the changes:

(1) d/tests/fake-future.sh change is absolutely required by the new
release. Without this change future-local-provider and future-manual-
provider autopkgtests fail. These tests check if Juju can live inside
new development release (when version and codename change) and proposed
change extends emulation layer by generating fake /etc/os-release. Juju
didn't process /etc/os-release before hence we need this change only for
1.22+.

(2) d/control change has been cherry-picked from Vivid because (a) not
fixing this bug will lead to issues with juju when lxc-templates package
have been installed w/o recommends (b) we want to minimize packaging
delta between supported releases.

(3) d/copyright change is needed because code base changed and we have
to react by providing up-to-date d/copyright. It also helps to minimize
packaging delta.

(4) Compliance to Debian Policy 3.9.6 has been declared to minimize
packaging delta. I don't see any regression potential here.

We still have some delta between 1.22.1 in Vivid and Trusty:

(1) Version in Trusty has explicit build dependency on libgo5 (= 
4.9.1-0ubuntu1) [!amd64 !i386 !armhf]
This change addressed the following issue: 
https://bugs.launchpad.net/juju-core/+bug/1377325
While 4.9.1-0ubuntu1 is the current version of the package in Trusty I don't 
see any reason to remove this explicit versioned dependency. It minimizes SRU 
delta and potential regression risk.

(2) Version in Vivid have autopkgtests modified to revert back to
upstart before running tests. This is needed because Juju 1.22.* doesn't
support systemd which is default init system in Vivid. This delta will
be removed with Juju 1.23 release which supports systemd.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-16 Thread Oleg Strikov
Removing 'block-proposed' flag to allow juju 1.22.1 to go into Vivid.

** Description changed:

  We're now in a position to have 1.22.1 enter trusty-proposed and vivid-
  proposed, but it should not land in trusty or vivid until upstream
  passes QA on our proposed binaries, published the tools in their stable
  simplestream and announces the release for general production use.
  
  [SRU Information]
  
  juju-core has a stable release exception in
  https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions,
  including for major version updates.
  
  [Development Fix]
  
  Upload of new upstream release with packaging review. [strikov] will
  remove the block-proposed tag when verification has passed, and then
  this update should migrate to vivid.
  
  [Stable Fix]
  
  Full backport of new upstream release.
  
  [Pre-QA tasks]
  
- [strikov] Upload to the development release (vivid-proposed): TODO
+ [strikov] Upload to the development release (vivid-proposed): DONE
  [strikov] Upload to the current LTS release (trusty-proposed): TODO
  
  [QA Status]
  
  Since there are multiple verifications required, they are listed here as
  a work item whiteboard status type thing rather than try and track them
  in a single tag. Please do not mark verification-done or remove block-
  proposed until all following items have passed. If any of these items
  fail, this bug should be marked verification-failed immediately.
  
  [sinzui] Upsteam QA test against Vivid: DONE
  [sinzui] Upstream QA test against Trusty: TODO
  [sinzui] Upstream release process complete: TODO
  
  Manual tests required:
  
  [sinzui] Test juju-quickstart against vivid-proposed: DONE
  [sinzui] Test juju-quickstart against trusty-proposed: TODO
  
  The following stakeholders have expressed an interest in performing
  their own tests and we will wait for a (timely) acknowledgement from
  them before removing the -proposed blocks. If you also have an interest
  in testing new Juju releases before they land in an SRU, then please
  comment in this bug.
  
  Landscape team QA: TODO

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-16 Thread Oleg Strikov
Removing 'block-proposed' flag to allow juju 1.22.1 to go into Vivid.

** Description changed:

  We're now in a position to have 1.22.1 enter trusty-proposed and vivid-
  proposed, but it should not land in trusty or vivid until upstream
  passes QA on our proposed binaries, published the tools in their stable
  simplestream and announces the release for general production use.
  
  [SRU Information]
  
  juju-core has a stable release exception in
  https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions,
  including for major version updates.
  
  [Development Fix]
  
  Upload of new upstream release with packaging review. [strikov] will
  remove the block-proposed tag when verification has passed, and then
  this update should migrate to vivid.
  
  [Stable Fix]
  
  Full backport of new upstream release.
  
  [Pre-QA tasks]
  
- [strikov] Upload to the development release (vivid-proposed): TODO
+ [strikov] Upload to the development release (vivid-proposed): DONE
  [strikov] Upload to the current LTS release (trusty-proposed): TODO
  
  [QA Status]
  
  Since there are multiple verifications required, they are listed here as
  a work item whiteboard status type thing rather than try and track them
  in a single tag. Please do not mark verification-done or remove block-
  proposed until all following items have passed. If any of these items
  fail, this bug should be marked verification-failed immediately.
  
  [sinzui] Upsteam QA test against Vivid: DONE
  [sinzui] Upstream QA test against Trusty: TODO
  [sinzui] Upstream release process complete: TODO
  
  Manual tests required:
  
  [sinzui] Test juju-quickstart against vivid-proposed: DONE
  [sinzui] Test juju-quickstart against trusty-proposed: TODO
  
  The following stakeholders have expressed an interest in performing
  their own tests and we will wait for a (timely) acknowledgement from
  them before removing the -proposed blocks. If you also have an interest
  in testing new Juju releases before they land in an SRU, then please
  comment in this bug.
  
  Landscape team QA: TODO

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-15 Thread Oleg Strikov
** Project changed: juju-core = juju-core (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-15 Thread Oleg Strikov
** Project changed: juju-core = juju-core (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-15 Thread Oleg Strikov
** Changed in: juju-core (Ubuntu)
 Assignee: Curtis Hovey (sinzui) = (unassigned)

** Changed in: juju-core (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: juju-core (Ubuntu Trusty)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1444037] Re: juju-core 1.22.1 is not packaged in Ubuntu

2015-04-15 Thread Oleg Strikov
** Changed in: juju-core (Ubuntu)
 Assignee: Curtis Hovey (sinzui) = (unassigned)

** Changed in: juju-core (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: juju-core (Ubuntu Trusty)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1444037

Title:
  juju-core 1.22.1 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1444037/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-04-08 Thread Oleg Strikov
Hi Harry,

Thanks for the input.
Could you add more information on this please:
 silently switch from a slapd that used openssl to gnutls
I just looked through the launchpad package archive and it looks like we never 
had openldap linked against openssl in 12.04 and 14.04. First version of 
openldap which showed up in 12.04 was 2.4.25 and it has libgnutls-dev in build 
dependencies. Do you mean upgrading from any previous release to precise/trusty?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-04-08 Thread Oleg Strikov
Hi Harry,

Thanks for the input.
Could you add more information on this please:
 silently switch from a slapd that used openssl to gnutls
I just looked through the launchpad package archive and it looks like we never 
had openldap linked against openssl in 12.04 and 14.04. First version of 
openldap which showed up in 12.04 was 2.4.25 and it has libgnutls-dev in build 
dependencies. Do you mean upgrading from any previous release to precise/trusty?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1416051] Re: juju-core 1.22.0 is not packaged in Ubuntu

2015-04-07 Thread Oleg Strikov
Tag block-proposed has been removed to be able to update the package in vivid.
We don't plan to update trusty package with 1.22.0 for now.
I'll post an update to this bug when we make decision on package update in 
trusty.

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1416051

Title:
  juju-core 1.22.0 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1416051/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1416051] Re: juju-core 1.22.0 is not packaged in Ubuntu

2015-04-07 Thread Oleg Strikov
Tag block-proposed has been removed to be able to update the package in vivid.
We don't plan to update trusty package with 1.22.0 for now.
I'll post an update to this bug when we make decision on package update in 
trusty.

** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1416051

Title:
  juju-core 1.22.0 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1416051/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1416051] Re: juju-core 1.22.0 is not packaged in Ubuntu

2015-04-07 Thread Oleg Strikov
Juju 1.22.0 can't provision instances which run vivid because it doesn't
support systemd. Systemd support has been introduced in Juju 1.23 and we
plan to package this release when it becomes stable (now in beta).
However, I think that having 1.22 in vivid is much better than having
Juju 1.20 (what we currently have) taking into account that 1.20 doesn't
support vivid as well. We get new features of Juju 1.22 and can use them
against trusty and precise instances.

Due to the fact that Juju 1.22 can't provision instances which run vivid, many 
dep8 autotests fail. These tests rely on juju local provider (LXC) and expect 
to have upstart running on both host machine and guest instance. I made 
decision to avoid modifying tests because this operation is needed only for 
1.22 and will be reverted while packaging 1.23. To do functional testing I 
modified the image adt-run uses and manually installed upstart there. Then, I 
run adt-run and get all tests passed:
http://paste.ubuntu.com/10760926/
I think that this can be counted as equivalent to the regular autotests run 
which is carried out automatically against package in -proposed.

Curtis Hovey (sinzui) from Juju Team carried out all the testing
procedures required (see #2) and we are ready to move juju-1.22.0
package from -proposed to release. This can't be done automatically
(dep8 tests fail) that's why I'm asking for sponsorship to *manually*
move the package to release repo.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1416051

Title:
  juju-core 1.22.0 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1416051/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1416051] Re: juju-core 1.22.0 is not packaged in Ubuntu

2015-04-07 Thread Oleg Strikov
Juju 1.22.0 can't provision instances which run vivid because it doesn't
support systemd. Systemd support has been introduced in Juju 1.23 and we
plan to package this release when it becomes stable (now in beta).
However, I think that having 1.22 in vivid is much better than having
Juju 1.20 (what we currently have) taking into account that 1.20 doesn't
support vivid as well. We get new features of Juju 1.22 and can use them
against trusty and precise instances.

Due to the fact that Juju 1.22 can't provision instances which run vivid, many 
dep8 autotests fail. These tests rely on juju local provider (LXC) and expect 
to have upstart running on both host machine and guest instance. I made 
decision to avoid modifying tests because this operation is needed only for 
1.22 and will be reverted while packaging 1.23. To do functional testing I 
modified the image adt-run uses and manually installed upstart there. Then, I 
run adt-run and get all tests passed:
http://paste.ubuntu.com/10760926/
I think that this can be counted as equivalent to the regular autotests run 
which is carried out automatically against package in -proposed.

Curtis Hovey (sinzui) from Juju Team carried out all the testing
procedures required (see #2) and we are ready to move juju-1.22.0
package from -proposed to release. This can't be done automatically
(dep8 tests fail) that's why I'm asking for sponsorship to *manually*
move the package to release repo.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1416051

Title:
  juju-core 1.22.0 is not packaged in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1416051/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-04-07 Thread Oleg Strikov
I plan to change the status of this bug for 12.04 (precise) and 14.04 (trusty) 
to Won't Fix.
In this comment I want to explain why I came to this decision.

This bug had CVE-2013-4449 linked to it. I don't think that this CVE is 
relevant because the patch proposed in this bug doesn't resolve the issue 
mentioned in the description of this CVE. I proved that by using the following 
repro script:
http://pastebin.ubuntu.com/10764620/
This script is derived from the repro case provided in the debian bug for 
CVE-2013-4449:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729367#22
[!] Please note that this CVE can be reliably reproduced only on multicore 
machine (e.g. you can't use m1.small cloud instance). Some form of race 
condition takes place and your chances are much higher on multicore.

When CVE-2013-4449 is resolved this script should print 'Finished' at the end 
of execution.
When CVE is still here it prints 'No server found on localhost:389 attempt'.
'No server found' means that slapd crashed and can't be accessed via network 
and  'attempt' is a number of iteration when slapd crashed (it usually takes 
from 3 to 15 iterations because some form of race condition needs to take 
place).
WITH and WITHOUT the proposed patch I get 'No server found' message on 12.04 
(precise) and 14.04 (trusty).
It means that patch doesn't fix CVE-2013-4449.

Patch doesn't fix CVE-2013-4449 but it still can fix the issue mentioned
in the bug description (incorrect cipher suite string leads to a crash).
That's true but I don't think that we want to update 12.04 (precise) and
14.04 (trusty). ANY update may lead to unpredictable regressions (see
https://wiki.ubuntu.com/StableReleaseUpdates) and the profit of patching
should exceed the amount of potential issues it may create. OpenLDAP is
an important infrastructural component and we need to have a very good
reason to update it. I don't see such a reason. Client may crash itself
by passing incorrect cipher suite to the API. While that's sad, it
doesn't crash slapd itself and doesn't create any inconveniences to
other users. This looks like a good fix for a development release but
not stable release.

Please let me know if you have any objections or additional information about 
this bug.
We're open to discussion and can re-open this bug if needed.
Thanks to Jouko Orava and others for opening this bug and taking part in the 
discussion.

** Bug watch added: Debian Bug tracker #729367
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729367

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4449

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-04-07 Thread Oleg Strikov
I plan to change the status of this bug for 12.04 (precise) and 14.04 (trusty) 
to Won't Fix.
In this comment I want to explain why I came to this decision.

This bug had CVE-2013-4449 linked to it. I don't think that this CVE is 
relevant because the patch proposed in this bug doesn't resolve the issue 
mentioned in the description of this CVE. I proved that by using the following 
repro script:
http://pastebin.ubuntu.com/10764620/
This script is derived from the repro case provided in the debian bug for 
CVE-2013-4449:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729367#22
[!] Please note that this CVE can be reliably reproduced only on multicore 
machine (e.g. you can't use m1.small cloud instance). Some form of race 
condition takes place and your chances are much higher on multicore.

When CVE-2013-4449 is resolved this script should print 'Finished' at the end 
of execution.
When CVE is still here it prints 'No server found on localhost:389 attempt'.
'No server found' means that slapd crashed and can't be accessed via network 
and  'attempt' is a number of iteration when slapd crashed (it usually takes 
from 3 to 15 iterations because some form of race condition needs to take 
place).
WITH and WITHOUT the proposed patch I get 'No server found' message on 12.04 
(precise) and 14.04 (trusty).
It means that patch doesn't fix CVE-2013-4449.

Patch doesn't fix CVE-2013-4449 but it still can fix the issue mentioned
in the bug description (incorrect cipher suite string leads to a crash).
That's true but I don't think that we want to update 12.04 (precise) and
14.04 (trusty). ANY update may lead to unpredictable regressions (see
https://wiki.ubuntu.com/StableReleaseUpdates) and the profit of patching
should exceed the amount of potential issues it may create. OpenLDAP is
an important infrastructural component and we need to have a very good
reason to update it. I don't see such a reason. Client may crash itself
by passing incorrect cipher suite to the API. While that's sad, it
doesn't crash slapd itself and doesn't create any inconveniences to
other users. This looks like a good fix for a development release but
not stable release.

Please let me know if you have any objections or additional information about 
this bug.
We're open to discussion and can re-open this bug if needed.
Thanks to Jouko Orava and others for opening this bug and taking part in the 
discussion.

** Bug watch added: Debian Bug tracker #729367
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729367

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4449

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1439793] [NEW] deb-systemd-helper crashes while removing packages with unusual (but legal) Alias in unit config

2015-04-02 Thread Oleg Strikov
Public bug reported:

While working on mysql-5.6 package we met unusual (maybe even partially 
incorrect) Alias option in systemd unit config:
Alias=mysql.service
It is unusual because mysql.service is the original name of the service which 
can be found inside /lib/systemd/system/... This Alias option doesn't make 
any sense (mysql service will be accessible as mysql.service even without this 
alias) and my assumption is that it was created because the author was not sure 
if it's okay not to have any aliases at all or you need at least one. Anyhow 
this seems to be legal to do that (i was not able to find any documents which 
state that this is incorrect) even if it's something useless.

Installation went well and the following alias symlink has been created:
/etc/systemd/system/mysq.service -- /lib/systemd/system/mysql.service
Service was accessible via systemctl and everything was fine.

When you try to remove/purge the package you get the following error:
/usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists
This happens because deb-systemd-helper tries to 'mask' service the following 
way:

sub mask_service {
my ($scriptname, $service_path) = @_;

my $mask_link = '/etc/systemd/system/' . basename($service_path);

if (-e $mask_link) {
# If the link already exists, don’t do anything.
return if -l $mask_link  readlink($mask_link) eq '/dev/null';

debug $mask_link already exists, not masking.;
return;
}

make_path(dirname($mask_link));
symlink('/dev/null', $mask_link) or
error(unable to link $mask_link to /dev/null: $!);
...
}

Check for '-e $mask_link' FAILS because symlink's TARGET
(/lib/systemd/system/mysql.service) doesn't exists while doing postrm
and '-e' FOLLOWS symlinks. That's why we go to symlink(...) call
directly which fails because symlink already exists.

WORKAROUND: If apt-get remove/purge crashes with the error mentioned
above you need to manually remove symlink inside /etc/systemd/system
(/etc/systemd/system/mysql.service in our case) and rerun apt-get
remove/purge.

I'm not sure if we want to fix that.
On one hand, this situation is pretty rare.
On other hand though, such Alias=original-name situation is somewhat legal 
and we may want to handle it correctly.

This issue with Alias= has been fixed (by removing this useless Alias)
in mysql-5.6 so that's not a blocker for us.

** Affects: init-system-helpers (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  While working on mysql-5.6 package we met unusual (maybe even partially 
incorrect) Alias option in systemd unit config:
  Alias=mysql.service
  It is unusual because mysql.service is the original name of the service which 
can be found inside /lib/systemd/system/... This Alias option doesn't make 
any sense (mysql service will be accessible as mysql.service even without this 
alias) and my assumption is that it was created because the author was not sure 
if it's okay not to have any aliases at all or you need at least one. Anyhow 
this seems to be legal to do that (i was not able to find any documents which 
state that this is incorrect) even if it's something useless.
  
  Installation went well and the following alias symlink has been created:
  /etc/systemd/system/mysq.service -- /lib/systemd/system/mysql.service
  Service was accessible via systemctl and everything was fine.
  
  When you try to remove/purge the package you get the following error:
  /usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists
  This happens because deb-systemd-helper tries to 'mask' service the following 
way:
  
  sub mask_service {
- my ($scriptname, $service_path) = @_;
+ my ($scriptname, $service_path) = @_;
  
- my $mask_link = '/etc/systemd/system/' . basename($service_path);
+ my $mask_link = '/etc/systemd/system/' . basename($service_path);
  
- if (-e $mask_link) {
- # If the link already exists, don’t do anything.
- return if -l $mask_link  readlink($mask_link) eq '/dev/null';
+ if (-e $mask_link) {
+ # If the link already exists, don’t do anything.
+ return if -l $mask_link  readlink($mask_link) eq '/dev/null';
  
- # If the file already exists, the user most likely copied the .service
- # file to /etc/ to change it in some way. In this case we don’t need 
to
- # mask the .service in the first place, since it will not be removed 
by
- # dpkg.
- debug $mask_link already exists, not masking.;
- return;
- }
+ debug $mask_link already exists, not masking.;
+ return;
+ }
  
- make_path(dirname($mask_link));
- symlink('/dev/null', $mask_link) or
- error(unable to link $mask_link to /dev/null: $!);
+ make_path(dirname($mask_link));
+ symlink('/dev/null', $mask_link) or
+ 

[Bug 1439793] [NEW] deb-systemd-helper crashes while removing packages with unusual (but legal) Alias in unit config

2015-04-02 Thread Oleg Strikov
Public bug reported:

While working on mysql-5.6 package we met unusual (maybe even partially 
incorrect) Alias option in systemd unit config:
Alias=mysql.service
It is unusual because mysql.service is the original name of the service which 
can be found inside /lib/systemd/system/... This Alias option doesn't make 
any sense (mysql service will be accessible as mysql.service even without this 
alias) and my assumption is that it was created because the author was not sure 
if it's okay not to have any aliases at all or you need at least one. Anyhow 
this seems to be legal to do that (i was not able to find any documents which 
state that this is incorrect) even if it's something useless.

Installation went well and the following alias symlink has been created:
/etc/systemd/system/mysq.service -- /lib/systemd/system/mysql.service
Service was accessible via systemctl and everything was fine.

When you try to remove/purge the package you get the following error:
/usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists
This happens because deb-systemd-helper tries to 'mask' service the following 
way:

sub mask_service {
my ($scriptname, $service_path) = @_;

my $mask_link = '/etc/systemd/system/' . basename($service_path);

if (-e $mask_link) {
# If the link already exists, don’t do anything.
return if -l $mask_link  readlink($mask_link) eq '/dev/null';

debug $mask_link already exists, not masking.;
return;
}

make_path(dirname($mask_link));
symlink('/dev/null', $mask_link) or
error(unable to link $mask_link to /dev/null: $!);
...
}

Check for '-e $mask_link' FAILS because symlink's TARGET
(/lib/systemd/system/mysql.service) doesn't exists while doing postrm
and '-e' FOLLOWS symlinks. That's why we go to symlink(...) call
directly which fails because symlink already exists.

WORKAROUND: If apt-get remove/purge crashes with the error mentioned
above you need to manually remove symlink inside /etc/systemd/system
(/etc/systemd/system/mysql.service in our case) and rerun apt-get
remove/purge.

I'm not sure if we want to fix that.
On one hand, this situation is pretty rare.
On other hand though, such Alias=original-name situation is somewhat legal 
and we may want to handle it correctly.

This issue with Alias= has been fixed (by removing this useless Alias)
in mysql-5.6 so that's not a blocker for us.

** Affects: init-system-helpers (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  While working on mysql-5.6 package we met unusual (maybe even partially 
incorrect) Alias option in systemd unit config:
  Alias=mysql.service
  It is unusual because mysql.service is the original name of the service which 
can be found inside /lib/systemd/system/... This Alias option doesn't make 
any sense (mysql service will be accessible as mysql.service even without this 
alias) and my assumption is that it was created because the author was not sure 
if it's okay not to have any aliases at all or you need at least one. Anyhow 
this seems to be legal to do that (i was not able to find any documents which 
state that this is incorrect) even if it's something useless.
  
  Installation went well and the following alias symlink has been created:
  /etc/systemd/system/mysq.service -- /lib/systemd/system/mysql.service
  Service was accessible via systemctl and everything was fine.
  
  When you try to remove/purge the package you get the following error:
  /usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists
  This happens because deb-systemd-helper tries to 'mask' service the following 
way:
  
  sub mask_service {
- my ($scriptname, $service_path) = @_;
+ my ($scriptname, $service_path) = @_;
  
- my $mask_link = '/etc/systemd/system/' . basename($service_path);
+ my $mask_link = '/etc/systemd/system/' . basename($service_path);
  
- if (-e $mask_link) {
- # If the link already exists, don’t do anything.
- return if -l $mask_link  readlink($mask_link) eq '/dev/null';
+ if (-e $mask_link) {
+ # If the link already exists, don’t do anything.
+ return if -l $mask_link  readlink($mask_link) eq '/dev/null';
  
- # If the file already exists, the user most likely copied the .service
- # file to /etc/ to change it in some way. In this case we don’t need 
to
- # mask the .service in the first place, since it will not be removed 
by
- # dpkg.
- debug $mask_link already exists, not masking.;
- return;
- }
+ debug $mask_link already exists, not masking.;
+ return;
+ }
  
- make_path(dirname($mask_link));
- symlink('/dev/null', $mask_link) or
- error(unable to link $mask_link to /dev/null: $!);
+ make_path(dirname($mask_link));
+ symlink('/dev/null', $mask_link) or
+ 

[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
I plan to change the status of this bug to Won't Fix and here is the
explanation for this decision. We can theoretically fix this issue in
mysql package. In the postrm handler we need to check if this
problematic symlink exists and remove it before passing control to deb-
systemd-helper. I don't think this is reasonable decision though. If we
put this code into the package we'd be required to leave it there
forever (users may upgrade from buggy ubuntu4 to ubuntu5-6-7-8 and then
make decision to remove the package). Keeping it there forever is bad
because we're doing systemd's and deb-systemd-helper's work by managing
symlinks inside /etc/systemd/system/ and this fact may lead to
unpredictable issues in the future. Workaround (see above) is pretty
straightforward and shouldn't create any issues for vivid users.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
I plan to change the status of this bug to Won't Fix and here is the
explanation for this decision. We can theoretically fix this issue in
mysql package. In the postrm handler we need to check if this
problematic symlink exists and remove it before passing control to deb-
systemd-helper. I don't think this is reasonable decision though. If we
put this code into the package we'd be required to leave it there
forever (users may upgrade from buggy ubuntu4 to ubuntu5-6-7-8 and then
make decision to remove the package). Keeping it there forever is bad
because we're doing systemd's and deb-systemd-helper's work by managing
symlinks inside /etc/systemd/system/ and this fact may lead to
unpredictable issues in the future. Workaround (see above) is pretty
straightforward and shouldn't create any issues for vivid users.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
Hi Argenis,

Today I tried to upgrade from 5.6.23-1~exp1~ubuntu4 to 5.6.23-1~exp1~ubuntu5 
and reproduce the issue you observed.
Here is what I found:

Upgrade from ~ubuntu4 to ~ubuntu5 runs smoothly.
Mysql service starts after upgrade and automatically starts after reboot.
I can't reproduce the fact that service doesn't start automatically.
I assume that you observed the issue with autostart while using previous 
version of the package (~ubuntu4) i.e. one you used before the upgrade.
Could you please confirm that?
If so -- you met this bug: 
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1435823
It was fixed in the latest version of the package.

I was able to reproduce the issue with upgrading the package (second part of 
the bug):
Removing mysql-server-5.6 (5.6.23-1~exp1~ubuntu5) ...
/usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists

Please note that this issue is not related to the latest package (~ubuntu5) 
itself.
It happens because the previous version (~ubuntu4) created incorrect symlink at 
/etc/systemd/system/ which can't be removed while removing the package.
Latest version of the package won't create this symlink but you need to 
manually remove the link created by the previous version of the package. Once 
you do it -- you won't observe this issue in future.

To fix this issue run the following command when apt-get remove/purge crashes:
$ sudo rm /etc/systemd/system/mysql.service
Now, re-run remove/purge. It should finish correctly this time.
After carrying out this procedure you can reinstall mysql back. You won't 
observe the issue again.
You may use this bug as a reference: 
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1436178

Please try to apply this workaround and let us know if it helps you or not.
Thanks for reporting the bug!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
'I was able to reproduce the issue with upgrading the package (second part of 
the bug):'
should be
'I was able to reproduce the issue with REMOVING the package (second part of 
the bug):'

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
Hi Argenis,

Today I tried to upgrade from 5.6.23-1~exp1~ubuntu4 to 5.6.23-1~exp1~ubuntu5 
and reproduce the issue you observed.
Here is what I found:

Upgrade from ~ubuntu4 to ~ubuntu5 runs smoothly.
Mysql service starts after upgrade and automatically starts after reboot.
I can't reproduce the fact that service doesn't start automatically.
I assume that you observed the issue with autostart while using previous 
version of the package (~ubuntu4) i.e. one you used before the upgrade.
Could you please confirm that?
If so -- you met this bug: 
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1435823
It was fixed in the latest version of the package.

I was able to reproduce the issue with upgrading the package (second part of 
the bug):
Removing mysql-server-5.6 (5.6.23-1~exp1~ubuntu5) ...
/usr/bin/deb-systemd-helper: error: unable to link 
/etc/systemd/system/mysql.service to /dev/null: File exists

Please note that this issue is not related to the latest package (~ubuntu5) 
itself.
It happens because the previous version (~ubuntu4) created incorrect symlink at 
/etc/systemd/system/ which can't be removed while removing the package.
Latest version of the package won't create this symlink but you need to 
manually remove the link created by the previous version of the package. Once 
you do it -- you won't observe this issue in future.

To fix this issue run the following command when apt-get remove/purge crashes:
$ sudo rm /etc/systemd/system/mysql.service
Now, re-run remove/purge. It should finish correctly this time.
After carrying out this procedure you can reinstall mysql back. You won't 
observe the issue again.
You may use this bug as a reference: 
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1436178

Please try to apply this workaround and let us know if it helps you or not.
Thanks for reporting the bug!

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-04-01 Thread Oleg Strikov
'I was able to reproduce the issue with upgrading the package (second part of 
the bug):'
should be
'I was able to reproduce the issue with REMOVING the package (second part of 
the bug):'

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-03-31 Thread Oleg Strikov
Shell script which reproduces the issue: http://pastebin.ubuntu.com/10712595/
Please run this script only on a disposable instance in the cloud because it 
creates and adds ultimately trusted certificate to the target machine.

I was able to reproduce the issue on precise (12.04) and trusty (14.04).
I *was not* able to reproduce the issue on utopic (14.10) and vivid (15.04).
This happens because libldap is linked against later version of libgnutls in 
14.10 and 15.04.
12.04 and 14.04 use 2.x generation of libgnutls while 14.10 and 15.04 use 3.x 
generation.
I assume that libgnutls 3.x does proper cleanup and doesn't return 
semi-initialized context on errors  (which was the root cause of the bug).

Please note that this issue doesn't crash ldap server itself but only
clients who passes incorrect SSL/TLS-related settings into libldap using
ldap_set_option(NULL, LDAP_OPT_X_TLS_CIPHER_SUITE, NAME).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-03-31 Thread Oleg Strikov
Shell script which reproduces the issue: http://pastebin.ubuntu.com/10712595/
Please run this script only on a disposable instance in the cloud because it 
creates and adds ultimately trusted certificate to the target machine.

I was able to reproduce the issue on precise (12.04) and trusty (14.04).
I *was not* able to reproduce the issue on utopic (14.10) and vivid (15.04).
This happens because libldap is linked against later version of libgnutls in 
14.10 and 15.04.
12.04 and 14.04 use 2.x generation of libgnutls while 14.10 and 15.04 use 3.x 
generation.
I assume that libgnutls 3.x does proper cleanup and doesn't return 
semi-initialized context on errors  (which was the root cause of the bug).

Please note that this issue doesn't crash ldap server itself but only
clients who passes incorrect SSL/TLS-related settings into libldap using
ldap_set_option(NULL, LDAP_OPT_X_TLS_CIPHER_SUITE, NAME).

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-03-31 Thread Oleg Strikov
** Changed in: openldap (Ubuntu Precise)
   Status: New = In Progress

** Changed in: openldap (Ubuntu Trusty)
   Status: New = In Progress

** Changed in: openldap (Ubuntu Precise)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: openldap (Ubuntu Trusty)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: openldap (Ubuntu)
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1103353] Re: Invalid GnuTLS cipher suite strings causes libldap to crash

2015-03-31 Thread Oleg Strikov
** Changed in: openldap (Ubuntu Precise)
   Status: New = In Progress

** Changed in: openldap (Ubuntu Trusty)
   Status: New = In Progress

** Changed in: openldap (Ubuntu Precise)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: openldap (Ubuntu Trusty)
 Assignee: (unassigned) = Oleg Strikov (strikov)

** Changed in: openldap (Ubuntu)
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1103353

Title:
  Invalid GnuTLS cipher suite strings causes libldap to crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1103353/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-03-31 Thread Oleg Strikov
Hi Argenis,

Thanks for reporting the bug.

I was not able to reproduce the bug on a fresh installation of 15.04.
It looks like this issue happens when you upgrade the package from ubuntu4 to 
ubuntu5.
I think that the following workaround may resolve the issue:
$ sudo rm /etc/systemd/system/mysql.service

After running this command you (theoretically) should be able to purge and 
install the package w/o any issue.
Please let us now if it helps you or not.


** Changed in: mysql-5.6 (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1438788] Re: package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1

2015-03-31 Thread Oleg Strikov
Hi Argenis,

Thanks for reporting the bug.

I was not able to reproduce the bug on a fresh installation of 15.04.
It looks like this issue happens when you upgrade the package from ubuntu4 to 
ubuntu5.
I think that the following workaround may resolve the issue:
$ sudo rm /etc/systemd/system/mysql.service

After running this command you (theoretically) should be able to purge and 
install the package w/o any issue.
Please let us now if it helps you or not.


** Changed in: mysql-5.6 (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438788

Title:
  package mysql-server-5.6 5.6.23-1~exp1~ubuntu5 failed to
  install/upgrade: subprocess installed post-removal script returned
  error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/1438788/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-30 Thread Oleg Strikov
Kernel from -proposed (3.2.0-80-generic) resolves the bug.

L0: 12.04 running 3.2.0-80-generic
L1: 14.10 (utopic) - /dev/kvm is available
L2: 14.04 (trusty) - I was able to bootstrap the instance and ssh into it

L0: 12.04 running 3.2.0-80-generic
L1: 15.04 (vivid) - /dev/kvm is available
L2: 14.04 (trusty) - I was able to bootstrap the instance and ssh into it

Results:
(1) /dev/kvm exists for both L1/utopic and L1/vivid
(2) nested virtualization is functional and L2 guests can be bootstrapped

Thanks to everyone!
Special thanks to Stefan for providing us with the fix.

** Tags removed: verification-needed-precise
** Tags added: verification-done-precise

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-28 Thread Oleg Strikov
I will do appropriate verification on Monday.
Thanks for notification.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-27 Thread Oleg Strikov
** Changed in: tomcat7 (Ubuntu Vivid)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-27 Thread Oleg Strikov
** Changed in: tomcat7 (Ubuntu Vivid)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
It seems that this bug consists of many partially independent bugs.
I found at least two:

(1)
openjdk in vivid has SSLv3 disable but tests try to use it and get 'protocol is 
disabled or cipher suites are inappropriate'
as a warkaround you may enable sslv3 back by commenting the following line in 
/etc/java-7-openjdk/security/java.security:
# jdk.tls.disabledAlgorithms=SSLv3

(2)
another issue is that certificates inside the package expired which leads to 
SSL errors here and there
for example:

$ head test/org/apache/tomcat/util/net/localhost-cert.pem 
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4099 (0x1003)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, CN=ca-test.tomcat.apache.org
Validity
Not Before: Feb 28 05:28:42 2013 GMT
Not After : Feb 28 05:28:42 2015 GMT
Subject: C=US, CN=localhost

Note Feb 28 2015

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
It seems that this bug consists of many partially independent bugs.
I found at least two:

(1)
openjdk in vivid has SSLv3 disable but tests try to use it and get 'protocol is 
disabled or cipher suites are inappropriate'
as a warkaround you may enable sslv3 back by commenting the following line in 
/etc/java-7-openjdk/security/java.security:
# jdk.tls.disabledAlgorithms=SSLv3

(2)
another issue is that certificates inside the package expired which leads to 
SSL errors here and there
for example:

$ head test/org/apache/tomcat/util/net/localhost-cert.pem 
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4099 (0x1003)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, CN=ca-test.tomcat.apache.org
Validity
Not Before: Feb 28 05:28:42 2013 GMT
Not After : Feb 28 05:28:42 2015 GMT
Subject: C=US, CN=localhost

Note Feb 28 2015

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
They have updated certs in trunk:
http://mail-archives.apache.org/mod_mbox/tomcat-dev/201502.mbox/%3c20150228182330.eaaabac0...@hades.apache.org%3E
We may just pick them up.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
They have updated certs in trunk:
http://mail-archives.apache.org/mod_mbox/tomcat-dev/201502.mbox/%3c20150228182330.eaaabac0...@hades.apache.org%3E
We may just pick them up.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
Some part of bugs disappear when I put updated certs (with expiration date in 
2017) from here:
https://github.com/apache/tomcat/test/org/apache/tomcat/util/net/{localhost-cert.pem,
 localhost-copy1.jks, localhost.jks, localhost-key.pem}

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1432715] Re: tomcat7 ftbfs in vivd (test failures)

2015-03-25 Thread Oleg Strikov
Some part of bugs disappear when I put updated certs (with expiration date in 
2017) from here:
https://github.com/apache/tomcat/test/org/apache/tomcat/util/net/{localhost-cert.pem,
 localhost-copy1.jks, localhost.jks, localhost-key.pem}

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432715

Title:
  tomcat7 ftbfs in vivd (test failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tomcat7/+bug/1432715/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-20 Thread Oleg Strikov
Brilliant job Stefan!
Thanks for helping.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-17 Thread Oleg Strikov
I wonder if it's possible to change livbirt config to block some of
these flags even if they are provided by host CPU.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-17 Thread Oleg Strikov
I did a quick analysis if the flag (doublecheck might be needed).
All systems which WORK CORRECTLY has these guest flags:
x2apic vnmi ept

Systems which fail don't have any of these flags.

x2apic -- improves guest performance by reducing the overhead of APIC access, 
which is used to program timers and for issuing inter-processor interrupts
vnmi -- Intel Virtual NMI feature which helps with certain sorts of interrupt 
events in guests
ept -- Intel Extended Page Table

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-17 Thread Oleg Strikov
I was able to reproduce the bug on another type of processor (core i7).
/dev/kvm is not available with vivid kernel but available with trusty kernel.

ubuntu@vivid-adt3:~$ cat /proc/cpuinfo 
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 2
model name  : Intel Core i7 9xx (Nehalem Class Core i7)
stepping: 3
microcode   : 0x1
cpu MHz : 2400.084
cache size  : 2048 KB
physical id : 0
siblings: 1
core id : 0
cpu cores   : 1
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 2
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pse36 clflush mmx fxsr sse sse2 ss syscall nx rdtscp lm rep_good nopl pni vmx 
ssse3 cx16 sse4_1 sse4_2 popcnt hypervisor lahf_lm
bugs:
bogomips: 4800.16
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management:


ubuntu@vivid-adt3:~$ ls -l /dev/kvm
ls: cannot access /dev/kvm: No such file or directory

ubuntu@vivid-adt3:~$ sudo modprobe kvm_intel
modprobe: ERROR: could not insert 'kvm_intel': Input/output error

ubuntu@vivid-adt3:~$ uname -a
Linux vivid-adt3 3.19.0-9-generic #9-Ubuntu SMP Wed Mar 11 17:50:03 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432683] Re: apt-get install lxc doesn't load required apparmor profiles

2015-03-17 Thread Oleg Strikov
Hi Serge,

Many thanks for looking at the bug.
Here is information you requested.

ubuntu@vivid-lxc-bug:~$ uname -a
Linux vivid-lxc-bug 3.19.0-9-generic #9-Ubuntu SMP Wed Mar 11 17:50:03 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

ubuntu@vivid-lxc-bug:~$ sudo aa-status 
apparmor module is loaded.
6 profiles are loaded.
6 profiles are in enforce mode.
   /sbin/dhclient
   /usr/bin/lxc-start
   /usr/lib/NetworkManager/nm-dhcp-client.action
   /usr/lib/NetworkManager/nm-dhcp-helper
   /usr/lib/connman/scripts/dhclient-script
   /usr/sbin/tcpdump
0 profiles are in complain mode.
1 processes have profiles defined.
0 processes are in enforce mode.
0 processes are in complain mode.
1 processes are unconfined but have a profile defined.
   /sbin/dhclient (508)

/tmp/debug.out:
http://paste.ubuntu.com/10614837/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432683

Title:
  apt-get install lxc doesn't load required apparmor profiles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1432683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432683] Re: apt-get install lxc doesn't load required apparmor profiles

2015-03-17 Thread Oleg Strikov
Hi Serge,

Many thanks for looking at the bug.
Here is information you requested.

ubuntu@vivid-lxc-bug:~$ uname -a
Linux vivid-lxc-bug 3.19.0-9-generic #9-Ubuntu SMP Wed Mar 11 17:50:03 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

ubuntu@vivid-lxc-bug:~$ sudo aa-status 
apparmor module is loaded.
6 profiles are loaded.
6 profiles are in enforce mode.
   /sbin/dhclient
   /usr/bin/lxc-start
   /usr/lib/NetworkManager/nm-dhcp-client.action
   /usr/lib/NetworkManager/nm-dhcp-helper
   /usr/lib/connman/scripts/dhclient-script
   /usr/sbin/tcpdump
0 profiles are in complain mode.
1 processes have profiles defined.
0 processes are in enforce mode.
0 processes are in complain mode.
1 processes are unconfined but have a profile defined.
   /sbin/dhclient (508)

/tmp/debug.out:
http://paste.ubuntu.com/10614837/

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1432683

Title:
  apt-get install lxc doesn't load required apparmor profiles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1432683/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1431473] Re: kvm_intel (nested) module will not load [Input/output error]

2015-03-17 Thread Oleg Strikov
 Oh... maybe for Oleg: what release/kernel is running on your host?
I'm experimenting with canonistack (lcy_02) that's why I don't have such info 
as well as some other guys in the thread.
Sorry for not mentioning canonistack in my comment.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431473

Title:
  kvm_intel (nested) module will not load [Input/output error]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1431473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432683] [NEW] apt-get install lxc doesn't load required apparmor profiles

2015-03-16 Thread Oleg Strikov
Public bug reported:

I'm trying to use LXC on my openstack instance which runs vivid daily:

$ sudo apt-get install lxc -y

$ sudo lxc-create -t ubuntu-cloud --name=vivid -- --flush-cache
--stream=daily --release=vivid

$ sudo lxc-start --name vivid --logfile=lxc.log
lxc-start: lxc_start.c: main: 344 The container failed to start.
lxc-start: lxc_start.c: main: 346 To get more details, run the container in 
foreground mode.
lxc-start: lxc_start.c: main: 348 Additional information can be obtained by 
setting the --logfile and --logpriority options.

In the log file (lxc.log) I observe the following error:
lxc-start 1426516387.814 ERRORlxc_apparmor - 
lsm/apparmor.c:apparmor_process_label_set:183 - No such file or directory - 
failed to change apparmor profile to lxc-container-default

This profile *exists* under /etc/apparmor.d/lxc/lxc-default but was not
loaded appropriately.

This issue disappears if I:
(a) reload apparmor profile manually: sudo /etc/init.d/apparmor reload
or
(b) reboot the instance

I'd expect that 'apt-get install lxc' has to load all appropriate
apparmor profiles to allow starting containers w/o profile reloading /
rebooting.

** Affects: lxc (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  I'm trying to use LXC on my openstack instance which runs vivid daily:
  
  $ sudo apt-get install lxc -y
  
  $ sudo lxc-create -t ubuntu-cloud --name=vivid -- --flush-cache
  --stream=daily --release=vivid
  
  $ sudo lxc-start --name vivid --logfile=lxc.log
  lxc-start: lxc_start.c: main: 344 The container failed to start.
  lxc-start: lxc_start.c: main: 346 To get more details, run the container in 
foreground mode.
  lxc-start: lxc_start.c: main: 348 Additional information can be obtained by 
setting the --logfile and --logpriority options.
  
  In the log file (lxc.log) I observe the following error:
  lxc-start 1426516387.814 ERRORlxc_apparmor - 
lsm/apparmor.c:apparmor_process_label_set:183 - No such file or directory - 
failed to change apparmor profile to lxc-container-default
  
  This profile *exists* under /etc/apparmor.d/lxc/lxc-default but was not
  loaded appropriately.
  
  This issue disappears if I:
  (a) reload apparmor profile manually: sudo /etc/init.d/apparmor reload
  or
  (b) reboot the instance
  
- I'd expert that 'apt-get install lxc' has to load all appropriate
+ I'd expect that 'apt-get install lxc' has to load all appropriate
  apparmor profiles to allow starting containers w/o profile reloading /
  rebooting.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1432683

Title:
  apt-get install lxc doesn't load required apparmor profiles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1432683/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1432683] [NEW] apt-get install lxc doesn't load required apparmor profiles

2015-03-16 Thread Oleg Strikov
Public bug reported:

I'm trying to use LXC on my openstack instance which runs vivid daily:

$ sudo apt-get install lxc -y

$ sudo lxc-create -t ubuntu-cloud --name=vivid -- --flush-cache
--stream=daily --release=vivid

$ sudo lxc-start --name vivid --logfile=lxc.log
lxc-start: lxc_start.c: main: 344 The container failed to start.
lxc-start: lxc_start.c: main: 346 To get more details, run the container in 
foreground mode.
lxc-start: lxc_start.c: main: 348 Additional information can be obtained by 
setting the --logfile and --logpriority options.

In the log file (lxc.log) I observe the following error:
lxc-start 1426516387.814 ERRORlxc_apparmor - 
lsm/apparmor.c:apparmor_process_label_set:183 - No such file or directory - 
failed to change apparmor profile to lxc-container-default

This profile *exists* under /etc/apparmor.d/lxc/lxc-default but was not
loaded appropriately.

This issue disappears if I:
(a) reload apparmor profile manually: sudo /etc/init.d/apparmor reload
or
(b) reboot the instance

I'd expect that 'apt-get install lxc' has to load all appropriate
apparmor profiles to allow starting containers w/o profile reloading /
rebooting.

** Affects: lxc (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  I'm trying to use LXC on my openstack instance which runs vivid daily:
  
  $ sudo apt-get install lxc -y
  
  $ sudo lxc-create -t ubuntu-cloud --name=vivid -- --flush-cache
  --stream=daily --release=vivid
  
  $ sudo lxc-start --name vivid --logfile=lxc.log
  lxc-start: lxc_start.c: main: 344 The container failed to start.
  lxc-start: lxc_start.c: main: 346 To get more details, run the container in 
foreground mode.
  lxc-start: lxc_start.c: main: 348 Additional information can be obtained by 
setting the --logfile and --logpriority options.
  
  In the log file (lxc.log) I observe the following error:
  lxc-start 1426516387.814 ERRORlxc_apparmor - 
lsm/apparmor.c:apparmor_process_label_set:183 - No such file or directory - 
failed to change apparmor profile to lxc-container-default
  
  This profile *exists* under /etc/apparmor.d/lxc/lxc-default but was not
  loaded appropriately.
  
  This issue disappears if I:
  (a) reload apparmor profile manually: sudo /etc/init.d/apparmor reload
  or
  (b) reboot the instance
  
- I'd expert that 'apt-get install lxc' has to load all appropriate
+ I'd expect that 'apt-get install lxc' has to load all appropriate
  apparmor profiles to allow starting containers w/o profile reloading /
  rebooting.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432683

Title:
  apt-get install lxc doesn't load required apparmor profiles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1432683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
Thanks for pointing that.
Done.

** Patch added: lp-1424508-proposed-1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335313/+files/lp-1424508-proposed-1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
Thanks for pointing that.
Done.

** Patch added: lp-1424508-proposed-1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335313/+files/lp-1424508-proposed-1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1426460] Re: [MIR] dns-root-data

2015-03-05 Thread Oleg Strikov
Hi Michael,

Thanks for your comments and your point abount inconsistency in the MIR 
decription.
It seems to me that you read between the lines and got me correctly.
But to avoid any other confusion I want to tell the whole story about config 
options.

(1) by default dnssec is disabled and no anchors are needed at all

(2) to enable dnssec capability in dnsmasq you need to put 'dnssec'
option into /etc/dnsmasq.conf

If you have dnssec enabled you have two options:

(1) if dns-root-data package is installed -- dnsmasq uses its anchors
automatically:

/etc/init.d/dnsmasq:
...
# If the dns-root-data package is installed, then the trust anchors will be 
# available in $ROOT_DS, in BIND zone-file format. Reformat as dnsmasq
# --trust-anchor options.

ROOT_DS=/usr/share/dns/root.ds

if [ -f $ROOT_DS ]; then
   DNSMASQ_OPTS=$DNSMASQ_OPTS `sed -e s/. IN DS /--trust-anchor=.,/ -e s/ 
/,/g $ROOT_DS | tr '\n' ' '`
fi
...

(2) if dns-root-data package is not installed but 'dnssec' option is
enabled -- you'll get an error:

dnsmasq[2623]: No trust anchors provided for DNSSEC

To deal with this error you need to put the following line into 
/etc/dnsmasq.conf as well:
conf-file=/usr/share/dnsmasq-base/trust-anchors.conf
By putting this line into config we force dnsmasq to use its own anchors which 
are installed by dnsmasq-base package.
You may put a path to your own anchors as well.

Bottom line:
We can live without dns-root-data installed.
It's just a good way to centralize important security data in one place which 
might be useful.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426460

Title:
  [MIR] dns-root-data

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dns-root-data/+bug/1426460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
I prepared debdiff for vivid-release (attached) and currently looking
for sponsorship.

** Patch added: lp-1424508-released.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335137/+files/lp-1424508-released.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1336742] Re: Caching responses with Vary header

2015-03-05 Thread Oleg Strikov
Updated package has been pushed to vivid-proposed.
Feel free to try it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336742

Title:
  Caching responses with Vary header

To manage notifications about this bug go to:
https://bugs.launchpad.net/squid/+bug/1336742/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
I prepared debdiff for vivid-proposed (attached) and currently looking
for sponsorship.

** Patch added: lp-1424508-proposed.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335136/+files/lp-1424508-proposed.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
I prepared debdiff for vivid-release (attached) and currently looking
for sponsorship.

** Patch added: lp-1424508-released.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335137/+files/lp-1424508-released.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
I prepared debdiff for vivid-proposed (attached) and currently looking
for sponsorship.

** Patch added: lp-1424508-proposed.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+attachment/4335136/+files/lp-1424508-proposed.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1336742] Re: Caching responses with Vary header

2015-03-05 Thread Oleg Strikov
Updated package has been pushed to vivid-proposed.
Feel free to try it.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1336742

Title:
  Caching responses with Vary header

To manage notifications about this bug go to:
https://bugs.launchpad.net/squid/+bug/1336742/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
My reprocase can be found here: http://paste.ubuntu.com/10538557/

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1424508] Re: upstartism in the maintainer script

2015-03-05 Thread Oleg Strikov
My reprocase can be found here: http://paste.ubuntu.com/10538557/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1424508

Title:
  upstartism in the maintainer script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1424508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1336742] Re: Caching responses with Vary header

2015-03-04 Thread Oleg Strikov
I prepared a debdiff for vivid (attached) and currently looking for sponsorship.
My repro case can be found here: http://pastebin.ubuntu.com/10527246/

** Patch added: lp-1336742-vivid.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1336742/+attachment/4334428/+files/lp-1336742-vivid.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1336742

Title:
  Caching responses with Vary header

To manage notifications about this bug go to:
https://bugs.launchpad.net/squid/+bug/1336742/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1336742] Re: Caching responses with Vary header

2015-03-04 Thread Oleg Strikov
I prepared a debdiff for vivid (attached) and currently looking for sponsorship.
My repro case can be found here: http://pastebin.ubuntu.com/10527246/

** Patch added: lp-1336742-vivid.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1336742/+attachment/4334428/+files/lp-1336742-vivid.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336742

Title:
  Caching responses with Vary header

To manage notifications about this bug go to:
https://bugs.launchpad.net/squid/+bug/1336742/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1416039] Re: Broken apparmor profile

2015-03-03 Thread Oleg Strikov
Hi Jacek,

Thanks for reporting the bug and providing us with the fix.
I prepared a debdiff (attached) and will be looking for sponsorship.

** Patch added: lp-1416039.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+attachment/4333549/+files/lp-1416039.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1416039

Title:
  Broken apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1416039] Re: Broken apparmor profile

2015-03-03 Thread Oleg Strikov
Hi Jacek,

Thanks for reporting the bug and providing us with the fix.
I prepared a debdiff (attached) and will be looking for sponsorship.

** Patch added: lp-1416039.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+attachment/4333549/+files/lp-1416039.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1416039

Title:
  Broken apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1416039] Re: Broken apparmor profile

2015-03-03 Thread Oleg Strikov
** Changed in: squid3 (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1416039

Title:
  Broken apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1416039] Re: Broken apparmor profile

2015-03-03 Thread Oleg Strikov
** Changed in: squid3 (Ubuntu)
 Assignee: (unassigned) = Oleg Strikov (strikov)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1416039

Title:
  Broken apparmor profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid3/+bug/1416039/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1426460] Re: [MIR] dns-root-data

2015-02-27 Thread Oleg Strikov
** Description changed:

  Package provides centralized version of DNS root data including root zone and 
DNSSEC key
  Package provides information available at https://data.iana.org/root-anchors/ 
and http://www.internic.net/domain/named.root together with some derived bytes
  This is data-only package: 
http://packages.ubuntu.com/vivid/all/dns-root-data/filelist
  
  == Availability ==
  In universe
  
  == Rationale ==
  New dependency (recommends) for dnsmasq-base
- If dns-root-data package is installed dnsmasq uses /usr/share/dns/root.ds 
provided by this package as --trust-anchor
- If dns-root-data package is not installed dnsmasq uses its own trust anchor 
stored inside /usr/share/dnsmasq/trust-anchors.conf
+ 
+ Dnsmasq doesn't provide DNSSEC functionality by default but if you
+ enable it via /etc/dnsmasq.conf you have two options:
+ 
+ If dns-root-data package is installed dnsmasq uses
+ /usr/share/dns/root.ds provided by this package as --trust-anchor
+ 
+ If dns-root-data package is not installed -- you need to uncomment
+ 'conf-file=/usr/share/dnsmasq/trust-anchors.conf' line in
+ /etc/dnsmasq.conf to ask dnsmasq to use its own trust anchor stored
+ inside /usr/share/dnsmasq/trust-anchors.conf
+ 
  Right now both anchors are the same.
  
  It means that we have two options:
  (a) drop 'recommends' to 'suggests' -- dnsmasq will use its own trust-anchor 
all the time
  (b) include dns-root-data into main and keep it 'recommends'
  
  While (a) is simpler, there are some arguments for (b) as well:
  (1) some other packages may start using dns-root-data in the near future (see 
bug opened for bind9: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760459)
  (2) when and if dnssec keys will be changed it's much simpler to update them 
in a single place than to provide deltas to all depending packages
- 
+ 
  I would appreciate any input on which option to choose.
  
  == Security ==
  No CVE's found:
  http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=dns-root-data
  http://secunia.com/advisories/search/?search=dns-root-data
  http://people.canonical.com/~ubuntu-security/cve/universe.html
  
  Package is about public keys / certificates used to verify validity of DNSSEC 
signatures.
  Special attention of security team might be needed.
  
  == QA ==
  Package works out of the box (data-only package) with no prompting
  
  There is no major bugs in Ubuntu:
  https://launchpad.net/ubuntu/+source/dns-root-data/+bugs
  
- There is no major bugs in Debian (just a single wishlist bug): 
+ There is no major bugs in Debian (just a single wishlist bug):
  https://bugs.debian.org/cgi-bin/pkgreport.cgi?package=dns-root-data
  
  No testsuite provided (seems to be okay for data-only package)
  
  The package is maintained well in Debian by Ondřej Surý:
  https://packages.qa.debian.org/d/dns-root-data.html
  
  The package provides debian/README.source
  
  == Dependencies ==
  Package has no dependencies
  
  == Standards Compliance ==
  FHS compliant
  Debian Policy compliant (package is compliant to Debian Policy 3.9.5 not the 
latest 3.9.6)
  
  == Maintenance ==
  Can be synced with Debian
  Server team will own the package

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426460

Title:
  [MIR] dns-root-data

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dns-root-data/+bug/1426460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1426460] [NEW] [MIR] dns-root-data

2015-02-27 Thread Oleg Strikov
Public bug reported:

Package provides centralized version of DNS root data including root zone and 
DNSSEC key
Package provides information available at https://data.iana.org/root-anchors/ 
and http://www.internic.net/domain/named.root together with some derived bytes
This is data-only package: 
http://packages.ubuntu.com/vivid/all/dns-root-data/filelist

== Availability ==
In universe

== Rationale ==
New dependency (recommends) for dnsmasq-base
If dns-root-data package is installed dnsmasq uses /usr/share/dns/root.ds 
provided by this package as --trust-anchor
If dns-root-data package is not installed dnsmasq uses its own trust anchor 
stored inside /usr/share/dnsmasq/trust-anchors.conf
Right now both anchors are the same.

It means that we have two options:
(a) drop 'recommends' to 'suggests' -- dnsmasq will use its own trust-anchor 
all the time
(b) include dns-root-data into main and keep it 'recommends'

While (a) is simpler, there are some arguments for (b) as well:
(1) some other packages may start using dns-root-data in the near future (see 
bug opened for bind9: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760459)
(2) when and if dnssec keys will be changed it's much simpler to update them in 
a single place than to provide deltas to all depending packages

I would appreciate any input on which option to choose.

== Security ==
No CVE's found:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=dns-root-data
http://secunia.com/advisories/search/?search=dns-root-data
http://people.canonical.com/~ubuntu-security/cve/universe.html

Package is about public keys / certificates used to verify validity of DNSSEC 
signatures.
Special attention of security team might be needed.

== QA ==
Package works out of the box (data-only package) with no prompting

There is no major bugs in Ubuntu:
https://launchpad.net/ubuntu/+source/dns-root-data/+bugs

There is no major bugs in Debian (just a single wishlist bug): 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?package=dns-root-data

No testsuite provided (seems to be okay for data-only package)

The package is maintained well in Debian by Ondřej Surý:
https://packages.qa.debian.org/d/dns-root-data.html

The package provides debian/README.source

== Dependencies ==
Package has no dependencies

== Standards Compliance ==
FHS compliant
Debian Policy compliant (package is compliant to Debian Policy 3.9.5 not the 
latest 3.9.6)

== Maintenance ==
Can be synced with Debian
Server team will own the package

** Affects: dns-root-data (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426460

Title:
  [MIR] dns-root-data

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dns-root-data/+bug/1426460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1379062] Re: Graphics problem in Virtualbox

2015-02-24 Thread Oleg Strikov
Just FYI. This bug affects regular Ubuntu 15.04 as well (daily-live
20150224).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379062

Title:
  Graphics problem in Virtualbox

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1379062/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1316579] [NEW] --upload-tools doesn't work with bootstrap on armhf machine managed by maas

2014-05-06 Thread Oleg Strikov
Public bug reported:

ubuntu@mw01-02:~$ juju --version
1.18.1-trusty-armhf

ubuntu@mw01-02:~$ uname -a
Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux

ubuntu@mw01-02:~$ cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS

ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug

2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf

I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
What I'm doing wrong?
Thanks

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

+ ubuntu@mw01-02:~$ uname -a
+ Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux
+ 
+ ubuntu@mw01-02:~$ cat /etc/lsb-release 
+ DISTRIB_ID=Ubuntu
+ DISTRIB_RELEASE=14.04
+ DISTRIB_CODENAME=trusty
+ DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS
+ 
  ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug
  
  2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
  2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf
  
  I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
  What I'm doing wrong?
  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1316579

Title:
  --upload-tools doesn't work with bootstrap on armhf machine managed by
  maas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316579/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1316582] [NEW] juju command spontaneously hangs/crashes while running on armhf

2014-05-06 Thread Oleg Strikov
Public bug reported:

ubuntu@mw01-02:~$ juju --version
1.18.1-trusty-armhf

ubuntu@mw01-02:~$ uname -a
Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux

ubuntu@mw01-02:~$ cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS

ubuntu@mw01-02:~$ juju bootstrap --constraints arch=armhf --debug
...
Running apt-get update
Installing package: git
Installing package: curl
Installing package: cpu-checker
Installing package: bridge-utils
Installing package: rsyslog-gnutls
Installing package: juju-mongodb
Fetching tools: curl -sSfw 'tools from %{url_effective} downloaded: HTTP 
%{http_code}; time %{time_total}s; size %{size_download} bytes; speed 
%{speed_download} bytes/s ' -o $bin/tools.tar.gz 
'https://streams.canonical.com/juju/tools/releases/juju-1.18.2-trusty-armhf.tgz'
Starting MongoDB server (juju-db)
Bootstrapping Juju machine agent
Starting Juju machine agent (jujud-machine-0)
2014-05-06 11:15:50 INFO juju.cmd supercommand.go:306 command finished
HANGS

ubuntu@mw01-02:~$ juju status
environment: maas
machines:
  0:
agent-state: started
agent-version: 1.18.2
dns-name: mw01-04.1ss
instance-id: /MAAS/api/1.0/nodes/node-8cd85c4e-d062-11e3-bdfd-000173020cf5/
series: trusty
services:
  mysql:
charm: local:trusty/mysql-311
exposed: false
relations:
  cluster:
  - mysql
units:
  mysql/0:
agent-state: started
agent-version: 1.18.2
machine: 0
public-address: mw01-04.1ss
  wordpress:
charm: local:trusty/wordpress-93
exposed: false
relations:
  loadbalancer:
  - wordpress
units:
  wordpress/0:
agent-state: pending
agent-version: 1.18.2
machine: 0
public-address: mw01-04.1ss
HANGS

When application hangs I observe the following issue in ps:
ubuntu@mw01-02:~$ ps aux | grep juju
ubuntu9696 47.7  0.0  0 0 pts/0Zl+  12:11   3:38 [juju] 
defunct

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1316582

Title:
  juju command spontaneously hangs/crashes while running on armhf

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316582/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1316579] Re: --upload-tools doesn't work with bootstrap on armhf machine managed by maas

2014-05-06 Thread Oleg Strikov
** Description changed:

+ ubuntu@mw01-02:~$ juju --version
+ 1.18.1-trusty-armhf
+ 
  ubuntu@mw01-02:~$ uname -a
  Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux
  
- ubuntu@mw01-02:~$ cat /etc/lsb-release 
+ ubuntu@mw01-02:~$ cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=14.04
  DISTRIB_CODENAME=trusty
  DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS
  
  ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug
  
  2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
  2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf
  
  I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
  What I'm doing wrong?
  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1316579

Title:
  --upload-tools doesn't work with bootstrap on armhf machine managed by
  maas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316579/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1316579] [NEW] --upload-tools doesn't work with bootstrap on armhf machine managed by maas

2014-05-06 Thread Oleg Strikov
Public bug reported:

ubuntu@mw01-02:~$ juju --version
1.18.1-trusty-armhf

ubuntu@mw01-02:~$ uname -a
Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux

ubuntu@mw01-02:~$ cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS

ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug

2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf

I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
What I'm doing wrong?
Thanks

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

+ ubuntu@mw01-02:~$ uname -a
+ Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux
+ 
+ ubuntu@mw01-02:~$ cat /etc/lsb-release 
+ DISTRIB_ID=Ubuntu
+ DISTRIB_RELEASE=14.04
+ DISTRIB_CODENAME=trusty
+ DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS
+ 
  ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug
  
  2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
  2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf
  
  I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
  What I'm doing wrong?
  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316579

Title:
  --upload-tools doesn't work with bootstrap on armhf machine managed by
  maas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316579/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1316579] Re: --upload-tools doesn't work with bootstrap on armhf machine managed by maas

2014-05-06 Thread Oleg Strikov
** Description changed:

+ ubuntu@mw01-02:~$ juju --version
+ 1.18.1-trusty-armhf
+ 
  ubuntu@mw01-02:~$ uname -a
  Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux
  
- ubuntu@mw01-02:~$ cat /etc/lsb-release 
+ ubuntu@mw01-02:~$ cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=14.04
  DISTRIB_CODENAME=trusty
  DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS
  
  ubuntu@mw01-02:~/juju$ juju bootstrap --constraints arch=armhf --upload-tools 
--debug
  
  2014-05-06 11:07:49 DEBUG juju.environs.simplestreams simplestreams.go:985 
metadata: {map[com.ubuntu.cloud:server:12.04:amd64:{precise 12.04 amd64   
map[20140408:0x114c2390 20140227:0x114c2780]} 
com.ubuntu.cloud:server:13.10:amd64:{saucy 13.10 amd64   
map[20140227:0x114c2ab0 20140410:0x114c2cf0]} 
com.ubuntu.cloud:server:14.04:amd64:{trusty 14.04 amd64   
map[20140416:0x114c2f60]}] map[crsn:map[euww1:map[region:eu-ams-1 
endpoint:https://eu-ams-1.api.joyentcloud.com] ussw1:map[region:us-sw-1 
endpoint:https://us-sw-1.api.joyentcloud.com] usww1:map[region:us-west-1 
endpoint:https://us-west-1.api.joyentcloud.com] usee1:map[region:us-east-1 
endpoint:https://us-east-1.api.joyentcloud.com]]] Thu, 17 Apr 2014 18:22:18 
+ products:1.0 com.ubuntu.cloud:released:joyent}
  2014-05-06 11:07:49 ERROR juju.cmd supercommand.go:300 environment maas of 
type maas does not support instances running on armhf
  
  I can successfully use juju with this maas/armhf installation if I don't pass 
'--upload-tools' flag to bootstrap.
  What I'm doing wrong?
  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316579

Title:
  --upload-tools doesn't work with bootstrap on armhf machine managed by
  maas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316579/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1316582] [NEW] juju command spontaneously hangs/crashes while running on armhf

2014-05-06 Thread Oleg Strikov
Public bug reported:

ubuntu@mw01-02:~$ juju --version
1.18.1-trusty-armhf

ubuntu@mw01-02:~$ uname -a
Linux mw01-02 3.13.0-24-generic-lpae #46-Ubuntu SMP Thu Apr 10 21:01:14 UTC 
2014 armv7l armv7l armv7l GNU/Linux

ubuntu@mw01-02:~$ cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION=Ubuntu 14.04 LTS

ubuntu@mw01-02:~$ juju bootstrap --constraints arch=armhf --debug
...
Running apt-get update
Installing package: git
Installing package: curl
Installing package: cpu-checker
Installing package: bridge-utils
Installing package: rsyslog-gnutls
Installing package: juju-mongodb
Fetching tools: curl -sSfw 'tools from %{url_effective} downloaded: HTTP 
%{http_code}; time %{time_total}s; size %{size_download} bytes; speed 
%{speed_download} bytes/s ' -o $bin/tools.tar.gz 
'https://streams.canonical.com/juju/tools/releases/juju-1.18.2-trusty-armhf.tgz'
Starting MongoDB server (juju-db)
Bootstrapping Juju machine agent
Starting Juju machine agent (jujud-machine-0)
2014-05-06 11:15:50 INFO juju.cmd supercommand.go:306 command finished
HANGS

ubuntu@mw01-02:~$ juju status
environment: maas
machines:
  0:
agent-state: started
agent-version: 1.18.2
dns-name: mw01-04.1ss
instance-id: /MAAS/api/1.0/nodes/node-8cd85c4e-d062-11e3-bdfd-000173020cf5/
series: trusty
services:
  mysql:
charm: local:trusty/mysql-311
exposed: false
relations:
  cluster:
  - mysql
units:
  mysql/0:
agent-state: started
agent-version: 1.18.2
machine: 0
public-address: mw01-04.1ss
  wordpress:
charm: local:trusty/wordpress-93
exposed: false
relations:
  loadbalancer:
  - wordpress
units:
  wordpress/0:
agent-state: pending
agent-version: 1.18.2
machine: 0
public-address: mw01-04.1ss
HANGS

When application hangs I observe the following issue in ps:
ubuntu@mw01-02:~$ ps aux | grep juju
ubuntu9696 47.7  0.0  0 0 pts/0Zl+  12:11   3:38 [juju] 
defunct

** Affects: juju-core (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316582

Title:
  juju command spontaneously hangs/crashes while running on armhf

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1316582/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1301516] [NEW] apparmor prevents libvirt from running qemu-system-aarch64

2014-04-02 Thread Oleg Strikov
Public bug reported:

While trying to run openstack-nova/libvirt on arm64 machine we got the
following error:

libvirtd.log
2014-04-02 16:08:11.140+: 1227: error : qemuProcessWaitForMonitor:1915 : 
internal error: process exited while connecting to monitor: libvirt:  error : 
cannot execute binary /usr/bin/qemu-system-aarch64: Permission denied

/var/log/kern.log
Apr  2 12:34:57 ms01a kernel: [ 2133.890335] type=1400 
audit(1396456497.933:59): apparmor=DENIED operation=exec 
profile=libvirt-be2523fd-4c0a-43f0-afa9-c46122f2cf81 
name=/usr/bin/qemu-system-aarch64 pid=6241 comm=libvirtd requested_mask=x 
denied_mask=x fsuid=111 ouid=0

AppArmor prevents libvirtd from running qemu-system-aarch64 because this binary 
name is not listed in:
/etc/apparmor.d/abstractions/libvirt-qemu
  ...
  # the various binaries
  /usr/bin/kvm rmix,
  /usr/bin/qemu rmix,
  /usr/bin/qemu-system-arm rmix,
  /usr/bin/qemu-system-cris rmix,
  /usr/bin/qemu-system-i386 rmix,
  ...

The following patch fixes the issue:
--- libvirt-1.2.2-0/debian/apparmor/libvirt-qemu2014-04-02 
12:51:03.013539000 -0400
+++ libvirt-1.2.2/debian/apparmor/libvirt-qemu  2014-04-02 12:54:18.653539000 
-0400
@@ -83,6 +83,7 @@
   /usr/bin/kvm rmix,
   /usr/bin/qemu rmix,
   /usr/bin/qemu-system-arm rmix,
+  /usr/bin/qemu-system-aarch64 rmix,
   /usr/bin/qemu-system-cris rmix,
   /usr/bin/qemu-system-i386 rmix,
   /usr/bin/qemu-system-m68k rmix,

** Affects: libvirt (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: hs-arm64

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/1301516

Title:
  apparmor prevents libvirt from running qemu-system-aarch64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1301516/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1301516] [NEW] apparmor prevents libvirt from running qemu-system-aarch64

2014-04-02 Thread Oleg Strikov
Public bug reported:

While trying to run openstack-nova/libvirt on arm64 machine we got the
following error:

libvirtd.log
2014-04-02 16:08:11.140+: 1227: error : qemuProcessWaitForMonitor:1915 : 
internal error: process exited while connecting to monitor: libvirt:  error : 
cannot execute binary /usr/bin/qemu-system-aarch64: Permission denied

/var/log/kern.log
Apr  2 12:34:57 ms01a kernel: [ 2133.890335] type=1400 
audit(1396456497.933:59): apparmor=DENIED operation=exec 
profile=libvirt-be2523fd-4c0a-43f0-afa9-c46122f2cf81 
name=/usr/bin/qemu-system-aarch64 pid=6241 comm=libvirtd requested_mask=x 
denied_mask=x fsuid=111 ouid=0

AppArmor prevents libvirtd from running qemu-system-aarch64 because this binary 
name is not listed in:
/etc/apparmor.d/abstractions/libvirt-qemu
  ...
  # the various binaries
  /usr/bin/kvm rmix,
  /usr/bin/qemu rmix,
  /usr/bin/qemu-system-arm rmix,
  /usr/bin/qemu-system-cris rmix,
  /usr/bin/qemu-system-i386 rmix,
  ...

The following patch fixes the issue:
--- libvirt-1.2.2-0/debian/apparmor/libvirt-qemu2014-04-02 
12:51:03.013539000 -0400
+++ libvirt-1.2.2/debian/apparmor/libvirt-qemu  2014-04-02 12:54:18.653539000 
-0400
@@ -83,6 +83,7 @@
   /usr/bin/kvm rmix,
   /usr/bin/qemu rmix,
   /usr/bin/qemu-system-arm rmix,
+  /usr/bin/qemu-system-aarch64 rmix,
   /usr/bin/qemu-system-cris rmix,
   /usr/bin/qemu-system-i386 rmix,
   /usr/bin/qemu-system-m68k rmix,

** Affects: libvirt (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: hs-arm64

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1301516

Title:
  apparmor prevents libvirt from running qemu-system-aarch64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1301516/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1298070] [NEW] Flash-kernel shouldn't raise any errors while running inside vm instance

2014-03-26 Thread Oleg Strikov
Public bug reported:

While running flash-kernel inside vm instance on armhf I get the
following error:

$ flash-kernel
Unsupported platform.
$ echo $?
1

This happens because dtb is not provided (we don't need it) and /proc/cpuinfo 
contains the following information:
Hardware: Dummy Virtual Machine
But we don't have description for this 'Dummy Virtual Machine' inside all.db.

This leads to a crash of curtin (ubuntu fast path installer) because it
checks the return code.

** Affects: flash-kernel (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

- While running flash-kernel inside vm instance I get the following error:
+ While running flash-kernel inside vm instance on armhf I get the
+ following error:
  
- $ flash-kernel 
+ $ flash-kernel
  Unsupported platform.
  $ echo $?
  1
  
  This happens because dtb is not provided (we don't need it) and /proc/cpuinfo 
contains the following information:
  Hardware  : Dummy Virtual Machine
  But we don't have description for this 'Dummy Virtual Machine' inside all.db.
  
  This leads to a crash of curtin (ubuntu fast path installer) because it
  checks the return code.

** Branch linked: lp:~strikov/flash-kernel/running-inside-vm-instance

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1298070

Title:
  Flash-kernel shouldn't raise any errors while running inside vm
  instance

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flash-kernel/+bug/1298070/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1298070] Re: Flash-kernel shouldn't raise any errors while running inside vm instance

2014-03-26 Thread Oleg Strikov
Proposed branch includes three no-op entries: for armhf, arm64 and ARMv8
fast model (all of them provide different entries in /proc/cpuinfo)

** Branch unlinked: lp:~strikov/flash-kernel/running-inside-vm-instance

** Branch linked: lp:~strikov/flash-kernel/running-inside-vm-instance-2

** Description changed:

- While running flash-kernel inside vm instance on armhf I get the
+ While running flash-kernel inside qemu instance on armhf I get the
  following error:
  
  $ flash-kernel
  Unsupported platform.
  $ echo $?
  1
  
  This happens because dtb is not provided (we don't need it) and /proc/cpuinfo 
contains the following information:
  Hardware  : Dummy Virtual Machine
  But we don't have description for this 'Dummy Virtual Machine' inside all.db.
  
  This leads to a crash of curtin (ubuntu fast path installer) because it
  checks the return code.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1298070

Title:
  Flash-kernel shouldn't raise any errors while running inside vm
  instance

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flash-kernel/+bug/1298070/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1287265] [NEW] Fixes required to run on trusty

2014-03-03 Thread Oleg Strikov
Public bug reported:

I had to do some source code changes to be able to run Horizon on trusty.
Here is a list of change in a form of error message followed by solution.
Can we update the package to be able to run it just from the box?

===

File /usr/lib/python2.7/dist-packages/openstack_auth/urls.py, line 14, in 
module
 from django.conf.urls.defaults import patterns, url
ImportError: No module named defaults

===

/usr/share/pyshared/openstack_auth/urls.py:
- from django.conf.urls.defaults import patterns, url
+ from django.conf.urls import patterns, url

===

File 
/usr/share/openstack-dashboard/openstack_dashboard/wsgi/../../openstack_dashboard/api/__init__.py,
 line 36, in module
 from openstack_dashboard.api import base
 ImportError: cannot import name base

===

/usr/share/openstack-dashboard/openstack_dashboard/api/__init__.py

- from openstack_dashboard.api import base
- from openstack_dashboard.api import ceilometer
- from openstack_dashboard.api import cinder
- from openstack_dashboard.api import fwaas
- from openstack_dashboard.api import glance
- from openstack_dashboard.api import heat
- from openstack_dashboard.api import keystone
- from openstack_dashboard.api import lbaas
- from openstack_dashboard.api import network
- from openstack_dashboard.api import neutron
- from openstack_dashboard.api import nova
- from openstack_dashboard.api import swift
- from openstack_dashboard.api import trove
- from openstack_dashboard.api import vpn

+ import base
+ import ceilometer
+ import cinder
+ import fwaas
+ import glance
+ import heat
+ import keystone
+ import lbaas
+ import network
+ import neutron
+ import nova
+ import swift
+ import trove
+ import vpn

=

File 
/usr/share/openstack-dashboard/openstack_dashboard/wsgi/../../openstack_dashboard/api/trove.py,
 line 20, in module
 from troveclient.v1 import client
 ImportError: No module named v1

=

/usr/share/openstack-dashboard/openstack_dashboard/api/trove.py

- from troveclient.v1 import client
+ from troveclient import client

=
File /usr/lib/python2.7/dist-packages/django/contrib/auth/forms.py, line 175, 
in __init__
super(AuthenticationForm, self).__init__(*args, **kwargs)
TypeError: __init__() got multiple values for keyword argument 'data'

=

/usr/lib/python2.7/dist-packages/openstack_auth/forms.py:54
-super(Login, self).__init__(*args, **kwargs)
+super(Login, self).__init__(**kwargs)

** Affects: horizon (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  I had to do some source code changes to be able to run Horizon on trusty.
  Here is a list of change in a form of error message followed by solution.
  Can we update the package to be able to run it just from the box?
  
- 

+ 
===
  
- [Mon Mar 03 14:05:11.309641 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] Traceback (most recent call last):
- [Mon Mar 03 14:05:11.309705 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/wsgi.py, line 187, in 
__call__
- [Mon Mar 03 14:05:11.309970 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] self.load_middleware()
- [Mon Mar 03 14:05:11.310010 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/base.py, line 49, in 
load_middleware
- [Mon Mar 03 14:05:11.310344 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] mw_instance = mw_class()
- [Mon Mar 03 14:05:11.310384 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/middleware/locale.py, line 24, in 
__init__
- [Mon Mar 03 14:05:11.310579 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] for url_pattern in get_resolver(None).url_patterns:
- [Mon Mar 03 14:05:11.310633 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/urlresolvers.py, line 346, in 
url_patterns
- [Mon Mar 03 

[Bug 1287265] [NEW] Fixes required to run on trusty

2014-03-03 Thread Oleg Strikov
Public bug reported:

I had to do some source code changes to be able to run Horizon on trusty.
Here is a list of change in a form of error message followed by solution.
Can we update the package to be able to run it just from the box?

===

File /usr/lib/python2.7/dist-packages/openstack_auth/urls.py, line 14, in 
module
 from django.conf.urls.defaults import patterns, url
ImportError: No module named defaults

===

/usr/share/pyshared/openstack_auth/urls.py:
- from django.conf.urls.defaults import patterns, url
+ from django.conf.urls import patterns, url

===

File 
/usr/share/openstack-dashboard/openstack_dashboard/wsgi/../../openstack_dashboard/api/__init__.py,
 line 36, in module
 from openstack_dashboard.api import base
 ImportError: cannot import name base

===

/usr/share/openstack-dashboard/openstack_dashboard/api/__init__.py

- from openstack_dashboard.api import base
- from openstack_dashboard.api import ceilometer
- from openstack_dashboard.api import cinder
- from openstack_dashboard.api import fwaas
- from openstack_dashboard.api import glance
- from openstack_dashboard.api import heat
- from openstack_dashboard.api import keystone
- from openstack_dashboard.api import lbaas
- from openstack_dashboard.api import network
- from openstack_dashboard.api import neutron
- from openstack_dashboard.api import nova
- from openstack_dashboard.api import swift
- from openstack_dashboard.api import trove
- from openstack_dashboard.api import vpn

+ import base
+ import ceilometer
+ import cinder
+ import fwaas
+ import glance
+ import heat
+ import keystone
+ import lbaas
+ import network
+ import neutron
+ import nova
+ import swift
+ import trove
+ import vpn

=

File 
/usr/share/openstack-dashboard/openstack_dashboard/wsgi/../../openstack_dashboard/api/trove.py,
 line 20, in module
 from troveclient.v1 import client
 ImportError: No module named v1

=

/usr/share/openstack-dashboard/openstack_dashboard/api/trove.py

- from troveclient.v1 import client
+ from troveclient import client

=
File /usr/lib/python2.7/dist-packages/django/contrib/auth/forms.py, line 175, 
in __init__
super(AuthenticationForm, self).__init__(*args, **kwargs)
TypeError: __init__() got multiple values for keyword argument 'data'

=

/usr/lib/python2.7/dist-packages/openstack_auth/forms.py:54
-super(Login, self).__init__(*args, **kwargs)
+super(Login, self).__init__(**kwargs)

** Affects: horizon (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  I had to do some source code changes to be able to run Horizon on trusty.
  Here is a list of change in a form of error message followed by solution.
  Can we update the package to be able to run it just from the box?
  
- 

+ 
===
  
- [Mon Mar 03 14:05:11.309641 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] Traceback (most recent call last):
- [Mon Mar 03 14:05:11.309705 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/wsgi.py, line 187, in 
__call__
- [Mon Mar 03 14:05:11.309970 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] self.load_middleware()
- [Mon Mar 03 14:05:11.310010 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/base.py, line 49, in 
load_middleware
- [Mon Mar 03 14:05:11.310344 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] mw_instance = mw_class()
- [Mon Mar 03 14:05:11.310384 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/middleware/locale.py, line 24, in 
__init__
- [Mon Mar 03 14:05:11.310579 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131] for url_pattern in get_resolver(None).url_patterns:
- [Mon Mar 03 14:05:11.310633 2014] [:error] [pid 2765:tid 3010790448] [remote 
10.229.37.209:30131]   File 
/usr/lib/python2.7/dist-packages/django/core/urlresolvers.py, line 346, in 
url_patterns
- [Mon Mar 03 

[Bug 1266677] Re: Doesn't parse cpu model for arm64

2014-01-10 Thread Oleg Strikov
Just to make bug description a bit more precise -- qemu doesn't require '-mcpu' 
to run. Right now our virtual machines work fine without it [1].
We may need to fix this issue because we want to pass cpu_mode=host-passthrough 
to nova. This flag tells nova/libvirt forces nova to see which cpu model is 
available on host and use the same for the guest. And with this flag libvirt 
crashes the way Ming posted.
Important fact is that this functionality is not available in libvirt for both 
arm32 (!) and arm64. We may want to continue to use cpu_mode=none then. We need 
to discuss it more next week.

1:
/usr/local/bin/qemu-system-aarch64 -name instance-0117 -S -machine 
virt,accel=kvm,usb=off -m 2000 -realtime mlock=off -smp 
1,sockets=1,cores=1,threads=1 -cpu host -uuid 
60468654-eaf4-423f-a823-296cb0f30342 -nographic -no-user-config -nodefaults 
-chardev 
socket,id=charmonitor,path=/var/lib/libvirt/qemu/instance-0117.monitor,server,nowait
 -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc,driftfix=slew 
-no-shutdown -kernel 
/var/lib/nova/instances/60468654-eaf4-423f-a823-296cb0f30342/kernel -append 
root=/dev/vda console=tty0 console=ttyS0 console=ttyAMA0 rw -usb -drive 
file=/var/lib/nova/instances/60468654-eaf4-423f-a823-296cb0f30342/disk,if=none,id=drive-virtio-disk0,format=qcow2,cache=none
 -device 
virtio-blk-device,scsi=off,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1 
-netdev tap,fd=22,id=hostnet0 -device 
virtio-net-device,netdev=hostnet0,id=net0,mac=fa:16:3e:29:c0:f9 -serial 
file:/var/lib/nova/instances/60468654-eaf4-423f-a823-296cb0f30342/console.log 
-ser
 ial pty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1266677

Title:
  Doesn't parse cpu model for arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1266677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   >