This bug report can be rejected, the redirect has been removed on the
server side so the existing code and clients using API v1 work again.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1594316
Yes, I think it only affects Trusty.
I think it's unlikely that upstream will provide a patch as upstream
since 3.6.0 has moved to a newer API version that isn't affected by this
issue. It does look likely from the FORGE-327 ticket above that the
server behaviour will be changed for this older
** Summary changed:
- HTTP response we received was '404 Not Found' when using "puppet module
install"
+ HTTP response we received was '302 Found' when using "puppet module install"
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I've also filed a ticket with Puppet to see if the server behaviour can
be changed for the old API:
https://tickets.puppetlabs.com/browse/FORGE-327
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
The "puppet module" command is now throwing errors when installing
modules from the Puppet Forge (https://forge.puppet.com), as it
redirects from puppetlabs.com to puppet.com.
# puppet module install puppetlabs/ntp
Notice: Preparing to install into /etc/puppet/modules ...
Ryan, changing an existing value will preserve the whitespace (something
Augeas tries hard to do), so you'll probably need to add a new setting
to observe the behaviour.
You could delete the existing cfg_file entry and create a new one, e.g.
augtool> rm /files/etc/nagios3/nagios.cfg/cfg_file
I'd suggest just adding these two entries to the includes list:
/etc/php/*/*/*.ini
/etc/php/*/fpm/pool.d/*.conf
Unless there are other incompatible INI files that might be matched?
I'm not familiar with the PHP packages to be sure.
--
You received this bug notification because you are a member
I've tested the diff in #4 on Ubuntu 16.04, with puppet-common 3.8.5-2,
it seems to fix the issue correctly.
Prior to the patch, Puppet would try and manage services using upstart:
/Stage[main]/Tftp::Service/Service[tftpd-hpa]: Could not evaluate:
Execution of '/sbin/status tftpd-hpa' returned
I'm attaching the trio of commits to fix the bug in a single patch,
rebased on top of the upstream 1.3.0 release. Hopefully somebody can
use this as the basis of a patch against the package itself.
Locally it seems to resolve parsing of the ssl.conf file at
I'm attaching the trio of commits to fix the bug in a single patch,
rebased on top of the upstream 1.3.0 release. Hopefully somebody can
use this as the basis of a patch against the package itself.
Locally it seems to resolve parsing of the ssl.conf file at
With regards to manual regression testing for a stable update, I'd
suggest running "augtool print /files/etc/apache2" (with Apache, mod_ssl
and optionally, other Apache modules installed) to check if any files
that used to parse now fail in any way. Hopefully the number of errors
will be reduced.
With regards to manual regression testing for a stable update, I'd
suggest running "augtool print /files/etc/apache2" (with Apache, mod_ssl
and optionally, other Apache modules installed) to check if any files
that used to parse now fail in any way. Hopefully the number of errors
will be reduced.
Public bug reported:
The fix for CVE-2013-4969 (tempfile vulnerability) contained a
regression affecting the default file mode if none is specified on a
file resource. This has been fixed in upstream 3.4.2 and 2.7.25.
Upstream bug: https://tickets.puppetlabs.com/browse/PUP-1255
Please apply
Public bug reported:
The fix for CVE-2013-4969 (tempfile vulnerability) contained a
regression affecting the default file mode if none is specified on a
file resource. This has been fixed in upstream 3.4.2 and 2.7.25.
Upstream bug: https://tickets.puppetlabs.com/browse/PUP-1255
Please apply
bits of the
modprobe lens, so my name change broke it. Attached is a followup patch
committed as c0ff479 which repairs the damage caused.
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap-c0ff479.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3339679
bits of the
modprobe lens, so my name change broke it. Attached is a followup patch
committed as c0ff479 which repairs the damage caused.
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap-c0ff479.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3339679
Could you share the contents of /etc/modprobe.d/iwlwifi.conf ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to netcf in Ubuntu.
https://bugs.launchpad.net/bugs/1054306
Title:
ncftool list fails
To manage notifications about this
attached if you want
to apply it.
http://git.fedorahosted.org/cgit/augeas.git/commit/?id=e599fed9
Regards,
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3329888/+files/1054306-modprobe-wrap.patch
Could you share the contents of /etc/modprobe.d/iwlwifi.conf ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1054306
Title:
ncftool list fails
To manage notifications about this bug go to:
attached if you want
to apply it.
http://git.fedorahosted.org/cgit/augeas.git/commit/?id=e599fed9
Regards,
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3329888/+files/1054306-modprobe-wrap.patch
Confirmed in my upgrade from 8.04 to 8.10 final and also back in 8.04
when installing KDE4 packages.
--
Icon problems after switching to cystal svg iconset
https://bugs.launchpad.net/bugs/283469
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
21 matches
Mail list logo