** Description changed:

  [impact]
  
  a connection session is opened, but the TLS parameters (timeout, ca,
  cert and key) are not actually set for the session.  This prevents use
  of TLS.
  
  [test case]
  
- I am currently updating the unit test to include testing of TLS params
+ We will be backporting this as part of the python-etcd3gw from upstream 
debian maintainers who bumped the version from 0.2.1-3 to 0.2.5-1
+ Running the additional unit tests provided for this would be enough to 
trigger the raised exception.
  
  [regression potential]
  
  This adds TLS parameters (if provided) to the session, so regressions
  would involve failed connections, possibly those without TLS that had
  TLS params incorrectly provided before.
  
  [scope]
  
  the upstream bug is https://github.com/dims/etcd3-gateway/issues/20
  fixed upstream with pull request https://github.com/dims/etcd3-gateway/pull/21
  via commit 90b7a19cdc4daa1230d7f15c10b113abdefdc8c0
  
  that commit is contained in version 0.2.2, which is not yet pulled into
  Debian, so this patch is needed in Debian, as well as Bionic, Eoan, and
  Focal.  This package was not included in Xenial.

** Description changed:

  [impact]
  
  a connection session is opened, but the TLS parameters (timeout, ca,
  cert and key) are not actually set for the session.  This prevents use
  of TLS.
  
- [test case]
+ [Test Case]
  
  We will be backporting this as part of the python-etcd3gw from upstream 
debian maintainers who bumped the version from 0.2.1-3 to 0.2.5-1
  Running the additional unit tests provided for this would be enough to 
trigger the raised exception.
  
- [regression potential]
+ [Regression Potential]
  
  This adds TLS parameters (if provided) to the session, so regressions
  would involve failed connections, possibly those without TLS that had
  TLS params incorrectly provided before.
  
- [scope]
+ [Scope]
  
  the upstream bug is https://github.com/dims/etcd3-gateway/issues/20
  fixed upstream with pull request https://github.com/dims/etcd3-gateway/pull/21
  via commit 90b7a19cdc4daa1230d7f15c10b113abdefdc8c0
  
  that commit is contained in version 0.2.2, which is not yet pulled into
- Debian, so this patch is needed in Debian, as well as Bionic, Eoan, and
- Focal.  This package was not included in Xenial.
+ Debian, so this patch is needed in Debian, as well as Bionicand Focal.
+ This package was not included in Xenial.

** Description changed:

- [impact]
+ [Impact]
  
  a connection session is opened, but the TLS parameters (timeout, ca,
  cert and key) are not actually set for the session.  This prevents use
  of TLS.
  
  [Test Case]
  
  We will be backporting this as part of the python-etcd3gw from upstream 
debian maintainers who bumped the version from 0.2.1-3 to 0.2.5-1
  Running the additional unit tests provided for this would be enough to 
trigger the raised exception.
  
  [Regression Potential]
  
  This adds TLS parameters (if provided) to the session, so regressions
  would involve failed connections, possibly those without TLS that had
  TLS params incorrectly provided before.
  
  [Scope]
  
  the upstream bug is https://github.com/dims/etcd3-gateway/issues/20
  fixed upstream with pull request https://github.com/dims/etcd3-gateway/pull/21
  via commit 90b7a19cdc4daa1230d7f15c10b113abdefdc8c0
  
  that commit is contained in version 0.2.2, which is not yet pulled into
  Debian, so this patch is needed in Debian, as well as Bionicand Focal.
  This package was not included in Xenial.

** Description changed:

  [Impact]
  
  a connection session is opened, but the TLS parameters (timeout, ca,
  cert and key) are not actually set for the session.  This prevents use
  of TLS.
  
  [Test Case]
  
  We will be backporting this as part of the python-etcd3gw from upstream 
debian maintainers who bumped the version from 0.2.1-3 to 0.2.5-1
  Running the additional unit tests provided for this would be enough to 
trigger the raised exception.
  
- [Regression Potential]
+ [Where Problems Could Occur]
  
  This adds TLS parameters (if provided) to the session, so regressions
  would involve failed connections, possibly those without TLS that had
  TLS params incorrectly provided before.
  
- [Scope]
+ [Other Info]
  
  the upstream bug is https://github.com/dims/etcd3-gateway/issues/20
  fixed upstream with pull request https://github.com/dims/etcd3-gateway/pull/21
  via commit 90b7a19cdc4daa1230d7f15c10b113abdefdc8c0
  
  that commit is contained in version 0.2.2, which is not yet pulled into
  Debian, so this patch is needed in Debian, as well as Bionicand Focal.
  This package was not included in Xenial.

** Description changed:

  [Impact]
  
- a connection session is opened, but the TLS parameters (timeout, ca,
+ A connection session is opened, but the TLS parameters (timeout, ca,
  cert and key) are not actually set for the session.  This prevents use
  of TLS.
  
  [Test Case]
  
  We will be backporting this as part of the python-etcd3gw from upstream 
debian maintainers who bumped the version from 0.2.1-3 to 0.2.5-1
  Running the additional unit tests provided for this would be enough to 
trigger the raised exception.
  
  [Where Problems Could Occur]
  
  This adds TLS parameters (if provided) to the session, so regressions
  would involve failed connections, possibly those without TLS that had
  TLS params incorrectly provided before.
  
  [Other Info]
  
  the upstream bug is https://github.com/dims/etcd3-gateway/issues/20
  fixed upstream with pull request https://github.com/dims/etcd3-gateway/pull/21
  via commit 90b7a19cdc4daa1230d7f15c10b113abdefdc8c0
  
  that commit is contained in version 0.2.2, which is not yet pulled into
  Debian, so this patch is needed in Debian, as well as Bionicand Focal.
  This package was not included in Xenial.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820083

Title:
  TLS params not set for session

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-etcd3gw/+bug/1820083/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to