Augeas 1.3 can't read some conf files
Bug #1510318 reported by
Noah Swartz
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
augeas (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Vivid |
Won't Fix
|
Low
|
Unassigned | ||
Wily |
Won't Fix
|
Low
|
Unassigned |
Bug Description
https:/
Augaes 1.3 can't read certain ssl.conf files, such as one of the ones Let's Encrypt uses: https:/
versions 1.2 and 1.4 of augaes don't have this problem, but currently vivid and wily are distributing version 1.3: http://
For Let's Encrypt to work for all Ubuntu users this bug should be fixed for them.
Changed in augeas (Ubuntu): | |
status: | New → Triaged |
Changed in augeas (Ubuntu Vivid): | |
status: | New → Triaged |
Changed in augeas (Ubuntu Wily): | |
status: | New → Triaged |
Changed in augeas (Ubuntu Vivid): | |
importance: | Undecided → High |
Changed in augeas (Ubuntu Wily): | |
importance: | Undecided → High |
To post a comment you must log in.
Thank you for taking the time to report this bug and helping to make Ubuntu better.
We can't bump augeas in Vivid and Wily as they are already released, but it looks like it should be fairly easy to cherry-pick just this fix without regressing existing users. Is this accurate?
In this case, if somebody can prepare and test a backported patch for 1.3.0-0ubuntu1, I will be happy to help drive this to a fix in Wily, Vivid and Xenial which all currently are on that version.
I will need a commitment from someone to verify the fix for each release as even though I appreciate there is an automated test case, we do still require manual verification for updates to stable releases in order to minimise risk of regression to existing users.
If you're interested in the process, it is documented at https:/ /wiki.ubuntu. com/StableRelea seUpdates