Public bug reported:
$ nova --debug list
DEBUG (shell:732) hasattr(): attribute name must be string
Traceback (most recent call last):
File /usr/lib/python2.7/dist-packages/novaclient/shell.py, line 729, in main
OpenStackComputeShell().main(sys.argv[1:])
File
** Project changed: juju-core = juju-core (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1178506
Title:
Cannot switch between juju-0.7 and juju-core
To manage
** Changed in: juju-core (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1178506
Title:
Cannot switch between juju-0.7 and juju-core
To
James,
Looking at one of our bootstrap nodes, it seems we're using the default
shipped with Precise:
ii zookeeper 3.3.5+dfsg1-1ubuntu1
High-performance coordination service for distributed applications
/etc/zookeeper/conf/log4j.properties:
#
# Add ROLLINGFILE to
Public bug reported:
Hi,
This is related to
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/959597 where
upstream has removed process_name.rb in 2.7.11 but it is still packaged
and provided by puppet-common.
Source tarball for 2.7.10 from puppetlabs:
[hloeung@darkon puppet-2.7.10]$ find
See also https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/995719
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/959597
Title:
missing parenthesis in process_name.rb produces
Confirmed removed in Debian upstream -
http://packages.debian.org/sid/all/puppet-common/filelist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/995719
Title:
process_name.rb removed
http://projects.puppetlabs.com/issues/12588
http://projects.puppetlabs.com/issues/12181#note-17
http://projects.puppetlabs.com/issues/12310#note-16
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
Might also be bug #995719. Can you try remove process_name.rb ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1043292
Title:
Hung agent processes
To manage notifications about
*** This bug is a duplicate of bug 995719 ***
https://bugs.launchpad.net/bugs/995719
** This bug has been marked a duplicate of bug 995719
process_name.rb removed in 2.7.11 but still provided by puppet-common
--
You received this bug notification because you are a member of Ubuntu
Server
** Also affects: maas
Importance: Undecided
Status: New
** Changed in: maas
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1227252
Title:
Robie,
Marked as Fix Released as requested.
What about for Precise? Are we going to backport the fix to Precise? In
IS, we currently have puppet ensure that the file is absent / deleted.
Regards,
Haw
** Changed in: puppet (Ubuntu)
Status: Confirmed = Fix Released
--
You received
Hi Dave,
The package in precise-proposed looks good to me:
ubuntu@hloeung-test:~$ apt-cache policy puppet-common
puppet-common:
Installed: 2.7.11-1ubuntu2.5
Candidate: 2.7.11-1ubuntu2.5
ubuntu@hloeung-test:~$ ls -la
/usr/lib/ruby/1.8/puppet/util/instrumentation/listeners
total 16
This happened again today.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/924105
Title:
integer out of range errors for fact_values
To manage notifications about this bug go to:
** Also affects: juju-core
Importance: Undecided
Status: New
** Also affects: juju-core (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
Looks like this is fixed in facter-1.7.0-1ubuntu1 (saucy):
| elsif domain = Facter::Util::Resolution.exec('dnsdomainname') \
| and domain =~ /.+/
|
| return_value = domain
In facter-1.6.5-1ubuntu1.2 (precise), it looks like this:
| elsif domain =
Robie, can we backport the fix to Precise?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to facter in Ubuntu.
https://bugs.launchpad.net/bugs/1088720
Title:
facter virtual runs lspci unconditionally
To manage notifications about
Public bug reported:
Hi,
It seems pollinate ships out SSL certificate for entropy.ubuntu.com. Due
to the recent OpenSSL Heartbleed Bug, we've re-keyed the
entropy.ubuntu.com certificate and updated so that the service now uses
the new certificate/key.
Could you please update the pollinate
Public bug reported:
Hi,
We're testing MAAS 1.5 on precise using the cloud-tools-next pocket in
the cloud archives. It seems that python-amqp seems too new and MAAS
celery services fail because of this:
$ sudo service maas-cluster-celery start
maas-cluster-celery start/running, process 15005
Err, it's .1 because I manually rotated them
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju in Ubuntu.
https://bugs.launchpad.net/bugs/1078213
Title:
logs are not logrotated
To manage notifications about this bug go to:
ubuntu@juju-prod-XX-YYY-machine-0:/var/log/juju$ ls -la
total 19790064
drwxr-xr-x 2 syslog adm 4096 Oct 2 07:33 .
drwxr-xr-x 11 root root 4096 Oct 2 06:38 ..
-rw-r--r-- 1 syslog adm11719171973 Oct 2 07:33 all-machines.log.1
-rw--- 1 syslog syslog 879 Aug
** Changed in: apache2 (Ubuntu Precise)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
apache2.2 SSL has no forward-secrecy: need
** Changed in: apache2 (Ubuntu Precise)
Importance: Undecided = Wishlist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
apache2.2 SSL has no forward-secrecy: need
Seems I tried to be clever in providing a bundle without the original CA
certificate (we're using almost everywhere else). Unfortunately,
pollinate is calling curl with --capath /dev/null so we need to include
this.
I've created MP:239160 to fix this.
Tested as follows:
$ curl -A
Public bug reported:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
to negotiate TLS v1.0. The patch below has landed in upstream OpenVPN
2.3.3 and replaces TLSv1_server_method() calls with
SSLv23_client_method().
** Description changed:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
- to negotiate TLS v1.0. The patch below has landed in OpenVPN 2.3.3 and
- replaces TLSv1_server_method() calls with SSLv23_client_method().
+ to negotiate TLS v1.0. The patch below
Public bug reported:
Hi,
Seems pollen fails to log everytime rsyslog packages are upgraded or
rsyslog daemon itself is bounced. There's an alert for it, but I don't
think it should be set up in such a way that we need to manually bounce
the pollen daemon every time rsyslog packages are upgraded.
** Tags added: trusty utopic
** Patch added:
https://github.com/OpenVPN/openvpn/commit/4b67f9849ab3efe89268e01afddc7795f38d0f64;
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1385851/+attachment/4246696/+files/4b67f9849ab3efe89268e01afddc7795f38d0f64.patch
** Tags added:
Since the update, it seems that pollen isn't logging anymore:
| -rw-r--r-- 1 syslog adm 276100 Nov 4 06:36 pollen.log-20141104.xz
| -rw-r--r-- 1 syslog adm 5665237 Nov 5 06:23 pollen.log-20141105
| -rw-r--r-- 1 syslog adm 703 Nov 5 23:23 pollen.log
|
** Also affects: openvpn (Ubuntu Vivid)
Importance: Medium
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1385851
Title:
OpenVPN only supports TLS v1.0
** No longer affects: qemu (Ubuntu Trusty)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1457639
Title:
qemu-img qcow2 conversion hangs on large core systems
To manage notifications
Any chance of having the fixes (or fixed version) backported to trusty?
We need this for the HP Moonshot hardware we're using in ScalingStack
and am currently working around it with a backport of the version in
Vivid[1]
[1]https://launchpad.net/~canonical-is-sa/+archive/ubuntu/arm64-infra-
Hi,
We need this to support HP Moonshot hardware, can this be backported to
1.7 and SRU'ed to trusty?
** Also affects: maas (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in
I should mention for ScalingStack BOS01. At present, we're using a
custom package in our PPA[1].
[1]https://launchpad.net/~canonical-is-sa/+archive/ubuntu/arm64-infra-
workarounds/+packages
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510819/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510815/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510811/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510821/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server
apport information
** Also affects: linux-meta-lts-vivid (Ubuntu)
Importance: Undecided
Status: New
** Tags added: apport-collected trusty uec-images
** Description changed:
Hi,
We're seeing this often on our HP Moonshot ARM64 nova-compute nodes
where qemu-nbd processes
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510814/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510816/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510817/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "RelatedPackageVersions.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510818/+files/RelatedPackageVersions.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "KvmCmdLine.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510813/+files/KvmCmdLine.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510820/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510812/+files/IwConfig.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
Public bug reported:
Hi,
We're seeing this often on our HP Moonshot ARM64 nova-compute nodes
where qemu-nbd processes would lock up. At the same time, there's also a
bunch of kernel spew as follows:
| [605282.018238] block nbd3: Attempted send on closed socket
| [605282.018242] block nbd3:
Kernel OOPS on one of the mcdivitts:
| [544599.231964] block nbd0: Attempted send on closed socket
| [544599.231968] block nbd0: Attempted send on closed socket
| [544599.231972] block nbd0: Attempted send on closed socket
| [544599.231975] block nbd0: Attempted send on closed socket
|
FYI, ECDHE-ECDSA-* cipher suites are only enabled when using ECDSA SSL
certificates (with RSA being the most common).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
With the recently released logjam attack, can we please revisit and
increase the priority for, backporting ECDHE support to apache2.2?
https://weakdh.org/
http://openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
--
You received this bug notification because you are a member of
Our pollen charm actually ships out an rsyslog config so it's logged to
/var/log/pollen/pollen.log. I can confirm that with the latest updates,
it's still logging to /var/log/syslog after rsyslog package update.
--
You received this bug notification because you are a member of Ubuntu
Server
Ah right, so it seems logging location has changed from
/var/log/pollen/pollen.log to /var/log/syslog.
** Tags removed: verification-failed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pollen in
3.19.2 was just released[1] with:
Notable Changes in NSS 3.19.2
Bug 1172128 - In NSS 3.19.1, the minimum key sizes that the freebl
cryptographic implementation (part of the softoken cryptographic module used by
default by NSS) was willing to generate or use was increased - for RSA keys, to
https://hg.mozilla.org/projects/nss/rev/ae72d76f8d24
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1465014
Title:
after update still vulnerable against LOGJAM
To manage notifications
Chrome and Firefox both uses NSS. NSS 3.19.1 contains fixes to mitigate
logjam by increasing the minimum modulus size for Diffie-Hellman keys to
1023 bits[1].
Maybe we can look into backporting that.
[1]https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
**
https://bz.apache.org/bugzilla/show_bug.cgi?id=49559#c20
** Bug watch added: bz.apache.org/bugzilla/ #49559
https://bz.apache.org/bugzilla/show_bug.cgi?id=49559
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
** Bug watch added: Mozilla Bugzilla #1138554
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
** Also affects: nss via
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of
Any chance we could backport support for TLS v1.1+ to Trusty LTS?
** Description changed:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
to negotiate TLS v1.0. The patch below has landed in upstream OpenVPN
2.3.3 and replaces TLSv1_server_method()
Public bug reported:
Hi,
We're trying to import images using 'maas-import-pxe-files' from the CLI
but that seems to fail. On further investigation, it seems that it's
because MAAS_URL is enclosed in double quotes and the URL it's trying to
get to isn't removing it:
|
Public bug reported:
Starting with udev v197, systems now use predictable network interface
names by default[1]. Unfortunately on my system running Xenial alpha2,
it seems vlan doesn't support the generated interface names:
| ubuntu@lagertha:/var/log$ dmesg | grep rename
| [5.101700] igb
Attached patch makes it work when interface names are enpXsY. It doesn't
cover the other cases as per link to PredictableNetworkInterfaceNames.
** Patch added: "enp1s0.patch"
https://bugs.launchpad.net/ubuntu/+source/vlan/+bug/1541678/+attachment/4563451/+files/enp1s0.patch
--
You received
Public bug reported:
Hi,
Xenial now ships without python2.7 by default. Unfortunately, it seems
etckeeper still wants to pull in python2.7. Should it be updated to
python3?
Thanks,
Haw
** Affects: etckeeper (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug
** Tags added: xenial
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to etckeeper in Ubuntu.
https://bugs.launchpad.net/bugs/1556563
Title:
etckeeper in Xenial wants python2.x
To manage notifications about this bug go to:
63 matches
Mail list logo