** Tags added: xenial
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to etckeeper in Ubuntu.
https://bugs.launchpad.net/bugs/1556563
Title:
etckeeper in Xenial wants python2.x
To manage notifications about this bug go to:
https://bugs
Public bug reported:
Hi,
Xenial now ships without python2.7 by default. Unfortunately, it seems
etckeeper still wants to pull in python2.7. Should it be updated to
python3?
Thanks,
Haw
** Affects: etckeeper (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug no
Attached patch makes it work when interface names are enpXsY. It doesn't
cover the other cases as per link to PredictableNetworkInterfaceNames.
** Patch added: "enp1s0.patch"
https://bugs.launchpad.net/ubuntu/+source/vlan/+bug/1541678/+attachment/4563451/+files/enp1s0.patch
--
You received t
Public bug reported:
Starting with udev v197, systems now use predictable network interface
names by default[1]. Unfortunately on my system running Xenial alpha2,
it seems vlan doesn't support the generated interface names:
| ubuntu@lagertha:/var/log$ dmesg | grep rename
| [5.101700] igb
Kernel OOPS on one of the mcdivitts:
| [544599.231964] block nbd0: Attempted send on closed socket
| [544599.231968] block nbd0: Attempted send on closed socket
| [544599.231972] block nbd0: Attempted send on closed socket
| [544599.231975] block nbd0: Attempted send on closed socket
| [544627.046
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510819/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/15121
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510812/+files/IwConfig.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "RelatedPackageVersions.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510818/+files/RelatedPackageVersions.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
http
apport information
** Attachment added: "KvmCmdLine.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510813/+files/KvmCmdLine.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510811/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510814/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1512185
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510816/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchp
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510817/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510815/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510820/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/15
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1512185/+attachment/4510821/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Tea
apport information
** Also affects: linux-meta-lts-vivid (Ubuntu)
Importance: Undecided
Status: New
** Tags added: apport-collected trusty uec-images
** Description changed:
Hi,
We're seeing this often on our HP Moonshot ARM64 nova-compute nodes
where qemu-nbd processes would
Public bug reported:
Hi,
We're seeing this often on our HP Moonshot ARM64 nova-compute nodes
where qemu-nbd processes would lock up. At the same time, there's also a
bunch of kernel spew as follows:
| [605282.018238] block nbd3: Attempted send on closed socket
| [605282.018242] block nbd3: Attem
** No longer affects: qemu (Ubuntu Trusty)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1457639
Title:
qemu-img qcow2 conversion hangs on large core systems
To manage notifications
Any chance of having the fixes (or fixed version) backported to trusty?
We need this for the HP Moonshot hardware we're using in ScalingStack
and am currently working around it with a backport of the version in
Vivid[1]
[1]https://launchpad.net/~canonical-is-sa/+archive/ubuntu/arm64-infra-
workaro
Hi,
We need this to support HP Moonshot hardware, can this be backported to
1.7 and SRU'ed to trusty?
** Also affects: maas (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in U
I should mention for ScalingStack BOS01. At present, we're using a
custom package in our PPA[1].
[1]https://launchpad.net/~canonical-is-sa/+archive/ubuntu/arm64-infra-
workarounds/+packages
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
Public bug reported:
Hi,
We're trying to import images using 'maas-import-pxe-files' from the CLI
but that seems to fail. On further investigation, it seems that it's
because MAAS_URL is enclosed in double quotes and the URL it's trying to
get to isn't removing it:
| root@somehost:/var/log/maas#
Any chance we could backport support for TLS v1.1+ to Trusty LTS?
** Description changed:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
to negotiate TLS v1.0. The patch below has landed in upstream OpenVPN
2.3.3 and replaces TLSv1_server_method() cal
** Bug watch added: Mozilla Bugzilla #1138554
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
** Also affects: nss via
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of U
Our pollen charm actually ships out an rsyslog config so it's logged to
/var/log/pollen/pollen.log. I can confirm that with the latest updates,
it's still logging to /var/log/syslog after rsyslog package update.
--
You received this bug notification because you are a member of Ubuntu
Server Team,
Ah right, so it seems logging location has changed from
/var/log/pollen/pollen.log to /var/log/syslog.
** Tags removed: verification-failed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pollen in Ubun
3.19.2 was just released[1] with:
"""
Notable Changes in NSS 3.19.2
Bug 1172128 - In NSS 3.19.1, the minimum key sizes that the freebl
cryptographic implementation (part of the softoken cryptographic module used by
default by NSS) was willing to generate or use was increased - for RSA keys, to
https://hg.mozilla.org/projects/nss/rev/ae72d76f8d24
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1465014
Title:
after update still vulnerable against LOGJAM
To manage notifications
Chrome and Firefox both uses NSS. NSS 3.19.1 contains fixes to mitigate
logjam by increasing the minimum modulus size for Diffie-Hellman keys to
1023 bits[1].
Maybe we can look into backporting that.
[1]https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
** Al
https://bz.apache.org/bugzilla/show_bug.cgi?id=49559#c20
** Bug watch added: bz.apache.org/bugzilla/ #49559
https://bz.apache.org/bugzilla/show_bug.cgi?id=49559
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https:/
With the recently released logjam attack, can we please revisit and
increase the priority for, backporting ECDHE support to apache2.2?
https://weakdh.org/
http://openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
--
You received this bug notification because you are a member of Ubun
FYI, ECDHE-ECDSA-* cipher suites are only enabled when using ECDSA SSL
certificates (with RSA being the most common).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
** Also affects: openvpn (Ubuntu Vivid)
Importance: Medium
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1385851
Title:
OpenVPN only supports TLS v1.0
Since the update, it seems that pollen isn't logging anymore:
| -rw-r--r-- 1 syslog adm 276100 Nov 4 06:36 pollen.log-20141104.xz
| -rw-r--r-- 1 syslog adm 5665237 Nov 5 06:23 pollen.log-20141105
| -rw-r--r-- 1 syslog adm 703 Nov 5 23:23 pollen.log
| ubuntu@juju-machine-2-lxc-1:/var/log/p
** Tags added: trusty utopic
** Patch added:
"https://github.com/OpenVPN/openvpn/commit/4b67f9849ab3efe89268e01afddc7795f38d0f64";
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1385851/+attachment/4246696/+files/4b67f9849ab3efe89268e01afddc7795f38d0f64.patch
** Tags added: patch-acc
Public bug reported:
Hi,
Seems pollen fails to log everytime rsyslog packages are upgraded or
rsyslog daemon itself is bounced. There's an alert for it, but I don't
think it should be set up in such a way that we need to manually bounce
the pollen daemon every time rsyslog packages are upgraded.
** Description changed:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
- to negotiate TLS v1.0. The patch below has landed in OpenVPN 2.3.3 and
- replaces TLSv1_server_method() calls with SSLv23_client_method().
+ to negotiate TLS v1.0. The patch below has
Public bug reported:
Hi Guys,
Seems the version of OpenVPN we're carrying only supports and/or is able
to negotiate TLS v1.0. The patch below has landed in upstream OpenVPN
2.3.3 and replaces TLSv1_server_method() calls with
SSLv23_client_method().
https://github.com/OpenVPN/openvpn/commit/4b67f
Seems I tried to be clever in providing a bundle without the original CA
certificate (we're using almost everywhere else). Unfortunately,
pollinate is calling curl with --capath /dev/null so we need to include
this.
I've created MP:239160 to fix this.
Tested as follows:
$ curl -A 'pollinate/4.8-
** Changed in: apache2 (Ubuntu Precise)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
apache2.2 SSL has no forward-secrecy: need
** Changed in: apache2 (Ubuntu Precise)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1197884
Title:
apache2.2 SSL has no forward-secrecy: need ECDH
Err, it's .1 because I manually rotated them
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju in Ubuntu.
https://bugs.launchpad.net/bugs/1078213
Title:
logs are not logrotated
To manage notifications about this bug go to:
https:
ubuntu@juju-prod-XX-YYY-machine-0:/var/log/juju$ ls -la
total 19790064
drwxr-xr-x 2 syslog adm 4096 Oct 2 07:33 .
drwxr-xr-x 11 root root 4096 Oct 2 06:38 ..
-rw-r--r-- 1 syslog adm11719171973 Oct 2 07:33 all-machines.log.1
-rw--- 1 syslog syslog 879 Aug 1
Public bug reported:
Hi,
We're testing MAAS 1.5 on precise using the cloud-tools-next pocket in
the cloud archives. It seems that python-amqp seems too new and MAAS
celery services fail because of this:
$ sudo service maas-cluster-celery start
maas-cluster-celery start/running, process 15005
hlo
Public bug reported:
Hi,
It seems pollinate ships out SSL certificate for entropy.ubuntu.com. Due
to the recent OpenSSL "Heartbleed Bug", we've re-keyed the
entropy.ubuntu.com certificate and updated so that the service now uses
the new certificate/key.
Could you please update the pollinate pack
Robie, can we backport the fix to Precise?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to facter in Ubuntu.
https://bugs.launchpad.net/bugs/1088720
Title:
facter virtual runs lspci unconditionally
To manage notifications about this
Looks like this is fixed in facter-1.7.0-1ubuntu1 (saucy):
| elsif domain = Facter::Util::Resolution.exec('dnsdomainname') \
| and domain =~ /.+/
|
| return_value = domain
In facter-1.6.5-1ubuntu1.2 (precise), it looks like this:
| elsif domain = Facter::Util::Resolution.exec
** Also affects: juju-core
Importance: Undecided
Status: New
** Also affects: juju-core (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.la
This happened again today.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/924105
Title:
integer out of range errors for fact_values
To manage notifications about this bug go to:
htt
Hi Dave,
The package in precise-proposed looks good to me:
ubuntu@hloeung-test:~$ apt-cache policy puppet-common
puppet-common:
Installed: 2.7.11-1ubuntu2.5
Candidate: 2.7.11-1ubuntu2.5
ubuntu@hloeung-test:~$ ls -la
/usr/lib/ruby/1.8/puppet/util/instrumentation/listeners
total 16
drwxr-xr-x
Robie,
Marked as Fix Released as requested.
What about for Precise? Are we going to backport the fix to Precise? In
IS, we currently have puppet ensure that the file is absent / deleted.
Regards,
Haw
** Changed in: puppet (Ubuntu)
Status: Confirmed => Fix Released
--
You received thi
** Also affects: maas
Importance: Undecided
Status: New
** Changed in: maas
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1227252
Title:
Upg
*** This bug is a duplicate of bug 995719 ***
https://bugs.launchpad.net/bugs/995719
** This bug has been marked a duplicate of bug 995719
process_name.rb removed in 2.7.11 but still provided by puppet-common
--
You received this bug notification because you are a member of Ubuntu
Server
James,
Looking at one of our bootstrap nodes, it seems we're using the default
shipped with Precise:
ii zookeeper 3.3.5+dfsg1-1ubuntu1
High-performance coordination service for distributed applications
/etc/zookeeper/conf/log4j.properties:
#
# Add ROLLINGFILE to root
** Changed in: juju-core (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1178506
Title:
Cannot switch between juju-0.7 and juju-core
To mana
** Project changed: juju-core => juju-core (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1178506
Title:
Cannot switch between juju-0.7 and juju-core
To manage notificat
Public bug reported:
$ nova --debug list
DEBUG (shell:732) hasattr(): attribute name must be string
Traceback (most recent call last):
File "/usr/lib/python2.7/dist-packages/novaclient/shell.py", line 729, in main
OpenStackComputeShell().main(sys.argv[1:])
File "/usr/lib/python2.7/dist-pac
Might also be bug #995719. Can you try remove process_name.rb ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1043292
Title:
Hung agent processes
To manage notifications about this
http://projects.puppetlabs.com/issues/12588
http://projects.puppetlabs.com/issues/12181#note-17
http://projects.puppetlabs.com/issues/12310#note-16
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad
Confirmed removed in Debian upstream -
http://packages.debian.org/sid/all/puppet-common/filelist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/995719
Title:
process_name.rb removed
See also https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/995719
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/959597
Title:
missing parenthesis in process_name.rb produces rub
Public bug reported:
Hi,
This is related to
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/959597 where
upstream has removed process_name.rb in 2.7.11 but it is still packaged
and provided by puppet-common.
Source tarball for 2.7.10 from puppetlabs:
[hloeung@darkon puppet-2.7.10]$ find .
63 matches
Mail list logo