Based on reading apparmor code and changes, it sounds like changing 'w'
to 'rw' actually is the correct fix (f.ex. [1]). My proposed merge (bug
1395098) includes that change.
This should probably be SRUed to U and V after getting fixed in the
development release. Considering that ldapi is our defa
oh, for crying out loud. I added "* Enable the mdb backend again on
ppc64el ...", but didn't drop " * Disable mdb backend ..." from the
"Remaining changes" section... :)
leaving it alone for now, anyway, in case a reviewer spots something
else I need to fix.
--
You received this bug notificatio
** Patch added: "openldap_2.4.40+dfsg-1ubuntu1.diff.gz"
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404461/+files/openldap_2.4.40%2Bdfsg-1ubuntu1.diff.gz
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
** Patch added: "debdiff | filterdiff -i '*/debian/*'"
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404462/+files/openldap_2.4.31-1%2Bnmu2ubuntu12_2.4.40%2Bdfsg-1ubuntu1.debian.debdiff
** Changed in: openldap (Ubuntu)
Assignee: Ryan Tandy (rtandy) => (unass
** Attachment added: "openldap_2.4.40+dfsg-1ubuntu1.dsc"
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404460/+files/openldap_2.4.40%2Bdfsg-1ubuntu1.dsc
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
Hello sponsors, hello server team,
(OK, let's try this again...)
Here is an updated rebase of openldap on to current Debian unstable.
A test build can be seen in my PPA:
https://launchpad.net/~rtandy/+archive/ubuntu/lp1395098
orig.tar.gz can be downloaded from there too:
https://launchpad.net/~
[Expired for ubuntu-cloud-archive because there has been no activity for
60 days.]
** Changed in: cloud-archive
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launch
[Expired for neutron (Ubuntu) because there has been no activity for 60
days.]
** Changed in: neutron (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchp
[Expired for keystone (Ubuntu) because there has been no activity for 60
days.]
** Changed in: keystone (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.laun
[Expired for ceilometer (Ubuntu) because there has been no activity for
60 days.]
** Changed in: ceilometer (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceilometer in Ubuntu.
https://bug
It looks like very recent GnuTLS releases (>= 3.3.6) may have finally
added the API needed to make this possible:
https://www.happyassassin.net/2015/01/12/a-note-about-ssltls-trusted-
certificate-stores-and-platforms/
http://gnutls.org/manual/html_node/X509-certificate-API.html#index-
gnutls_005f
Hello Peter,
I don't have a natty chroot any more, but as far back as precise,
preseeding slapd/domain does set the suffix of the default DIT, and
there is a debconf prompt for it too, at medium priority.
Marking the bug fixed, but please correct me if you meant something
different.
** Changed i
** Changed in: cinder (Ubuntu Trusty)
Status: New => Invalid
** Changed in: neutron (Ubuntu Trusty)
Status: New => Invalid
** Changed in: nova (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which
Hello,
The log says:
Configurazione di slapd (2.4.31-1+nmu2ubuntu8)...
Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.4.31-1+nmu2ubuntu3...
done.
Moving old database directories to /var/backups:
- directory dc=nodomain... done.
Loading from /var/backups/slapd-2.4.31-1+nmu2ubuntu3:
** Changed in: openldap (Ubuntu)
Assignee: (unassigned) => Ryan Tandy (rtandy)
** Changed in: openldap (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bu
Hello,
This appears to have been related to the smbkrb5pwd overlay (which I
would note is not packaged in Ubuntu):
Preparing to replace slapd 2.4.28-1.1ubuntu4.4 (using
.../slapd_2.4.31-1+nmu2ubuntu8_amd64.deb) ...
* Stopping OpenLDAP slapd
...done.
Dumping to /var/backups/slapd-2.4.28-1.1
Hello,
I can't reproduce this bug in precise.
I added an entry with slapadd:
# slapadd << eof
dn: uid=a,ou=b,dc=example,dc=com
objectClass: account
^D
Error, entries missing!
entry 3: ou=b,dc=example,dc=com
then started slapd, then tried to add the parent entry:
# ldapadd -x -D cn=admin,dc=e
Can't argue with results, can you now? With my fingers crossed, that's
good enough for me!
I like to stick with the Ubuntu LTS packages, instead of going upstream.
But I think I can now confidently move this into production. :-)
--
You received this bug notification because you are a member of
** Changed in: openldap (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1452087
Title:
slapd [or its init script] does not create necessary
Hello,
Your dpkg log says:
Loading the initial configuration from the ldif file () failed with
the following error while running slapadd:
slapadd: dn="cn=module{0},cn=config" (line=1034): (65) unrecognized
objectClass 'olcModuleList'
That object class is hard-coded in slapd (in servers/slap
** Tags added: apparmor
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1392018
Title:
apparmor stops /var/run/ldapi from being read causing ldap to fail
To manage notifications ab
I did not want to wait until this is fixed for apache 2.22 in Ubuntu
12.04
So I took mod_ssl from apache 2.2.29 which supports ECDH.
Additional I removed the 512 and 1024 bit DH parameters from ssl_engine_dh.c
and replaced them with 2048 and 3072 bit.
Two DH keys are not needed because libssl in
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to clamav in Ubuntu.
https://bugs.launchpad.net/bugs/1458614
Title:
package clamav-freshclam 0.98.7+dfsg-0ubuntu0.14.04.1 failed to
install/upgrade:
In my case this appears to have been caused by a botched removal of
vmware tools and replacement with open-vm-tools
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1423226
Title:
Public bug reported:
I was attempting to install
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: clamav-freshclam 0.98.7+dfsg-0ubuntu0.14.04.1
ProcVersionSignature: Ubuntu 3.13.0-49.83-generic 3.13.11-ckt17
Uname: Linux 3.13.0-49-generic i686
ApportVersion: 2.14.1-0ubuntu3.10
Architectu
ACK on the debdiffs, I've uploaded them for building. (I removed the
extra patch, and changed the pocket to -security).
What testing did you perform on these?
** Also affects: openldap (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: openldap (Ubuntu Utopic)
Import
26 matches
Mail list logo