[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-05-05 Thread Chris Glass
Indeed, it seems like the kernel linked above breaks dockerd.

dmesg with "general protection fault" and stacktrace. all docker
commands hang.

https://pastebin.ubuntu.com/p/VRbFSmPkPs/

:(

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-05-01 Thread Chris Glass
Perfect, no need to change tags anymore.

Now that at least 2 persons verified the bug is fixed with the -proposed
kernel, the SRU process will follow its course now and the fixed linux
will land in the archives in due time: there is a mandatory 7 days wait
time, so it should hit the archives next week, unless another fix rolled
in this SRU breaks something else (I hope not :) ).

Thanks for your help!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-05-01 Thread Chris Glass
For all other subscribers to this bug, now is the time to help :)

Enable -proposed on affected systems:

$ echo "deb http://archive.ubuntu.com/ubuntu/ eoan-proposed main" >>
/etc/apt/source.list

Update apt sources:

$ apt update

Install the linux kernel (and friends) from -proposed:

$ sudo apt install linux-headers-5.3.0-52 linux-headers-5.3.0-52-generic
linux-image-5.3.0-52-generic linux-modules-5.3.0-52-generic linux-
modules-extra-5.3.0-52-generic

Remove or comment the -proposed line in /etc/apt

Reboot.

Verify that the bug if fixed (and that nothing else broke), then report
here :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-04-30 Thread Chris Glass
I can confirm that the problem is fix in the -proposed kernel
(5.3.0-52-generic).

Marking verification-done.

** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-04-29 Thread Chris Glass
Reverting the status of that bug to confirmed was a bit premature :)

My previous comment already mentions 5.3.0-51-generic not being fixed
(before it being marked fix commited).

>From IRC:

"we should get a eoan/linux kernel in -proposed at the latest by
tomorrow, when that happens an automated comment will be added to the
bug report"

So, when a package with the comited fix is available ("tomorrow") you
can test it again. 5.3.0-51.44 is not the version containing the patch,
however.

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872001] Re: 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0

2020-04-29 Thread Chris Glass
For the record, this still happens with the latest Eoan kernel
(5.3.0-51-generic).

[   68.285097] i915 :00:02.0: GPU HANG: ecode 9:0:0x, hang on rcs0
[   68.286107] i915 :00:02.0: Resetting rcs0 for hang on rcs0
[   76.301387] i915 :00:02.0: Resetting rcs0 for hang on rcs0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872001

Title:
  5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1872001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854872] Re: sru cloud-init (19.2.36 to 19.3.40) Xenial, Bionic, Disco, Eoan

2019-12-09 Thread Chris Glass
I have verified the SRU on our platform (Exoscale.com) for the
following:

- Xenial (19.3-41-gc4735dd3-0ubuntu1~16.04.1)
- Bionic (19.3-41-gc4735dd3-0ubuntu1~18.04.1)
- Disco (19.3-41-gc4735dd3-0ubuntu1~19.04.1)
- Eoan (19.3-41-gc4735dd3-0ubuntu1~19.10.1)

A branch to add a scripted sru template will be up for review soon to
make this process less manual in the future.

Thanks for all the good work!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854872

Title:
  sru cloud-init (19.2.36 to 19.3.40) Xenial, Bionic, Disco, Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1854872/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1759519] Re: [SRU] Ensure "minimal" images have "minimal" in their /etc/cloud/build.info

2018-03-28 Thread Chris Glass
** Branch linked: lp:~tribaal/livecd-rootfs/xenial-proposed-build-info-
minimal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1759519

Title:
  [SRU] Ensure "minimal" images have "minimal" in their
  /etc/cloud/build.info

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1759519/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1759519] [NEW] [SRU] Ensure "minimal" images have "minimal" in their /etc/cloud/build.info

2018-03-28 Thread Chris Glass
Public bug reported:

This is a backport to xenial for changes landed in bionic in
https://code.launchpad.net/~tribaal/livecd-rootfs/trunk-minimal-build-
info/+merge/342096

/etc/cloud/build.info is the file we write to the (image) disk where we
track build information. In the current state of things we hardcode
"server" in there as the build type, but should instead write "minimal"
for minimal builds.

[Impact]

 * Minimized images will have "minimal" in their /etc/cloud/build.info
file.

[Test Case]

 * No new autopkgtest was added, however, it is trivial to check the
produced image for the appropriate key.

[Regression Potential]

 * Since minimal images have not had an official release yet, none.

[Other Info]

(none)

** Affects: livecd-rootfs (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1759519

Title:
  [SRU] Ensure "minimal" images have "minimal" in their
  /etc/cloud/build.info

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1759519/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1754586] Re: [FFe request] Enable booting initrd-less with fallback

2018-03-09 Thread Chris Glass
It seems like I cannot link the branch for some reason.

It can be found here: https://code.launchpad.net/~ubuntu-core-
dev/grub/+git/ubuntu/+ref/feature/initrd-less-boot-with-fallback

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1754586

Title:
  [FFe request] Enable booting initrd-less with fallback

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1754586/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1754586] [NEW] [FFe request] Enable booting initrd-less with fallback

2018-03-09 Thread Chris Glass
Public bug reported:

The proposed change allows users to enable "initrd-less" boot for
kernels that support it, by setting the GRUB_FORCE_PARTUUID
configuration variable in /etc/default/grub.

In case the user sets the variable today, the initrd line will not be
written, and some kernels will boot this way (faster, usually, since
there is no IO involved to lift the initrd from disk. This is
particularly relevant to cloud images for example).

This change allows the GRUB_FORCE_PARTUUID to be set more agressively,
by providing a fallback mechanism: should the initrd-less boot fail,
grub will try booting the same kernel with an initrd. To achieve this we
set a flag in grubenv, that is then cleaned very early in the userspace
boot process.

The rest of the behavior does not change.

Users not using initrd-less boots are unaffected by this change.
Users currently using initrd-less boots will still boot - and get a new 
fallback in case the kernel they boot does not support initrd-less booting 
(when upgrading or changing kernel flavor for example).

Testing done:

- Booting with and without initrd on a kernel that supports it (in this 
particular case the -gcp kernel)
- Booting with and without initrd on a kernel that does *not* support it 
(ensuring the fallback works)
- Tried to test the case where userspace sets "next boot" but it looks like the 
feature allowing to do so regressed. This is independent of this FFe and will 
be the subject of another bugreport (it's mentioned here since tangentially 
relevant).

** Affects: grub2 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1754586

Title:
  [FFe request] Enable booting initrd-less with fallback

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1754586/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1656293] Re: OVF metadata for Ubuntu is wrong

2018-03-07 Thread Chris Glass
** Changed in: cloud-images
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1656293

Title:
  OVF metadata for Ubuntu is wrong

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1656293/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1752882] [NEW] Systemd sysv install fails with update-rc.d: error: unable to read /etc/init.d/enable

2018-03-02 Thread Chris Glass
Public bug reported:

The bionic builds of cloud images for one of our partners fails when
installing/enabling NTP in the image during livecdrootfs build:

+ chroot mountpoint_gce systemctl --root / enable ntp.service
Synchronizing state of ntp.service with SysV service script with 
/lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install --root=/ enable ntp
update-rc.d: error: unable to read /etc/init.d/enable

On Xnox's request I am filing a bug here and assigning to him.

Please let me know if you need further information.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1752882

Title:
  Systemd sysv install fails with update-rc.d: error: unable to read
  /etc/init.d/enable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1752882/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1456238] Re: Rewrite urls to mirror

2018-02-01 Thread Chris Glass
I have a preliminary solution to this working in ppa:tribaal/squid-deb-
proxy

Note that while it should improve the hit rate, it is also a little hard
to see it working since the existing squid logs mention the URL - not
the store ID.

Feedback welcome.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456238

Title:
  Rewrite urls to mirror

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid-deb-proxy/+bug/1456238/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1456238] Re: Rewrite urls to mirror

2018-01-28 Thread Chris Glass
** Branch linked: lp:~tribaal/squid-deb-proxy/add-store-id-program

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456238

Title:
  Rewrite urls to mirror

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid-deb-proxy/+bug/1456238/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1456238] Re: Rewrite urls to mirror

2018-01-28 Thread Chris Glass
I started working on a what I believe is a fix for this - using the
"store_id_program" configuration in squid, all known mirrors will be
remapped internally to the distribution's "main" mirror URL, and
therefore result in a cache hit no matter what the mirror used in the
apt configuration is.

Unknown mirrors (mirrors not listed in /usr/share/python-
apt/templates/*) will continue to behave as today.

** Changed in: squid-deb-proxy (Ubuntu)
   Status: Triaged => In Progress

** Changed in: squid-deb-proxy (Ubuntu)
     Assignee: (unassigned) => Chris Glass (tribaal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456238

Title:
  Rewrite urls to mirror

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid-deb-proxy/+bug/1456238/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1743378] Re: Please merge lowmem 1.45 (main) from Debian unstable (main)

2018-01-15 Thread Chris Glass
** Patch added: "debdiff_lowmem_debian_1.45_to_ubuntu_1.45.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lowmem/+bug/1743378/+attachment/5037338/+files/debdiff_lowmem_debian_1.45_to_ubuntu_1.45.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1743378

Title:
  Please merge lowmem 1.45 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lowmem/+bug/1743378/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1743378] Re: Please merge lowmem 1.45 (main) from Debian unstable (main)

2018-01-15 Thread Chris Glass
** Patch added: "debdiff_lowmem_ubuntu_1.44_to_ubuntu_1.45.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lowmem/+bug/1743378/+attachment/5037339/+files/debdiff_lowmem_ubuntu_1.44_to_ubuntu_1.45.debdiff

** Changed in: lowmem (Ubuntu)
 Assignee: Chris Glass (tribaal) => (unassigned)

** Changed in: lowmem (Ubuntu)
   Status: In Progress => Confirmed

** Description changed:

- Filing a merge bug to work on it myself.
+ Please merge lowmem 1.45 (main) from Debian unstable (main)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1743378

Title:
  Please merge lowmem 1.45 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lowmem/+bug/1743378/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1743378] [NEW] Please merge lowmem 1.45 (main) from Debian unstable (main)

2018-01-15 Thread Chris Glass
Public bug reported:

Please merge lowmem 1.45 (main) from Debian unstable (main)

** Affects: lowmem (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Changed in: lowmem (Ubuntu)
 Assignee: (unassigned) => Chris Glass (tribaal)

** Changed in: lowmem (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1743378

Title:
  Please merge lowmem 1.45 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lowmem/+bug/1743378/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-13 Thread Chris Glass
** Changed in: xenial-backports
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-13 Thread Chris Glass
This bug is now fixed in ubuntu/xenial64 v20180112.0.0.

Update your vagrant boxes:

vagrant box update
vagrant up
vagrant ssh

(notice you're "vagrant").

** Changed in: cloud-images/x-series
   Status: Fix Committed => Fix Released

** Changed in: cloud-images/trunk
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-12 Thread Chris Glass
Quick update:

We would normally respin an image build right now to put this to bed
once and for all, but since we're in the middle of the Meltdown/Spectre
crisis it's best to keep the build system available for security-related
work.

The vagrant image will be built and pushed along with the rest of the
images whenever the build system triggers next (so if security-work
needs a respin of cloud images the Vagrant box will be published as
well).

I'll update this bug and mark it fix released once and image is
available.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-11 Thread Chris Glass
** Changed in: cloud-images/x-series
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-11 Thread Chris Glass
The fix landed in the livecd-rootfs package, so expect to see the fix in
the ubuntu/xenial64 images very soon (next image build, or the one
after).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Looks like the failure there is due to the following commit in the linux
kernel:

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-
next.git/commit/?id=c6c70f4455d1eda91065e93cc4f7eddf4499b105

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #27 was good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #25 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #23 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #21 is bad

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #19 is bad.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #17 is bad

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #14 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel in #12 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
kernel in #10 is bad.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
kernel from #8 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
kernel from #6 is bad.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel from #4 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Kernel from #2 is good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1627931] Re: SHA256 checksum for ovf in xenial-server-cloudimg-amd64.ova has incorrect path

2018-01-08 Thread Chris Glass
** Changed in: cloud-images
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1627931

Title:
  SHA256 checksum for ovf in xenial-server-cloudimg-amd64.ova has
  incorrect path

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1627931/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] Re: Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Just tried with v4.15-rc7 from http://kernel.ubuntu.com/~kernel-
ppa/mainline/ and the problem persists.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1741887] [NEW] Kubernetes test suite fails on mainline kernel 4.11+

2018-01-08 Thread Chris Glass
Public bug reported:

The to-be-introduced 4.13 based kernel fails the kubernetes test suite
(https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/ci-
kubernetes-e2e-gce-ubuntudev2-k8sbeta-default/15?log#log)

After rough bisecting (using kernels from http://kernel.ubuntu.com
/~kernel-ppa/mainline/ ), it seems some kernel change introduced in 4.11
breaks those tests (4.10 is good, 4.11+ are bad. 4.11-rc* are bad).

The minimal reproducer (doesn't have to be on a cloud image - my bionic
desktop reproduces it just as well):

sudo apt install docker.io
sudo docker run -d gcr.io/kubernetes-e2e-test-images/hostexec-amd64:1.0
(note down returned hash)
sudo docker exec -it (first few chars of returned hash) /bin/sh
# (Inside the docker prompt)
timeout -t 1 cat

On kernels exhibiting the problem, the "timeout/cat" command above will
terminate the container.

On kernels exhibiting the problem, docker logs exhibits:

# sudo docker logs (first few chars of returned hash)
/bin/sh: can't open /fifo: Interrupted system call

Kernels that do not exhibit the problem will not terminate after the
"timeout" command and return to a normal command prompt.

** Affects: linux-gke (Ubuntu)
 Importance: High
 Assignee: Joseph Salisbury (jsalisbury)
 Status: In Progress


** Tags: performing-bisect

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741887

Title:
  Kubernetes test suite fails on mainline kernel 4.11+

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1741887/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-03 Thread Chris Glass
This is when you all can help: as you can see the proposed fix landed in
-proposed: if you know how, feel free to build images yourself using the
livecd-rootfs package in -proposed.

If you would still like to help testing the change but don't know how to
build images with livecd-rootfs, please give the following a try and
report if it behaves as you would expect. If you have automated test
infrastructures in place, it would help to plug this image in as well
and see how it fares.

vagrant init tribaal/xenial64
vagrant up

Note: the "tribaal/xenial64" box is obviously not a production image so
please don't treat it as such. Once the changes are verified and landed
in -updates, we will build a "real" xenial image with a vagrant user and
will update this bug when that happened.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2018-01-03 Thread Chris Glass
It seems those bugs are not affecting the xenial release. They are
however important to tackle/investigate.

The proposed SRU changes can be tested by using the "tribaal/xenial64"
image.

The SRU process can go ahead/restart as far as I can tell.

** Description changed:

  It is Vagrant convention that the default user is named "vagrant"[0],
  and a whole host of scripts assume this to be the default.
  
  The xenial box is substantially less useful to Vagrant users with the
  "ubuntu" user as the default.
  
  [0] Search for "user to SSH" in
  https://www.vagrantup.com/docs/boxes/base.html.
  
  
  
  Xenial SRU:
  
  [impact]
  
  * An additional "vagrant" user is available in the created image once
  the proposed patch is applied. The normal "ubuntu" user is also
  available, and is conforming to the "ubuntu experience" (it requires
  cloud-init or another mechanism to be given keys/a password).
  
  * The vagrant boxes produced by livecd-rootfs hooks do not conform to
  the vagrant community's guidelines for box creation, leading vagrant
  users to use non-official (unaudited) boxes instead, where a "vagrant"
  user can be found.
  
  * A large portion of vagrant automation (3rd party tools, scripts) rely
  on the presence of a "vagrant" user conforming to the above guidelines.
  The official ubuntu images are ones of the very few not conforming to
  the expected user layout.
  
  * The official Ubuntu trusty image previously offered a "vagrant" user,
  and that was lost or omitted when migrating xenial+ to a new build
  system. This could be considered a regression, although historical
  context of that change is unfortunately not available anymore.
  
  [test case]
  
  From a fresh Ubuntu install:
  
  * sudo apt install vagrant
  
  * vagrant init ubuntu/xenial64
  
  * vagrant up
  
  * vagrant ssh
  
  notice the user being logged in as is "ubuntu"
  
  With either ubuntu/artful64 or ubuntu/trusty64, the same steps log the
  user in as "vagrant".
  
+ An image with the proposed changes was built and uploaded as
+ "tribaal/xenial64".
+ 
  [Regression potential]
  
  * Users who worked around this behavior in their automation are the most
  at-risk. They might not be able to login to their boxes anymore, if they
  worked around by extracting the ubuntu password from the box metadata.
  If they worked around the problem using cloud-init, no regression will
  be visible.
  
  * The changes introduce a new insecure user, users having worked around
  the problem on their own might be be unaware of this.
  
  * The general consensus in the vagrant community is to install third-
  party boxes instead of spending time to try and workaround the problems
  with the official ubuntu boxes, so it is likely to be a limited real-
  world impact.
  
  * The change might affect exotic systems where people for some reason
  decided to build a non-vagrant machine out of our official vagrant image
  
  Note that these regressions will apply to users upgrading their
  installations to future releases (artful, bionic, and later).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1701132] Re: Please use xz instead of pxz

2017-12-14 Thread Chris Glass
Verified by building cloud images using the proposed package and
ensuring the resulting artifacts were satisfactory.

** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701132

Title:
  Please use xz instead of pxz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1701132/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1701132] Re: Please use xz instead of pxz

2017-12-14 Thread Chris Glass
(verified with 2.408.25)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701132

Title:
  Please use xz instead of pxz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1701132/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-14 Thread Chris Glass
** Description changed:

  It is Vagrant convention that the default user is named "vagrant"[0],
  and a whole host of scripts assume this to be the default.
  
  The xenial box is substantially less useful to Vagrant users with the
  "ubuntu" user as the default.
  
  [0] Search for "user to SSH" in
  https://www.vagrantup.com/docs/boxes/base.html.
  
  
  
  Xenial SRU:
  
  [impact]
  
+ * An additional "vagrant" user is available in the created image once
+ the proposed patch is applied. The normal "ubuntu" user is also
+ available, and is conforming to the "ubuntu experience" (it requires
+ cloud-init or another mechanism to be given keys/a password).
+ 
  * The vagrant boxes produced by livecd-rootfs hooks do not conform to
  the vagrant community's guidelines for box creation, leading vagrant
  users to use non-official (unaudited) boxes instead, where a "vagrant"
  user can be found.
  
  * A large portion of vagrant automation (3rd party tools, scripts) rely
  on the presence of a "vagrant" user conforming to the above guidelines.
  The official ubuntu images are ones of the very few not conforming to
  the expected user layout.
  
- * An additional "vagrant" user is available in the created image once
- the proposed patch is applied. The normal "ubuntu" user is also
- available, and is conforming to the "ubuntu experience" (it requires
- cloud-init or another mechanism to be given keys/a password).
+ * The official Ubuntu trusty image previously offered a "vagrant" user,
+ and that was lost or omitted when migrating xenial+ to a new build
+ system. This could be considered a regression, although historical
+ context of that change is unfortunately not available anymore.
  
  [test case]
  
  From a fresh Ubuntu install:
  
  * sudo apt install vagrant
  
  * vagrant init ubuntu/xenial64
  
  * vagrant up
  
  * vagrant ssh
  
  notice the user being logged in as is "ubuntu"
  
- With either ubuntu/artful64 or ubuntu/bionic64, the same steps log the
+ With either ubuntu/artful64 or ubuntu/trusty64, the same steps log the
  user in as "vagrant".
  
  [Regression potential]
  
  * Users who worked around this behavior in their automation are the most
  at-risk. They might not be able to login to their boxes anymore, if they
  worked around by extracting the ubuntu password from the box metadata.
  If they worked around the problem using cloud-init, no regression will
  be visible.
  
  * The changes introduce a new insecure user, users having worked around
  the problem on their own might be be unaware of this.
  
  * The general consensus in the vagrant community is to install third-
  party boxes instead of spending time to try and workaround the problems
  with the official ubuntu boxes, so it is likely to be a limited real-
  world impact.
  
  * The change might affect exotic systems where people for some reason
  decided to build a non-vagrant machine out of our official vagrant image
  
  Note that these regressions will apply to users upgrading their
  installations to future releases (artful, bionic, and later).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-13 Thread Chris Glass
Not yet.

This is currently in the sponsorship queue, so for those not familiar
with the procedure, point 6 in
https://wiki.ubuntu.com/StableReleaseUpdates#Procedure .

As you can see using "rmadison livecd-rootfs" another SRU for livecd-
rootfs is under way (for something unrelated to this bug), so we need to
wait for it to land or be rejected (the full SRU review queue is here
https://people.canonical.com/~ubuntu-archive/pending-sru.html).

Once the changes are uploaded to xenial-proposed, we will build a test
vagrant box for xenial, push it *somewhere* and let you all know.

Then we'll need your help!

The change won't move forward without your help testing it. You can
already contribute some useful testing today by using "ubuntu/artful64"
and checking that it behaves according to what you expect (and
commenting on this bug, even as simple as "ubuntu/artful64 works for
me").

So once it hits proposed we need people to test the box and report here
that it works for them, or not. This part is very important! Once it has
been verified (tested), then the SRU team will hopefully promote the
change, and once that lands the normal build process will publish new
vagrant boxes.

At this point you'll see the change appear in the boxes you use in your
normal vagrant workflow, and I'll mark the bug as "fix released".

This process takes time - and unfortunately the timing with end of year
holidays is not going to help, but it's under way :) Besides, changing
an LTS release of Ubuntu is slow "by design" - is allows for more
testing to occur, as nobody wants bad code to be sent to millions of
machines.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-11 Thread Chris Glass
** Description changed:

  It is Vagrant convention that the default user is named "vagrant"[0],
  and a whole host of scripts assume this to be the default.
  
  The xenial box is substantially less useful to Vagrant users with the
- "ubuntu" user as the default, and there is limited benefit to having the
- "ubuntu" user.
+ "ubuntu" user as the default.
  
  [0] Search for "user to SSH" in
  https://www.vagrantup.com/docs/boxes/base.html.
  
  
  
  Xenial SRU:
  
  [impact]
  
  * The vagrant boxes produced by livecd-rootfs hooks do not conform to
  the vagrant community's guidelines for box creation, leading vagrant
  users to use non-official (unaudited) boxes instead, where a "vagrant"
  user can be found.
  
  * A large portion of vagrant automation (3rd party tools, scripts) rely
  on the presence of a "vagrant" user conforming to the above guidelines.
  The official ubuntu images are ones of the very few not conforming to
  the expected user layout.
+ 
+ * An additional "vagrant" user is available in the created image once
+ the proposed patch is applied. The normal "ubuntu" user is also
+ available, and is conforming to the "ubuntu experience" (it requires
+ cloud-init or another mechanism to be given keys/a password).
  
  [test case]
  
  From a fresh Ubuntu install:
  
  * sudo apt install vagrant
  
  * vagrant init ubuntu/xenial64
  
  * vagrant up
  
  * vagrant ssh
  
  notice the user being logged in as is "ubuntu"
  
  With either ubuntu/artful64 or ubuntu/bionic64, the same steps log the
  user in as "vagrant".
  
  [Regression potential]
  
  * Users who worked around this behavior in their automation are the most
  at-risk. They might not be able to login to their boxes anymore, if they
  worked around by extracting the ubuntu password from the box metadata.
  If they worked around the problem using cloud-init, no regression will
  be visible.
  
  * The changes introduce a new insecure user, users having worked around
  the problem on their own might be be unaware of this.
  
  * The general consensus in the vagrant community is to install third-
  party boxes instead of spending time to try and workaround the problems
  with the official ubuntu boxes, so it is likely to be a limited real-
  world impact.
  
  * The change might affect exotic systems where people for some reason
  decided to build a non-vagrant machine out of our official vagrant image
  
  Note that these regressions will apply to users upgrading their
  installations to future releases (artful, bionic, and later).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-11 Thread Chris Glass
Clarified the description by the original bug author.

The proposed solution for SRUing does *not* drop the ubuntu@ user, and
the ubuntu user behaves exactly the same way as with every other cloud-
image we deliver.

There is an *additional* default user (the "vagrant" user), that
conforms to the community's expectations.

Please be kind enough to either keep the conversation civil and adhering
to the Ubuntu community's code of conduct, or refrain from making
further comments. The behavior is being changed, swearing and calling
names won't make it go any faster.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1258597] Re: Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.

2017-12-08 Thread Chris Glass
I've tried to reproduce this issue, unsuccessfully.

I remember being affect by it in the past, however. Could someone please
confirm:

- That it's still an issue on artful (17.10).
- What the current version of grub2 they using is, with the output of 
"apt-cache policy grub2; apt-cache policy grub2-common"
- Please share the contents of /etc/default/grub and /etc/default/grub.d/* (in 
a pastebin ideally, such as pastebin.ubuntu.com)

On my machine running artful (grub2-common 2.02~beta3-4ubuntu7), running
update-grub yields:

$ sudo update-grub
Generating grub configuration file ...
Found linux image: /boot/vmlinuz-4.13.0-19-generic
Found initrd image: /boot/initrd.img-4.13.0-19-generic
Found linux image: /boot/vmlinuz-4.13.0-17-generic
Found initrd image: /boot/initrd.img-4.13.0-17-generic
Found memtest86+ image: /memtest86+.elf
Found memtest86+ image: /memtest86+.bin
done

This looks like the desirable behavior. I would like to understand how
my machines are different here (I tried on 16.04, 17.04 and 17.10 on GCE
as well).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1258597

Title:
  Warning: Setting GRUB_TIMEOUT to a non-zero value when
  GRUB_HIDDEN_TIMEOUT is set is no longer supported.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1258597/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-07 Thread Chris Glass
** Branch linked: lp:~tribaal/livecd-rootfs/xenial-proposed-vagrant-
user-changes

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-07 Thread Chris Glass
Untargetting vagrant as the bug is not in vagrant at all but in the
image creation code instead (livecd-rootfs)

** Changed in: vagrant
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1569237] Re: vagrant xenial box is not provided with vagrant/vagrant username and password

2017-12-07 Thread Chris Glass
** Description changed:

  It is Vagrant convention that the default user is named "vagrant"[0],
  and a whole host of scripts assume this to be the default.
  
  The xenial box is substantially less useful to Vagrant users with the
  "ubuntu" user as the default, and there is limited benefit to having the
  "ubuntu" user.
  
+ [0] Search for "user to SSH" in
+ https://www.vagrantup.com/docs/boxes/base.html.
  
- [0] Search for "user to SSH" in 
https://www.vagrantup.com/docs/boxes/base.html.
+ 
+ 
+ Xenial SRU:
+ 
+ [impact]
+ 
+ * The vagrant boxes produced by livecd-rootfs hooks do not conform to
+ the vagrant community's guidelines for box creation, leading vagrant
+ users to use non-official (unaudited) boxes instead, where a "vagrant"
+ user can be found.
+ 
+ * A large portion of vagrant automation (3rd party tools, scripts) rely
+ on the presence of a "vagrant" user conforming to the above guidelines.
+ The official ubuntu images are ones of the very few not conforming to
+ the expected user layout.
+ 
+ [test case]
+ 
+ From a fresh Ubuntu install:
+ 
+ * sudo apt install vagrant
+ 
+ * vagrant init ubuntu/xenial64
+ 
+ * vagrant up
+ 
+ * vagrant ssh
+ 
+ notice the user being logged in as is "ubuntu"
+ 
+ With either ubuntu/artful64 or ubuntu/bionic64, the same steps log the
+ user in as "vagrant".
+ 
+ [Regression potential]
+ 
+ * Users who worked around this behavior in their automation are the most
+ at-risk. They might not be able to login to their boxes anymore, if they
+ worked around by extracting the ubuntu password from the box metadata.
+ If they worked around the problem using cloud-init, no regression will
+ be visible.
+ 
+ * The changes introduce a new insecure user, users having worked around
+ the problem on their own might be be unaware of this.
+ 
+ * The general consensus in the vagrant community is to install third-
+ party boxes instead of spending time to try and workaround the problems
+ with the official ubuntu boxes, so it is likely to be a limited real-
+ world impact.
+ 
+ * The change might affect exotic systems where people for some reason
+ decided to build a non-vagrant machine out of our official vagrant image
+ 
+ Note that these regressions will apply to users upgrading their
+ installations to future releases (artful, bionic, and later).

** Also affects: livecd-rootfs (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1569237

Title:
  vagrant xenial box is not provided with vagrant/vagrant username and
  password

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1569237/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-23 Thread Chris Glass
Built a minimized image with https://launchpad.net/ubuntu/+source
/livecd-rootfs/2.408.24 and could confirm that the changes are indeed
present and that the image boots and behaves normally.

Marking verified.

** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-16 Thread Chris Glass
This was fixed in bionic/devel in livecd-rootfs 2.482

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1716992] Re: ubuntu-cpc lacks common function to reverse setup_mountpoint

2017-11-16 Thread Chris Glass
I've successfully built new images with the livecd-rootfs in zesty-
proposed.

Marking verification-done.

** Tags removed: verification-needed-zesty
** Tags added: verification-done-zesty

** Tags removed: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1716992

Title:
  ubuntu-cpc lacks common function to reverse setup_mountpoint

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1716992/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-14 Thread Chris Glass
Regression potential section updated.

** Description changed:

- 
  [Impact]
  
   * Minimized images have their disk footprint further reduced with these
     changes.
   * Using minimal images can save bandwidth and system resources and we
     would like to make those improvements available for Xenial users,
     especially since most if not all of our minimized images users care
     mostly about LTS releases.
  
  [Test Case]
  
   * No new autopkgtest was added, however, an autopkgtest (minimized)
     was previously added to test building minimized images. The test logs show
     the generated image sizes for ubuntu-cpc images with and without
     minimization and the minimized images have to be smaller.
  
  [Regression Potential]
  
-  * The changes should not affect images which are not minimized. The
+  * If images rely on the presence of a populated /var/cache/apt, that
+functionality could now break (no such image is known).
+  * If images rely on /var/cache/debconf/*-old or /var/lib/dpkg/*-old files to
+be present, that functionality cloud now break (no such image is known).
+  * The package changes should not affect images which are not minimized. The
     minimized images in general may not boot on some systems. This is not a
-    regression however, that branch does not make the situation better or
+    regression however, this branch does not make the situation better or
     worse in this regard.
  
  [Other Info]
  
  (none)

** Description changed:

  [Impact]
  
   * Minimized images have their disk footprint further reduced with these
     changes.
   * Using minimal images can save bandwidth and system resources and we
     would like to make those improvements available for Xenial users,
     especially since most if not all of our minimized images users care
     mostly about LTS releases.
  
  [Test Case]
  
   * No new autopkgtest was added, however, an autopkgtest (minimized)
     was previously added to test building minimized images. The test logs show
     the generated image sizes for ubuntu-cpc images with and without
     minimization and the minimized images have to be smaller.
  
  [Regression Potential]
  
-  * If images rely on the presence of a populated /var/cache/apt, that
-functionality could now break (no such image is known).
-  * If images rely on /var/cache/debconf/*-old or /var/lib/dpkg/*-old files to
-be present, that functionality cloud now break (no such image is known).
+  * If images rely on the presence of a populated /var/cache/apt, that
+    functionality could now break (no such image is known). This is believed 
+to be a functionally "no-op" change.
+  * If images rely on /var/cache/debconf/*-old or /var/lib/dpkg/*-old files to
+    be present, that functionality cloud now break (no such image is known). 
+This is believed to be a functionally "no-op" change.
   * The package changes should not affect images which are not minimized. The
     minimized images in general may not boot on some systems. This is not a
     regression however, this branch does not make the situation better or
     worse in this regard.
  
  [Other Info]
  
  (none)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-13 Thread Chris Glass
** Description changed:

- PLEASE IGNORE UNTIL THIS MESSAGE IS REMOVED
- (Description incomplete for now - will complete before subscribing the sru 
team)
  
  [Impact]
  
   * Minimized images have their disk footprint further reduced with these
     changes.
   * Using minimal images can save bandwidth and system resources and we
-    would like to make those improvements available for Xenial users, 
-especially since most if not all of our minimized images users care 
-mostly about LTS releases.
+    would like to make those improvements available for Xenial users,
+    especially since most if not all of our minimized images users care
+    mostly about LTS releases.
  
  [Test Case]
  
   * No new autopkgtest was added, however, an autopkgtest (minimized)
     was previously added to test building minimized images. The test logs show
-    the generated image sizes for ubuntu-cpc images with and without 
-minimization and the minimized images have to be smaller.
+    the generated image sizes for ubuntu-cpc images with and without
+    minimization and the minimized images have to be smaller.
  
  [Regression Potential]
  
   * The changes should not affect images which are not minimized. The
     minimized images in general may not boot on some systems. This is not a
     regression however, that branch does not make the situation better or
     worse in this regard.
  
  [Other Info]
  
  (none)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-10 Thread Chris Glass
** Description changed:

  PLEASE IGNORE UNTIL THIS MESSAGE IS REMOVED
  (Description incomplete for now - will complete before subscribing the sru 
team)
  
  [Impact]
  
   * Minimized images have their disk footprint further reduced with these
     changes.
   * Using minimal images can save bandwidth and system resources and we
-    would like to make those improvements available for Xenial users, 
especially
-    since most if not all of our minimized images users care mostly about
-    LTS releases.
+    would like to make those improvements available for Xenial users, 
+especially since most if not all of our minimized images users care 
+mostly about LTS releases.
  
  [Test Case]
  
   * No new autopkgtest was added, however, an autopkgtest (minimized)
     was previously added to test building minimized images. The test logs show
-    the generated image sizes for ubuntu-cpc images with and without 
minimization and the minimized images have to be smaller.
+    the generated image sizes for ubuntu-cpc images with and without 
+minimization and the minimized images have to be smaller.
  
  [Regression Potential]
  
   * The changes should not affect images which are not minimized. The
     minimized images in general may not boot on some systems. This is not a
     regression however, that branch does not make the situation better or
     worse in this regard.
  
  [Other Info]
  
  (none)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] Re: [SRU] Release "minimized round 2" changes to Xenial

2017-11-10 Thread Chris Glass
** Description changed:

  PLEASE IGNORE UNTIL THIS MESSAGE IS REMOVED
  (Description incomplete for now - will complete before subscribing the sru 
team)
  
  [Impact]
  
-  * Minimized images have their disk footprint further reduced with these
-changes.
-  * Using minimal images can save bandwidth and system resources and we
-would like to make those improvements available for Xenial users, 
especially
-since most if not all of our minimized images users care mostly about
-LTS releases.
+  * Minimized images have their disk footprint further reduced with these
+    changes.
+  * Using minimal images can save bandwidth and system resources and we
+    would like to make those improvements available for Xenial users, 
especially
+    since most if not all of our minimized images users care mostly about
+    LTS releases.
  
  [Test Case]
  
-  * No new autopkgtest was added, however, a previously autopkgtest 
(minimized) 
-was previously added to test building minimized images. The test logs show
-the generated image sizes for ubuntu-cpc images with and without 
minimization
-and the minimized images have to be smaller.
+  * No new autopkgtest was added, however, an autopkgtest (minimized)
+    was previously added to test building minimized images. The test logs show
+    the generated image sizes for ubuntu-cpc images with and without 
minimization and the minimized images have to be smaller.
  
  [Regression Potential]
  
-  * The changes should not affect images which are not minimized. The
-minimized images in general may not boot on some systems. This is not a
-regression however, that branch does not make the situation better or
-worse in this regard.
+  * The changes should not affect images which are not minimized. The
+    minimized images in general may not boot on some systems. This is not a
+    regression however, that branch does not make the situation better or
+    worse in this regard.
  
  [Other Info]
  
  (none)

** Branch linked: lp:~tribaal/livecd-rootfs/xenial-proposed-minimized-
round-two

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731492] [NEW] [SRU] Release "minimized round 2" changes to Xenial

2017-11-10 Thread Chris Glass
Public bug reported:

PLEASE IGNORE UNTIL THIS MESSAGE IS REMOVED
(Description incomplete for now - will complete before subscribing the sru team)

[Impact]

 * Minimized images have their disk footprint further reduced with these
   changes.
 * Using minimal images can save bandwidth and system resources and we
   would like to make those improvements available for Xenial users, especially
   since most if not all of our minimized images users care mostly about
   LTS releases.

[Test Case]

 * No new autopkgtest was added, however, a previously autopkgtest (minimized) 
   was previously added to test building minimized images. The test logs show
   the generated image sizes for ubuntu-cpc images with and without minimization
   and the minimized images have to be smaller.

[Regression Potential]

 * The changes should not affect images which are not minimized. The
   minimized images in general may not boot on some systems. This is not a
   regression however, that branch does not make the situation better or
   worse in this regard.

[Other Info]

(none)

** Affects: livecd-rootfs (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731492

Title:
  [SRU] Release "minimized round 2" changes to Xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1731492/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731019] Re: gsutil tracebacks on artful with "ImportError: cannot import name json_format"

2017-11-08 Thread Chris Glass
Turns out I had rogue pacakges in /usr/local/lib/python2.7/dist-
pacakges.

Nothing to see here, moving along.

** Changed in: google-cloud-sdk (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731019

Title:
  gsutil tracebacks on artful with "ImportError: cannot import name
  json_format"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-cloud-sdk/+bug/1731019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731019] Re: gsutil tracebacks on artful with "ImportError: cannot import name json_format"

2017-11-08 Thread Chris Glass
Well, I can't reproduce it in a lxc either. I suppose that must be my
local environment being weird somehow.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731019

Title:
  gsutil tracebacks on artful with "ImportError: cannot import name
  json_format"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-cloud-sdk/+bug/1731019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1731019] [NEW] gsutil tracebacks on artful with "ImportError: cannot import name json_format"

2017-11-08 Thread Chris Glass
Public bug reported:

google-cloud-sdk 176.0.0-0ubuntu1 exits with a traceback on artful:

$ gsutil 
Traceback (most recent call last):
  File "/usr/bin/../lib/google-cloud-sdk/bin/bootstrapping/gsutil.py", line 12, 
in 
import bootstrapping
  File "/usr/lib/google-cloud-sdk/bin/bootstrapping/bootstrapping.py", line 22, 
in 
from googlecloudsdk.core.credentials import store as c_store
  File 
"/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/credentials/store.py", line 
27, in 
from googlecloudsdk.core import http
  File "/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/http.py", line 31, in 

from googlecloudsdk.core.resource import session_capturer
  File 
"/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/resource/session_capturer.py",
 line 31, in 
from googlecloudsdk.core.resource import yaml_printer
  File 
"/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/resource/yaml_printer.py", 
line 17, in 
from googlecloudsdk.core.resource import resource_printer_base
  File 
"/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/resource/resource_printer_base.py",
 line 38, in 
from googlecloudsdk.core.resource import resource_projector
  File 
"/usr/lib/google-cloud-sdk/lib/googlecloudsdk/core/resource/resource_projector.py",
 line 34, in 
from google.protobuf import json_format as protobuf_encoding
ImportError: cannot import name json_format

** Affects: google-cloud-sdk (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1731019

Title:
  gsutil tracebacks on artful with "ImportError: cannot import name
  json_format"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-cloud-sdk/+bug/1731019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1696663] Re: grub2-common: update-grub shows Warning because of bad /etc/default/grub

2017-10-24 Thread Chris Glass
*** This bug is a duplicate of bug 1258597 ***
https://bugs.launchpad.net/bugs/1258597

** This bug has been marked a duplicate of bug 1258597
   Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT 
is set is no longer supported.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1696663

Title:
  grub2-common: update-grub shows Warning because of bad
  /etc/default/grub

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1696663/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1726798] Re: rpc.statd is not started

2017-10-24 Thread Chris Glass
*** This bug is a duplicate of bug 1624715 ***
https://bugs.launchpad.net/bugs/1624715

** This bug has been marked a duplicate of bug 1624715
   rpc.statd not started automatically

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1726798

Title:
  rpc.statd is not started

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1726798/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-18 Thread Chris Glass
A bug has been filed upstream here:
https://bugs.freedesktop.org/show_bug.cgi?id=103351

** Bug watch added: freedesktop.org Bugzilla #103351
   https://bugs.freedesktop.org/show_bug.cgi?id=103351

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-18 Thread Chris Glass
For the record since I forgot to comment previously: kernel in #21
(mainline kernel with suspicious patch reverted) does boot fine with
nouveau.

(However just reverting it will probably cause other regressions)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-17 Thread Chris Glass
I just tested 4.15-rc5 and the problem still persists.

A (bit painful) workaround if you don't have a choice:

- Boot liveCD, enable "expert mode" (F6 at boot menu"

- Edit the boot line to have "blacklist=nouveau
modprobe.blacklist=nouveau" BOTH before AND after the "--" at the end of
the line. The second part should transfer to your installed system.

- Boot into the live session. You now have horribly low resolution but
it should allow you to run ubiquity.

- Install Ubuntu normally using horrible graphics

- Reboot. Hopefully your kernel cmdline parameters were saved and
therefore you will reboot into a happy (still horrible) fresh system.
Congratulations.

- If your reboot crashes odds are parts of the command line was not
carried over. No worries, spam ESC to get in the grub menu then edit the
kernel's entry to have both "blacklist=nouveau" and
"modprobe.blacklist=nouveau". Boot into your ugly new system as previous
point.

- Install the nvidia proprietary drivers: "sudo ubuntu-drivers" then
install the appropriate nvidia-XXX package (was nvidia-384 in my case
but it depends on your hardware).

- Reboot into hopefully glorious native resolution.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-17 Thread Chris Glass
Blacklisting nouveau allows a full boot (at a very low screen
resolution, obviously).

Kernel at #16 fails to boot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-16 Thread Chris Glass
The kernel at #14 fails to boot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-16 Thread Chris Glass
As discussed on IRC kaihengfeng and I will sync up tomorrow and bissect
the problem together.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-16 Thread Chris Glass
Tested all mainline kernels I could find for 4.13-rc*:

- 4.13-rc1: DisplayPort setup boots. Login screen appears. Choosing the
default option (wayland) results in broken desktop
(https://photos.app.goo.gl/xisx9EgTKTFoLXmJ3). Choosing the xorg
fallback works perfectly.

- 4.13-rc2: DisplayPort setup boots. Login screen appears. Choosing the
default option (wayland) results in broken desktop. Choosing the xorg
fallback works perfectly.

- 4.13-rc3: DisplayPort setup does NOT boot
(https://photos.app.goo.gl/ASCw1tDI6fHD1i6w1)

- 4.13-rc4: DisplayPort setup does NOT boot.

(could not find a -rc5)

- 4.13-rc6: DisplayPort setup does NOT boot.

- 4.13-rc7: DisplayPort setup does NOT boot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau on a displayport

2017-10-15 Thread Chris Glass
I've done further testing as you suggested. Here's a breakdown of my
findings:

I tested the following kernel versions on 4k + displayport (installed
from launchpad librarian, with their matching -extra package and an
"update-grub"):

- 4.12.0-12: Boots. System seems to crash after a few seconds on the 4k
desktop (cannot switch VTs). Maybe a separate bug however, at least it
makes it to login+desktop.

- 4.12.0-13: Boots. Same symptoms as previous kernel (crashes after a
few seconds on the desktop).

- 4.13.0-10: Does not boot. Fails with a slightly different output than
initially reported (see below)

- 4.13.0-11: Does not boot. Same symptoms.

- 4.13.0-12: Does not boot. Same symptoms. Screenshot
https://photos.app.goo.gl/ztJvK7Im2LVCK0ss1

- 4.13.0-15: Does not boot. Same symptoms.

- 4.13.0-16: Does not boot. Same symptoms.

None of the tested kernels exhibit any problematic behavior when the
HDMI + 1080p screen is plugged in.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau

2017-10-14 Thread Chris Glass
Switching the faulty system to using HDMI + 1080p succeeded. Updating
bug description.

** Summary changed:

- Ubuntu Desktop ISO fails to boot with nouveau
+ Ubuntu Desktop ISO fails to boot with nouveau on a displayport

** Description changed:

  On the latest daily artful image (/current as of 2017-01-14), the
  following occurs on a system with nVidia graphics (on my system, a
- GTX970): https://photos.app.goo.gl/gLUva3Vgvtv0lAmj2
+ GTX970) when connected to a 4k display over a displayport:
+ https://photos.app.goo.gl/gLUva3Vgvtv0lAmj2
  
  Steps to reproduce:
  - Download latest daily image, check checksums, burn to USB
  - Boot from USB.
  - Choose "Install Ubuntu" or "try ubuntu" at the menu.
  
  This happens on the livecd, but also upon ugrading the system from a
  previous daily with a different kernel: my "old" daily booted and
  installed fine with kernel 4.12.0-12, then failed with same error once
  dist-upgraded.
+ 
+ On the faulty system I could test with, it seems to *only* happen over
+ displayport/on a 4k screen (I don't own a non-4k displayport screen to
+ test the 4k out).

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau on a displayport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau

2017-10-14 Thread Chris Glass
Another machine (GTX950m on an integrated screen) boots as well.

>From my limited understanding of the error message in the screenshot -
perhaps the problem is that the screen is connected to displayport (the
GT 640 uses HDMI).

The failing system has a 4k screen connected to displayport.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau

2017-10-14 Thread Chris Glass
I cannot run apport-collect because the livecd doesn't boot :(

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] Re: Ubuntu Desktop ISO fails to boot with nouveau

2017-10-14 Thread Chris Glass
The livecd boots fine on another machine of mine with a nvidia GT 640
(so, an older generation), fromt eh same daily and same image burn.

I am out of extra hardware to try this on.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1723619] [NEW] Ubuntu Desktop ISO fails to boot with nouveau

2017-10-14 Thread Chris Glass
Public bug reported:

On the latest daily artful image (/current as of 2017-01-14), the
following occurs on a system with nVidia graphics (on my system, a
GTX970): https://photos.app.goo.gl/gLUva3Vgvtv0lAmj2

Steps to reproduce:
- Download latest daily image, check checksums, burn to USB
- Boot from USB.
- Choose "Install Ubuntu" or "try ubuntu" at the menu.

This happens on the livecd, but also upon ugrading the system from a
previous daily with a different kernel: my "old" daily booted and
installed fine with kernel 4.12.0-12, then failed with same error once
dist-upgraded.

** Affects: ubuntu-release-notes
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1723619

Title:
  Ubuntu Desktop ISO fails to boot with nouveau

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1723619/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1606600] Re: dpkg-reconfigure unattended-upgrades results in update-rc.d warning that start and stop actions are no longer supported

2017-03-06 Thread Chris Glass
More investigation is needed. The path *does* fix the problem, but in a
way that feels like it is a side effect.

Sorry, I should have commented on this bug before.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1606600

Title:
  dpkg-reconfigure unattended-upgrades results in update-rc.d warning
  that start and stop actions are no longer supported

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1606600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1666912] Re: Invoking openvpn removed option --tls-remote

2017-02-27 Thread Chris Glass
An even better fix for your configuration is to change the dropdown to
"verify name exactly", and then remove the "CN=" part of the field if
you previously had one in your subject match.

Example:

"/CN=example.com" becomes "example.com"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666912

Title:
  Invoking openvpn removed option --tls-remote

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-openvpn/+bug/1666912/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1666912] Re: Invoking openvpn removed option --tls-remote

2017-02-27 Thread Chris Glass
For people suffering from this, a clean workaround is to change the VPN
configuration as follows:

- Edit your VPN connection
- "VPN" tab
- "Advanced"
- "TLS Authentication" tab
- Change the "Server certificate check" to something that is *not* "verify 
subject partially".

In my case, "Don't verify certificate identity" was chosen since the
server's public key is checked anyway.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666912

Title:
  Invoking openvpn removed option --tls-remote

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-openvpn/+bug/1666912/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1606600] Re: dpkg-reconfigure unattended-upgrades results in update-rc.d warning that start and stop actions are no longer supported

2017-02-25 Thread Chris Glass
I *think* the root of the issue is that the assumption in debian/rules

# we do not want to run the init script in the postinst/prerm, its
#  really only useful on shutdown, see Debian bug #645919
dh_installinit $@ --no-start -- stop 10 0 6 .

is wrong.

It is not only useful on shutdown but also when dpkg-reconfigure is
invoked.

As a strawman fix, I've uploaded a fixed (xenial) package to
https://launchpad.net/~tribaal/+archive/ubuntu/unattended-upgrades

It seems to fix the issue in my limited testing: running "dpkg-
reconfigure -fnoninteractive unattended-upgrades" does apply changes
passed by debconf-set-selections.

I'll attach a debdiff to this bug as well, and open a pull request
upsteam.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1606600

Title:
  dpkg-reconfigure unattended-upgrades results in update-rc.d warning
  that start and stop actions are no longer supported

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1606600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1606600] Re: dpkg-reconfigure unattended-upgrades results in update-rc.d warning that start and stop actions are no longer supported

2017-02-25 Thread Chris Glass
This debdiff should fix the problem.

** Patch added: "debdiff for xenial"
   
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1606600/+attachment/4826417/+files/unattended-debdiff.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1606600

Title:
  dpkg-reconfigure unattended-upgrades results in update-rc.d warning
  that start and stop actions are no longer supported

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1606600/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-28 Thread Chris Glass
Xenial debdiff

** Patch added: "Xenial debdiff"
   
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+attachment/4784081/+files/xenial.deb.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-28 Thread Chris Glass
Yakkety debdiff

** Patch added: "Yakkety debdiff"
   
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+attachment/4784079/+files/yakkety.deb.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-28 Thread Chris Glass
I re-ran the outlined test-sequence without adding the juju-stable PPA
(like I originally did) to make sure this bug is not a side-effect of
the PPA.

It is not. It is reproducible on vanilla distro as outlined in the
description.

** Description changed:

  [Impact]
  
   * The python Juju client cannot make SSL connections to the server anymore, 
because TLS v1.0 was deprecated on the server.
   * Switching to TLS v1.2 fixes the problem entirely.
   * Example failure: http://pastebin.ubuntu.com/23521446/
  
  [Test case]
  
  Steps to reproduce (works in a container, needs a valid juju
  environment):
  
-  * Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
+  * Install juju 1.25: sudo apt-get install juju-1-default juju-1.25
   * Install the package: sudo apt-get install python-jujuclient
   * Set up an environment (ec2 works for instance)
   * Bootstrap environment: "juju bootstrap # Note your environment's name"
   * Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'
  
  [Regression Potential]
  
   * None - the package is completely unusable in its current state
  because of server changes. It can't get any worse :)
  
  [Other Info]
  
   * The attached patch is the minimal fix - forcing Python to connect over TLS 
1.2 instead of forcing TLS 1.0.
   * TLS 1.2 connectivity is available in all targeted releases.
   * lp:python-jujuclient (upstream) is not affected by the problem, but the 
code is much diverged from the version in the archives, with way too many 
changes for a SRU.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-28 Thread Chris Glass
** Description changed:

- Package affected: python-jujuclient 0.50.5-0ubuntu1 (on Xenial)
+ [Impact]
  
- The python Juju client cannot make SSL connections to the server
- anymore, because TLS v1 was deprecated.
+  * The python Juju client cannot make SSL connections to the server anymore, 
because TLS v1.0 was deprecated on the server.
+  * Switching to TLS v1.2 fixes the problem entirely.
+  * Example failure: http://pastebin.ubuntu.com/23521446/
  
- Switching to TLS v1.2 fixes the problem entirely.
+ [Test case]
  
- Example failure: http://pastebin.ubuntu.com/23521446/
+ Steps to reproduce (works in a container, needs a valid juju
+ environment):
  
- lp:python-jujuclient is not affected by the problem, but the code is much 
diverged from the version in the archives, way too many changes for a SRU.
- The attached patch is the minimal fix - forcing Python to connect over TLS 
1.2 instead of forcing TLS 1.0.
+  * Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
+  * Install the package: sudo apt-get install python-jujuclient
+  * Set up an environment (ec2 works for instance)
+  * Bootstrap environment: "juju bootstrap # Note your environment's name"
+  * Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'
  
- TLS 1.2 connectivity is available in all affected releases.
+ [Regression Potential]
  
- Steps to reproduce (works in a container):
+  * None - the package is completely unusable in its current state
+ because of server changes. It can't get any worse :)
  
- - Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
- - Install the package: sudo apt-get install python-jujuclient
- - Set up an environment (ec2 works for instance)
- - Bootstrap environment: "juju bootstrap # Note your environment's name"
- - Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'
+ [Other Info]
+ 
+  * The attached patch is the minimal fix - forcing Python to connect over TLS 
1.2 instead of forcing TLS 1.0.
+  * TLS 1.2 connectivity is available in all targeted releases.
+  * lp:python-jujuclient (upstream) is not affected by the problem, but the 
code is much diverged from the version in the archives, with way too many 
changes for a SRU.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-28 Thread Chris Glass
** Description changed:

  Package affected: python-jujuclient 0.50.5-0ubuntu1 (on Xenial)
  
  The python Juju client cannot make SSL connections to the server
  anymore, because TLS v1 was deprecated.
  
  Switching to TLS v1.2 fixes the problem entirely.
  
  Example failure: http://pastebin.ubuntu.com/23521446/
  
- It seems like lp:python-jujuclient already has the fix.
+ lp:python-jujuclient is not affected by the problem, but the code is
+ much diverged from the version in the archives, way too many changes for
+ a SRU.
+ 
+ Steps to reproduce (works in a container):
+ 
+ - Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
+ - Install the package: sudo apt-get install python-jujuclient
+ - Set up an environment (ec2 works for instance)
+ - Bootstrap environment: "juju bootstrap "
+ - Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'

** Description changed:

  Package affected: python-jujuclient 0.50.5-0ubuntu1 (on Xenial)
  
  The python Juju client cannot make SSL connections to the server
  anymore, because TLS v1 was deprecated.
  
  Switching to TLS v1.2 fixes the problem entirely.
  
  Example failure: http://pastebin.ubuntu.com/23521446/
  
  lp:python-jujuclient is not affected by the problem, but the code is
  much diverged from the version in the archives, way too many changes for
  a SRU.
  
  Steps to reproduce (works in a container):
  
  - Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
  - Install the package: sudo apt-get install python-jujuclient
  - Set up an environment (ec2 works for instance)
- - Bootstrap environment: "juju bootstrap "
+ - Bootstrap environment: "juju bootstrap # Note your environment's name"
  - Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'

** Description changed:

  Package affected: python-jujuclient 0.50.5-0ubuntu1 (on Xenial)
  
  The python Juju client cannot make SSL connections to the server
  anymore, because TLS v1 was deprecated.
  
  Switching to TLS v1.2 fixes the problem entirely.
  
  Example failure: http://pastebin.ubuntu.com/23521446/
  
- lp:python-jujuclient is not affected by the problem, but the code is
- much diverged from the version in the archives, way too many changes for
- a SRU.
+ lp:python-jujuclient is not affected by the problem, but the code is much 
diverged from the version in the archives, way too many changes for a SRU.
+ The attached patch is the minimal fix - forcing Python to connect over TLS 
1.2 instead of forcing TLS 1.0.
+ 
+ TLS 1.2 connectivity is available in all affected releases.
  
  Steps to reproduce (works in a container):
  
  - Install juju 1.25, ideally from the juju stable ppa: sudo 
add-apt-repository ppa:juju/stable; sudo apt-get update; sudo apt-get install 
juju-1-default
  - Install the package: sudo apt-get install python-jujuclient
  - Set up an environment (ec2 works for instance)
  - Bootstrap environment: "juju bootstrap # Note your environment's name"
  - Run: python -c 'from jujuclient import Environment; 
Environment.connect("")'

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-23 Thread Chris Glass
Once this gets into zesty I shall open another bug for the SRU into
yakkety and xenial.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial, yakkety, zesty

2016-11-23 Thread Chris Glass
** Summary changed:

- SSL handshake fails on xenial
+ SSL handshake fails on xenial, yakkety, zesty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial, yakkety, zesty

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial

2016-11-23 Thread Chris Glass
Debdiff against the current Ubuntu release (zesty)'s version.

** Patch added: "python-jujuclient-debdiff.diff"
   
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+attachment/4782000/+files/python-jujuclient-debdiff.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial

2016-11-23 Thread Chris Glass
(for what it's worth, the systems we use have ppa:juju/stable installed,
so adding the fix to that PPA would unblock many users already)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1644153] Re: SSL handshake fails on xenial

2016-11-23 Thread Chris Glass
Patch against the Xenial package.

** Attachment added: "switch-to-tls12"
   
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+attachment/4781989/+files/switch-to-tls12

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644153

Title:
  SSL handshake fails on xenial

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-jujuclient/+bug/1644153/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1641664] Re: systemd services starting while plymouth is deactivated

2016-11-15 Thread Chris Glass
(sorry for the shallow bug report - I intended to fill it up some more
but it fell through the cracks)

Specific units are:

plymouth-read-write.service
plymouth-quit.service
plymouth-quit-wait.service

Measured time spent in these: between 100 and 300ms (depending on I/O, I
assume). It's a modest win for boot time, but it's also a very simple
patch (https://paste.ubuntu.com/23476239/)

Despite being referenced in other services as an "after", it seems (from
manually applying above patch) that other services start and normally
(Before manual patch: https://paste.ubuntu.com/23479860/, after manual
patch: https://paste.ubuntu.com/23479865/ , both taken on a machine with
no "splash" in cmdline)

It seems like a clear cut case of removing "dead" code conditionally
(switching on the cmdline presence of "splash" as for the starting
service), but of course I might not have the whole picture.

I intend to try the same on a desktop machine with and without a
"splash" cmdline, with FDE enabled.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1641664

Title:
  systemd services starting while plymouth is deactivated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1641664/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1641664] [NEW] systemd services starting while plymouth is deactivated

2016-11-14 Thread Chris Glass
Public bug reported:

A few systemd units are started despite plymouth itself not running
(nospash is set in cmdline for instance).

This results in boot times slightly longer than necessary for those
systems.

** Affects: plymouth (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1641664

Title:
  systemd services starting while plymouth is deactivated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1641664/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1640878] Re: grub2 cannot currently generate configuration without initrd

2016-11-14 Thread Chris Glass
For the record, the branch patching grub2 is:
https://code.launchpad.net/~tribaal/ubuntu/+source/grub2/+git/grub2/+ref
/add-partuuid-override

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1640878

Title:
  grub2 cannot currently generate configuration without initrd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1640878/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1640878] Re: grub2 cannot currently generate configuration without initrd

2016-11-11 Thread Chris Glass
cyphermox uploaded patched packages to ppa:cyphermox/grub .

Steps to assert this works are as follows:

- Boot a Yakkety EC2 image 
(https://console.aws.amazon.com/ec2/home?region=eu-central-1#launchAmi=ami-b87881d7)
- Login
- sudo apt-add-repository ppa:cyphermox/grub; sudo apt update; sudo apt-upgrade
- reboot
(assert the system comes back online with no modifications to the grub config)
- login again
- Get the PARTUUID for the image's disk: ls /dev/disk/by-partuuid/ (should be 
6983c98a-01 on this particular image)
- Add "GRUB_FORCE_PARTUUID=6983c98a-01" to /etc/default/grub
- sudo update-grub
- reboot
(assert the system comes back online with a root=PARTUUID config)
- login again
- Add "GRUB_DISABLE_INITD=true" to /etc/default/grub.
- sudo update-grub
- reboot
(assert the system comes back online with root=PARTUUID and no initrd)

Currently the Xenial images we build don't expose partuuids (it's an
artifact of CPC transitionning to a new build system, AFAIU).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1640878

Title:
  grub2 cannot currently generate configuration without initrd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1640878/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1640878] [NEW] grub2 cannot currently generate configuration without initrd

2016-11-10 Thread Chris Glass
Public bug reported:

As it currently stands grub2 cannot create grub.cfg menu entries that do not 
use an initrd image if one is present but the user does not desire to use it.
Furthermore, root= entries only support UUID and LABEL, but neither is an 
option if booting the kernel without an initrd.

Suggestion:

Allow grub2 to create configuration files without an "initrd" line and
passing PARTUUID as root= entry by adding configuration knobs.

** Affects: grub2 (Ubuntu)
 Importance: High
 Assignee: Chris Glass (tribaal)
 Status: Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1640878

Title:
  grub2 cannot currently generate configuration without initrd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1640878/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1383184] Re: Atheros Qualcomm Killer N1525 Wireless-AC [168c:003e] is not supported

2015-11-02 Thread Chris Glass
Could somebody summarize that the instructions to get this working on
wily are? Thanks a lot

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1383184

Title:
  Atheros Qualcomm Killer N1525 Wireless-AC [168c:003e] is not supported

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1383184/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   >