Public bug reported: [Impact] This new upstream bugfix release of MAAS includes bug fixes for several bugs reports. This includes Hardware Enablement for the Cisco B Series.
- Hardware Enablement for Cisco B-Series. (LP: #1300476) - Allow AMT power type to specify IP Address. (LP: #1308772) - Spurious failure when starting and creating lock files. (LP: 1308069) - Fix regression introduced by a security fix (LP: #1311433, LP: #1311433) - Fix usage of hardware enablement kernels by fixing the preseeds (LP: #1310082, LP: #1310076, LP: #1310082) - Fix parallel juju deployments. (LP: #1314409) - Clear distro_series when stopping node from WebUI (LP: #1316396) - Fix click hijacking (LP: #1298784) - Fix blocking API client when deleting a resource (LP: #1313556) - Do not import Trusty RC images by default (LP: #1311151) [Test Case] 1. Install MAAS 2. Follow steps for each of the bugs being fixed above. [Regression Potential] Minimal. All of the fixes include their own unittests as well as have been tested in the MAAS CI. ** Affects: maas (Ubuntu) Importance: Critical Status: New ** Changed in: maas (Ubuntu) Importance: Undecided => Critical -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to maas in Ubuntu. https://bugs.launchpad.net/bugs/1317601 Title: [SRU] SRU New upstream bugfix release of MAAS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1317601/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs