Already synced by Dimitri.
** Changed in: nose (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nose in Ubuntu.
https://bugs.launchpad.net/bugs/1300429
Title:
Sync nose 1.3.1-2 (main) from
*** This bug is a duplicate of bug 1205850 ***
https://bugs.launchpad.net/bugs/1205850
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1205850, so is being marked as such.
** Tags added: trusty
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1205850
Title:
apache2 crashed with SIGABRT in Py_FatalError()
To manage notifications about this bug go to:
Public bug reported:
we changed a iscsitarget configuration file, but no use. here is the details
1. vi /etc/ietd/ietd.conf
2. we changed parameters and save
3. we restart iscsitarget, but when we login, the parameters are still the same.
** Affects: iscsitarget (Ubuntu)
Importance:
From log:
Setting up clamav-base (0.98.1+dfsg-4ubuntu1~ubuntu13.10.2) ...
groups: clamav: no such user
chown: invalid user: 'clamav:clamav'
chown: invalid user: 'clamav:clamav'
Replacing config file /etc/clamav/clamd.conf with new version
Setting up clamav-freshclam
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
Please could you specify exactly how to reproduce this problem on a
fresh installation? Specifically:
1) What exactly did you change in /etc/ietd/ietd.conf?
2) What command did you use to restart iscsitarget?
3)
@Mark: Thanks for these clarifications. So as far as I understand,
simplestreams is conceptually way above the juju packaging, as it just
selects which built Ubuntu cloud image to fetch and install. So this
doesn't seem related to the question of how to build and package juju
itself.
These Ubuntu
** Also affects: samba (Ubuntu Trusty)
Importance: High
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1292548
Title:
Standalone Server: Update from Samba
** Changed in: samba (Ubuntu)
Importance: Undecided = High
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1296289
Title:
smb.conf contains valid users = %S in [global]
To manage
Please can you see if this is bug 1296289, and if the fix there (the
valid users line) works?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1292548
Title:
Standalone Server: Update
** Tags added: rls-s-incoming
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1292548
Title:
Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to
@Brian: I'm unsure the desktop team can help there, the issue seems to
be a samba regression and we don't have any knowledge of this component
in desktop. Do you know who we could talk to about looking at that?
** Tags added: rls-s-incoming
** Changed in: nautilus-share (Ubuntu Trusty)
*** This bug is a duplicate of bug 1261873 ***
https://bugs.launchpad.net/bugs/1261873
** This bug is no longer a duplicate of bug 1293177
'net usershare' returned error 255: net usershare add: cannot convert name
Everyone to a SID. Access denied.
** This bug has been marked a duplicate
*** This bug is a duplicate of bug 1261873 ***
https://bugs.launchpad.net/bugs/1261873
** This bug has been marked a duplicate of bug 1261873
'net usershare' returned error 255
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
** Changed in: samba (Ubuntu)
Status: Fix Released = Triaged
** Changed in: samba (Ubuntu)
Importance: Undecided = High
** Also affects: samba (Ubuntu Trusty)
Importance: High
Status: Triaged
** Tags added: release-t-incoming
--
You received this bug notification because
Public bug reported:
I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any
IPv6 virtual servers.
I get the following message when trying to list a virtual service:
ipvsadm -L -t [2001::::xxx]:xxx
Resource temporarily unavailable
ProblemType: Bug
DistroRelease: Ubuntu
** Changed in: neutron
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1291535
Title:
'Unable to retrieve OVS kernel module version' when
+1
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keepalived in Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual servers
To manage notifications about this bug go to:
** Also affects: keepalived
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keepalived in Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: keepalived (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keepalived in Ubuntu.
This would happen if the timestamps remain not the same. This usually
happens on e.g. FAT filesystems where the timestamp resolution differs
from that on Linux. Check the man page for the solution. If that
helps, report back with what
ls --full-time
shows on both source and destination files,
** Changed in: juju-core
Milestone: None = 1.18.0
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1208430
Title:
mongodb runs as root user
To manage notifications about this
This bug was fixed in the package uvtool - 0~bzr92-0ubuntu1
---
uvtool (0~bzr92-0ubuntu1) trusty; urgency=low
* New upstream snapshot (bugfixes only):
- Fix manpage to reflect correct create default.
- Correctly handle wait with custom ssh keys (LP: #1287140).
-- Robie
Public bug reported:
Does not work:
Trusty Tahr.
Rsync version 3.1.0
Protocol version 31
DOES work:
Saucy
rsync version 3.0.9
protocol version 30
In both cases: server side:
Suse 7.0
version 2.3.2
protocol version 21
with both client side rsyncs I of course get:
Server is very old
Fixed in rev 92, by adding --without-ssh and --ssh-private-key-file to
the wait subcommand.
Serge, you'll need to call with one of these two in your branch.
Probably --ssh-private-key-file with a file to match the --ssh-public-
key-file you used.
** Also affects: uvtool (Ubuntu)
Importance:
** Attachment added: libvirt xml created by nova
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1300779/+attachment/4058223/+files/instance-006a.txt
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in
Public bug reported:
Added ppc64el image to Openstack with glance create-image and started an
instance with nova boot.
The guest starts but there is no network.
1) Downloaded ppc64el cloud-image from http://cloud-images.ubuntu.com/trusty/
2) Created glance image with glance image-create api
Public bug reported:
Changes since 1.3.0a9:
* Expose PublishErrorsHandler in the public API
* 1288425: Add kombu driver library to requirements.txt
* 1255239: Add unit tests for the qpid driver
* 1261631: Add unit test for Qpid reconnect order
* 1282706: Fixed inconsistent eventlet test failures
** Changed in: neutron (Ubuntu Trusty)
Assignee: (unassigned) = James Page (james-page)
** Changed in: neutron (Ubuntu Trusty)
Status: Triaged = In Progress
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in
Public bug reported:
On ubuntu 14.04
I updated keystone to the version 1:2014.1~rc1-0ubuntu1.
I drop the database and re-create.
CREATE DATABASE keystone;
GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' IDENTIFIED BY
'$KEYSTONE_DBPASS';
GRANT ALL PRIVILEGES ON keystone.* TO
Setting Critical for Julian.
** Changed in: maas (Ubuntu)
Importance: Undecided = Critical
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1300507
Title:
Rabbit password is reset
That change basically restores some of the diff we had over Debian (I
assume it was dropped by mistake since the changelog doesn't mention it
being dropped for a reason)
** Changed in: samba (Ubuntu Trusty)
Status: Triaged = In Progress
** Summary changed:
- 'net usershare' returned
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
I think the appropriate next step to take with this bug would be to try
and reproduce this with rsync built from the upstream tarball, with no
distribution packaging.
If it still does not work with the latest
** Changed in: heat (Ubuntu Trusty)
Status: Fix Released = New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1299055
Title:
Standing FFe for icehouse
To manage notifications
** Changed in: neutron (Ubuntu Trusty)
Status: Triaged = In Progress
** Changed in: neutron (Ubuntu Trusty)
Assignee: (unassigned) = James Page (james-page)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in
Thanks. This is a similiar but different issue to bug 1264548. The
general issue is that custom nss changes require manual tweaking of
apparmor profiles for those that import abstractions/nameservice.
** Changed in: ntp (Ubuntu)
Importance: Undecided = Medium
--
You received this bug
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/autofs/trusty-
proposed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to autofs in Ubuntu.
https://bugs.launchpad.net/bugs/1081489
Title:
autofs package is missing the lookup_sss.so
Public bug reported:
Present upgrade (1 Apr 2014) failed to complete
ProblemType: Package
DistroRelease: Ubuntu 12.04
Package: open-vm-dkms 2011.12.20-562307-0ubuntu1
ProcVersionSignature: Ubuntu 3.5.0-47.71~precise1-generic 3.5.7.30
Uname: Linux 3.5.0-47-generic x86_64
ApportVersion:
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1300826
Title:
open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools kernel module
** Also affects: keystone
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to glance in Ubuntu.
https://bugs.launchpad.net/bugs/1279000
Title:
db migrate script to set charset=utf8 for all
Related fix proposed to branch: master
Review: https://review.openstack.org/84462
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1291535
Title:
'Unable to retrieve OVS kernel
This bug was fixed in the package autofs - 5.0.7-3ubuntu2
---
autofs (5.0.7-3ubuntu2) trusty; urgency=medium
* Add support for sssd backend (LP: #1081489)
- control: Add sssd-common to build-depends.
- rules: Set sssldir for the sssd module so autoreconf knows about it.
--
I got the git upstream sources.
I used git bisect for the first time.
Out of 356 commits between 3.0.9 and the current version
[8b3e60523aa3d86583a1df54c81c9d480ea19740] Improved the fix that ensures
that the generator gets notified about an I/O error for the incremental
directory that
Thanks! It's not completely clear to me. Did you find that the latest
git HEAD does have the problem? If so, then it looks to me that this is
either an upstream bug or done by design upstream. For both of those
cases, I don't think we'll be able to do anything about this in Ubuntu
directly, but we
Blueprint changed by Scott Moser:
Work items changed:
Work items for ubuntu-13.12:
- kexec support: INPROGRESS
+ kexec support: DONE
config-archive support: DONE
change maas template to use config-archive: POSTPONED
Work items for ubuntu-14.01:
LVM/RAID support: POSTPONED
This bug was fixed in the package oslo.messaging - 1.3.0-0ubuntu1
---
oslo.messaging (1.3.0-0ubuntu1) trusty; urgency=medium
* New upstream release. (LP: #1300804)
* debian/patches/skip-qpid-tests.patch: Skip qpid tests if qpid
is not installed.
-- Chuck Short
Covered under standing FFe
** Changed in: ceilometer (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceilometer in Ubuntu.
https://bugs.launchpad.net/bugs/1298998
Title:
FFE for ceilometer
Hi - I notice that this hasn't yet gotten an ack/nack from the release
team.
Ping?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1294823
Title:
FFE: create a trusty machine type
To
Hi Robie,
Yes, there is a valid users = %S line present in the smb.conf file.
When I comment it out, smbclient -L works as expected.
What i did:
1) Comment out valid users = %S, see the diff:
root@ubuntu:/etc/samba# diff -u ~/smb.conf.old smb.conf
--- /root/smb.conf.old 2014-04-01
Public bug reported:
Version: 2:4.1.3+dfsg-2ubuntu4
from log file:
2014/04/01 16:38:11.053394, 0] ../lib/dbwrap/dbwrap.c:133(debug_lock_order)
lock order: 1:/var/run/samba/locking.tdb 2:none 3:none
[2014/04/01 16:38:11.053568, 0] ../source3/lib/util.c:785(smb_panic_s3)
PANIC (pid 1817):
Sounds like something useful to me, granted.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1294823
Title:
FFE: create a trusty machine type
To manage notifications about this bug go
FFe bugs must be in new/confirmed for the release team to look at them,
the Triaged status is for approved FFes.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1294823
Title:
FFE:
*** This bug is a duplicate of bug 1292548 ***
https://bugs.launchpad.net/bugs/1292548
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
Your report clued me in to what is going on - thanks! There's a
duplicate in bug 1292548. I'll mark this one as a dupe of
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: samba (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1292548
Title:
smb.conf contains valid users = %S in [global]
To manage notifications about this bug go to:
This bug was fixed in the package samba - 2:4.1.3+dfsg-2ubuntu5
---
samba (2:4.1.3+dfsg-2ubuntu5) trusty; urgency=medium
* debian/smb.conf: comment back some of the share definitions
options (including valid users). That was an Ubuntu diff and seems to
have been dropped in
** Summary changed:
- Standalone Server: Update from Samba 2:3.6.18-1ubuntu3.1 (saucy) to
2:4.1.3+dfsg-2ubuntu3 (trusty) breaks access to the server
+ smb.conf contains valid users = %S in [global]
** Changed in: samba (Ubuntu Trusty)
Status: Confirmed = Triaged
--
You received this
Rafael,
Could you please open this bug on Tasty taco other than in cloud-init
project? Trusty taco is the place where we are tracking ppc64el bugs.
Thanks
** Changed in: cloud-init (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
** Summary changed:
- Tables migrate_version have non utf8 collation,
+ Tables migrate_version have non utf8 collation
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1300814
Title:
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1291535
Title:
'Unable to retrieve OVS kernel module version' when _not_ using
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1298676
Title:
l3 agent should include fwaas_driver.ini
To manage notifications
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1298675
Title:
VPN agent upstart configuration needs to reference l3_agent.ini
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1293632
Title:
One Convergence NVSD plugin agent missing
To manage notifications
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1255420
Title:
Neutron Mellanox plugin package is missing
To manage
** Branch linked: lp:ubuntu/trusty-proposed/neutron
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1288696
Title:
Unable to migrate from ovs to ml2 plugin
To manage notifications
** Also affects: qemu
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1297487
Title:
MTU not honored in virtio vnet
To manage
We have the same problem with 14.04
I hope the bug will be fixed until the release.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to multipath-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1240049
Title:
multipath udev rules
Blueprint changed by James Page:
Work items changed:
Work items for ubuntu-13.11:
[yolanda.robla] Charm Heat: DONE
[james-page] Complete charms for ceilometer: DONE
Work items for ubuntu-13.12:
[james-page] Bundles for OpenStack: DONE
Work items for ubuntu-14.04-alpha-2:
** Branch linked: lp:ubuntu/cloud-init
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1295223
Title:
seedfrom cmdline option broken in 0.7.5
To manage notifications about this
the last Version from 2013-12-17 on http://christophe.varoqui.free.fr/
is multipath-tools-0.5.0
Changes :
*scsi3 persistent reservations on multipaths
*systemd integration
^^^
*better udev integration (get device events and ids from udev)
*kpartx support for
Public bug reported:
quagga version 0.99.22.4 on ubuntu 14.04beta2
apt-get source quagga
apt-get build-dep quagga
cd quagga-0.99.22.4/
./configure; make; sudo make install
-- seems to compile successfully; but on closer examination, vtysh didn't
successfully build and no vtysh binary is
Public bug reported:
OpenNebula uses a text file with shell variables for storing the
configuration variables (including user provided data). Some user data
may not be renderable into this format, so using base64 encoding
alleviates the problem. This change considers that, by default, USERDATA
** Branch linked: lp:ubuntu/cloud-init
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1300941
Title:
user-data on OpenNebula restricted to shell sourceable content
To manage
fix-released in 0.7.5.
** Changed in: cloud-init
Status: Fix Committed = Fix Released
** Changed in: cloud-init (Ubuntu)
Status: New = In Progress
** Changed in: cloud-init (Ubuntu)
Importance: Undecided = Medium
--
You received this bug notification because you are a member
Blueprint changed by Scott Moser:
Work items changed:
Work items for ubuntu-13.12:
sysvinit invoke-rc.d clean out eatmydata (bug 1257036): DONE
eatmydata support in cloud-init (bug 1236531): DONE
eatmydata in cloud-images: DONE
Work items for ubuntu-14.01:
address plymouth loss of
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package neutron - 1:2014.1~rc1-0ubuntu1
---
neutron (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/rules: Run testr init before tests.
* debian/patches/disable-udev-tests.patch: Refresh.
*
This bug was fixed in the package nova - 1:2014.1~rc1-0ubuntu1
---
nova (1:2014.1~rc1-0ubuntu1) trusty; urgency=medium
[ Chuck Short ]
* debian/control: Use python-oslosphinx instead of python-oslo.sphinx.
* debian/patches/use-oslo.sphinx-namespace.patch: Dropped no longer
This bug was fixed in the package cloud-init - 0.7.5-0ubuntu1
---
cloud-init (0.7.5-0ubuntu1) trusty; urgency=medium
* New upstream release.
* support base64 encoded user-data in OpenNebula, required
to allow arbitrary content in user-data (LP: #1300941)
* pep8 and
** Changed in: nova (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1300522
Title:
Testsuite failure in rc1
To manage notifications about
Please close. It's a configure flag:
./configure --enable-user=root --enable-group=root --enable-vty-group=root
--sysconfdir=/usr/local/etc/quagga --localstatedir=/var/run/quagga
--enable-vtysh --with-libpam
--
You received this bug notification because you are a member of Ubuntu
Server Team,
** Changed in: glance
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to glance in Ubuntu.
https://bugs.launchpad.net/bugs/1279000
Title:
db migrate script to set charset=utf8 for all tables
Public bug reported:
It appears that ifdown command is not working because
“/run/network/ifstate does not contain eth0=eth0.
This in turn causes hyper-v's script hv_set_ifconfig.sh to fail as
follows:
root@ubuntu:~# ./hv_set_ifconfig.sh /var/lib/hyperv/ifcfg-eth0
ifdown: interface eth0 not
** Branch linked: lp:~corey.bryant/glance/2014.1.rc1
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1299055
Title:
Standing FFe for icehouse
To manage notifications about this bug go
See bug 1301036 for the keystone issue
** No longer affects: keystone
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to glance in Ubuntu.
https://bugs.launchpad.net/bugs/1279000
Title:
db migrate script to set charset=utf8 for all
Since we are dropping this MIR for this cycle, can we setup time to go
through this issue across the teams, and get alignment after the
release, but before the Juju cloud sprint at the end of April?
+1. Feel free to bring myself or Adam (or both) into this conversation.
--
You received this
On Sat, Mar 29, 2014 at 04:24:22AM -, Gustavo Niemeyer wrote:
[Steve]
My biggest concern here is that making golang-go genuinely supportable
in the distro context means supporting dynamic linking, and the Go
upstream community appears to be quite hostile to the principle of
dynamic
** Tags added: landscape
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1299588
Title:
LXC permission denied issue with 1.17.7
To manage notifications about this bug go to:
It's happening for me too. I used the manual provider + kapil's digital
ocean plugin. I deployed ubuntu to a new machine, and then another
service to lxc on that machine. machine log is attached, this is the
last part:
2014-04-01 22:39:27 INFO juju.utils.apt apt.go:126 Running: [apt-get
** Changed in: net-snmp (Debian)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in Ubuntu.
https://bugs.launchpad.net/bugs/1251847
Title:
Enable EtherLike-MIB::dot3StatsTable in
Deploying a containerized service to the bootstrap node works, i.e.:
juju deploy ubuntu --to lxc:0
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1299588
Title:
LXC permission
Same thing happened on AWS. Steps to reproduce:
juju bootstrap
juju deploy ubuntu
juju deploy ubuntu --to lxc:1
juju ssh 1
tail -f /var/log/juju/machine-1.log
You'll see:
(...)
2014-04-01 23:22:36 DEBUG juju.worker.logger logger.go:60 logger setup
2014-04-01 23:22:36 DEBUG
You have been subscribed to a public bug:
I tested vsftpd on a 32-bit kernel (3.11.0-19-generic) but when I
install it on a 64-bit kernel and upgrade to the current kernel version
it fails to start with. Running by hand give the error oops 500 munmap
** Affects: vsftpd (Ubuntu)
Importance:
Seems like it's very easy to repro on AWS. Anything but the bootstrap
node gets this when you deploy lxc ala:
juju deploy --to lxc:1 ubuntu
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
** Package changed: ubuntu = vsftpd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to vsftpd in Ubuntu.
https://bugs.launchpad.net/bugs/1301051
Title:
vsftpd will not run on ubuntu 13.10 (Linux 3.11.0-19-generic x86_64)
To
** Changed in: juju-core
Milestone: 1.19.0 = 1.17.8
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1297077
Title:
juju-local should depend on cpu-checker
To manage
1 - 100 of 110 matches
Mail list logo