[Bug 2091657] Re: systemd-localed requires read-only-etc hacks for /etc/vconsole.conf and /etc/locale.conf

2025-03-04 Thread Philip Meulengracht
** Tags removed: verification-needed verification-needed-noble ** Tags added: verification-done verification-done-noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2091657 Title: systemd-localed r

[Bug 2091657] Re: systemd-localed requires read-only-etc hacks for /etc/vconsole.conf and /etc/locale.conf

2025-03-03 Thread Philip Meulengracht
Tested on a pristine UC24 built with a custom `core24` base that uses noble-proposed instead of noble-updates, and ran the same sequence of commands (updating locale, rebooting, ensuring it was the same) $ systemctl --version systemd 255 (255.4-1ubuntu8.6) +PAM +AUDIT +SELINUX +APPARMOR +IMA +SMAC

[Bug 2091657] Re: systemd-localed requires read-only-etc hacks for /etc/vconsole.conf and /etc/locale.conf

2025-02-25 Thread Philip Meulengracht
Thank you Nick! The core side of things are in this PR: https://github.com/canonical/core-base/pull/313 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2091657 Title: systemd-localed requires read-on

[Bug 2091657] Re: systemd-localed requires read-only-etc hacks for /etc/vconsole.conf and /etc/locale.conf

2025-02-02 Thread Philip Meulengracht
As James pointed out that was the root of my issue, after removing the bind-mount everything worked -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2091657 Title: systemd-localed requires read-only-et

[Bug 2091657] Re: systemd-localed requires read-only-etc hacks for /etc/vconsole.conf and /etc/locale.conf

2025-01-30 Thread Philip Meulengracht
Hey! So tested with a new UC 24 system that includes the systemd from enr0n ppa and has the following setup $ systemctl --version systemd 255 (255.4-1ubuntu8.6~ppa3) +PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +

[Bug 2089145] Re: Backport patch to read actions from /etc and /run

2024-12-04 Thread Philip Meulengracht
Hey! policykit-1/124-2ubuntu1.24.10.2 - Works on Oracular and loads actions from /etc, verified with pkaction policykit-1/124-2ubuntu1.24.04.2 - Works on Noble and loads actions from /etc as well, verified again with pkaction -- You received this bug notification because you are a member of

[Bug 2089145] [NEW] Backport patch to read actions from /etc and /run

2024-11-20 Thread Philip Meulengracht
Public bug reported: Hey! I would like to request a SRU of the following upstream PR for Noble. https://github.com/polkit-org/polkit/pull/499 I have applied this to ubuntu/noble-updates and produced a new patch that is attached with identical changes. The PR does not apply directly due to misma

[Bug 2087827] Re: Pam includes does not look in /usr/lib/pam.d

2024-11-11 Thread Philip Meulengracht
** Description changed: Hey! We're using libpam in the Ubuntu Core rootfs for the core24 snap (which is pam from Noble). We've run into a sitaution where we would like to move pam.d files into /usr/lib/pam.d instead of /etc/pam.d, and looking at man pages this should be supported. (I.

[Bug 2087827] [NEW] Pam includes does not look in /usr/lib/pam.d

2024-11-11 Thread Philip Meulengracht
Public bug reported: Hey! We're using libpam in the Ubuntu Core rootfs for the core24 snap (which is pam from Noble). We've run into a sitaution where we would like to move pam.d files into /usr/lib/pam.d instead of /etc/pam.d, and looking at man pages this should be supported. (I.e it always che

[Bug 2063200] Re: useradd --extrausers --groups tries to lock /etc/group

2024-09-04 Thread Philip Meulengracht
Hey! Sorry for the slow response from the Core team, I can verify this is now working with passwd in proposed. I was able to add a user with --extrausers and --groups switches together. It no longer fails on locking /etc/groups -- You received this bug notification because you are a member of Ub

[Bug 2074070] Re: unable to get WPA supplicant status via wpa-cli utility from a snap

2024-08-06 Thread Philip Meulengracht
Just as an added information, providing the switch `-s /run/wpa_supplicant` with the network-control interface connected should work. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074070 Title: una

[Bug 2074070] Re: unable to get WPA supplicant status via wpa-cli utility from a snap

2024-08-05 Thread Philip Meulengracht
So I looked into this and the observations made in this post is correct. It's because the default path of the wpa_cli client socket made is in /tmp (they use AF_UNIX sockets, and UDP protocol - this means the client socket must bind a visible place for the server) /tmp is obviously not visible out

[Bug 2063365] Re: brcmfmac: brcmf_set_channel: set chanspec 0x100c fail, reason -52

2024-04-29 Thread Philip Meulengracht
This happens too with Ubuntu Core 24 during console-conf WiFi configuration, and provides a less-than-nice experience. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2063365 Title: brcmfmac: brcmf_se