Bug#494873: kvm-source: Diversion of kernel modules does not work anymore
Package: kvm-source Version: 71+dfsg-1 Severity: important The fix for bug #429851 tries to divert the kernel-supplied kvm modules when the modules from the packages are installed. Unfortunately, the location has apparently changed. The packages tries to find the modules here: /lib/modules/2.6.25-2-amd64/kernel/drivers/kvm ... while they are really here (at least on my system): /lib/modules/2.6.25-2-amd64/kernel/arch/x86/kvm/kvm.ko Please update the diversion script. Thanks! Regards, Joost -- Package-specific info: /proc/cpuinfo: processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Xeon(R) CPU X3323 @ 2.50GHz stepping: 6 cpu MHz : 2499.998 cache size : 3072 KB physical id : 0 siblings: 4 core id : 0 cpu cores : 4 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr dca sse4_1 lahf_lm bogomips: 5004.55 clflush size: 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Xeon(R) CPU X3323 @ 2.50GHz stepping: 6 cpu MHz : 2499.998 cache size : 3072 KB physical id : 0 siblings: 4 core id : 1 cpu cores : 4 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr dca sse4_1 lahf_lm bogomips: 5000.02 clflush size: 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 2 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Xeon(R) CPU X3323 @ 2.50GHz stepping: 6 cpu MHz : 2499.998 cache size : 3072 KB physical id : 0 siblings: 4 core id : 2 cpu cores : 4 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr dca sse4_1 lahf_lm bogomips: 5000.05 clflush size: 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 3 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Xeon(R) CPU X3323 @ 2.50GHz stepping: 6 cpu MHz : 2499.998 cache size : 3072 KB physical id : 0 siblings: 4 core id : 3 cpu cores : 4 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr dca sse4_1 lahf_lm bogomips: 5000.05 clflush size: 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages kvm-source depends on: ii bzip2 1.0.5-0.1 high-quality block-sorting file co ii debhelper 7.0.15 helper programs for debian/rules ii make 3.81-5 The GNU version of the make util ii module-assistant 0.10.11.0 tool to make module package creati kvm-source recommends no packages. Versions of packages kvm-source suggests: pn kernel-packagenone (no description available) ii linux-headers-2.6.25-2-amd64 2.6.25-7 Header files for Linux 2.6.25 on A -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494665: symbol lookup error: /usr/lib/collectd/ipmi.so: undefined symbol: ipmi_init
Package: collectd Version: 4.4.1-2 Severity: normal The system is a Dell PowerEdge R300. After I enabled the ipmi plugin collectd failed to start. Running collectd -f gives the error: collectd: symbol lookup error: /usr/lib/collectd/ipmi.so: undefined symbol: ipmi_init Not sure what else I could do to aid debugging. ipmitool connects to the IPMI system just fine. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages collectd depends on: ii debconf [debconf-2.0] 1.5.22 Debian configuration management sy ii libc6 2.7-13 GNU C Library: Shared libraries ii librrd2 1.2.28-1 Time-series data storage and displ Versions of packages collectd recommends: ii libcurl3-gnutls 7.18.2-5 Multi-protocol file transfer libra ii libdbus-1-3 1.2.1-2 simple interprocess messaging syst ii libhal1 0.5.11-2 Hardware Abstraction Layer - share ii libmysqlclient15off 5.0.51a-9+lenny2 MySQL database client library ii libopenipmi02.0.14-1 Intelligent Platform Management In ii liboping0 0.3.5-1 C/C++ library to generate ICMP_ECH ii libpcap0.8 0.9.8-5 system interface for user-level pa ii libperl5.10 5.10.0-11.1 Shared Perl library ii libsensors3 1:2.10.7-1 library to read temperature/voltag ii libsnmp15 5.4.1~dfsg-8.1 SNMP (Simple Network Management Pr ii libupsclient1 2.2.2-2 Client library for the nut - Netwo ii libvirt00.4.4-3 library for interfacing with diffe ii libxenstore3.0 3.2.1-2 Xenstore communications library fo ii libxml2 2.6.32.dfsg-2GNOME XML library ii lm-sensors 1:3.0.2-1+b1 utilities to read temperature/volt ii perl5.10.0-11.1 Larry Wall's Practical Extraction ii rrdtool 1.2.28-1 Time-series data storage and displ Versions of packages collectd suggests: pn collectd-dev none(no description available) pn hddtempnone(no description available) pn httpd-cgi none(no description available) ii libhtml-parser-perl3.56-1+b1 A collection of modules that parse ii libregexp-common-perl 2.122-1 Provide commonly requested regular ii librrds-perl 1.2.28-1 Time-series data storage and displ ii liburi-perl1.35.dfsg.1-1 Manipulates and accesses URI strin pn mbmon none(no description available) -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494665: symbol lookup error: /usr/lib/collectd/ipmi.so: undefined symbol: ipmi_init
On 11-08-08 15:54, Florian Forster wrote: On Mon, Aug 11, 2008 at 12:55:25PM +0200, Joost Cassee wrote: collectd: symbol lookup error: /usr/lib/collectd/ipmi.so: undefined symbol: ipmi_init could you please provide the output of the following command? $ ldd /usr/lib/collectd/ipmi.so $ ldd /usr/lib/collectd/ipmi.so linux-vdso.so.1 = (0x7fff7cffe000) libOpenIPMIpthread.so.0 = not found libc.so.6 = /lib/libc.so.6 (0x7f8d748e) /lib64/ld-linux-x86-64.so.2 (0x7f8d74e3e000) Thanks for looking into this! Regards, Joost -- Joost Cassee http://joost.cassee.net signature.asc Description: OpenPGP digital signature
Bug#411046: nagios-nrpe-server: A reproduction
Package: nagios-nrpe-server Version: 2.5.1-3 Followup-For: Bug #411046 This bug is reproduced on my system. Apparently, the pid file is created as root. I tried 'chmod nagios:nagios /var/run/nrpe.pid', but after a restart of the service the file was owned by root again. /etc/nagios/nrpe[_local].cfg attached. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages nagios-nrpe-server depends on: ii adduser 3.102Add and remove users and groups ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries ii libssl0.9.8 0.9.8c-4 SSL shared libraries ii lsb-base3.1-23.1 Linux Standard Base 3.1 init scrip Versions of packages nagios-nrpe-server recommends: ii nagios-plugins1.4.5-1Plugins for the nagios network mon ii nagios-plugins-basic 1.4.5-1Plugins for the nagios network mon -- no debconf information # # Sample NRPE Config File # Written by: Ethan Galstad ([EMAIL PROTECTED]) # # Last Modified: 02-23-2006 # # NOTES: # This is a sample configuration file for the NRPE daemon. It needs to be # located on the remote host that is running the NRPE daemon, not the host # from which the check_nrpe client is being executed. # # PID FILE # The name of the file in which the NRPE daemon should write it's process ID # number. The file is only written if the NRPE daemon is started by the root # user and is running in standalone mode. pid_file=/var/run/nrpe.pid # PORT NUMBER # Port number we should wait for connections on. # NOTE: This must be a non-priviledged port (i.e. 1024). # NOTE: This option is ignored if NRPE is running under either inetd or xinetd server_port=5666 # SERVER ADDRESS # Address that nrpe should bind to in case there are more than one interface # and you do not want nrpe to bind on all interfaces. # NOTE: This option is ignored if NRPE is running under either inetd or xinetd #server_address=192.168.1.1 # NRPE USER # This determines the effective user that the NRPE daemon should run as. # You can either supply a username or a UID. # # NOTE: This option is ignored if NRPE is running under either inetd or xinetd nrpe_user=nagios # NRPE GROUP # This determines the effective group that the NRPE daemon should run as. # You can either supply a group name or a GID. # # NOTE: This option is ignored if NRPE is running under either inetd or xinetd nrpe_group=nagios # ALLOWED HOST ADDRESSES # This is an optional comma-delimited list of IP address or hostnames # that are allowed to talk to the NRPE daemon. # # Note: The daemon only does rudimentary checking of the client's IP # address. I would highly recommend adding entries in your /etc/hosts.allow # file to allow only the specified host to connect to the port # you are running this daemon on. # # NOTE: This option is ignored if NRPE is running under either inetd or xinetd #allowed_hosts=127.0.0.1,192.168.0.2 # COMMAND ARGUMENT PROCESSING # This option determines whether or not the NRPE daemon will allow clients # to specify arguments to commands that are executed. This option only works # if the daemon was configured with the --enable-command-args configure script # option. # # *** ENABLING THIS OPTION IS A SECURITY RISK! *** # Read the SECURITY file for information on some of the security implications # of enabling this variable. # # Values: 0=do not allow arguments, 1=allow command arguments dont_blame_nrpe=0 # COMMAND PREFIX # This option allows you to prefix all commands with a user-defined string. # A space is automatically added between the specified prefix string and the # command line from the command definition. # # *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! *** # Usage scenario: # Execute restricted commmands using sudo. For this to work, you need to add # the nagios user to your /etc/sudoers. An example entry for alllowing # execution of the plugins from might be: # # nagios ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/ # # This lets the nagios user run all commands in that directory (and only them) # without asking for a password. If you do this, make sure you don't give # random users write access to that directory or its contents! # command_prefix=/usr/bin/sudo # DEBUGGING OPTION # This option determines whether or not debugging messages are logged to the # syslog facility. # Values: 0=debugging off, 1=debugging on debug=0 # COMMAND TIMEOUT # This specifies the maximum number of seconds that the NRPE daemon will # allow plugins to finish executing before killing
Bug#433688: puppet: --help switch doesn't work
On 19/07/2007 00:12, Matthew Palmer wrote: On Wed, Jul 18, 2007 at 11:24:35PM +0200, Markus Fischer wrote: Package: puppet Version: 0.20.1-1 Severity: important The help switch doesn't work on any of the executeables in the puppet/puppetmaster package. This is the output I get: Please upgrade to 0.23.0-1 from unstable (it should work fine in Etch), this was a known problem in that release. Note, however, that version 0.23.0 has a problem with package 'ensure = present' on Debian systems: http://reductivelabs.com/trac/puppet/ticket/716 Changeset 2709 contains the patch which you may want to apply yourself. Regards, Joost -- Joost Cassee http://joost.cassee.net signature.asc Description: OpenPGP digital signature
Bug#393835: Script update
Sorry, just found out the script did not play nice with CAcert. Now using curl, which works correctly with SubjectAltName. Regards, Joost -- Joost Cassee http://joost.cassee.net #!/bin/sh # # Get all HTTP-accessable CRLs from CA certificates # # Copyright (C) 2007 Joost Cassee # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # The full license can be found at http://www.gnu.org/licenses/gpl.txt CRTDIR=/etc/ssl/certs CRLDIR=/var/lib/ssl/crl set -e cd $CRTDIR for crt in *.pem; do openssl x509 -noout -text -in $crt | \ egrep -A 1 '^ *X509v3 CRL Distribution Points: *$' | \ tail -n 1 | \ grep '^ *URI:' | \ cut -d: -f2- | \ while read url; do crlfile=$CRLDIR/$crt curl -s --capath /etc/ssl/certs -o $crlfile.tmp $url 21 if openssl crl -noout -inform DER -in $crlfile.tmp 2/dev/null; then openssl crl -inform DER -outform PEM -in $crlfile.tmp -out $crlfile rm $crlfile.tmp echo CRL for $crt found elif openssl crl -noout -in $crlfile.tmp 2/dev/null; then mv $crlfile.tmp $crlfile echo CRL for $crt found else rm $crlfile.tmp echo CRL for $crt in unknown format, removed fi done done c_rehash $CRLDIR 21 /dev/null | grep -v '^WARNING: ' 2 signature.asc Description: OpenPGP digital signature
Bug#393835: CRL update script
For my own system, I hacked up a shell script that downloads all CRLs with an URI: distribution point. It could be expanded to work with LDAP distribution points. I attached the script to this message. You may have to create the CRLDIR directory. Just call the script from cron.daily, redirecting stdout to /dev/null. Regards, Joost -- Joost Cassee http://joost.cassee.net #!/bin/sh # # Get all HTTP-accessable CRLs from CA certificates # # Copyright (C) 2007 Joost Cassee # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # The full license can be found at http://www.gnu.org/licenses/gpl.txt CRTDIR=/etc/ssl/certs CRLDIR=/var/lib/ssl/crl set -e cd $CRTDIR for crt in *.pem; do openssl x509 -noout -text -in $crt | \ egrep -A 1 '^ *(X509v3 CRL Distribution Points|Netscape CA Revocation Url): *$' | \ tail -n 1 | \ grep '^ *URI:' | \ cut -d: -f2- | \ while read url; do crlfile=$CRLDIR/$crt wget -q -O $crlfile.tmp $url if openssl crl -noout -inform DER -in $crlfile.tmp 2/dev/null; then openssl crl -inform DER -outform PEM -in $crlfile.tmp -out $crlfile rm $crlfile.tmp echo CRL for $crt found elif openssl crl -noout -in $crlfile.tmp 2/dev/null; then mv $crlfile.tmp $crlfile echo CRL for $crt found else rm $crlfile.tmp echo CRL for $crt in unknown format, removed fi done done c_rehash $CRLDIR 21 /dev/null | grep -v '^WARNING: ' 2 signature.asc Description: OpenPGP digital signature
Bug#312276: Just add --with-prelude to configure
Dear Javier, Apparently, with the current version of samhain, you only have to add --with-prelude to the configuration script. Please consider applying this option. Thanks. Regards, Joost Cassee -- Joost Cassee http://joost.cassee.net signature.asc Description: OpenPGP digital signature
Bug#404345: This bug is triggered by using different encryption and signing keys
I can confirm this bug when using different signing and encryption keys. If both are the same there is no problem. Layman idea: are the manifest files perhaps also encrypted? -- Joost Cassee http://joost.cassee.net signature.asc Description: OpenPGP digital signature
Bug#406477: Also happened to me
This oops also found its way to my server system. I am running the standard Linux 2.6.18-3 kernel. Mar 1 18:01:30 ben kernel: [ cut here ] Mar 1 18:01:30 ben kernel: kernel BUG at mm/slab.c:595! Mar 1 18:01:30 ben kernel: invalid opcode: [#1] Mar 1 18:01:30 ben kernel: SMP Mar 1 18:01:30 ben kernel: Modules linked in: edd joydev sg st sr_mod ip6table_mangle ip6table_filter ip6_tables iptable_nat ip_nat ip_conntrack nfnetlink iptable_mangle iptable_filter ip_tables x_tables nfs nfsd exportfs lockd nfs_acl sunrpc autofs4 tun ipv6 aes dm_crypt ztdummy zaptel crc_ccitt w83627hf hwmon_vid eeprom i2c_isa snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device snd evdev soundcore snd_page_alloc floppy psmouse shpchp serio_raw pci_hotplug intel_agp agpgart parport_pc parport rtc i2c_i801 i2c_core pcspkr ext3 jbd mbcache dm_mirror dm_snapshot dm_mod raid456 xor raid1 md_mod ide_generic ide_cd cdrom usb_storage sd_mod 8139too piix ata_piix sata_promise 8139cp mii libata scsi_mod generic ide_core ehci_hcd uhci_hcd usbcore thermal processor fan Mar 1 18:01:30 ben kernel: CPU:0 Mar 1 18:01:30 ben kernel: EIP:0060:[c0156f55]Not tainted VLI Mar 1 18:01:30 ben kernel: EFLAGS: 00210206 (2.6.18-3-686 #1) Mar 1 18:01:30 ben kernel: EIP is at kmem_cache_free+0x29/0x6d Mar 1 18:01:30 ben kernel: eax: 8001006c ebx: bf8d ecx: dfabb140 edx: c16d1420 Mar 1 18:01:30 ben kernel: esi: d24a680c edi: f68a15c8 ebp: 0148 esp: e9429db0 Mar 1 18:01:30 ben kernel: ds: 007b es: 007b ss: 0068 Mar 1 18:01:30 ben kernel: Process lvremove (pid: 16263, ti=e9428000 task=c4938000 task.ti=e9428000) Mar 1 18:01:30 ben kernel: Stack: bf8d d24a680c f8d82148 f88cf94e dfabb140 0029 0400 d24a67c0 Mar 1 18:01:30 ben kernel:caab8960 f8d80020 f88cf9fc db2ccc80 f8d80020 f894b695 Mar 1 18:01:30 ben kernel:e753ba80 db2ccc80 f8d4e000 f894a892 f0b15cc0 e753ba80 f894d9bf Mar 1 18:01:30 ben kernel: Call Trace: Mar 1 18:01:30 ben kernel: [f88cf94e] exit_exception_table+0x32/0x5a [dm_snapshot] Mar 1 18:01:30 ben kernel: [f88cf9fc] snapshot_dtr+0x86/0xb8 [dm_snapshot] Mar 1 18:01:30 ben kernel: [f894b695] dm_table_put+0x4a/0xa7 [dm_mod] Mar 1 18:01:30 ben kernel: [f894a892] dm_put+0x79/0x11d [dm_mod] Mar 1 18:01:30 ben kernel: [f894d9bf] dev_remove+0x82/0x90 [dm_mod] Mar 1 18:01:30 ben kernel: [f894df21] ctl_ioctl+0x1f3/0x238 [dm_mod] Mar 1 18:01:30 ben kernel: [f894d93d] dev_remove+0x0/0x90 [dm_mod] Mar 1 18:01:30 ben kernel: [c016937b] do_ioctl+0x47/0x5d Mar 1 18:01:30 ben kernel: [c01695db] vfs_ioctl+0x24a/0x25c Mar 1 18:01:30 ben kernel: [c0169635] sys_ioctl+0x48/0x5f Mar 1 18:01:30 ben kernel: [c0102c11] sysenter_past_esp+0x56/0x79 Mar 1 18:01:30 ben kernel: Code: ff ff 57 89 d7 8d 92 00 00 00 40 89 c1 c1 ea 0c c1 e2 05 03 15 70 e3 36 c0 56 53 8b 02 f6 c4 40 74 03 8b 52 0c 8b 02 84 c0 78 08 0f 0b 53 02 76 af 29 c0 39 4a 18 74 08 0f 0b 6a 0d 76 af 29 c0 Mar 1 18:01:30 ben kernel: EIP: [c0156f55] kmem_cache_free+0x29/0x6d SS:ESP 0068:e9429db0 -- Joost Cassee http://joost.cassee.net signature.asc Description: OpenPGP digital signature
Bug#369020: init script exit code
I think I have found two problems with the init script: If 'foreground_mode no' the wrong pid will be written to the pidfile, causing the error '/proc/30387/cmdline: No such file or directory' The '| grep warning' line in the init script causes the 'stop' action to fail (because of 'set -e'). - Joost signature.asc Description: Dit berichtdeel is digitaal ondertekend
Bug#384398: poppass-cgi: Use HTTP authentication username if available
Package: poppass-cgi Version: 3-3 Severity: wishlist Tags: patch When the script is used in on an HTTP authenticated website, the username could be taken from the REMOTE_USER environment variable. A patch to include this behaviour is attached. Note that this patch removes the center tag to work around the problems with the alignment of the fixed username. As it seems that the Debian packager is also the upstream maintainer, I think this bugreport should reach the right person. Please consider applying the patch. - Joost -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.11-bixenu Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages poppass-cgi depends on: ii libwww-perl5.803-4 WWW client/server library for Perl ii perl 5.8.4-8sarge4 Larry Wall's Practical Extraction ii perl-modules [libcgi-pm-pe 5.8.4-8sarge4 Core Perl modules -- no debconf information --- poppass.orig2006-08-23 20:43:06.0 +0200 +++ poppass 2006-08-23 20:43:30.0 +0200 @@ -36,7 +36,7 @@ my $COPYRIGHT = Copyright 1996-2000 $AUTHOR; my $HOME = hr. a({href=/}, Home); # Very Basic Home link my $MESSAGE= EOM; -Enter your UserName, current password, and new password (twice for +Enter your username, current password, and new password (twice for verification) then click on Change Password. Passwords must be at least 6 characters and can be mixed case. EOM @@ -82,14 +82,20 @@ # Subroutines # -- sub showform { + my @p; + if (remote_user) { +@p = (hidden('username', remote_user), remote_user); + } else { +@p = (textfield('username', '', 25)); + } print p, blockquote(center(h2('Change Password')), hr, -$MESSAGE, hr, center(pre(startform(), -b UserName: /b, textfield('username','', 25), \n, +$MESSAGE, hr, pre(startform(), +b Username: /b, @p, \n, b Old Password: /b, password_field('password','', 25), \n, b New Password: /b, password_field('newpassword1','',25),\n, bVerify New Password: /b, password_field('newpassword2','',25),\n\n, submit('action','Change Password'), -endform))), \n; +endform)), \n; } # -- sub error_exit {
Bug#380438: drupal: Debconf does not accept selecting no webserver
Package: drupal Version: 4.5.3-6.1sarge2 Severity: wishlist The debconf webserver configuration should handle selecting none of the webservers. It will only continue if one or more webservers are selected. Please allow manual webserver configuration. (When the webservers config entry is cleared manually in the debconf settings file, the update script hangs.) -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.11-bixenu Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages drupal depends on: ii apache2 2.0.54-5next generation, scalable, extenda ii apache2-mpm-prefork [apa 2.0.54-5traditional model for Apache2 ii debconf 1.4.30.13 Debian configuration management sy ii makepasswd 1.10-2 Generate and encrypt passwords ii mysql-client-4.1 [mysql- 4.1.11a-4sarge5 mysql database client binaries ii php4-cli 4:4.3.10-16 command-line interpreter for the p ii php4-mysql 4:4.3.10-16 MySQL module for php4 ii postfix [mail-transport- 2.1.5-9 A high-performance mail transport ii wwwconfig-common 0.0.43 Debian web auto configuration -- debconf information: * drupal/remove_backups: true drupal/createuser_failed: * drupal/db_auto_update: true drupal/dropdb_failed: drupal/upgradedb_impossible: * drupal/dbgeneration: true * drupal/dbtype: MySQL * drupal/database_doremove: true drupal/createdb_failed: * drupal/dbserver: localhost * drupal/webserver: apache drupal/upgradedb_failed: * drupal/dbname: drupal * drupal/dbuser: drupal drupal/dbadmin: root drupal/initdb_failed: drupal/conffile_failed: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#349465: Confirmation on sarge
Stefano Zacchiroli wrote: On Mon, Jan 23, 2006 at 06:00:52PM +1000, David Young wrote: Since the recent patch of sudo (DSA-946-1) started filtering the HOME environment variable (leaving it unset), Vim: Could you please provide more info on this? On a sid box I already have the version of sudo including the fix (1.6.8p12-1), but I'm unable to reproduce the behaviour you are reporting, thus I'm tagging the bug as unreproducible. Details of my tests follow. I tried both running sudo -s (as root) and sudo vim (as a user who has the permission to run /usr/bin/vim via sudo). In the former case $HOME is set correctly to /root, in the latter case vim starts properly without exhibiting any of the problems you reported. I can confirm this behaviour. Indeed, the variable HOME is unset. This can be fixed in /etc/sudoers by setting the 'always_set_home' flag or by running sudo with the -H option. sudo bug #203874 requests this option in the default sudoers file, but there was no answer from the sudo maintainer. I doubt think this bug can/should be fixed in the vim package. Regards, Joost signature.asc Description: OpenPGP digital signature
Bug#306453: Is this a bug?
On Tue, Apr 26, 2005 at 12:34:43PM -0500, Micah Anderson wrote: Package: cron-apt Version: 0.3.0 Severity: minor # If FILTERCTRLM is true, then any line containing ^M in the apt-get # output will be filtered from log/mail/console output. This is useful # with aptitude, which does not currently support -qq (very quiet). # This feature is considered exprimental and will not work with for example this last line is unclear and ambigious, its an incomlete sentence (will not work with... with what? for example, what?) Also, immeditately following is the following two options: # MAILON=upgrade. # FILTERCTRLM=false Hold on. Doesn't the comment just say that FILTERCTRLM=false does not work with MAILON=upgrade? Notice the dot after MAILON-upgrade. The second line is just the commented-out configuration option. Regards, Joost Cassee smime.p7s Description: S/MIME Cryptographic Signature