Activity log for bug #1921374

Date Who What changed Old value New value Message
2021-03-25 11:06:48 Jean-Baptiste Lallement bug added bug
2021-03-25 11:16:37 Jean-Baptiste Lallement description TODO [Impact] * An explanation of the effects of the bug on users and * justification for backporting the fix to the stable release. * In addition, it is helpful, but not required, to include an explanation of how the upload fixes this bug. [Test Plan] * detailed instructions how to reproduce the bug * these should allow someone who is not familiar with the affected package to reproduce the bug and verify that the updated package fixes the problem. * if other testing is appropriate to perform before landing this update, this should also be described here. [Where problems could occur] * Think about what the upload changes in the software. Imagine the change is wrong or breaks something else: how would this show up? * It is assumed that any SRU candidate patch is well-tested before upload and has a low overall risk of regression, but it's important to make the effort to think about what ''could'' happen in the event of a regression. * This must '''never''' be "None" or "Low", or entirely an argument as to why your upload is low risk. * This both shows the SRU team that the risks have been considered, and provides guidance to testers in regression-testing the SRU. [Other Info] * Anything else you think is useful to include * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board * and address these questions in advance TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. [Test Plan] [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-03-25 11:17:13 Jean-Baptiste Lallement description TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. [Test Plan] [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image. TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 [Test Plan] [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-03-25 11:18:17 Jean-Baptiste Lallement nominated for series Ubuntu Focal
2021-03-25 11:18:17 Jean-Baptiste Lallement bug task added ubiquity (Ubuntu Focal)
2021-03-25 11:18:21 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): importance Undecided High
2021-03-25 11:18:24 Jean-Baptiste Lallement ubiquity (Ubuntu): importance Undecided High
2021-03-25 11:18:26 Jean-Baptiste Lallement ubiquity (Ubuntu): status New Fix Released
2021-05-11 10:01:09 Jean-Baptiste Lallement bug added subscriber Didier Roche
2021-05-11 10:01:12 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): assignee Jean-Baptiste Lallement (jibel)
2021-05-11 10:01:15 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): milestone ubuntu-20.04.3
2021-05-11 10:01:19 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): status New In Progress
2021-05-19 16:00:42 Jean-Baptiste Lallement description TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 [Test Plan] [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image. TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 and to the dependencies of Ubiquity to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification* - Log in as a user of the domain must succeed. - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-05-21 14:41:46 Jean-Baptiste Lallement bug task added livecd-rootfs (Ubuntu)
2021-05-21 14:42:07 Jean-Baptiste Lallement livecd-rootfs (Ubuntu): status New Fix Released
2021-05-21 14:42:11 Jean-Baptiste Lallement livecd-rootfs (Ubuntu): importance Undecided High
2021-05-21 14:42:13 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): importance Undecided High
2021-05-21 14:42:16 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): status New In Progress
2021-05-21 14:43:50 Jean-Baptiste Lallement description TODO [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 and to the dependencies of Ubiquity to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification* - Log in as a user of the domain must succeed. - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image. [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required: 1. a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification*   - Log in as a user of the domain must succeed.   - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-05-21 14:44:01 Jean-Baptiste Lallement description [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required: 1. a change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification*   - Log in as a user of the domain must succeed.   - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image. [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required: 1. A change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification*   - Log in as a user of the domain must succeed.   - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-05-21 14:45:47 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): assignee Jean-Baptiste Lallement (jibel)
2021-05-21 14:48:37 Jean-Baptiste Lallement description [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required: 1. A change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal. [Test Plan] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification*   - Log in as a user of the domain must succeed.   - The home directory of the user must be created dynamically. [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image. [Impact] This feature allows to join a machine to an Active Directory domain at installation time. It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain. It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot. This feature also required: 1. A change to the seed to include additional packages for AD connectivity. https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283 2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal. [Test Plan Ubiquity] Prerequisites: A network with an up and running AD controller, DHCP and DNS. 1. Start the installer either from a live session or ubiquity-dm 2. Proceed to the step "Who are you?" 3. Enter the user and computer information. For the computer name, you must use the FQDN. 4. Check box "Use Active Directory" and press continue. 5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain. 6. Verify that the server is reachable by pressing "Test Connection". 7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation. 8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot More information about initial installation on the ADSys' Wiki: https://github.com/ubuntu/adsys/wiki/2.-Prerequisites *Verification*   - Log in as a user of the domain must succeed.   - The home directory of the user must be created dynamically. [Test Plan livecd-rootfs] 1. Build an image with the patched version of livecd-rootfs 2. Compare the manifest to an image without the patch *Verification* - No package should be removed with the patched version - The following packages and their dependencies should be added: sssd, realmd, adcli, krb5-config [Where problems could occur] If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose. Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue. [Other Info] Built and tested on latest focal daily image.
2021-05-21 15:21:55 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): status In Progress New
2021-05-21 15:21:58 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): status In Progress New
2021-05-21 15:22:03 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): assignee Jean-Baptiste Lallement (jibel)
2021-05-21 15:22:06 Jean-Baptiste Lallement ubiquity (Ubuntu Focal): assignee Jean-Baptiste Lallement (jibel)
2021-05-21 15:22:09 Jean-Baptiste Lallement livecd-rootfs (Ubuntu Focal): milestone ubuntu-20.04.3
2021-05-21 15:25:53 Jean-Baptiste Lallement bug added subscriber Ubuntu Stable Release Updates Team
2021-05-27 11:20:32 Łukasz Zemczak ubiquity (Ubuntu Focal): status New Fix Committed
2021-05-27 11:20:35 Łukasz Zemczak bug added subscriber SRU Verification
2021-05-27 11:20:38 Łukasz Zemczak tags verification-needed verification-needed-focal
2021-05-27 11:56:33 Łukasz Zemczak livecd-rootfs (Ubuntu Focal): status New Fix Committed
2021-06-03 10:34:31 Jean-Baptiste Lallement tags verification-needed verification-needed-focal verification-done verification-done-focal
2021-06-03 16:34:34 Launchpad Janitor livecd-rootfs (Ubuntu Focal): status Fix Committed Fix Released
2021-06-03 16:34:40 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2021-06-03 16:35:31 Launchpad Janitor ubiquity (Ubuntu Focal): status Fix Committed Fix Released