ACK on the debdiffs, I've uploaded them for building. (I removed the
extra patch, and changed the pocket to -security).
What testing did you perform on these?
** Also affects: openldap (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: openldap (Ubuntu Utopic)
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to clamav in Ubuntu.
https://bugs.launchpad.net/bugs/1458614
Title:
package clamav-freshclam 0.98.7+dfsg-0ubuntu0.14.04.1 failed to
Public bug reported:
I was attempting to install
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: clamav-freshclam 0.98.7+dfsg-0ubuntu0.14.04.1
ProcVersionSignature: Ubuntu 3.13.0-49.83-generic 3.13.11-ckt17
Uname: Linux 3.13.0-49-generic i686
ApportVersion: 2.14.1-0ubuntu3.10
In my case this appears to have been caused by a botched removal of
vmware tools and replacement with open-vm-tools
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1423226
** Tags added: apparmor
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1392018
Title:
apparmor stops /var/run/ldapi from being read causing ldap to fail
To manage notifications
Can't argue with results, can you now? With my fingers crossed, that's
good enough for me!
I like to stick with the Ubuntu LTS packages, instead of going upstream.
But I think I can now confidently move this into production. :-)
--
You received this bug notification because you are a member of
I did not want to wait until this is fixed for apache 2.22 in Ubuntu
12.04
So I took mod_ssl from apache 2.2.29 which supports ECDH.
Additional I removed the 512 and 1024 bit DH parameters from ssl_engine_dh.c
and replaced them with 2048 and 3072 bit.
Two DH keys are not needed because libssl in
** Changed in: cinder (Ubuntu Trusty)
Status: New = Invalid
** Changed in: neutron (Ubuntu Trusty)
Status: New = Invalid
** Changed in: nova (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Hello,
Your dpkg log says:
Loading the initial configuration from the ldif file () failed with
the following error while running slapadd:
slapadd: dn=cn=module{0},cn=config (line=1034): (65) unrecognized
objectClass 'olcModuleList'
That object class is hard-coded in slapd (in
** Changed in: openldap (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1452087
Title:
slapd [or its init script] does not create necessary
Hello,
I can't reproduce this bug in precise.
I added an entry with slapadd:
# slapadd eof
dn: uid=a,ou=b,dc=example,dc=com
objectClass: account
^D
Error, entries missing!
entry 3: ou=b,dc=example,dc=com
then started slapd, then tried to add the parent entry:
# ldapadd -x -D
Hello,
This appears to have been related to the smbkrb5pwd overlay (which I
would note is not packaged in Ubuntu):
Preparing to replace slapd 2.4.28-1.1ubuntu4.4 (using
.../slapd_2.4.31-1+nmu2ubuntu8_amd64.deb) ...
* Stopping OpenLDAP slapd
...done.
Dumping to
** Changed in: openldap (Ubuntu)
Assignee: (unassigned) = Ryan Tandy (rtandy)
** Changed in: openldap (Ubuntu)
Status: Confirmed = In Progress
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
Hello,
The log says:
Configurazione di slapd (2.4.31-1+nmu2ubuntu8)...
Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.4.31-1+nmu2ubuntu3...
done.
Moving old database directories to /var/backups:
- directory dc=nodomain... done.
Loading from /var/backups/slapd-2.4.31-1+nmu2ubuntu3:
** Patch added: openldap_2.4.40+dfsg-1ubuntu1.diff.gz
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404461/+files/openldap_2.4.40%2Bdfsg-1ubuntu1.diff.gz
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
[Expired for ubuntu-cloud-archive because there has been no activity for
60 days.]
** Changed in: cloud-archive
Status: Incomplete = Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
[Expired for keystone (Ubuntu) because there has been no activity for 60
days.]
** Changed in: keystone (Ubuntu)
Status: Incomplete = Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
[Expired for neutron (Ubuntu) because there has been no activity for 60
days.]
** Changed in: neutron (Ubuntu)
Status: Incomplete = Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
[Expired for ceilometer (Ubuntu) because there has been no activity for
60 days.]
** Changed in: ceilometer (Ubuntu)
Status: Incomplete = Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceilometer in Ubuntu.
Hello Peter,
I don't have a natty chroot any more, but as far back as precise,
preseeding slapd/domain does set the suffix of the default DIT, and
there is a debconf prompt for it too, at medium priority.
Marking the bug fixed, but please correct me if you meant something
different.
** Changed
Based on reading apparmor code and changes, it sounds like changing 'w'
to 'rw' actually is the correct fix (f.ex. [1]). My proposed merge (bug
1395098) includes that change.
This should probably be SRUed to U and V after getting fixed in the
development release. Considering that ldapi is our
It looks like very recent GnuTLS releases (= 3.3.6) may have finally
added the API needed to make this possible:
https://www.happyassassin.net/2015/01/12/a-note-about-ssltls-trusted-
certificate-stores-and-platforms/
http://gnutls.org/manual/html_node/X509-certificate-API.html#index-
** Patch added: debdiff | filterdiff -i '*/debian/*'
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404462/+files/openldap_2.4.31-1%2Bnmu2ubuntu12_2.4.40%2Bdfsg-1ubuntu1.debian.debdiff
** Changed in: openldap (Ubuntu)
Assignee: Ryan Tandy (rtandy) =
Hello sponsors, hello server team,
(OK, let's try this again...)
Here is an updated rebase of openldap on to current Debian unstable.
A test build can be seen in my PPA:
https://launchpad.net/~rtandy/+archive/ubuntu/lp1395098
orig.tar.gz can be downloaded from there too:
** Attachment added: openldap_2.4.40+dfsg-1ubuntu1.dsc
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+attachment/4404460/+files/openldap_2.4.40%2Bdfsg-1ubuntu1.dsc
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
oh, for crying out loud. I added * Enable the mdb backend again on
ppc64el ..., but didn't drop * Disable mdb backend ... from the
Remaining changes section... :)
leaving it alone for now, anyway, in case a reviewer spots something
else I need to fix.
--
You received this bug notification
26 matches
Mail list logo