[Bug 1594316] Re: HTTP response we received was '302 Found' when using "puppet module install"

2016-06-22 Thread Dominic Cleal
This bug report can be rejected, the redirect has been removed on the server side so the existing code and clients using API v1 work again. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1594316

[Bug 1594316] Re: HTTP response we received was '302 Found' when using "puppet module install"

2016-06-21 Thread Dominic Cleal
Yes, I think it only affects Trusty. I think it's unlikely that upstream will provide a patch as upstream since 3.6.0 has moved to a newer API version that isn't affected by this issue. It does look likely from the FORGE-327 ticket above that the server behaviour will be changed for this older

[Bug 1594316] Re: HTTP response we received was '302 Found' when using "puppet module install"

2016-06-20 Thread Dominic Cleal
** Summary changed: - HTTP response we received was '404 Not Found' when using "puppet module install" + HTTP response we received was '302 Found' when using "puppet module install" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1594316] Re: HTTP response we received was '404 Not Found' when using "puppet module install"

2016-06-20 Thread Dominic Cleal
I've also filed a ticket with Puppet to see if the server behaviour can be changed for the old API: https://tickets.puppetlabs.com/browse/FORGE-327 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1594316] [NEW] HTTP response we received was '404 Not Found' when using "puppet module install"

2016-06-20 Thread Dominic Cleal
Public bug reported: The "puppet module" command is now throwing errors when installing modules from the Puppet Forge (https://forge.puppet.com), as it redirects from puppetlabs.com to puppet.com. # puppet module install puppetlabs/ntp Notice: Preparing to install into /etc/puppet/modules ...

[Bug 1491406] Re: augeas-lenses-1.2.0 - NagiosCfg lens broken for /etc/nagios.cfg due to spaces

2016-06-07 Thread Dominic Cleal
Ryan, changing an existing value will preserve the whitespace (something Augeas tries hard to do), so you'll probably need to add a new setting to observe the behaviour. You could delete the existing cfg_file entry and create a new one, e.g. augtool> rm /files/etc/nagios3/nagios.cfg/cfg_file

[Bug 1580731] Re: augeas-lenses filter for PHP files doesn't match php7.0-* files

2016-05-12 Thread Dominic Cleal
I'd suggest just adding these two entries to the includes list: /etc/php/*/*/*.ini /etc/php/*/fpm/pool.d/*.conf Unless there are other incompatible INI files that might be matched? I'm not familiar with the PHP packages to be sure. -- You received this bug notification because you are a member

[Bug 1570472] Re: Set systemd as default service provider

2016-05-09 Thread Dominic Cleal
I've tested the diff in #4 on Ubuntu 16.04, with puppet-common 3.8.5-2, it seems to fix the issue correctly. Prior to the patch, Puppet would try and manage services using upstart: /Stage[main]/Tftp::Service/Service[tftpd-hpa]: Could not evaluate: Execution of '/sbin/status tftpd-hpa' returned

[Bug 1510318] Re: Augeas 1.3 can't read some conf files

2015-10-27 Thread Dominic Cleal
I'm attaching the trio of commits to fix the bug in a single patch, rebased on top of the upstream 1.3.0 release. Hopefully somebody can use this as the basis of a patch against the package itself. Locally it seems to resolve parsing of the ssl.conf file at

[Bug 1510318] Re: Augeas 1.3 can't read some conf files

2015-10-27 Thread Dominic Cleal
I'm attaching the trio of commits to fix the bug in a single patch, rebased on top of the upstream 1.3.0 release. Hopefully somebody can use this as the basis of a patch against the package itself. Locally it seems to resolve parsing of the ssl.conf file at

[Bug 1510318] Re: Augeas 1.3 can't read some conf files

2015-10-27 Thread Dominic Cleal
With regards to manual regression testing for a stable update, I'd suggest running "augtool print /files/etc/apache2" (with Apache, mod_ssl and optionally, other Apache modules installed) to check if any files that used to parse now fail in any way. Hopefully the number of errors will be reduced.

[Bug 1510318] Re: Augeas 1.3 can't read some conf files

2015-10-27 Thread Dominic Cleal
With regards to manual regression testing for a stable update, I'd suggest running "augtool print /files/etc/apache2" (with Apache, mod_ssl and optionally, other Apache modules installed) to check if any files that used to parse now fail in any way. Hopefully the number of errors will be reduced.

[Bug 1267385] [NEW] Default file mode now 0600 instead of 0644 (regression in CVE-2013-4969 fix)

2014-01-09 Thread Dominic Cleal
Public bug reported: The fix for CVE-2013-4969 (tempfile vulnerability) contained a regression affecting the default file mode if none is specified on a file resource. This has been fixed in upstream 3.4.2 and 2.7.25. Upstream bug: https://tickets.puppetlabs.com/browse/PUP-1255 Please apply

[Bug 1267385] [NEW] Default file mode now 0600 instead of 0644 (regression in CVE-2013-4969 fix)

2014-01-09 Thread Dominic Cleal
Public bug reported: The fix for CVE-2013-4969 (tempfile vulnerability) contained a regression affecting the default file mode if none is specified on a file resource. This has been fixed in upstream 3.4.2 and 2.7.25. Upstream bug: https://tickets.puppetlabs.com/browse/PUP-1255 Please apply

Re: [Bug 1054306] Re: ncftool list fails

2012-09-24 Thread Dominic Cleal
bits of the modprobe lens, so my name change broke it. Attached is a followup patch committed as c0ff479 which repairs the damage caused. -- Dominic Cleal domi...@computerkb.co.uk ** Patch added: 1054306-modprobe-wrap-c0ff479.patch https://bugs.launchpad.net/bugs/1054306/+attachment/3339679

Re: [Bug 1054306] Re: ncftool list fails

2012-09-24 Thread Dominic Cleal
bits of the modprobe lens, so my name change broke it. Attached is a followup patch committed as c0ff479 which repairs the damage caused. -- Dominic Cleal domi...@computerkb.co.uk ** Patch added: 1054306-modprobe-wrap-c0ff479.patch https://bugs.launchpad.net/bugs/1054306/+attachment/3339679

[Bug 1054306] Re: ncftool list fails

2012-09-21 Thread Dominic Cleal
Could you share the contents of /etc/modprobe.d/iwlwifi.conf ? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to netcf in Ubuntu. https://bugs.launchpad.net/bugs/1054306 Title: ncftool list fails To manage notifications about this

Re: [Bug 1054306] Re: ncftool list fails

2012-09-21 Thread Dominic Cleal
attached if you want to apply it. http://git.fedorahosted.org/cgit/augeas.git/commit/?id=e599fed9 Regards, -- Dominic Cleal domi...@computerkb.co.uk ** Patch added: 1054306-modprobe-wrap.patch https://bugs.launchpad.net/bugs/1054306/+attachment/3329888/+files/1054306-modprobe-wrap.patch

[Bug 1054306] Re: ncftool list fails

2012-09-21 Thread Dominic Cleal
Could you share the contents of /etc/modprobe.d/iwlwifi.conf ? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1054306 Title: ncftool list fails To manage notifications about this bug go to:

Re: [Bug 1054306] Re: ncftool list fails

2012-09-21 Thread Dominic Cleal
attached if you want to apply it. http://git.fedorahosted.org/cgit/augeas.git/commit/?id=e599fed9 Regards, -- Dominic Cleal domi...@computerkb.co.uk ** Patch added: 1054306-modprobe-wrap.patch https://bugs.launchpad.net/bugs/1054306/+attachment/3329888/+files/1054306-modprobe-wrap.patch

[Bug 283469] Re: Icon problems after switching to cystal svg iconset

2008-10-31 Thread Dominic Cleal
Confirmed in my upgrade from 8.04 to 8.10 final and also back in 8.04 when installing KDE4 packages. -- Icon problems after switching to cystal svg iconset https://bugs.launchpad.net/bugs/283469 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to