Public bug reported:

[Impact]
This new upstream bugfix release of MAAS includes bug fixes for several bugs 
reports. This includes Hardware Enablement for the Cisco B Series.

 - Hardware Enablement for Cisco B-Series. (LP: #1300476)
 - Allow AMT power type to specify IP Address. (LP: #1308772)
 - Spurious failure when starting and creating lock files. (LP: 1308069)
 - Fix regression introduced by a security fix (LP: #1311433, LP: #1311433)
 - Fix usage of hardware enablement kernels by fixing the preseeds
   (LP: #1310082, LP: #1310076, LP: #1310082)
 - Fix parallel juju deployments. (LP: #1314409)
 - Clear distro_series when stopping node from WebUI (LP: #1316396)
 - Fix click hijacking (LP: #1298784)
 - Fix blocking API client when deleting a resource (LP: #1313556)
 - Do not import Trusty RC images by default (LP: #1311151)

[Test Case]
1. Install MAAS
2. Follow steps for each of the bugs being fixed above.


[Regression Potential]
Minimal. All of the fixes include their own unittests as well as have been 
tested in the MAAS CI.

** Affects: maas (Ubuntu)
     Importance: Critical
         Status: New

** Changed in: maas (Ubuntu)
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1317601

Title:
  [SRU] SRU New upstream bugfix release of MAAS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1317601/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to