** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091657
Title:
systemd-localed r
Tested on a pristine UC24 built with a custom `core24` base that uses
noble-proposed instead of noble-updates, and ran the same sequence of
commands (updating locale, rebooting, ensuring it was the same)
$ systemctl --version
systemd 255 (255.4-1ubuntu8.6)
+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMAC
Thank you Nick!
The core side of things are in this PR:
https://github.com/canonical/core-base/pull/313
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091657
Title:
systemd-localed requires read-on
As James pointed out that was the root of my issue, after removing the
bind-mount everything worked
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091657
Title:
systemd-localed requires read-only-et
Hey!
So tested with a new UC 24 system that includes the systemd from enr0n
ppa and has the following setup
$ systemctl --version
systemd 255 (255.4-1ubuntu8.6~ppa3)
+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL
+ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +
Hey!
policykit-1/124-2ubuntu1.24.10.2
- Works on Oracular and loads actions from /etc, verified with pkaction
policykit-1/124-2ubuntu1.24.04.2
- Works on Noble and loads actions from /etc as well, verified again with
pkaction
--
You received this bug notification because you are a member of
Public bug reported:
Hey!
I would like to request a SRU of the following upstream PR for Noble.
https://github.com/polkit-org/polkit/pull/499
I have applied this to ubuntu/noble-updates and produced a new patch
that is attached with identical changes. The PR does not apply directly
due to misma
** Description changed:
Hey!
We're using libpam in the Ubuntu Core rootfs for the core24 snap (which
is pam from Noble). We've run into a sitaution where we would like to
move pam.d files into /usr/lib/pam.d instead of /etc/pam.d, and looking
at man pages this should be supported. (I.
Public bug reported:
Hey!
We're using libpam in the Ubuntu Core rootfs for the core24 snap (which
is pam from Noble). We've run into a sitaution where we would like to
move pam.d files into /usr/lib/pam.d instead of /etc/pam.d, and looking
at man pages this should be supported. (I.e it always che
Hey!
Sorry for the slow response from the Core team, I can verify this is now
working with passwd in proposed. I was able to add a user with
--extrausers and --groups switches together. It no longer fails on
locking /etc/groups
--
You received this bug notification because you are a member of Ub
Just as an added information, providing the switch `-s
/run/wpa_supplicant` with the network-control interface connected should
work.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074070
Title:
una
So I looked into this and the observations made in this post is correct.
It's because the default path of the wpa_cli client socket made is in
/tmp (they use AF_UNIX sockets, and UDP protocol - this means the client
socket must bind a visible place for the server)
/tmp is obviously not visible out
This happens too with Ubuntu Core 24 during console-conf WiFi
configuration, and provides a less-than-nice experience.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063365
Title:
brcmfmac: brcmf_se
13 matches
Mail list logo