Bug 1074070 - NetworkManager destroys resolv.conf
Summary: NetworkManager destroys resolv.conf
Status: RESOLVED WONTFIX
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: GNOME (show other bugs)
Version: Leap 42.3
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: E-mail List
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks: 1083848
  Show dependency treegraph
 
Reported: 2017-12-25 15:55 UTC by Michal Suchanek
Modified: 2019-07-11 11:23 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michal Suchanek 2017-12-25 15:55:24 UTC
This is RPi3 E20 image. I did not do any network configuration. It worked initially but stopped working after some update.

S  | Name                             | Summary                                                               | Type   
---+----------------------------------+-----------------------------------------------------------------------+--------
i+ | NetworkManager                   | Network Link Manager and User Applications                            | package
i+ | NetworkManager-branding-openSUSE | Default openSUSE branding for /etc/NetworkManager/NetworkManager.conf | package
i+ | NetworkManager-gnome             | GNOME applications for use with NetworkManager                        | package
i+ | NetworkManager-gnome-lang        | Languages for package NetworkManager-gnome                            | package
i+ | NetworkManager-lang              | Languages for package NetworkManager                                  | package

# cat /etc/sysconfig/network/ifcfg-eth0 
BOOTPROTO='dhcp'
MTU=''
REMOTE_IPADDR=''
STARTMODE='onboot'

# cat /etc/resolv.conf
# Generated by NetworkManager
search suse

# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: wlan0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN group default qlen 1000
    link/ether b8:27:eb:3c:89:30 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    link/ether b8:27:eb:69:dc:65 brd ff:ff:ff:ff:ff:ff
    inet 10.10.10.66/24 brd 10.10.10.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::ba27:ebff:fe69:dc65/64 scope link 
       valid_lft forever preferred_lft forever
Comment 1 Tomáš Chvátal 2019-07-11 11:23:32 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime