[Bug 1300768] Re: Rsync fails with (very) old server.
Yes, the git HEAD also has the problem. You are right. "upstream bug / by design". I'd think the first, because the commit comment doesn't say "break compatibility with V21 protocol". For me personally I need to be able to rsync to/from the ancient machine this week. I just need to remember to do this from the non 14.04 machines that I have. It's inconvenient, since some of the rsyncs that I need go to a partition that isn't mounted on the non-14.04 machines. So it will have to become a two-step procedure. But that's my workaround. I'll manage. I report bugs like this with the intention to help fix it for the future. When I run into a similar situation again in the future, I prefer to have helped get it fixed as opposed to running into the problems again. I'm guessing that some new feature in the protocol was not properly surrounded with "if (negotiatedprotocol > xxx) .." -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/1300768 Title: Rsync fails with (very) old server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1300768/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang
Actually, because juju-local only supports one architecture (your local machine), it does *not* download the jujud tools from a remote site, but uses the one on your local machine. (It should be put into the juju- local package, rather than being in the 'juju-core' package, but that is just shuffling the executables around.) So I think even the local case is already matching what was expected. The main reason the remote case doesn't just 'apt-get install jujud' on the machines we are starting up, is because that would lead to really out-of-date and fairly incompatible versions of jujud running on a heterogenous system. Having Trusty & Precise machines, would lead to a case where you would only have the jujud that was available on Precise (I'm not even sure if juju-1.0 was available there), mixed with the latest jujud (hopefully 2.0 in Trusty). It would have been possible to follow the cloud-archive model, where we look up the base Ubuntu image in simplestreams, start an instance with that base image, have that image's first step install a custom archive where we keep compatible versions of the jujud binaries in an archive. However, that doesn't solve the multiple-architectures-that- aren't-Ubuntu case, and we already depend on image lookup. I *really* feel like there is a clearcut win to separating what is "juju" the client CLI application that you would install on your desktop from "jujud" the server tools that get installed on the machines that are launched. I think "jujud" the binary should be in the juju-local package, and it would make lots of sense to keep "juju-local" in Universe (as it also allows juju-mongodb to stay in Universe, rsyslog- gnutls, cpu-checker, kvm and LXC support can all be brought in by the juju-local package, and *not* by the relatively small juju package.) I personally think the most productive path forward for Go-in-Ubuntu would be to put effort into the gccgo toolchain, since it is the only one that is going to support PPC/Arm64 anyway. I do think it is a shame to not be using the tool that gets the most focus upstream, but it would fit better into the Ubuntu ecosystem. (We would likely still want to statically compile our jujud binaries, but as they can't really be distributed from the Ubuntu primary archive, I don't think that is particularly problematic.) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-go/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301154] [NEW] python-novaclient needs to bump the epoch like the Debian package
Public bug reported: python-novaclient needs to bump the epoch like the Debian package. this currently prevents python-openstackclient from building, and probably other packages. Please check if you can sync the package from experimental ** Affects: python-novaclient (Ubuntu) Importance: High Assignee: Canonical Server Team (canonical-server) Status: Confirmed ** Affects: python-openstackclient (Ubuntu) Importance: High Assignee: Canonical Server Team (canonical-server) Status: Confirmed ** Affects: python-novaclient (Ubuntu Trusty) Importance: High Assignee: Canonical Server Team (canonical-server) Status: Confirmed ** Affects: python-openstackclient (Ubuntu Trusty) Importance: High Assignee: Canonical Server Team (canonical-server) Status: Confirmed ** Tags: ftbfs ** Also affects: python-novaclient (Ubuntu Trusty) Importance: High Assignee: Canonical Server Team (canonical-server) Status: Confirmed ** Changed in: python-novaclient (Ubuntu Trusty) Milestone: None => ubuntu-14.04 ** Also affects: python-openstackclient (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-novaclient in Ubuntu. https://bugs.launchpad.net/bugs/1301154 Title: python-novaclient needs to bump the epoch like the Debian package To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-novaclient/+bug/1301154/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301154] Re: python-novaclient needs to bump the epoch like the Debian package
or python-openstackclient needs a dependency update on the required version ** Changed in: python-openstackclient (Ubuntu Trusty) Importance: Undecided => High ** Changed in: python-openstackclient (Ubuntu Trusty) Status: New => Confirmed ** Changed in: python-openstackclient (Ubuntu Trusty) Milestone: None => ubuntu-14.04 ** Changed in: python-openstackclient (Ubuntu Trusty) Assignee: (unassigned) => Canonical Server Team (canonical-server) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-novaclient in Ubuntu. https://bugs.launchpad.net/bugs/1301154 Title: python-novaclient needs to bump the epoch like the Debian package To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-novaclient/+bug/1301154/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
** Branch linked: lp:~wallyworld/juju-core/container-provisioner- retrywatcher -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300026] Re: Enlistment/commissioning boot no longer works
** Changed in: maas Milestone: 14.04 => None -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to maas in Ubuntu. https://bugs.launchpad.net/bugs/1300026 Title: Enlistment/commissioning boot no longer works To manage notifications about this bug go to: https://bugs.launchpad.net/maas/+bug/1300026/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1274839] Re: package clamav-freshclam 0.97.8+dfsg-1ubuntu4 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
[Expired for clamav (Ubuntu) because there has been no activity for 60 days.] ** Changed in: clamav (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to clamav in Ubuntu. https://bugs.launchpad.net/bugs/1274839 Title: package clamav-freshclam 0.97.8+dfsg-1ubuntu4 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1274839/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
** Also affects: juju-core Importance: Undecided Status: New ** Changed in: juju-core Assignee: (unassigned) => Ian Booth (wallyworld) ** Changed in: juju-core Milestone: None => 1.17.8 ** Changed in: juju-core Status: New => In Progress ** Changed in: juju-core Importance: Undecided => Critical ** Tags added: lxc regression -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301122] [NEW] Horizon Icehouse rc-1 in trusty does not work out of the box
Public bug reported: Hi, On Precise, using the cloud archive rc-1 packages, horizon works out of the box, installed using: # apt-get install memcached libapache2-mod-wsgi openstack-dashboard (Havana on precise worked in the same way) In Trusty, that install line no longer pulls in apache2, and does not enable the horizon config ... which is probably a good thing, because even with libapache2-mod-wsgi installed: # service apache2 restart * Restarting web server apache2 [fail] * The apache2 configtest failed. Output of config test was: AH00526: Syntax error on line 1 of /etc/apache2/conf-enabled/openstack-dashboard.conf: Invalid command 'WSGIScriptAlias', perhaps misspelled or defined by a module not included in the server configuration Action 'configtest' failed. I'd love to know if I'm going wrong somewhere here :) # apt-cache showpkg libapache2-mod-wsgi Package: libapache2-mod-wsgi Versions: 3.4-4ubuntu2 (/var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_binary-amd64_Packages) (/var/lib/dpkg/status) Description Language: File: /var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_binary-amd64_Packages MD5: 524e8bdbab4989bd739c548590367eb6 Description Language: en File: /var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_i18n_Translation-en MD5: 524e8bdbab4989bd739c548590367eb6 # apt-cache showpkg openstack-dashboard Package: openstack-dashboard Versions: 1:2014.1~rc1-0ubuntu1 (/var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_binary-amd64_Packages) (/var/lib/dpkg/status) Description Language: File: /var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_binary-amd64_Packages MD5: cfa8179aec54fb294480d24dfa12c4c6 Description Language: en File: /var/lib/apt/lists/free.nchc.org.tw_ubuntu_dists_trusty_main_i18n_Translation-en MD5: cfa8179aec54fb294480d24dfa12c4c6 ** Affects: horizon (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1301122 Title: Horizon Icehouse rc-1 in trusty does not work out of the box To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1301122/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1271189] Re: support switching image streams in import ephemerals
See the new bootresources.yaml. ** Changed in: maas Status: Triaged => Fix Committed ** Changed in: maas Milestone: None => 14.04 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to maas in Ubuntu. https://bugs.launchpad.net/bugs/1271189 Title: support switching image streams in import ephemerals To manage notifications about this bug go to: https://bugs.launchpad.net/maas/+bug/1271189/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1257186] Re: memory leakage messages
** Changed in: samba Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1257186 Title: memory leakage messages To manage notifications about this bug go to: https://bugs.launchpad.net/samba/+bug/1257186/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300826] Re: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build
*** This bug is a duplicate of bug 1247531 *** https://bugs.launchpad.net/bugs/1247531 Thank you for taking the time to report this bug and helping to make Ubuntu better. This particular bug has already been reported and is a duplicate of bug 1247531, so it is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Feel free to continue to report any other bugs you may find. ** This bug has been marked a duplicate of bug 1247531 open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build. [error: implicit declaration of function ‘d_alloc_root’] -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to open-vm-tools in Ubuntu. https://bugs.launchpad.net/bugs/1300826 Title: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1300826/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1297077] Re: juju-local should depend on cpu-checker
** Changed in: juju-core Milestone: 1.19.0 => 1.17.8 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1297077 Title: juju-local should depend on cpu-checker To manage notifications about this bug go to: https://bugs.launchpad.net/juju-core/+bug/1297077/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301051] Re: vsftpd will not run on ubuntu 13.10 (Linux 3.11.0-19-generic x86_64)
** Package changed: ubuntu => vsftpd (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to vsftpd in Ubuntu. https://bugs.launchpad.net/bugs/1301051 Title: vsftpd will not run on ubuntu 13.10 (Linux 3.11.0-19-generic x86_64) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/vsftpd/+bug/1301051/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
Seems like it's very easy to repro on AWS. Anything but the bootstrap node gets this when you deploy lxc ala: juju deploy --to lxc:1 ubuntu -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301051] [NEW] vsftpd will not run on ubuntu 13.10 (Linux 3.11.0-19-generic x86_64)
You have been subscribed to a public bug: I tested vsftpd on a 32-bit kernel (3.11.0-19-generic) but when I install it on a 64-bit kernel and upgrade to the current kernel version it fails to start with. Running by hand give the error oops 500 munmap ** Affects: vsftpd (Ubuntu) Importance: Undecided Status: New ** Tags: bot-comment -- vsftpd will not run on ubuntu 13.10 (Linux 3.11.0-19-generic x86_64) https://bugs.launchpad.net/bugs/1301051 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to vsftpd in Ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
Same thing happened on AWS. Steps to reproduce: juju bootstrap juju deploy ubuntu juju deploy ubuntu --to lxc:1 juju ssh 1 tail -f /var/log/juju/machine-1.log You'll see: (...) 2014-04-01 23:22:36 DEBUG juju.worker.logger logger.go:60 logger setup 2014-04-01 23:22:36 DEBUG juju.worker.machineenvironment machineenvironmentworker.go:70 write system files: true 2014-04-01 23:22:36 DEBUG juju.worker.rsyslog worker.go:76 starting rsyslog worker mode 1 for "machine-1" "" 2014-04-01 23:22:36 INFO juju runner.go:262 worker: start "authenticationworker" 2014-04-01 23:22:36 INFO juju.worker.machiner machiner.go:88 setting addresses for machine-1 to ["10.252.117.118" "fe80::2000:aff:fefc:7576"] 2014-04-01 23:22:36 DEBUG juju.worker.logger logger.go:45 reconfiguring logging from "=DEBUG" to "=WARNING;unit=DEBUG" 2014-04-01 23:22:36 WARNING juju.cmd.jujud machine.go:277 determining kvm support: exit status 1 no kvm containers possible 2014-04-01 23:30:48 ERROR juju runner.go:220 worker: exited "lxc-provisioner": permission denied 2014-04-01 23:30:51 ERROR juju runner.go:220 worker: exited "lxc-provisioner": permission denied And no container is created, nor started. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
Deploying a containerized service to the bootstrap node works, i.e.: juju deploy ubuntu --to lxc:0 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1251847] Re: Enable EtherLike-MIB::dot3StatsTable in agent
** Changed in: net-snmp (Debian) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to net-snmp in Ubuntu. https://bugs.launchpad.net/bugs/1251847 Title: Enable EtherLike-MIB::dot3StatsTable in agent To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1251847/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
It's happening for me too. I used the manual provider + kapil's digital ocean plugin. I deployed ubuntu to a new machine, and then another service to lxc on that machine. machine log is attached, this is the last part: 2014-04-01 22:39:27 INFO juju.utils.apt apt.go:126 Running: [apt-get --option=Dpkg::Options::=--force-confold --option=Dpkg::options::=--force-unsafe-io --assume-yes --quiet install --target-release precise-updates/cloud-tools lxc] 2014-04-01 22:39:49 INFO juju runner.go:262 worker: start "lxc-provisioner" 2014-04-01 22:39:49 ERROR juju runner.go:220 worker: exited "lxc-provisioner": permission denied 2014-04-01 22:39:49 INFO juju runner.go:254 worker: restarting "lxc-provisioner" in 3s 2014-04-01 22:39:52 INFO juju runner.go:262 worker: start "lxc-provisioner" 2014-04-01 22:39:52 ERROR juju runner.go:220 worker: exited "lxc-provisioner": permission denied 2014-04-01 22:39:52 INFO juju runner.go:254 worker: restarting "lxc-provisioner" in 3s And then it just loops. ** Attachment added: "machine-6.log" https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+attachment/4059474/+files/machine-6.log -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299588] Re: LXC permission denied issue with 1.17.7
** Tags added: landscape -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1299588 Title: LXC permission denied issue with 1.17.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/juju-core/+bug/1299588/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
Re: [Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang
On Sat, Mar 29, 2014 at 04:24:22AM -, Gustavo Niemeyer wrote: > [Steve] > > My biggest concern here is that making golang-go genuinely supportable > > in the distro context means supporting dynamic linking, and the Go > > upstream community appears to be quite hostile to the principle of > > dynamic linking. > That sounds like an overstatement. It is true that the Go community > appreciates static linkage, and some members have public sayings about > how dynamic linkage has its own issues, neither the Go community nor the > Go core development team (most important in this case) is not hostile to > dynamic linking. Ok, thanks for setting me straight on this. On Mon, Mar 31, 2014 at 01:30:45PM -, Mark Ramm wrote: > I think a key point here is that the juju package does not generally > install or pull down binaries from anywhere to your machine. It does > instruct the cloud installation of a server to use a specific ubuntu > image from simplestreams and a specific jujud binary (also from > simplestreams) on the remote host. I agree with Martin; the fact that these binaries do not originate in the Ubuntu archive, and are not subjected to the normal standards and procedures for the Ubuntu archive, is very concerning. Using simplestreams as the distribution method or not makes no difference to me - but the actual software that's being distributed should be built using Ubuntu best practices. We've been turning a blind eye to this so long as the package has been in universe. I don't think we want juju-core to go into main until jujud is also brought "in house" in Ubuntu. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-go/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
Re: [Bug 1267393] Re: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang
> Since we are dropping this MIR for this cycle, can we setup time to go > through this issue across the teams, and get alignment after the > release, but before the Juju cloud sprint at the end of April? +1. Feel free to bring myself or Adam (or both) into this conversation. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to golang in Ubuntu. https://bugs.launchpad.net/bugs/1267393 Title: [MIR] juju-core, juju-mongodb, gccgo-go, gccgo-4.9, golang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gccgo-go/+bug/1267393/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1279000] Re: db migrate script to set charset=utf8 for all tables
See bug 1301036 for the keystone issue ** No longer affects: keystone -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to glance in Ubuntu. https://bugs.launchpad.net/bugs/1279000 Title: db migrate script to set charset=utf8 for all tables To manage notifications about this bug go to: https://bugs.launchpad.net/glance/+bug/1279000/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299055] Re: Standing FFe for icehouse
** Branch linked: lp:~corey.bryant/glance/2014.1.rc1 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1299055 Title: Standing FFe for icehouse To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1299055/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1301019] [NEW] hyper-v: ifdown command not working due to bad ifstate
Public bug reported: It appears that ifdown command is not working because “/run/network/ifstate" does not contain eth0=eth0. This in turn causes hyper-v's script hv_set_ifconfig.sh to fail as follows: root@ubuntu:~# ./hv_set_ifconfig.sh /var/lib/hyperv/ifcfg-eth0 ifdown: interface eth0 not configured RTNETLINK answers: File exists Failed to bring up eth0. It appears that something is wrong with your core networking files for trusty. Please could you help fix? Thanks, Abhishek ** Affects: ubuntu Importance: Undecided Status: New ** Package changed: hv-kvp-daemon-init (Ubuntu) => ubuntu ** Summary changed: - ifdown command not working due to bad ifstate + hyper-v: ifdown command not working due to bad ifstate -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to hv-kvp-daemon-init in Ubuntu. https://bugs.launchpad.net/bugs/1301019 Title: hyper-v: ifdown command not working due to bad ifstate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1301019/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1279000] Re: db migrate script to set charset=utf8 for all tables
** Changed in: glance Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to glance in Ubuntu. https://bugs.launchpad.net/bugs/1279000 Title: db migrate script to set charset=utf8 for all tables To manage notifications about this bug go to: https://bugs.launchpad.net/glance/+bug/1279000/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300940] Re: vtysh fails to compile in quagga 0.99.22.4
Please close. It's a configure flag: ./configure --enable-user=root --enable-group=root --enable-vty-group=root --sysconfdir=/usr/local/etc/quagga --localstatedir=/var/run/quagga --enable-vtysh --with-libpam -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to quagga in Ubuntu. https://bugs.launchpad.net/bugs/1300940 Title: vtysh fails to compile in quagga 0.99.22.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quagga/+bug/1300940/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300522] Re: Testsuite failure in rc1
** Changed in: nova (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1300522 Title: Testsuite failure in rc1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nova/+bug/1300522/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300941] Re: user-data on OpenNebula restricted to shell sourceable content
This bug was fixed in the package cloud-init - 0.7.5-0ubuntu1 --- cloud-init (0.7.5-0ubuntu1) trusty; urgency=medium * New upstream release. * support base64 encoded user-data in OpenNebula, required to allow arbitrary content in user-data (LP: #1300941) * pep8 and pylint fixes -- Scott MoserTue, 01 Apr 2014 14:39:03 -0400 ** Changed in: cloud-init (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300941 Title: user-data on OpenNebula restricted to shell sourceable content To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1300941/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299055] Re: Standing FFe for icehouse
This bug was fixed in the package nova - 1:2014.1~rc1-0ubuntu1 --- nova (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/control: Use python-oslosphinx instead of python-oslo.sphinx. * debian/patches/use-oslo.sphinx-namespace.patch: Dropped no longer needed because of the python-oslo.sphinx rename. * debian/patches/arm-console-patch.patch: Fix typo in patch to allow booting ARM vm. * debian/nova-common.install: Remove nova-rpc-zmq-receiver, it has been removed upstream. [ Corey Bryant ] * New upstream release. (LP: #1299055) -- Corey BryantMon, 31 Mar 2014 16:21:50 -0400 ** Changed in: nova (Ubuntu Trusty) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1299055 Title: Standing FFe for icehouse To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1299055/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1288696] Re: Unable to migrate from ovs to ml2 plugin
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1288696 Title: Unable to migrate from ovs to ml2 plugin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1288696/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1255420] Re: Neutron Mellanox plugin package is missing
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1255420 Title: Neutron Mellanox plugin package is missing To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1255420/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1291535] Re: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1291535 Title: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1291535/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1298676] Re: l3 agent should include fwaas_driver.ini
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1298676 Title: l3 agent should include fwaas_driver.ini To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1298676/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1293632] Re: One Convergence NVSD plugin agent missing
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1293632 Title: One Convergence NVSD plugin agent missing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1293632/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1298675] Re: VPN agent upstart configuration needs to reference l3_agent.ini
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1 --- neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium [ Chuck Short ] * debian/rules: Run testr init before tests. * debian/patches/disable-udev-tests.patch: Refresh. * d/control,neutron-plugin-oneconvergence*: Add One Convergence plugin and agent (LP: #1293632). [ James Page ] * New upstream release candidate (LP: #1288696, #1291535). * d/control,neutron-mlnx-plugin{-agent}.install: Split out Mellanox plugin configuration from agent package (LP: #1255420). * d/control,neutron-{plugin-}{vpn|metering}-agent.*: Drop -plugin from metering and vpn agents (they are not plugins) and deal with associated change in name of upstart configurations. * d/neutron-l3-agent.{install,upstart}: Install fwaas_driver.ini with l3-agent and add to config-file path in upstart configuration (LP: #1298676). * d/neutron-vpn-agent.upstart,control: Include l3_agent.ini on upstart config-file path, add dependency on neutron-l3-agent (LP: #1298675). -- James PageTue, 01 Apr 2014 16:22:54 +0100 ** Changed in: neutron (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1298675 Title: VPN agent upstart configuration needs to reference l3_agent.ini To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1298675/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-1311-cloud-init] cloud-init
Blueprint changed by Scott Moser: Work items changed: Work items for ubuntu-13.12: sysvinit invoke-rc.d clean out eatmydata (bug 1257036): DONE eatmydata support in cloud-init (bug 1236531): DONE eatmydata in cloud-images: DONE Work items for ubuntu-14.01: address plymouth loss of console output (bug 1235231): INPROGRESS boot performance investigation: POSTPONED boot performance improvements: POSTPONED - cloud-init 0.7.5 call for testing: TODO + cloud-init 0.7.5 call for testing: DONE cloud-init-manual (used by juju manual provider): POSTPONED vendor-data support in cloud-init: DONE Work items for ubuntu-14.02: eatmydata MIR (bug 1126328): DONE - cloud-init 0.7.5 release: TODO + cloud-init 0.7.5 release: DONE -- cloud-init https://blueprints.launchpad.net/ubuntu/+spec/servercloud-1311-cloud-init -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300941] Re: user-data on OpenNebula restricted to shell sourceable content
fix-released in 0.7.5. ** Changed in: cloud-init Status: Fix Committed => Fix Released ** Changed in: cloud-init (Ubuntu) Status: New => In Progress ** Changed in: cloud-init (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300941 Title: user-data on OpenNebula restricted to shell sourceable content To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1300941/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300941] Re: user-data on OpenNebula restricted to shell sourceable content
** Branch linked: lp:ubuntu/cloud-init -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300941 Title: user-data on OpenNebula restricted to shell sourceable content To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1300941/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300941] [NEW] user-data on OpenNebula restricted to shell sourceable content
Public bug reported: OpenNebula uses a text file with shell variables for storing the configuration variables (including user provided data). Some user data may not be renderable into this format, so using base64 encoding alleviates the problem. This change considers that, by default, USERDATA variable contains a base64 encoded string with the user provided data. This behavior can be deactivated by defining the USERDATA_ENCODING variable to anything different to "base64" (similarly to the Azure data source). This feature is of special interest for resource providers with rOCCI- server front-end as the ones in EGI's Federated Cloud (https://wiki.egi.eu/wiki/Fedcloud-tf:Main) ** Affects: cloud-init Importance: Medium Status: Fix Released ** Affects: cloud-init (Ubuntu) Importance: Medium Status: In Progress ** Branch linked: lp:~enolfc/cloud-init/opennebula-b64-userdata ** Also affects: cloud-init Importance: Undecided Status: New ** Changed in: cloud-init Status: New => Fix Committed ** Changed in: cloud-init Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300941 Title: user-data on OpenNebula restricted to shell sourceable content To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1300941/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300940] [NEW] vtysh fails to compile in quagga 0.99.22.4
Public bug reported: quagga version 0.99.22.4 on ubuntu 14.04beta2 apt-get source quagga apt-get build-dep quagga cd quagga-0.99.22.4/ ./configure; make; sudo make install <-- seems to compile successfully; but on closer examination, vtysh didn't successfully build and no vtysh binary is installed --> However, the distributed binary deb package which contains a vtysh binary. Why doesn't source compile a vtysh binary? ** Affects: quagga (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to quagga in Ubuntu. https://bugs.launchpad.net/bugs/1300940 Title: vtysh fails to compile in quagga 0.99.22.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quagga/+bug/1300940/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1240049] Re: multipath udev rules problem
the last Version from 2013-12-17 on http://christophe.varoqui.free.fr/ is multipath-tools-0.5.0 Changes : *scsi3 persistent reservations on multipaths *systemd integration ^^^ *better udev integration (get device events and ids from udev) *kpartx support for non-512b blocksize disks *multipathd maintenance of important kernel tunable like oom_score_adj, dev_loss_tmo and fast_io_fail *followover failback mode *handle offline paths and quiesced rports *more synthetic and informative logs *better threading and performance *tons of bugfixes and stability improvements -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to multipath-tools in Ubuntu. https://bugs.launchpad.net/bugs/1240049 Title: multipath udev rules problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/multipath-tools/+bug/1240049/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1295223] Re: seedfrom cmdline option broken in 0.7.5
** Branch linked: lp:ubuntu/cloud-init -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1295223 Title: seedfrom cmdline option broken in 0.7.5 To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1295223/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-1311-openstack-charms] OpenStack Charms
Blueprint changed by James Page: Work items changed: Work items for ubuntu-13.11: [yolanda.robla] Charm Heat: DONE [james-page] Complete charms for ceilometer: DONE Work items for ubuntu-13.12: [james-page] Bundles for OpenStack: DONE Work items for ubuntu-14.04-alpha-2: [james-page] Switch to ML2 plugin by default for neutron: DONE Work items: [yolanda.robla] Active/active rabbitmq across openstack charms: DONE [yolanda.robla] VMWare virt type on nova-compute (pending NVP test): INPROGRESS [teknico] Simplestreams image sync charm: INPROGRESS [james-page] Add multiple backend support to cinder: DONE [james-page] Refactor ceph cinder integration as backend subordinate: INPROGRESS Write vmware storage backend subordinate: TODO [james-page] Add metering support to quantum-gateway charm: DONE [yolanda.robla] postgresql support across all openstack charms: DONE [yolanda.robla] Update glance/cinder to use alternatives for ceph configuration file (mps sent): DONE - General review/update of API versions across all charms: TODO + General review/update of API versions across all charms: DONE [ivoks] (+ james-page) keystone redux + unit testing: INPROGRESS - swift-proxy unit testing: TODO - nova-compute unit testing: TODO - nova-cloud-controller unit testing: TODO + swift-proxy unit testing: POSTPONED + nova-compute unit testing: POSTPONED + nova-cloud-controller unit testing: POSTPONED General improvements in HA Cluster configuration across charms: TODO - HA cluster in-depth monitoring: TODO - Review multiple network support across charms: TODO + HA cluster in-depth monitoring: POSTPONED + Review multiple network support across charms: POSTPONED SSL support in ceilometer: TODO SSL support in heat: TODO Split neutron API from nova-cloud-controller: POSTPONED Refactor openvswitch l2 agent into subordinate: POSTPONED - Ephemeral ceph backend for nova-compute: TODO - Cells support for Nova: TODO - Spice/VNC support in nova charms: TODO - Multi-hypervisor support in nova charms: TODO - Charm developer documentation: TODO - Charm template for charm-tools: TODO - Nagios nrpe sub-ordinate support for OpenStack charms: TODO - [yolanda.robla] Remote syslog support for OpenStack charms: INPROGRESS + Ephemeral ceph backend for nova-compute: POSTPONED + Cells support for Nova: POSTPONED + Spice/VNC support in nova charms: POSTPONED + Multi-hypervisor support in nova charms: POSTPONED + Charm developer documentation: POSTPONED + Charm template for charm-tools: POSTPONED + Nagios nrpe sub-ordinate support for OpenStack charms: POSTPONED + [yolanda.robla] Remote syslog support for OpenStack charms: DONE -- OpenStack Charms https://blueprints.launchpad.net/ubuntu/+spec/servercloud-1311-openstack-charms -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1240049] Re: multipath udev rules problem
We have the same problem with 14.04 I hope the bug will be fixed until the release. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to multipath-tools in Ubuntu. https://bugs.launchpad.net/bugs/1240049 Title: multipath udev rules problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/multipath-tools/+bug/1240049/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1297487] Re: MTU not honored in virtio vnet
** Also affects: qemu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1297487 Title: MTU not honored in virtio vnet To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1297487/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1288696] Re: Unable to migrate from ovs to ml2 plugin
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1288696 Title: Unable to migrate from ovs to ml2 plugin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1288696/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1255420] Re: Neutron Mellanox plugin package is missing
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1255420 Title: Neutron Mellanox plugin package is missing To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1255420/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1293632] Re: One Convergence NVSD plugin agent missing
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1293632 Title: One Convergence NVSD plugin agent missing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1293632/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1298675] Re: VPN agent upstart configuration needs to reference l3_agent.ini
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1298675 Title: VPN agent upstart configuration needs to reference l3_agent.ini To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1298675/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1298676] Re: l3 agent should include fwaas_driver.ini
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1298676 Title: l3 agent should include fwaas_driver.ini To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1298676/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1291535] Re: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module
** Branch linked: lp:ubuntu/trusty-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1291535 Title: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1291535/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300814] Re: Tables "migrate_version" have non utf8 collation
** Summary changed: - Tables "migrate_version" have non utf8 collation, + Tables "migrate_version" have non utf8 collation -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1300814 Title: Tables "migrate_version" have non utf8 collation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keystone/+bug/1300814/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300779] Re: No network adapters found in ppc64el cloud-image
Rafael, Could you please open this bug on Tasty taco other than in cloud-init project? Trusty taco is the place where we are tracking ppc64el bugs. Thanks ** Changed in: cloud-init (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300779 Title: No network adapters found in ppc64el cloud-image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1300779/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1292548] Re: smb.conf contains valid users = %S in [global]
** Summary changed: - Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server + smb.conf contains valid users = %S in [global] ** Changed in: samba (Ubuntu Trusty) Status: Confirmed => Triaged -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1292548 Title: smb.conf contains valid users = %S in [global] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1292548/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1261873] Re: [trusty] "usershare" access denied error (leads to non working nautilus samba sharing)
This bug was fixed in the package samba - 2:4.1.3+dfsg-2ubuntu5 --- samba (2:4.1.3+dfsg-2ubuntu5) trusty; urgency=medium * debian/smb.conf: comment back some of the "share definitions" options (including "valid users"). That was an Ubuntu diff and seems to have been dropped in the trusty merge. Those changes seem needed to get the usershare feature working (used by nautilus-share) (lp: #1261873) -- Sebastien BacherTue, 01 Apr 2014 16:01:04 +0200 ** Changed in: samba (Ubuntu Trusty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1261873 Title: [trusty] "usershare" access denied error (leads to non working nautilus samba sharing) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1261873/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1292548] Re: Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server
Thanks! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1292548 Title: smb.conf contains valid users = %S in [global] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1292548/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1292548] Re: Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: samba (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1292548 Title: smb.conf contains valid users = %S in [global] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1292548/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1296289] Re: smb.conf contains valid users = %S in [global]
*** This bug is a duplicate of bug 1292548 *** https://bugs.launchpad.net/bugs/1292548 Thank you for taking the time to report this bug and helping to make Ubuntu better. Your report clued me in to what is going on - thanks! There's a duplicate in bug 1292548. I'll mark this one as a dupe of that one, since there's more investigation in that bug. ** This bug has been marked a duplicate of bug 1292548 Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1296289 Title: smb.conf contains valid users = %S in [global] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1296289/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1294823] Re: FFE: create a trusty machine type
FFe bugs must be in new/confirmed for the release team to look at them, the Triaged status is for approved FFes. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1294823 Title: FFE: create a trusty machine type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1294823/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1294823] Re: FFE: create a trusty machine type
Sounds like something useful to me, granted. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1294823 Title: FFE: create a trusty machine type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1294823/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300878] [NEW] panic while renaming file
Public bug reported: Version: 2:4.1.3+dfsg-2ubuntu4 from log file: 2014/04/01 16:38:11.053394, 0] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) lock order: 1:/var/run/samba/locking.tdb 2: 3: [2014/04/01 16:38:11.053568, 0] ../source3/lib/util.c:785(smb_panic_s3) PANIC (pid 1817): invalid lock_order [2014/04/01 16:38:11.056407, 0] ../source3/lib/util.c:896(log_stack_trace) BACKTRACE: 33 stack frames: #0 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(log_stack_trace+0x1a) [0x7fc2a8650eba] #1 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(smb_panic_s3+0x20) [0x7fc2a8650f90] #2 /usr/lib/x86_64-linux-gnu/libsamba-util.so.0(smb_panic+0x2f) [0x7fc2a9b79c6f] #3 /usr/lib/x86_64-linux-gnu/samba/libdbwrap.so.0(+0x3255) [0x7fc2a511e255] #4 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smbXsrv_open_create+0x19a) [0x7fc2a97954ca] #5 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(file_new+0x73) [0x7fc2a96fa493] #6 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(+0xf93dd) [0x7fc2a974d3dd] #7 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(create_file_default+0x1ba) [0x7fc2a974e4fa] #8 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(+0x1c4beb) [0x7fc2a9818beb] #9 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smb_vfs_call_create_file+0xa5) [0x7fc2a9754ab5] #10 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(open_file_fchmod+0x80) [0x7fc2a974c7a0] #11 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(file_set_dosmode+0x2f9) [0x7fc2a9743e99] #12 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(rename_internals_fsp+0xa0f) [0x7fc2a9726c6f] #13 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smbd_do_setfilepathinfo+0x178c) [0x7fc2a973c4bc] #14 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smbd_smb2_request_process_setinfo+0x46f) [0x7fc2a978e8bf] #15 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smbd_smb2_request_dispatch+0x8b1) [0x7fc2a977cd01] #16 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(+0x12958f) [0x7fc2a977d58f] #17 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(+0x12648c) [0x7fc2a977a48c] #18 /usr/lib/x86_64-linux-gnu/samba/libsamba-sockets.so.0(+0x9c74) [0x7fc2a8422c74] #19 /usr/lib/x86_64-linux-gnu/samba/libsamba-sockets.so.0(+0x97a9) [0x7fc2a84227a9] #20 /usr/lib/x86_64-linux-gnu/samba/libsamba-sockets.so.0(+0x8686) [0x7fc2a8421686] #21 /usr/lib/x86_64-linux-gnu/libtevent.so.0(tevent_common_loop_immediate+0xd4) [0x7fc2a703fe14] #22 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(run_events_poll+0x3c) [0x7fc2a8666f7c] #23 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(+0x37264) [0x7fc2a8667264] #24 /usr/lib/x86_64-linux-gnu/libtevent.so.0(_tevent_loop_once+0x8d) [0x7fc2a703f5ed] #25 /usr/lib/x86_64-linux-gnu/samba/libsmbd_base.so.0(smbd_process+0x9d5) [0x7fc2a9768fd5] #26 smbd(+0x9fa4) [0x7fc2aa1ddfa4] #27 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(run_events_poll+0x16c) [0x7fc2a86670ac] #28 /usr/lib/x86_64-linux-gnu/libsmbconf.so.0(+0x37300) [0x7fc2a8667300] #29 /usr/lib/x86_64-linux-gnu/libtevent.so.0(_tevent_loop_once+0x8d) [0x7fc2a703f5ed] #30 smbd(main+0x13eb) [0x7fc2aa1dab8b] #31 /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf5) [0x7fc2a6c97ec5] #32 smbd(+0x6f1d) [0x7fc2aa1daf1d] [2014/04/01 16:38:11.059231, 0] ../source3/lib/dumpcore.c:317(dump_core) dumping core in /var/log/samba/cores/smbd # gdb /usr/sbin/smbd /var/log/samba/cores/smbd/core ... (gdb) bt full #0 0x7fc2a6cacf79 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 resultvar = 0 pid = 1817 selftid = 1817 #1 0x7fc2a6cb0388 in __GI_abort () at abort.c:89 save_stage = 2 act = {__sigaction_handler = {sa_handler = 0x4, sa_sigaction = 0x4}, sa_mask = {__val = {140474084789504, 140474049955744, 140474052240727, 140471200382977, 0, 0, 140473998495016, 502, 140474049955744, 140473969806672, 140474052269333, 140474047766096, 18446744073709551615, 140474050024256, 140735896838208, 6}}, sa_flags = -1591516624, sa_restorer = 0x0} sigs = {__val = {32, 0 }} #2 0x7fc2a865eecb in dump_core () at ../source3/lib/dumpcore.c:336 called = true __FUNCTION__ = "dump_core" #3 0x7fc2a8650ff7 in smb_panic_s3 (why=) at ../source3/lib/util.c:808 cmd = result = __FUNCTION__ = "smb_panic_s3" #4 0x7fc2a9b79c6f in smb_panic (why=why@entry=0x7fc2a5122b1c "invalid lock_order") at ../lib/util/fault.c:159 No locals. #5 0x7fc2a511e255 in dbwrap_check_lock_order (mem_ctx=0x7fc2abec8550, db=0x7fc2abe928a0) at ../lib/dbwrap/dbwrap.c:195 idx = state = 0x0 locked_dbs = {0x7fc2abe89700, 0x0, 0x0} #6 dbwrap_fetch_locked_internal (db=db@entry=0x7fc2abe928a0, mem_ctx=mem_ctx@entry=0x7fc2abec8d00, key=..., db_fn=0x7fc2a5120d50 ) at ../lib/dbwrap/dbwrap.c:225 rec = frame = 0x7fc2abec8550 #7 0x7fc
[Bug 1292548] Re: Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server
Hi Robie, Yes, there is a "valid users = %S" line present in the smb.conf file. When I comment it out, smbclient -L works as expected. What i did: 1) Comment out "valid users = %S", see the diff: > root@ubuntu:/etc/samba# diff -u ~/smb.conf.old smb.conf > --- /root/smb.conf.old 2014-04-01 18:19:16.880909594 +0200 > +++ smb.conf2014-04-01 18:19:40.065312095 +0200 > @@ -211,7 +211,7 @@ > # The following parameter makes sure that only "username" can connect > # to \\server\username > # This might need tweaking when using external authentication schemes > - valid users = %S > +; valid users = %S > > # Un-comment the following and create the netlogon directory for Domain > Logons > # (you need to configure Samba to act as a domain controller too.) 2) Restart samba: > root@ubuntu:/etc/samba# service samba restart 3) Test the connectivity: > root@ubuntu:/etc/samba# smbclient -L \\localhost -U ubuntu > Enter ubuntu's password: > Domain=[WORKGROUP] OS=[Unix] Server=[Samba 4.1.3-Ubuntu] > > Sharename Type Comment > - --- > IPC$IPC IPC Service (ubuntu server (Samba, Ubuntu)) > print$ Disk Printer Drivers > Domain=[WORKGROUP] OS=[Unix] Server=[Samba 4.1.3-Ubuntu] > > Server Comment > ---- > UBUNTU ubuntu server (Samba, Ubuntu) > > WorkgroupMaster > ---- > WORKGROUPUBUNTU There are a number of other options which IMHO are placed under [homes] but are commented in: Here the full, unchanged default smb.conf file (read only, create mask, directory mask, valid users): c u t #=== Share Definitions === # Un-comment the following (and tweak the other settings below to suit) # to enable the default home directory shares. This will share each # user's home directory as \\server\username ;[homes] ; comment = Home Directories ; browseable = no # By default, the home directories are exported read-only. Change the # next parameter to 'no' if you want to be able to write to them. read only = yes # File creation mask is set to 0700 for security reasons. If you want to # create files with group=rw permissions, set next parameter to 0775. create mask = 0700 # Directory creation mask is set to 0700 for security reasons. If you want to # create dirs. with group=rw permissions, set next parameter to 0775. directory mask = 0700 # By default, \\server\username shares can be connected to by anyone # with access to the samba server. # The following parameter makes sure that only "username" can connect # to \\server\username # This might need tweaking when using external authentication schemes valid users = %S # Un-comment the following and create the netlogon directory for Domain Logons # (you need to configure Samba to act as a domain controller too.) ;[netlogon] ; comment = Network Logon Service ; path = /home/samba/netlogon ; guest ok = yes ; read only = yes # Un-comment the following and create the profiles directory to store # users profiles (see the "logon path" option above) # (you need to configure Samba to act as a domain controller too.) # The path below should be writable by all users so that their # profile directory may be created the first time they log on ;[profiles] ; comment = Users profiles ; path = /home/samba/profiles ; guest ok = no ; browseable = no ; create mask = 0600 ; directory mask = 0700 [printers] comment = All Printers c u t Also, i compared this with to the smb.conf from samba 2:4.1.6+dfsg-1 which i took from Debian Jessie and applied on my Ubuntu 14.04 "Ubuntu Trusty Tahr (development branch)". In this configuration, everything below "[homes]" is commented out. Cheers, Raoul -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1292548 Title: Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to 2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1292548/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1294823] Re: FFE: create a trusty machine type
Hi - I notice that this hasn't yet gotten an ack/nack from the release team. Ping? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1294823 Title: FFE: create a trusty machine type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1294823/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1298998] Re: FFE for ceilometer 2014.1.rc1
Covered under standing FFe ** Changed in: ceilometer (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ceilometer in Ubuntu. https://bugs.launchpad.net/bugs/1298998 Title: FFE for ceilometer 2014.1.rc1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1298998/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300804] Re: FFE for oslo.messaging 1.3.0
This bug was fixed in the package oslo.messaging - 1.3.0-0ubuntu1 --- oslo.messaging (1.3.0-0ubuntu1) trusty; urgency=medium * New upstream release. (LP: #1300804) * debian/patches/skip-qpid-tests.patch: Skip qpid tests if qpid is not installed. -- Chuck ShortTue, 01 Apr 2014 10:09:49 -0400 ** Changed in: oslo.messaging (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to oslo.messaging in Ubuntu. https://bugs.launchpad.net/bugs/1300804 Title: FFE for oslo.messaging 1.3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oslo.messaging/+bug/1300804/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-1311-curtin] Curtin
Blueprint changed by Scott Moser: Work items changed: Work items for ubuntu-13.12: - kexec support: INPROGRESS + kexec support: DONE config-archive support: DONE change maas template to use config-archive: POSTPONED Work items for ubuntu-14.01: LVM/RAID support: POSTPONED non-destructive install: DONE UEFI support: POSTPONED support for hardware enablement kernels in install: DONE Work items for ubuntu-14.02: documentation improvements: TODO -- Curtin https://blueprints.launchpad.net/ubuntu/+spec/servercloud-1311-curtin -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300768] Re: Rsync fails with (very) old server.
Thanks! It's not completely clear to me. Did you find that the latest git HEAD does have the problem? If so, then it looks to me that this is either an upstream bug or done by design upstream. For both of those cases, I don't think we'll be able to do anything about this in Ubuntu directly, but we could cherry-pick something from upstream if they decided it was a bug and fixed it. Alternatively, is there some other solution you have in mind? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/1300768 Title: Rsync fails with (very) old server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1300768/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300768] Re: Rsync fails with (very) old server.
I got the git upstream sources. I used "git bisect" for the first time. Out of 356 commits between 3.0.9 and the current version [8b3e60523aa3d86583a1df54c81c9d480ea19740] Improved the fix that ensures that the generator gets notified about an I/O error for the incremental directory that generated the error. The PROTOCOL_VERSION was bumped to 31 to implement this. is the one that causes the problem. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/1300768 Title: Rsync fails with (very) old server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1300768/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1081489] Re: autofs package is missing the lookup_sss.so module(!); negating autofs-enabled sssd functionality (automount fails)
This bug was fixed in the package autofs - 5.0.7-3ubuntu2 --- autofs (5.0.7-3ubuntu2) trusty; urgency=medium * Add support for sssd backend (LP: #1081489) - control: Add sssd-common to build-depends. - rules: Set sssldir for the sssd module so autoreconf knows about it. -- Timo AaltonenFri, 31 Jan 2014 13:57:03 +0200 ** Changed in: autofs (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to autofs in Ubuntu. https://bugs.launchpad.net/bugs/1081489 Title: autofs package is missing the lookup_sss.so module(!); negating autofs-enabled sssd functionality (automount fails) To manage notifications about this bug go to: https://bugs.launchpad.net/linuxmint/+bug/1081489/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1291535] Related fix proposed to neutron (master)
Related fix proposed to branch: master Review: https://review.openstack.org/84462 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1291535 Title: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1291535/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1279000] Re: db migrate script to set charset=utf8 for all tables
** Also affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to glance in Ubuntu. https://bugs.launchpad.net/bugs/1279000 Title: db migrate script to set charset=utf8 for all tables To manage notifications about this bug go to: https://bugs.launchpad.net/glance/+bug/1279000/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300826] Re: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to open-vm-tools in Ubuntu. https://bugs.launchpad.net/bugs/1300826 Title: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1300826/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300826] [NEW] open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build
Public bug reported: Present upgrade (1 Apr 2014) failed to complete ProblemType: Package DistroRelease: Ubuntu 12.04 Package: open-vm-dkms 2011.12.20-562307-0ubuntu1 ProcVersionSignature: Ubuntu 3.5.0-47.71~precise1-generic 3.5.7.30 Uname: Linux 3.5.0-47-generic x86_64 ApportVersion: 2.0.1-0ubuntu17.6 Architecture: amd64 DKMSKernelVersion: 3.5.0-48-generic Date: Tue Apr 1 15:31:41 2014 InstallationMedia: Ubuntu 12.04.2 LTS "Precise Pangolin" - Release amd64 (20130213) MarkForUpload: True PackageArchitecture: all PackageVersion: 2011.12.20-562307-0ubuntu1 SourcePackage: open-vm-tools Title: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: open-vm-tools (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to open-vm-tools in Ubuntu. https://bugs.launchpad.net/bugs/1300826 Title: open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/open-vm-tools/+bug/1300826/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1135780] Re: ntp apparmor denied read of /usr/share/samba/upcase.dat
Thanks. This is a similiar but different issue to bug 1264548. The general issue is that custom nss changes require manual tweaking of apparmor profiles for those that import abstractions/nameservice. ** Changed in: ntp (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1135780 Title: ntp apparmor denied read of /usr/share/samba/upcase.dat To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1135780/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1081489] Re: autofs package is missing the lookup_sss.so module(!); negating autofs-enabled sssd functionality (automount fails)
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/autofs/trusty- proposed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to autofs in Ubuntu. https://bugs.launchpad.net/bugs/1081489 Title: autofs package is missing the lookup_sss.so module(!); negating autofs-enabled sssd functionality (automount fails) To manage notifications about this bug go to: https://bugs.launchpad.net/linuxmint/+bug/1081489/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1291535] Re: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module
** Changed in: neutron (Ubuntu Trusty) Status: Triaged => In Progress ** Changed in: neutron (Ubuntu Trusty) Assignee: (unassigned) => James Page (james-page) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1291535 Title: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1291535/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299055] Re: Standing FFe for icehouse
** Changed in: heat (Ubuntu Trusty) Status: Fix Released => New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1299055 Title: Standing FFe for icehouse To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1299055/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300768] Re: Rsync fails with (very) old server.
Thank you for taking the time to report this bug and helping to make Ubuntu better. I think the appropriate next step to take with this bug would be to try and reproduce this with rsync built from the upstream tarball, with no distribution packaging. If it still does not work with the latest upstream, then this bug will need to go upstream. If this cannot be reproduced with a clean upstream binary, then we'll need to investigate what broke this in Ubuntu. Are you able to test this case, please? ** Changed in: rsync (Ubuntu) Importance: Undecided => Medium ** Tags added: needs-upstream-report -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/1300768 Title: Rsync fails with (very) old server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1300768/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1261873] Re: 'net usershare' returned error 255
That change basically restores some of the diff we had over Debian (I assume it was dropped by mistake since the changelog doesn't mention it being dropped for a reason) ** Changed in: samba (Ubuntu Trusty) Status: Triaged => In Progress ** Summary changed: - 'net usershare' returned error 255 + [trusty] "usershare" access denied error (leads to non working nautilus samba sharing) ** Patch added: "suggested change to fix the issue" https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1261873/+attachment/4058366/+files/samba.diff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1261873 Title: [trusty] "usershare" access denied error (leads to non working nautilus samba sharing) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1261873/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300507] Re: Rabbit password is reset on every upgrade which forces lockstep cluster restarts
Setting Critical for Julian. ** Changed in: maas (Ubuntu) Importance: Undecided => Critical -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to maas in Ubuntu. https://bugs.launchpad.net/bugs/1300507 Title: Rabbit password is reset on every upgrade which forces lockstep cluster restarts To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1300507/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300814] [NEW] Tables "migrate_version" have non utf8 collation,
Public bug reported: On ubuntu 14.04 I updated keystone to the version 1:2014.1~rc1-0ubuntu1. I drop the database and re-create. CREATE DATABASE keystone; GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' IDENTIFIED BY '$KEYSTONE_DBPASS'; GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost' IDENTIFIED BY '$KEYSTONE_DBPASS'; GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'$' IDENTIFIED BY '$KEYSTONE_DBPASS'; And then, keystone-manage db_sync I got the next error ./keystone/keystone.log:2014-04-01 10:49:20.681 5423 CRITICAL keystone [-] ValueError: Tables "migrate_version" have non utf8 collation, please make sure all tables are CHARSET=utf8 ./keystone/keystone.log:2014-04-01 10:49:20.681 5423 TRACE keystone ValueError: Tables "migrate_version" have non utf8 collation, please make sure all tables are CHARSET=utf8 Problem: Bad charset Solution: alter table migrate_version charset=utf8; ** Affects: keystone (Ubuntu) Importance: Undecided Status: New ** Tags: keystone -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1300814 Title: Tables "migrate_version" have non utf8 collation, To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keystone/+bug/1300814/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1288696] Re: Unable to migrate from ovs to ml2 plugin
** Changed in: neutron (Ubuntu Trusty) Assignee: (unassigned) => James Page (james-page) ** Changed in: neutron (Ubuntu Trusty) Status: Triaged => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1288696 Title: Unable to migrate from ovs to ml2 plugin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1288696/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300804] [NEW] FFE for oslo.messaging 1.3.0
Public bug reported: Changes since 1.3.0a9: * Expose PublishErrorsHandler in the public API * 1288425: Add kombu driver library to requirements.txt * 1255239: Add unit tests for the qpid driver * 1261631: Add unit test for Qpid reconnect order * 1282706: Fixed inconsistent eventlet test failures * 1297161: Fixed pep8 failure due to pyflakes bug * 1286984: Build log_handler documentation ** Affects: oslo.messaging (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to oslo.messaging in Ubuntu. https://bugs.launchpad.net/bugs/1300804 Title: FFE for oslo.messaging 1.3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oslo.messaging/+bug/1300804/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300779] [NEW] No network adapters found in ppc64el cloud-image
Public bug reported: Added ppc64el image to Openstack with glance create-image and started an instance with nova boot. The guest starts but there is no network. 1) Downloaded ppc64el cloud-image from http://cloud-images.ubuntu.com/trusty/ 2) Created glance image with glance image-create api 3) Created an instance with nova boot Kernel in the host: Linux pok1 3.12.11-201.1.fc19.ppc64p7 #1 SMP Thu Mar 20 11:46:52 EST 2014 ppc64 ppc64 ppc64 GNU/Linux qemu/libvirt: qemu-1.7.91-0.1.fc19.ppc64 qemu-kvm-1.7.91-0.1.fc19.ppc64 libvirt-1.2.2-1.fc19.ppc64 cloud-init-nonet[5.50]: waiting 10 seconds for network device cloud-init-nonet[15.51]: waiting 120 seconds for network device cloud-init-nonet[135.51]: gave up waiting for a network device. Cloud-init v. 0.7.5 running 'init' at Mon, 31 Mar 2014 19:47:34 +. Up 135.72 seconds. ci-info: +++Net device info ci-info: ++---+---+---+---+ ci-info: | Device | Up | Address |Mask | Hw-Address| ci-info: ++---+---+---+---+ ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | . | ci-info: | tunl0 | False | . | . | . | ci-info: | eth0 | True | . | . | fa:16:3e:f0:26:72 | ci-info: ++---+---+---+---+ ci-info: !!!Route info failed 2014-03-31 19:47:34,951 - url_helper.py[WARNING]: Calling 'http://169.254.169.254/2009-04-04/meta-data/instance-id' failed [0/120s]: request error [HTTPConnectionPool(host='169.254.169.254', port=80): Max retries exceeded with url: /2009-04-04/meta-data/instance- id (Caused by : [Errno 101] Network is unreachable)] network qemu options used: -netdev tap,fd=25,id=hostnet0,vhost=on,vhostfd=22 -device virtio-net- pci,netdev=hostnet0,id=net0,mac=fa:16:3e:f0:26:72,bus=pci,addr=0x1 all qemu options used: 10757 ?Sl 3:00 /usr/bin/qemu-system-ppc64 -machine accel=kvm -name instance-006a -S -machine pseries,accel=kvm,usb=off -m 4096 -realtime mlock=off -smp 2,sockets=2,cores=1,threads=1 -uuid cef33775 -bc7a-4e04-80a0-b53224d5c6a8 -no-user-config -nodefaults -chardev socket,id=charmonitor,path=/var/lib/libvirt/qemu/instance- 006a.monitor,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc,driftfix=slew -no-shutdown -boot strict=on -usb -drive file=/var/lib/nova/instances/cef33775-bc7a- 4e04-80a0-b53224d5c6a8/disk,if=none,id=drive-virtio- disk0,format=qcow2,cache=none -device virtio-blk- pci,scsi=off,bus=pci,addr=0x3,drive=drive-virtio-disk0,id=virtio- disk0,bootindex=1 -netdev tap,fd=25,id=hostnet0,vhost=on,vhostfd=22 -device virtio-net- pci,netdev=hostnet0,id=net0,mac=fa:16:3e:f0:26:72,bus=pci,addr=0x1 -chardev file,id=charserial0,path=/var/lib/nova/instances/cef33775-bc7a- 4e04-80a0-b53224d5c6a8/console.log -device spapr- vty,chardev=charserial0,reg=0x3000 -chardev pty,id=charserial1 -device spapr-vty,chardev=charserial1,reg=0x30001000 -device usb- tablet,id=input0 -vnc 9.114.219.122:1 -k en-us -device VGA,id=video0,bus=pci,addr=0x5 -device virtio-balloon- pci,id=balloon0,bus=pci,addr=0x4 qemu instance log (/var/log/libvirt/qemu/instance-006a.log): 2014-03-31 19:44:58.000+: starting up LC_ALL=C PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin QEMU_AUDIO_DRV=none /usr/bin/qemu-kvm -name instance-006a -S -machine pseries,accel=kvm,usb=off -m 4096 -realtime mlock=off -smp 2,sockets=2,cores=1,threads=1 -uuid cef33775-bc7a-4e04-80a0-b53224d5c6a8 -no-user-config -nodefaults -chardev socket,id=charmonitor,path=/var/lib/libvirt/qemu/instance-006a.monitor,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc,driftfix=slew -no-shutdown -boot strict=on -usb -drive file=/var/lib/nova/instances/cef33775-bc7a-4e04-80a0-b53224d5c6a8/disk,if=none,id=drive-virtio-disk0,format=qcow2,cache=none -device virtio-blk-pci,scsi=off,bus=pci,addr=0x3,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1 -netdev tap,fd=25,id=hostnet0,vhost=on,vhostfd=22 -device virtio-net-pci,netdev=hostnet0,id=net0,mac=fa:16:3e:f0:26:72,bus=pci,addr=0x1 -chardev file,id=charserial0,path=/var/lib/nova/instances/cef33775-bc7a-4e04-80a0-b53224d5c6a8/console.log -device spapr- vty,chardev=charserial0,reg=0x3000 -chardev pty,id=charserial1 -device spapr-vty,chardev=charserial1,reg=0x30001000 -device usb-tablet,id=input0 -vnc 9.114.219.122:1 -k en-us -device VGA,id=video0,bus=pci,addr=0x5 -device virtio-balloon-pci,id=balloon0,bus=pci,addr=0x4 char device redirected to /dev/pts/5 (label charserial1) ** Affects: cloud-init (Ubuntu) Importance: Undecided Status: New ** Attachment added: "ppc64el guest console" https://bugs.launchpad.net/bugs/1300779/+attachment/4058219/+files/ubuntu_le.console.txt -- You received this bug notification because
[Bug 1300779] Re: No network adapters found in ppc64el cloud-image
** Attachment added: "libvirt xml created by nova" https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1300779/+attachment/4058223/+files/instance-006a.txt -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1300779 Title: No network adapters found in ppc64el cloud-image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1300779/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1287140] Re: "uvt-kvm wait" fails when the VM is created with --ssh-public-key-file
Fixed in rev 92, by adding --without-ssh and --ssh-private-key-file to the wait subcommand. Serge, you'll need to call with one of these two in your branch. Probably --ssh-private-key-file with a file to match the --ssh-public- key-file you used. ** Also affects: uvtool (Ubuntu) Importance: Undecided Status: New ** Changed in: uvtool Status: Triaged => Fix Committed ** Changed in: uvtool (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to uvtool in Ubuntu. https://bugs.launchpad.net/bugs/1287140 Title: "uvt-kvm wait" fails when the VM is created with --ssh-public-key-file To manage notifications about this bug go to: https://bugs.launchpad.net/uvtool/+bug/1287140/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300768] [NEW] Rsync fails with (very) old server.
Public bug reported: Does not work: Trusty Tahr. Rsync version 3.1.0 Protocol version 31 DOES work: Saucy rsync version 3.0.9 protocol version 30 In both cases: "server side": Suse 7.0 version 2.3.2 protocol version 21 with both "client" side rsyncs I of course get: > Server is very old version of rsync, upgrade recommended. but with the newer rsync I get: Warning: No xauth data; using fake authentication data for X11 forwarding. Server is very old version of rsync, upgrade recommended. protocol version mismatch - is your shell clean? (see the rsync man page for an explanation) rsync: connection unexpectedly closed (0 bytes received so far) [Receiver] rsync error: error in rsync protocol data stream (code 12) at io.c(226) [Receiver=3.1.0] According to the manpage I can test the "is your shell clean" with ssh oldserver /usr/bin/true > out.dat but I get a clean file (0 bytes). I just checked: the "no xauth data" doesn't matter: rsync -e "ssh -x" vsuse:/etc/issue . has the same problems. ** Affects: rsync (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/1300768 Title: Rsync fails with (very) old server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1300768/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1287140] Re: "uvt-kvm wait" fails when the VM is created with --ssh-public-key-file
This bug was fixed in the package uvtool - 0~bzr92-0ubuntu1 --- uvtool (0~bzr92-0ubuntu1) trusty; urgency=low * New upstream snapshot (bugfixes only): - Fix manpage to reflect correct "create" default. - Correctly handle wait with custom ssh keys (LP: #1287140). -- Robie BasakTue, 01 Apr 2014 13:07:55 +0100 ** Changed in: uvtool (Ubuntu) Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to uvtool in Ubuntu. https://bugs.launchpad.net/bugs/1287140 Title: "uvt-kvm wait" fails when the VM is created with --ssh-public-key-file To manage notifications about this bug go to: https://bugs.launchpad.net/uvtool/+bug/1287140/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1208430] Re: mongodb runs as root user
** Changed in: juju-core Milestone: None => 1.18.0 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to juju-core in Ubuntu. https://bugs.launchpad.net/bugs/1208430 Title: mongodb runs as root user To manage notifications about this bug go to: https://bugs.launchpad.net/juju-core/+bug/1208430/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 923032] Re: rsync keeps syncing file that isn't changed
This would happen if the timestamps remain "not the same". This usually happens on e.g. FAT filesystems where the timestamp resolution differs from that on Linux. Check the man page for the "solution". If that helps, report back with what ls --full-time shows on both source and destination files, and on what filesystem each of the files lives. (the "solution" is here intended to pinpoint the problem.) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rsync in Ubuntu. https://bugs.launchpad.net/bugs/923032 Title: rsync keeps syncing file that isn't changed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/923032/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
** Also affects: keepalived Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keepalived in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: keepalived (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keepalived in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
+1 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keepalived in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1291535] Re: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module
** Changed in: neutron Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1291535 Title: 'Unable to retrieve OVS kernel module version' when _not_ using DKMS openvswitch module To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1291535/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1300739] [NEW] keepalived doesn't load any ipv6 virtual servers
Public bug reported: I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) ** Affects: keepalived (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keepalived in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keepalived/+bug/1300739/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1261873] Re: 'net usershare' returned error 255
** Changed in: samba (Ubuntu) Status: Fix Released => Triaged ** Changed in: samba (Ubuntu) Importance: Undecided => High ** Also affects: samba (Ubuntu Trusty) Importance: High Status: Triaged ** Tags added: release-t-incoming -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1261873 Title: 'net usershare' returned error 255 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1261873/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1293177] Re: 'net usershare' returned error 255: net usershare add: cannot convert name "Everyone" to a SID. Access denied.
*** This bug is a duplicate of bug 1261873 *** https://bugs.launchpad.net/bugs/1261873 ** This bug has been marked a duplicate of bug 1261873 'net usershare' returned error 255 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1293177 Title: 'net usershare' returned error 255: net usershare add: cannot convert name "Everyone" to a SID. Access denied. To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1293177/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1299186] Re: Creating a Samba Share is not possible because "'net usershare' returned error 255: net usershare add: cannot convert name "Everyone" to a SID. Access denied."
*** This bug is a duplicate of bug 1261873 *** https://bugs.launchpad.net/bugs/1261873 ** This bug is no longer a duplicate of bug 1293177 'net usershare' returned error 255: net usershare add: cannot convert name "Everyone" to a SID. Access denied. ** This bug has been marked a duplicate of bug 1261873 'net usershare' returned error 255 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1299186 Title: Creating a Samba Share is not possible because "'net usershare' returned error 255: net usershare add: cannot convert name "Everyone" to a SID. Access denied." To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1299186/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs