Backport netplan 0.29

Bug #1713142 reported by Mathieu Trudel-Lapierre on 2017-08-25
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
nplan (Ubuntu)
Undecided
Unassigned
Xenial
High
Mathieu Trudel-Lapierre
Zesty
High
Mathieu Trudel-Lapierre

Bug Description

[Impact]
Backport features in upstream netplan / netplan in artful to zesty, xenial.

[Test cases]

== Autopkgtests ==
Run autopkgtests, they should all pass.

== MTU settings ==
1) Set a MTU for a device managed by NetworkManager:

ethernet:
  eth0:
    renderer: NetworkManager
    mtu: 1400
    dhcp4: yes

2) Verify that the MTU is properly applied to the device.

[Regression potential]
Failure to properly configure existing interfaces for MTU settings, IPv6 settings would be regressions; for example, if existing network devices were to all get the same MTU, or the same MTU as another interface configured in netplan although the configuration is not set to apply to them (ie. the config bleeds to other devices); then this would be a regression. Any new failures in autopkgtests would also be regressions to be investigated as possibly caused by the update.

Changed in nplan (Ubuntu):
status: New → Fix Released
Changed in nplan (Ubuntu Xenial):
status: New → In Progress
importance: Undecided → High
Changed in nplan (Ubuntu Zesty):
importance: Undecided → High
status: New → Triaged
Changed in nplan (Ubuntu Xenial):
assignee: nobody → Mathieu Trudel-Lapierre (cyphermox)
Changed in nplan (Ubuntu Zesty):
assignee: nobody → Mathieu Trudel-Lapierre (cyphermox)
summary: - Backport netplan 0.26
+ Backport netplan 0.29
description: updated
Brian Murray (brian-murray) wrote :

Are there plans to fix this in Zesty? Keep in mind that Xenial to Zesty is a supported upgrade path.

Hello Mathieu, or anyone else affected,

Accepted nplan into zesty-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/nplan/0.29~17.04.1 in a few hours, and then in the -proposed repository.

Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed.Your feedback will aid us getting this update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-needed-zesty to verification-done-zesty. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed-zesty. In either case, details of your testing will help us make a better decision.

Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance!

Changed in nplan (Ubuntu Zesty):
status: Triaged → Fix Committed
tags: added: verification-needed verification-needed-zesty
Brian Murray (brian-murray) wrote :

Hello Mathieu, or anyone else affected,

Accepted nplan into xenial-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/nplan/0.29~16.04.1 in a few hours, and then in the -proposed repository.

Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed.Your feedback will aid us getting this update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-needed-xenial to verification-done-xenial. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed-xenial. In either case, details of your testing will help us make a better decision.

Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance!

Changed in nplan (Ubuntu Xenial):
status: In Progress → Fix Committed
tags: added: verification-needed-xenial
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers