@julien-edwards no sign of 1.6 or this patch in trusty yet. Is it still
planned for 1.6 to be released for trusty? If not can this patch be
backported to trusty?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
1.6 is not going to be uploaded to any Ubuntu release, please look out
for 1.7 in Utopic. 1.7 *may* be backported to Trusty but it depends on
ongoing techboard approval.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
** Changed in: maas
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1250435
Title:
CNAME record leaks into juju's private-address, breaks
** Changed in: maas (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1250435
Title:
CNAME record leaks into juju's private-address, breaks host
** Also affects: maas (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1250435
Title:
CNAME record leaks into juju's
Is it possiable to backport this fix to current MaaS 1.5.2 in trusty ?
This is required for rabbitmq-server charm to works well in
active/active clusteing mode.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
On Wednesday 23 Jul 2014 07:25:34 you wrote:
Is it possiable to backport this fix to current MaaS 1.5.2 in trusty ?
This is required for rabbitmq-server charm to works well in
active/active clusteing mode.
That's not going to happen because 1.6 is being released soon, which should
get