Red Hat Bugzilla – Bug 677616
appliance doesn't include augeas device_map lens
Last modified: 2015-09-27 22:28:43 EDT
The libguestfs appliance needs to be rebuilt to pick up the new device_map lens in augeas-0.7.2-4.el6.
Augeas in the appliance loads the following modules: ><fs> aug-init / 16 ><fs> aug-ls /augeas/load /augeas/load/Aliases /augeas/load/Approx /augeas/load/AptPreferences /augeas/load/Aptsources /augeas/load/BBhosts /augeas/load/Cgconfig /augeas/load/Cgrules /augeas/load/CobblerModules /augeas/load/CobblerSettings /augeas/load/Cron /augeas/load/Darkice /augeas/load/Debctrl /augeas/load/Dhclient /augeas/load/Dnsmasq /augeas/load/Dpkg /augeas/load/Dput /augeas/load/Ethers /augeas/load/Exports /augeas/load/Fstab /augeas/load/Gdm /augeas/load/Group /augeas/load/Grub /augeas/load/Hosts /augeas/load/Inetd /augeas/load/Inittab /augeas/load/Interfaces /augeas/load/Iptables /augeas/load/Krb5 /augeas/load/Libvirtd /augeas/load/Libvirtd_lxc /augeas/load/Libvirtd_qemu /augeas/load/Limits /augeas/load/Logrotate /augeas/load/Lokkit /augeas/load/Modprobe /augeas/load/Modules_conf /augeas/load/Monit /augeas/load/Multipath /augeas/load/NagiosCfg /augeas/load/Ntp /augeas/load/OpenVPN /augeas/load/PHP /augeas/load/Pam /augeas/load/Passwd /augeas/load/Pbuilder /augeas/load/Phpvars /augeas/load/Postfix_Access /augeas/load/Postfix_Main /augeas/load/Postfix_Master /augeas/load/Puppet /augeas/load/Rsyncd /augeas/load/Samba /augeas/load/Securetty /augeas/load/Services /augeas/load/Shellvars /augeas/load/Shellvars_list /augeas/load/Slapd /augeas/load/Soma /augeas/load/Spacevars /augeas/load/Squid /augeas/load/Sshd /augeas/load/Sudoers /augeas/load/Sysctl /augeas/load/Vsftpd /augeas/load/Webmin /augeas/load/Xinetd /augeas/load/Xorg /augeas/load/Yum The above output should additionally include: /augeas/load/Device_map
The output of `aug-ls /augeas/load` contains the /augeas/load/Device_map line. And we can successfully get the /boot/grub/device.map file loaded into augeas with this. We found correct nodes and values. Move this to VERIFIED.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0586.html