[Group.of.nepali.translators] [Bug 1745227] Re: TLS SNI 01 authentication removed, must upgrade to 0.21.0 to renew

2018-03-25 Thread Jeremy Bicha
** Changed in: python-certbot (Ubuntu)
   Importance: Undecided => High

** Changed in: python-certbot (Ubuntu)
   Status: Confirmed => Fix Released

** Also affects: python-certbot (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: python-certbot (Ubuntu Artful)
   Importance: Undecided
   Status: New

** Changed in: python-certbot (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: python-certbot (Ubuntu Xenial)
   Status: New => Triaged

** Changed in: python-certbot (Ubuntu Artful)
   Importance: Undecided => High

** Changed in: python-certbot (Ubuntu Artful)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1745227

Title:
  TLS SNI 01 authentication removed, must upgrade to 0.21.0 to renew

Status in python-certbot package in Ubuntu:
  Fix Released
Status in python-certbot source package in Xenial:
  Triaged
Status in python-certbot source package in Artful:
  Triaged

Bug description:
  https://github.com/certbot/certbot/issues/5405#issuecomment-358524100

  TLS-SNI-01 had a CA security issue in shared hosts, as such the
  letsencrypt CA blocked the auth method. The update is in 0.21.0, until
  it's pushed out renewing will be more difficult as you'll need to
  configure webroot renewals.

  This affects all current and future versions. I'm in 14.04.5 LTS
  I'm on certbot 0.19.0, 20.0-3 is available in The Bionic Beaver

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-certbot/+bug/1745227/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu

2018-03-25 Thread Steve Langasek
** Changed in: linux-meta (Ubuntu Artful)
   Status: Fix Released => Triaged

** Changed in: linux-meta (Ubuntu Xenial)
   Status: Fix Released => Triaged

** Changed in: linux-meta (Ubuntu Trusty)
   Status: Fix Released => Triaged

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1738259

Title:
  need to ensure microcode updates are available to all bare-metal
  installs of Ubuntu

Status in linux-meta package in Ubuntu:
  Triaged
Status in linux-meta-hwe package in Ubuntu:
  New
Status in linux-meta-hwe-edge package in Ubuntu:
  New
Status in linux-meta-lts-xenial package in Ubuntu:
  Triaged
Status in linux-meta source package in Precise:
  New
Status in linux-meta source package in Trusty:
  Triaged
Status in linux-meta source package in Xenial:
  Triaged
Status in linux-meta-hwe source package in Xenial:
  Triaged
Status in linux-meta-hwe-edge source package in Xenial:
  Triaged
Status in linux-meta-lts-xenial source package in Xenial:
  New
Status in linux-meta source package in Zesty:
  Invalid
Status in linux-meta source package in Artful:
  Triaged
Status in linux-meta source package in Bionic:
  Triaged

Bug description:
  From time to time, CPU vendors release updates to microcode that can
  be loaded into the CPU from the OS.  For x86, we have these updates
  available in the archive as amd64-microcode and intel-microcode.

  Sometimes, these microcode updates have addressed security issues with
  the CPU.  They almost certainly will again in the future.

  We should ensure that all users of Ubuntu on baremetal x86 receive
  these security updates, and have them applied to the CPU in early boot
  where at all feasible.

  Because these are hardware-dependent packages which we don't want to
  install except on baremetal (so: not in VMs or containers), the
  logical place to pull them into the system is via the kernel, so that
  only the kernel baremetal flavors pull them in.  This is analogous to
  linux-firmware, which is already a dependency of the linux-
  image-{lowlatency,generic} metapackages, and whose contents are
  applied to the hardware by the kernel similar to microcode.

  So, please update the linux-image-{lowlatency,generic} metapackages to
  add a dependency on amd64-microcode [amd64], intel-microcode [amd64],
  and the corresponding hwe metapackages also.

  Please time this change to coincide with the next updates of the
  microcode packages in the archive.

  I believe we will also need to promote the *-microcode packages to
  main from restricted as part of this (again, by analogy with linux-
  firmware).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu

2018-03-25 Thread Steve Langasek
Indeed, this was reverted and does not appear to have re-landed yet;
resetting the bug state.

** Changed in: linux-meta-lts-xenial (Ubuntu)
   Status: Fix Released => Triaged

** Changed in: linux-meta-hwe-edge (Ubuntu Xenial)
   Status: Fix Released => Triaged

** Changed in: linux-meta-hwe (Ubuntu Xenial)
   Status: Fix Released => Triaged

** Changed in: linux-meta (Ubuntu Bionic)
   Status: Fix Released => Triaged

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1738259

Title:
  need to ensure microcode updates are available to all bare-metal
  installs of Ubuntu

Status in linux-meta package in Ubuntu:
  Triaged
Status in linux-meta-hwe package in Ubuntu:
  New
Status in linux-meta-hwe-edge package in Ubuntu:
  New
Status in linux-meta-lts-xenial package in Ubuntu:
  Triaged
Status in linux-meta source package in Precise:
  New
Status in linux-meta source package in Trusty:
  Fix Released
Status in linux-meta source package in Xenial:
  Fix Released
Status in linux-meta-hwe source package in Xenial:
  Triaged
Status in linux-meta-hwe-edge source package in Xenial:
  Triaged
Status in linux-meta-lts-xenial source package in Xenial:
  New
Status in linux-meta source package in Zesty:
  Invalid
Status in linux-meta source package in Artful:
  Fix Released
Status in linux-meta source package in Bionic:
  Triaged

Bug description:
  From time to time, CPU vendors release updates to microcode that can
  be loaded into the CPU from the OS.  For x86, we have these updates
  available in the archive as amd64-microcode and intel-microcode.

  Sometimes, these microcode updates have addressed security issues with
  the CPU.  They almost certainly will again in the future.

  We should ensure that all users of Ubuntu on baremetal x86 receive
  these security updates, and have them applied to the CPU in early boot
  where at all feasible.

  Because these are hardware-dependent packages which we don't want to
  install except on baremetal (so: not in VMs or containers), the
  logical place to pull them into the system is via the kernel, so that
  only the kernel baremetal flavors pull them in.  This is analogous to
  linux-firmware, which is already a dependency of the linux-
  image-{lowlatency,generic} metapackages, and whose contents are
  applied to the hardware by the kernel similar to microcode.

  So, please update the linux-image-{lowlatency,generic} metapackages to
  add a dependency on amd64-microcode [amd64], intel-microcode [amd64],
  and the corresponding hwe metapackages also.

  Please time this change to coincide with the next updates of the
  microcode packages in the archive.

  I believe we will also need to promote the *-microcode packages to
  main from restricted as part of this (again, by analogy with linux-
  firmware).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1706488] Re: Snaps without icons not showing

2018-03-25 Thread VladBlanton
*** This bug is a duplicate of bug 1697565 ***
https://bugs.launchpad.net/bugs/1697565

** This bug has been marked a duplicate of bug 1697565
   Snaps without icons don't show as installed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1706488

Title:
  Snaps without icons not showing

Status in gnome-software package in Ubuntu:
  Fix Released
Status in gnome-software source package in Xenial:
  Confirmed
Status in gnome-software source package in Zesty:
  Confirmed
Status in gnome-software source package in Artful:
  Fix Released

Bug description:
  [Impact]
  Snaps without an icon (i.e. not provided in snap or in the store) are not 
shown in GNOME Software. This is because GNOME Software fails to get the
  "package-x-generic" default icon.

  [Test Case]
  1. Install a snap without an icon, e.g:
  $ sudo snap install openscad-plars
  2. Start GNOME Software
  3. Click on installed tab

  Expected result:
  The installed snap is show in the list of apps.

  Observed result:
  The snap is not shown.

  [Regression Potential]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-software/+bug/1706488/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758699] [NEW] [CVE] JavaScript in a book can access local files using XMLHttpRequest

2018-03-25 Thread Simon Quigley
Public bug reported:

The E-book viewer in calibre before 2.75 allows remote attackers to read
arbitrary files via a crafted epub file with JavaScript.

** Affects: calibre (Ubuntu)
 Importance: Medium
 Status: Fix Released

** Affects: calibre (Ubuntu Trusty)
 Importance: Medium
 Assignee: Simon Quigley (tsimonq2)
 Status: New

** Affects: calibre (Ubuntu Xenial)
 Importance: Medium
 Assignee: Simon Quigley (tsimonq2)
 Status: New

** Also affects: calibre (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: calibre (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: calibre (Ubuntu Trusty)
 Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: calibre (Ubuntu Xenial)
 Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: calibre (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: calibre (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: calibre (Ubuntu)
   Importance: Undecided => Medium

** Changed in: calibre (Ubuntu)
   Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10187

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758699

Title:
  [CVE] JavaScript in a book can access local files using XMLHttpRequest

Status in calibre package in Ubuntu:
  Fix Released
Status in calibre source package in Trusty:
  New
Status in calibre source package in Xenial:
  New

Bug description:
  The E-book viewer in calibre before 2.75 allows remote attackers to
  read arbitrary files via a crafted epub file with JavaScript.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/calibre/+bug/1758699/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1738259] Re: need to ensure microcode updates are available to all bare-metal installs of Ubuntu

2018-03-25 Thread dino99
Zesty EOL reached

** Changed in: linux-meta (Ubuntu Zesty)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1738259

Title:
  need to ensure microcode updates are available to all bare-metal
  installs of Ubuntu

Status in linux-meta package in Ubuntu:
  Fix Released
Status in linux-meta-hwe package in Ubuntu:
  New
Status in linux-meta-hwe-edge package in Ubuntu:
  New
Status in linux-meta-lts-xenial package in Ubuntu:
  Fix Released
Status in linux-meta source package in Precise:
  New
Status in linux-meta source package in Trusty:
  Fix Released
Status in linux-meta source package in Xenial:
  Fix Released
Status in linux-meta-hwe source package in Xenial:
  Fix Released
Status in linux-meta-hwe-edge source package in Xenial:
  Fix Released
Status in linux-meta-lts-xenial source package in Xenial:
  New
Status in linux-meta source package in Zesty:
  Invalid
Status in linux-meta source package in Artful:
  Fix Released
Status in linux-meta source package in Bionic:
  Fix Released

Bug description:
  From time to time, CPU vendors release updates to microcode that can
  be loaded into the CPU from the OS.  For x86, we have these updates
  available in the archive as amd64-microcode and intel-microcode.

  Sometimes, these microcode updates have addressed security issues with
  the CPU.  They almost certainly will again in the future.

  We should ensure that all users of Ubuntu on baremetal x86 receive
  these security updates, and have them applied to the CPU in early boot
  where at all feasible.

  Because these are hardware-dependent packages which we don't want to
  install except on baremetal (so: not in VMs or containers), the
  logical place to pull them into the system is via the kernel, so that
  only the kernel baremetal flavors pull them in.  This is analogous to
  linux-firmware, which is already a dependency of the linux-
  image-{lowlatency,generic} metapackages, and whose contents are
  applied to the hardware by the kernel similar to microcode.

  So, please update the linux-image-{lowlatency,generic} metapackages to
  add a dependency on amd64-microcode [amd64], intel-microcode [amd64],
  and the corresponding hwe metapackages also.

  Please time this change to coincide with the next updates of the
  microcode packages in the archive.

  I believe we will also need to promote the *-microcode packages to
  main from restricted as part of this (again, by analogy with linux-
  firmware).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression

2018-03-25 Thread Corey Bryant
This bug was fixed in the package neutron - 2:8.4.0-0ubuntu7.2~cloud0
---

 neutron (2:8.4.0-0ubuntu7.2~cloud0) trusty-mitaka; urgency=medium
 .
   * New update for the Ubuntu Cloud Archive.
 .
 neutron (2:8.4.0-0ubuntu7.2) xenial; urgency=medium
 .
   * d/neutron-openvswitch-agent.service.in,
 d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in:
 Revert changes made for LP:#1752838 due to regression (LP: #1758411).


** Changed in: cloud-archive/mitaka
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758411

Title:
  [SRU] Revert fix for bug 1752838 regression

Status in Ubuntu Cloud Archive:
  Fix Released
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in Ubuntu Cloud Archive newton series:
  Fix Released
Status in Ubuntu Cloud Archive ocata series:
  Fix Released
Status in Ubuntu Cloud Archive pike series:
  Fix Released
Status in Ubuntu Cloud Archive queens series:
  Fix Released
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron source package in Xenial:
  Fix Committed
Status in neutron source package in Artful:
  Fix Committed
Status in neutron source package in Bionic:
  Fix Released

Bug description:
  [Impact]

  The fix for the following bug was found to cause a regression/race
  with neutron-ovs-cleanup and neutron-openvswitch-agent where
  ports/flows get deleted and do not get restored.

  https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838

  [Test Case]
  * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay
  * Create instance on gre overlay network
  * Add FIP to instance
  * Start a ping to FIP
  * juju ssh nova-compute/0
  * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for 
qdhcp and qrouter
  * systemctl restart openvswitch-switch
  * Check that flows re-added to br-tun (this takes a few seconds for 
neutron-openvswitch-agent to re-add them)
  * Check that ping still running

  [Regression Potential]

  There should be none as long as the code is reverted to what it was
  before the SRU for 1752838.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression

2018-03-25 Thread Corey Bryant
This bug was fixed in the package neutron - 2:12.0.0-0ubuntu1.3~cloud0
---

 neutron (2:12.0.0-0ubuntu1.3~cloud0) xenial-queens; urgency=medium
 .
   * New update for the Ubuntu Cloud Archive.
 .
 neutron (2:12.0.0-0ubuntu1.3) bionic; urgency=medium
 .
   * d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in:
 Revert changes made for LP:#1752838 due to regression (LP: #1758411).


** Changed in: cloud-archive/queens
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758411

Title:
  [SRU] Revert fix for bug 1752838 regression

Status in Ubuntu Cloud Archive:
  Fix Released
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in Ubuntu Cloud Archive newton series:
  Fix Released
Status in Ubuntu Cloud Archive ocata series:
  Fix Released
Status in Ubuntu Cloud Archive pike series:
  Fix Released
Status in Ubuntu Cloud Archive queens series:
  Fix Released
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron source package in Xenial:
  Fix Committed
Status in neutron source package in Artful:
  Fix Committed
Status in neutron source package in Bionic:
  Fix Released

Bug description:
  [Impact]

  The fix for the following bug was found to cause a regression/race
  with neutron-ovs-cleanup and neutron-openvswitch-agent where
  ports/flows get deleted and do not get restored.

  https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838

  [Test Case]
  * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay
  * Create instance on gre overlay network
  * Add FIP to instance
  * Start a ping to FIP
  * juju ssh nova-compute/0
  * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for 
qdhcp and qrouter
  * systemctl restart openvswitch-switch
  * Check that flows re-added to br-tun (this takes a few seconds for 
neutron-openvswitch-agent to re-add them)
  * Check that ping still running

  [Regression Potential]

  There should be none as long as the code is reverted to what it was
  before the SRU for 1752838.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression

2018-03-25 Thread Corey Bryant
This bug was fixed in the package neutron - 2:11.0.3-0ubuntu1.1~cloud0
---

 neutron (2:11.0.3-0ubuntu1.1~cloud0) xenial-pike; urgency=medium
 .
   * New update for the Ubuntu Cloud Archive.
 .
 neutron (2:11.0.3-0ubuntu1.1) artful; urgency=medium
 .
   * New upstream version.
   * d/p/call-update_all_ha_network_port_statuses-on-agent-start.patch:
 Dropped. Fixed in new upstream version.
   * New stable point release for OpenStack Pike (LP: #1758046).
   * d/neutron-openvswitch-agent.service.in,
 d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in:
 Revert changes made for LP:#1752838 due to regression (LP: #1758411).


** Changed in: cloud-archive/pike
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758411

Title:
  [SRU] Revert fix for bug 1752838 regression

Status in Ubuntu Cloud Archive:
  Fix Released
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in Ubuntu Cloud Archive newton series:
  Fix Released
Status in Ubuntu Cloud Archive ocata series:
  Fix Released
Status in Ubuntu Cloud Archive pike series:
  Fix Released
Status in Ubuntu Cloud Archive queens series:
  Fix Released
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron source package in Xenial:
  Fix Committed
Status in neutron source package in Artful:
  Fix Committed
Status in neutron source package in Bionic:
  Fix Released

Bug description:
  [Impact]

  The fix for the following bug was found to cause a regression/race
  with neutron-ovs-cleanup and neutron-openvswitch-agent where
  ports/flows get deleted and do not get restored.

  https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838

  [Test Case]
  * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay
  * Create instance on gre overlay network
  * Add FIP to instance
  * Start a ping to FIP
  * juju ssh nova-compute/0
  * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for 
qdhcp and qrouter
  * systemctl restart openvswitch-switch
  * Check that flows re-added to br-tun (this takes a few seconds for 
neutron-openvswitch-agent to re-add them)
  * Check that ping still running

  [Regression Potential]

  There should be none as long as the code is reverted to what it was
  before the SRU for 1752838.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression

2018-03-25 Thread Corey Bryant
This bug was fixed in the package neutron - 2:9.4.1-0ubuntu1~cloud2.2
---

 neutron (2:9.4.1-0ubuntu1~cloud2.2) xenial-newton; urgency=medium
 .
   * d/neutron-openvswitch-agent.service.in,
 d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in:
 Revert changes made for LP:#1752838 due to regression (LP: #1758411).


** Changed in: cloud-archive/newton
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758411

Title:
  [SRU] Revert fix for bug 1752838 regression

Status in Ubuntu Cloud Archive:
  Fix Released
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in Ubuntu Cloud Archive newton series:
  Fix Released
Status in Ubuntu Cloud Archive ocata series:
  Fix Released
Status in Ubuntu Cloud Archive pike series:
  Fix Released
Status in Ubuntu Cloud Archive queens series:
  Fix Released
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron source package in Xenial:
  Fix Committed
Status in neutron source package in Artful:
  Fix Committed
Status in neutron source package in Bionic:
  Fix Released

Bug description:
  [Impact]

  The fix for the following bug was found to cause a regression/race
  with neutron-ovs-cleanup and neutron-openvswitch-agent where
  ports/flows get deleted and do not get restored.

  https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838

  [Test Case]
  * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay
  * Create instance on gre overlay network
  * Add FIP to instance
  * Start a ping to FIP
  * juju ssh nova-compute/0
  * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for 
qdhcp and qrouter
  * systemctl restart openvswitch-switch
  * Check that flows re-added to br-tun (this takes a few seconds for 
neutron-openvswitch-agent to re-add them)
  * Check that ping still running

  [Regression Potential]

  There should be none as long as the code is reverted to what it was
  before the SRU for 1752838.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1758411] Re: [SRU] Revert fix for bug 1752838 regression

2018-03-25 Thread Corey Bryant
This bug was fixed in the package neutron - 2:10.0.4-0ubuntu2~cloud1.2
---

 neutron (2:10.0.4-0ubuntu2~cloud1.2) xenial-ocata; urgency=medium
 .
   * d/neutron-openvswitch-agent.service.in,
 d/neutron-openvswitch-agent.neutron-ovs-cleanup.service.in:
 Revert changes made for LP:#1752838 due to regression (LP: #1758411).


** Changed in: cloud-archive/ocata
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1758411

Title:
  [SRU] Revert fix for bug 1752838 regression

Status in Ubuntu Cloud Archive:
  Fix Released
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in Ubuntu Cloud Archive newton series:
  Fix Released
Status in Ubuntu Cloud Archive ocata series:
  Fix Released
Status in Ubuntu Cloud Archive pike series:
  Fix Released
Status in Ubuntu Cloud Archive queens series:
  Fix Released
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron source package in Xenial:
  Fix Committed
Status in neutron source package in Artful:
  Fix Committed
Status in neutron source package in Bionic:
  Fix Released

Bug description:
  [Impact]

  The fix for the following bug was found to cause a regression/race
  with neutron-ovs-cleanup and neutron-openvswitch-agent where
  ports/flows get deleted and do not get restored.

  https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1752838

  [Test Case]
  * Deploy OpenStack Mitaka with one compute, one gateway and gre overlay
  * Create instance on gre overlay network
  * Add FIP to instance
  * Start a ping to FIP
  * juju ssh nova-compute/0
  * Check 'ovs-ofctl dump-flows br-tun' and observe table=20 egress flows for 
qdhcp and qrouter
  * systemctl restart openvswitch-switch
  * Check that flows re-added to br-tun (this takes a few seconds for 
neutron-openvswitch-agent to re-add them)
  * Check that ping still running

  [Regression Potential]

  There should be none as long as the code is reverted to what it was
  before the SRU for 1752838.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1758411/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp