SRU review

1. Is this bug that saslauthd doesn't work in Noble at all because the
permissions are wrong? Or only in certain circumstances, and in which
case, which ones?

2. Is it possible that somebody is successfully using saslauthd running
as root, and changing the group of the service to sasl would break them?
For example, what if they have saslauthd configured to read something
else that is only readable by root? What about shadow?

3. Seems like this could do with verifying that saslauthd is working
end-to-end in at least one scenario. See: "The Test Plan verifies a
technical change but not the user story" as well as "Test Plan only
covers the fix, and not general use of the package to make sure that it
still works after the update" from https://canonical-sru-
docs.readthedocs-hosted.com/en/latest/howto/common-issues/#test-plan

4. Can we add a dep8 test for saslauthd to both do the verification and
also prevent regressions in the future?

** Changed in: cyrus-sasl2 (Ubuntu Noble)
       Status: Fix Committed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078851

Title:
  saslauthd wrong permission of /var/spool/postfix/var/run/saslauthd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cyrus-sasl2/+bug/2078851/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to