[Bug 792085] Re: Automatic remount of safely removed usb 3.0 drive

2016-10-15 Thread god
I think it would be much better to just switch to systemd-mount for all
removable media - see https://bugs.launchpad.net/ubuntu/+source/ubuntu-
meta/+bug/1627546 for details.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/792085

Title:
  Automatic remount of safely removed usb 3.0 drive

To manage notifications about this bug go to:
https://bugs.launchpad.net/nautilus/+bug/792085/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 838792] Re: "Restart" logs out, even when there are no other people logged in

2016-05-01 Thread god
That's utterly embarrassing - the bug is still present in 16.04!
Although in 15.10 it used to work fine.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-session in Ubuntu.
https://bugs.launchpad.net/bugs/838792

Title:
  "Restart" logs out, even when there are no other people logged in

To manage notifications about this bug go to:
https://bugs.launchpad.net/indicator-session/+bug/838792/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1542861] [NEW] machinectl packaging broken

2016-02-07 Thread god
Public bug reported:

When I type "machinectl" in 15.10 I got message which recommends me to
do following: sudo apt-get install systemd

This is obviously incorrect because systemd is already installed. Seems
like a packaging error.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1542861

Title:
  machinectl packaging broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1542861/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1480952] [NEW] remote logging missing

2015-08-03 Thread god
Public bug reported:

Right now there's nothing like systemd-journal-remote and systemd-
journal-upload available in Ubuntu's repo. Would be great to have this
packaged and installable in one command (or better yet - by default) to
get modern remote logging to/from ubuntu as quickly and pain-free for
users as possible.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1480952

Title:
  remote logging missing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1480952/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1479732] [NEW] systemd causes mess in /var/tmp

2015-07-30 Thread god
Public bug reported:

There's enormous amount of directories like systemd-private-
fdd28b0bfe4c47808e41dbb7a0300bdc-colord.service-vrglD7 in /var/tmp

It's clear why they are necessary but it's still looks irritating and is
magnified (compared to /tmp for example) by the fact that /var/tmp is
not cleaned up (and of course it shouldn't be) on every reboot.

The solution is trivial and already employed by lots of services for
/tmp - just prepend . to the folder name so it's hidden from user's file
manager.

Would be excellent if ubuntu could apply this to systemd as well: the
lesser is chance for user confusion (those directories are unaccessible
to the user anyway so there's little sense in showing them) - the
better.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1479732

Title:
  systemd causes mess in /var/tmp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1479732/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1471993] [NEW] coredump.conf is missing

2015-07-06 Thread god
Public bug reported:

There is no /etc/systemd/coredump.conf, the man page for systemd-coredump and 
coredumpctl are absent as well in latest ubuntu 15.04
Please put it back - I'd like to configure coredump policy in a way coherent 
with the rest of the system.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1471993

Title:
  coredump.conf is missing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1471993/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 296867] Re: empathy needs to support OTR encryption

2015-06-24 Thread god
No idea - I've long migrated to software which cares enough about
security not to have critical bugs opened for 5 years.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to empathy in Ubuntu.
https://bugs.launchpad.net/bugs/296867

Title:
  empathy needs to support OTR encryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/empathy/+bug/296867/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1467611] [NEW] unprivileged lxc containers broken

2015-06-22 Thread god
Public bug reported:

Seems like I've hit the bug #1413927 but as requested in comments I'm
filing new one.

lxc-start -n asterisk -l debug -F --logfile /dev/stdout

  lxc-start 1434992414.067 INFO lxc_start_ui - lxc_start.c:main:264 - 
using rcfile /home/x/.local/share/lxc/asterisk/config
  lxc-start 1434992414.067 INFO lxc_utils - utils.c:get_rundir:483 - 
XDG_RUNTIME_DIR isn't set in the environment.
  lxc-start 1434992414.067 WARN lxc_confile - 
confile.c:config_pivotdir:1768 - lxc.pivotdir is ignored.  It will soon become 
an error.
  lxc-start 1434992414.069 INFO lxc_confile - 
confile.c:config_idmap:1376 - read uid map: type u nsid 0 hostid 10 range 
65536
  lxc-start 1434992414.069 INFO lxc_confile - 
confile.c:config_idmap:1376 - read uid map: type g nsid 0 hostid 10 range 
65536
  lxc-start 1434992414.069 WARN lxc_log - log.c:lxc_log_init:316 - 
lxc_log_init called with log already initialized
  lxc-start 1434992414.075 WARN lxc_cgmanager - cgmanager.c:cgm_get:963 
- do_cgm_get exited with error
  lxc-start 1434992414.076 WARN lxc_start - 
start.c:lxc_check_inherited:224 - inherited fd 7
  lxc-start 1434992414.076 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM 
security driver AppArmor
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .reject_force_umount  # comment 
this to allow umount -f;  not recommended.  
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for reject_force_umount 
action 0
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:210 - Setting seccomp rule to reject force umounts
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for reject_force_umount 
action 0
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:438 - Adding non-compat rule bc nr1 == nr2 (-1, -1)
  lxc-start 1434992414.076 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:210 - Setting seccomp rule to reject force umounts
  
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .[all].
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .kexec_load errno 1.
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for kexec_load action 
327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for kexec_load action 327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:443 - Really adding compat rule bc nr1 == nr2 (283, 
246)
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .open_by_handle_at errno 1.
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for open_by_handle_at 
action 327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for open_by_handle_at action 
327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:443 - Really adding compat rule bc nr1 == nr2 (342, 
304)
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .init_module errno 1.
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for init_module action 
327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for init_module action 327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:443 - Really adding compat rule bc nr1 == nr2 (128, 
175)
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .finit_module errno 1.
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for finit_module action 
327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for finit_module action 
327681
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:443 - Really adding compat rule bc nr1 == nr2 (350, 
313)
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:316 - processing: .delete_module errno 1.
  lxc-start 1434992414.077 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:419 - Adding non-compat rule for delete_module action 
327681
  lxc-start 1434992414.078 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:430 - Adding compat rule for delete_module action 
327681
  lxc-start 1434992414.078 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:443 - Really adding compat rule bc nr1 == nr2 (129, 
176)

[Bug 1461274] Re: dependency cycles

2015-06-04 Thread god
Ah, my bad - failed to make a proper unit, will dig deeper into docs.
Hopefully upstream issue will get fixed so this would be easier to
troubleshoot in future.

** Changed in: systemd (Ubuntu)
   Status: Incomplete = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1461274

Title:
  dependency cycles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1461274/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 1461274] [NEW] dependency cycles

2015-06-02 Thread god
Public bug reported:

There are several dependency cycles reported during the boot of xubuntu
15.04 x86_64: see attached log.

Those cycles should be resoled.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: boot.log
   https://bugs.launchpad.net/bugs/1461274/+attachment/4408820/+files/boot.log

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1461274

Title:
  dependency cycles

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1461274/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 296867] Re: empathy needs to support OTR encryption

2015-05-03 Thread god
As good as dead if you care about security. Luckily there are plethora
of alternatives out there with OTR support. See http://otr.im for
details.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to empathy in Ubuntu.
https://bugs.launchpad.net/bugs/296867

Title:
  empathy needs to support OTR encryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/empathy/+bug/296867/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 30969] monitor goes to standby when playing a movie in totem fullscreen

2006-03-07 Thread toppled god
Public bug report changed:
https://launchpad.net/malone/bugs/30969

Comment:
Yassir! I killed it about 5-6 hours ago and everything seems alright
now.

--
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs


[Bug 29017] Attaching HTML from Firefox crashes Evolution

2006-01-19 Thread toppled god
Public bug reported:
https://launchpad.net/malone/bugs/29017

Affects: evolution (Ubuntu)
   Severity: Normal
   Priority: (none set)
 Status: Unconfirmed

Description:
Dragging and dropping the icon in the address bar of Firefox into the
body of an email to send usually attaches the web page as an html file.
I've now crashed Evolution 2.4.1 three times in a row.  I'm using
Breezy, by the way.

--
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
http://lists.ubuntu.com/mailman/listinfo/desktop-bugs