[Group.of.nepali.translators] [Bug 1745227] Re: TLS SNI 01 authentication removed, must upgrade to 0.21.0 to renew
** Changed in: python-certbot (Ubuntu) Importance: Undecided => High ** Changed in: python-certbot (Ubuntu) Status: Confirmed => Fix Released ** Also affects: python-certbot (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: python-certbot (Ubuntu Artful) Importance: Undecided Status: New ** Changed in: python-certbot (Ubuntu Xenial) Importance: Undecided => High ** Changed in: python-certbot (Ubuntu Xenial) Status: New => Triaged ** Changed in: python-certbot (Ubuntu Artful) Importance: Undecided => High ** Changed in: python-certbot (Ubuntu Artful) Status: New => Triaged -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1745227 Title: TLS SNI 01 authentication removed, must upgrade to 0.21.0 to renew Status in python-certbot package in Ubuntu: Fix Released Status in python-certbot source package in Xenial: Triaged Status in python-certbot source package in Artful: Triaged Bug description: https://github.com/certbot/certbot/issues/5405#issuecomment-358524100 TLS-SNI-01 had a CA security issue in shared hosts, as such the letsencrypt CA blocked the auth method. The update is in 0.21.0, until it's pushed out renewing will be more difficult as you'll need to configure webroot renewals. This affects all current and future versions. I'm in 14.04.5 LTS I'm on certbot 0.19.0, 20.0-3 is available in The Bionic Beaver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-certbot/+bug/1745227/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu
** Changed in: linux-meta (Ubuntu Artful) Status: Fix Released => Triaged ** Changed in: linux-meta (Ubuntu Xenial) Status: Fix Released => Triaged ** Changed in: linux-meta (Ubuntu Trusty) Status: Fix Released => Triaged -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1738259 Title: need to ensure microcode updates are available to all bare-metal installs of Ubuntu Status in linux-meta package in Ubuntu: Triaged Status in linux-meta-hwe package in Ubuntu: New Status in linux-meta-hwe-edge package in Ubuntu: New Status in linux-meta-lts-xenial package in Ubuntu: Triaged Status in linux-meta source package in Precise: New Status in linux-meta source package in Trusty: Triaged Status in linux-meta source package in Xenial: Triaged Status in linux-meta-hwe source package in Xenial: Triaged Status in linux-meta-hwe-edge source package in Xenial: Triaged Status in linux-meta-lts-xenial source package in Xenial: New Status in linux-meta source package in Zesty: Invalid Status in linux-meta source package in Artful: Triaged Status in linux-meta source package in Bionic: Triaged Bug description: From time to time, CPU vendors release updates to microcode that can be loaded into the CPU from the OS. For x86, we have these updates available in the archive as amd64-microcode and intel-microcode. Sometimes, these microcode updates have addressed security issues with the CPU. They almost certainly will again in the future. We should ensure that all users of Ubuntu on baremetal x86 receive these security updates, and have them applied to the CPU in early boot where at all feasible. Because these are hardware-dependent packages which we don't want to install except on baremetal (so: not in VMs or containers), the logical place to pull them into the system is via the kernel, so that only the kernel baremetal flavors pull them in. This is analogous to linux-firmware, which is already a dependency of the linux- image-{lowlatency,generic} metapackages, and whose contents are applied to the hardware by the kernel similar to microcode. So, please update the linux-image-{lowlatency,generic} metapackages to add a dependency on amd64-microcode [amd64], intel-microcode [amd64], and the corresponding hwe metapackages also. Please time this change to coincide with the next updates of the microcode packages in the archive. I believe we will also need to promote the *-microcode packages to main from restricted as part of this (again, by analogy with linux- firmware). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu
Indeed, this was reverted and does not appear to have re-landed yet; resetting the bug state. ** Changed in: linux-meta-lts-xenial (Ubuntu) Status: Fix Released => Triaged ** Changed in: linux-meta-hwe-edge (Ubuntu Xenial) Status: Fix Released => Triaged ** Changed in: linux-meta-hwe (Ubuntu Xenial) Status: Fix Released => Triaged ** Changed in: linux-meta (Ubuntu Bionic) Status: Fix Released => Triaged -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1738259 Title: need to ensure microcode updates are available to all bare-metal installs of Ubuntu Status in linux-meta package in Ubuntu: Triaged Status in linux-meta-hwe package in Ubuntu: New Status in linux-meta-hwe-edge package in Ubuntu: New Status in linux-meta-lts-xenial package in Ubuntu: Triaged Status in linux-meta source package in Precise: New Status in linux-meta source package in Trusty: Fix Released Status in linux-meta source package in Xenial: Fix Released Status in linux-meta-hwe source package in Xenial: Triaged Status in linux-meta-hwe-edge source package in Xenial: Triaged Status in linux-meta-lts-xenial source package in Xenial: New Status in linux-meta source package in Zesty: Invalid Status in linux-meta source package in Artful: Fix Released Status in linux-meta source package in Bionic: Triaged Bug description: From time to time, CPU vendors release updates to microcode that can be loaded into the CPU from the OS. For x86, we have these updates available in the archive as amd64-microcode and intel-microcode. Sometimes, these microcode updates have addressed security issues with the CPU. They almost certainly will again in the future. We should ensure that all users of Ubuntu on baremetal x86 receive these security updates, and have them applied to the CPU in early boot where at all feasible. Because these are hardware-dependent packages which we don't want to install except on baremetal (so: not in VMs or containers), the logical place to pull them into the system is via the kernel, so that only the kernel baremetal flavors pull them in. This is analogous to linux-firmware, which is already a dependency of the linux- image-{lowlatency,generic} metapackages, and whose contents are applied to the hardware by the kernel similar to microcode. So, please update the linux-image-{lowlatency,generic} metapackages to add a dependency on amd64-microcode [amd64], intel-microcode [amd64], and the corresponding hwe metapackages also. Please time this change to coincide with the next updates of the microcode packages in the archive. I believe we will also need to promote the *-microcode packages to main from restricted as part of this (again, by analogy with linux- firmware). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1706488] Re: Snaps without icons not showing
*** This bug is a duplicate of bug 1697565 *** https://bugs.launchpad.net/bugs/1697565 ** This bug has been marked a duplicate of bug 1697565 Snaps without icons don't show as installed -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1706488 Title: Snaps without icons not showing Status in gnome-software package in Ubuntu: Fix Released Status in gnome-software source package in Xenial: Confirmed Status in gnome-software source package in Zesty: Confirmed Status in gnome-software source package in Artful: Fix Released Bug description: [Impact] Snaps without an icon (i.e. not provided in snap or in the store) are not shown in GNOME Software. This is because GNOME Software fails to get the "package-x-generic" default icon. [Test Case] 1. Install a snap without an icon, e.g: $ sudo snap install openscad-plars 2. Start GNOME Software 3. Click on installed tab Expected result: The installed snap is show in the list of apps. Observed result: The snap is not shown. [Regression Potential] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1706488/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758699] [NEW] [CVE] JavaScript in a book can access local files using XMLHttpRequest
Public bug reported: The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript. ** Affects: calibre (Ubuntu) Importance: Medium Status: Fix Released ** Affects: calibre (Ubuntu Trusty) Importance: Medium Assignee: Simon Quigley (tsimonq2) Status: New ** Affects: calibre (Ubuntu Xenial) Importance: Medium Assignee: Simon Quigley (tsimonq2) Status: New ** Also affects: calibre (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: calibre (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: calibre (Ubuntu Trusty) Assignee: (unassigned) => Simon Quigley (tsimonq2) ** Changed in: calibre (Ubuntu Xenial) Assignee: (unassigned) => Simon Quigley (tsimonq2) ** Changed in: calibre (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: calibre (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: calibre (Ubuntu) Importance: Undecided => Medium ** Changed in: calibre (Ubuntu) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10187 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758699 Title: [CVE] JavaScript in a book can access local files using XMLHttpRequest Status in calibre package in Ubuntu: Fix Released Status in calibre source package in Trusty: New Status in calibre source package in Xenial: New Bug description: The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/calibre/+bug/1758699/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu
Zesty EOL reached ** Changed in: linux-meta (Ubuntu Zesty) Status: New => Invalid -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1738259 Title: need to ensure microcode updates are available to all bare-metal installs of Ubuntu Status in linux-meta package in Ubuntu: Fix Released Status in linux-meta-hwe package in Ubuntu: New Status in linux-meta-hwe-edge package in Ubuntu: New Status in linux-meta-lts-xenial package in Ubuntu: Fix Released Status in linux-meta source package in Precise: New Status in linux-meta source package in Trusty: Fix Released Status in linux-meta source package in Xenial: Fix Released Status in linux-meta-hwe source package in Xenial: Fix Released Status in linux-meta-hwe-edge source package in Xenial: Fix Released Status in linux-meta-lts-xenial source package in Xenial: New Status in linux-meta source package in Zesty: Invalid Status in linux-meta source package in Artful: Fix Released Status in linux-meta source package in Bionic: Fix Released Bug description: From time to time, CPU vendors release updates to microcode that can be loaded into the CPU from the OS. For x86, we have these updates available in the archive as amd64-microcode and intel-microcode. Sometimes, these microcode updates have addressed security issues with the CPU. They almost certainly will again in the future. We should ensure that all users of Ubuntu on baremetal x86 receive these security updates, and have them applied to the CPU in early boot where at all feasible. Because these are hardware-dependent packages which we don't want to install except on baremetal (so: not in VMs or containers), the logical place to pull them into the system is via the kernel, so that only the kernel baremetal flavors pull them in. This is analogous to linux-firmware, which is already a dependency of the linux- image-{lowlatency,generic} metapackages, and whose contents are applied to the hardware by the kernel similar to microcode. So, please update the linux-image-{lowlatency,generic} metapackages to add a dependency on amd64-microcode [amd64], intel-microcode [amd64], and the corresponding hwe metapackages also. Please time this change to coincide with the next updates of the microcode packages in the archive. I believe we will also need to promote the *-microcode packages to main from restricted as part of this (again, by analogy with linux- firmware). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression
This bug was fixed in the package neutron - 2:8.4.0-0ubuntu7.2~cloud0 --- neutron (2:8.4.0-0ubuntu7.2~cloud0) trusty-mitaka; urgency=medium . * New update for the Ubuntu Cloud Archive. . neutron (2:8.4.0-0ubuntu7.2) xenial; urgency=medium . * d/neutron-openvswitch-agent.service.in, d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in: Revert changes made for LP:#1752838 due to regression (LP: #1758411). ** Changed in: cloud-archive/mitaka Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758411 Title: [SRU] Revert fix for bug 1752838 regression Status in Ubuntu Cloud Archive: Fix Released Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in Ubuntu Cloud Archive newton series: Fix Released Status in Ubuntu Cloud Archive ocata series: Fix Released Status in Ubuntu Cloud Archive pike series: Fix Released Status in Ubuntu Cloud Archive queens series: Fix Released Status in neutron package in Ubuntu: Fix Released Status in neutron source package in Xenial: Fix Committed Status in neutron source package in Artful: Fix Committed Status in neutron source package in Bionic: Fix Released Bug description: [Impact] The fix for the following bug was found to cause a regression/race with neutron-ovs-cleanup and neutron-openvswitch-agent where ports/flows get deleted and do not get restored. https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838 [Test Case] * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay * Create instance on gre overlay network * Add FIP to instance * Start a ping to FIP * juju ssh nova-compute/0 * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for qdhcp and qrouter * systemctl restart openvswitch-switch * Check that flows re-added to br-tun (this takes a few seconds for neutron-openvswitch-agent to re-add them) * Check that ping still running [Regression Potential] There should be none as long as the code is reverted to what it was before the SRU for 1752838. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression
This bug was fixed in the package neutron - 2:12.0.0-0ubuntu1.3~cloud0 --- neutron (2:12.0.0-0ubuntu1.3~cloud0) xenial-queens; urgency=medium . * New update for the Ubuntu Cloud Archive. . neutron (2:12.0.0-0ubuntu1.3) bionic; urgency=medium . * d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in: Revert changes made for LP:#1752838 due to regression (LP: #1758411). ** Changed in: cloud-archive/queens Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758411 Title: [SRU] Revert fix for bug 1752838 regression Status in Ubuntu Cloud Archive: Fix Released Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in Ubuntu Cloud Archive newton series: Fix Released Status in Ubuntu Cloud Archive ocata series: Fix Released Status in Ubuntu Cloud Archive pike series: Fix Released Status in Ubuntu Cloud Archive queens series: Fix Released Status in neutron package in Ubuntu: Fix Released Status in neutron source package in Xenial: Fix Committed Status in neutron source package in Artful: Fix Committed Status in neutron source package in Bionic: Fix Released Bug description: [Impact] The fix for the following bug was found to cause a regression/race with neutron-ovs-cleanup and neutron-openvswitch-agent where ports/flows get deleted and do not get restored. https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838 [Test Case] * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay * Create instance on gre overlay network * Add FIP to instance * Start a ping to FIP * juju ssh nova-compute/0 * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for qdhcp and qrouter * systemctl restart openvswitch-switch * Check that flows re-added to br-tun (this takes a few seconds for neutron-openvswitch-agent to re-add them) * Check that ping still running [Regression Potential] There should be none as long as the code is reverted to what it was before the SRU for 1752838. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression
This bug was fixed in the package neutron - 2:11.0.3-0ubuntu1.1~cloud0 --- neutron (2:11.0.3-0ubuntu1.1~cloud0) xenial-pike; urgency=medium . * New update for the Ubuntu Cloud Archive. . neutron (2:11.0.3-0ubuntu1.1) artful; urgency=medium . * New upstream version. * d/p/call-update_all_ha_network_port_statuses-on-agent-start.patch: Dropped. Fixed in new upstream version. * New stable point release for OpenStack Pike (LP: #1758046). * d/neutron-openvswitch-agent.service.in, d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in: Revert changes made for LP:#1752838 due to regression (LP: #1758411). ** Changed in: cloud-archive/pike Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758411 Title: [SRU] Revert fix for bug 1752838 regression Status in Ubuntu Cloud Archive: Fix Released Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in Ubuntu Cloud Archive newton series: Fix Released Status in Ubuntu Cloud Archive ocata series: Fix Released Status in Ubuntu Cloud Archive pike series: Fix Released Status in Ubuntu Cloud Archive queens series: Fix Released Status in neutron package in Ubuntu: Fix Released Status in neutron source package in Xenial: Fix Committed Status in neutron source package in Artful: Fix Committed Status in neutron source package in Bionic: Fix Released Bug description: [Impact] The fix for the following bug was found to cause a regression/race with neutron-ovs-cleanup and neutron-openvswitch-agent where ports/flows get deleted and do not get restored. https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838 [Test Case] * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay * Create instance on gre overlay network * Add FIP to instance * Start a ping to FIP * juju ssh nova-compute/0 * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for qdhcp and qrouter * systemctl restart openvswitch-switch * Check that flows re-added to br-tun (this takes a few seconds for neutron-openvswitch-agent to re-add them) * Check that ping still running [Regression Potential] There should be none as long as the code is reverted to what it was before the SRU for 1752838. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression
This bug was fixed in the package neutron - 2:9.4.1-0ubuntu1~cloud2.2 --- neutron (2:9.4.1-0ubuntu1~cloud2.2) xenial-newton; urgency=medium . * d/neutron-openvswitch-agent.service.in, d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in: Revert changes made for LP:#1752838 due to regression (LP: #1758411). ** Changed in: cloud-archive/newton Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758411 Title: [SRU] Revert fix for bug 1752838 regression Status in Ubuntu Cloud Archive: Fix Released Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in Ubuntu Cloud Archive newton series: Fix Released Status in Ubuntu Cloud Archive ocata series: Fix Released Status in Ubuntu Cloud Archive pike series: Fix Released Status in Ubuntu Cloud Archive queens series: Fix Released Status in neutron package in Ubuntu: Fix Released Status in neutron source package in Xenial: Fix Committed Status in neutron source package in Artful: Fix Committed Status in neutron source package in Bionic: Fix Released Bug description: [Impact] The fix for the following bug was found to cause a regression/race with neutron-ovs-cleanup and neutron-openvswitch-agent where ports/flows get deleted and do not get restored. https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838 [Test Case] * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay * Create instance on gre overlay network * Add FIP to instance * Start a ping to FIP * juju ssh nova-compute/0 * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for qdhcp and qrouter * systemctl restart openvswitch-switch * Check that flows re-added to br-tun (this takes a few seconds for neutron-openvswitch-agent to re-add them) * Check that ping still running [Regression Potential] There should be none as long as the code is reverted to what it was before the SRU for 1752838. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression
This bug was fixed in the package neutron - 2:10.0.4-0ubuntu2~cloud1.2 --- neutron (2:10.0.4-0ubuntu2~cloud1.2) xenial-ocata; urgency=medium . * d/neutron-openvswitch-agent.service.in, d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in: Revert changes made for LP:#1752838 due to regression (LP: #1758411). ** Changed in: cloud-archive/ocata Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1758411 Title: [SRU] Revert fix for bug 1752838 regression Status in Ubuntu Cloud Archive: Fix Released Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in Ubuntu Cloud Archive newton series: Fix Released Status in Ubuntu Cloud Archive ocata series: Fix Released Status in Ubuntu Cloud Archive pike series: Fix Released Status in Ubuntu Cloud Archive queens series: Fix Released Status in neutron package in Ubuntu: Fix Released Status in neutron source package in Xenial: Fix Committed Status in neutron source package in Artful: Fix Committed Status in neutron source package in Bionic: Fix Released Bug description: [Impact] The fix for the following bug was found to cause a regression/race with neutron-ovs-cleanup and neutron-openvswitch-agent where ports/flows get deleted and do not get restored. https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838 [Test Case] * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay * Create instance on gre overlay network * Add FIP to instance * Start a ping to FIP * juju ssh nova-compute/0 * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for qdhcp and qrouter * systemctl restart openvswitch-switch * Check that flows re-added to br-tun (this takes a few seconds for neutron-openvswitch-agent to re-add them) * Check that ping still running [Regression Potential] There should be none as long as the code is reverted to what it was before the SRU for 1752838. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp