Please backport ansible 1.4.3+dfsg-1 (universe) from trusty
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Precise Backports |
Fix Released
|
Undecided
|
Unassigned | ||
Quantal Backports |
Fix Released
|
Undecided
|
Unassigned | ||
raring-backports |
Fix Released
|
Undecided
|
Unassigned | ||
saucy-backports |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Please backport ansible 1.4.3+dfsg-1 (universe) from trusty to saucy.
Reason for the backport:
=======
More convenient to work with, and:
+ speed
+ support for role dependencies and defaults
+ local facts
+ errors about mistyped variables
http://
Testing:
========
Mark off items in the checklist [X] as you test them, but please leave the checklist so that backporters can quickly evaluate the state of testing.
You can test-build the backport in your PPA with backportpackage:
$ backportpackage -u ppa:<lp username>/<ppa name> -s trusty -d saucy ansible
* saucy:
[x] Package builds without modification
[x] ansible-
[x] ansible installs cleanly and runs
[x] ansible-fireball installs cleanly and runs
[x] ansible-doc installs cleanly and runs
I tested raring,
* raring:
[x] Package builds without modification
[x] ansible-
[x] ansible installs cleanly and runs
[x] ansible-fireball installs cleanly and runs
[x] ansible-doc installs cleanly and runs
* quantal:
[x] Package builds without modification
[x] ansible-
[x] ansible installs cleanly and runs
[x] ansible-fireball installs cleanly and runs
[x] ansible-doc installs cleanly and runs
* precise:
[x] Package builds without modification
[x] ansible-
[x] ansible installs cleanly and runs
[x] ansible-fireball installs cleanly and runs
[x] ansible-doc installs cleanly and runs
No reverse dependencies
summary: |
- Please backport ansible 1.3.4+dfsg-1 (universe) from trusty + Please backport ansible 1.4.0+dfsg-1 (universe) from trusty |
Trusty has 1.4.0 now.
We should backport it al lthe way to precise as the current version in backports has some security issues, notably:
- http:// cve.mitre. org/cgi- bin/cvename. cgi?name= CVE-2013- 4259 cve.mitre. org/cgi- bin/cvename. cgi?name= CVE-2013- 4260 /access. redhat. com/security/ cve/CVE- 2013-2233
- http://
- https:/
I build and tested 1.4.0 and it works fine for me. I will update the description of the bugreport to reflect this.