2021-03-25 11:06:48 |
Jean-Baptiste Lallement |
bug |
|
|
added bug |
2021-03-25 11:16:37 |
Jean-Baptiste Lallement |
description |
TODO
[Impact]
* An explanation of the effects of the bug on users and
* justification for backporting the fix to the stable release.
* In addition, it is helpful, but not required, to include an
explanation of how the upload fixes this bug.
[Test Plan]
* detailed instructions how to reproduce the bug
* these should allow someone who is not familiar with the affected
package to reproduce the bug and verify that the updated package fixes
the problem.
* if other testing is appropriate to perform before landing this update,
this should also be described here.
[Where problems could occur]
* Think about what the upload changes in the software. Imagine the change is
wrong or breaks something else: how would this show up?
* It is assumed that any SRU candidate patch is well-tested before
upload and has a low overall risk of regression, but it's important
to make the effort to think about what ''could'' happen in the
event of a regression.
* This must '''never''' be "None" or "Low", or entirely an argument as to why
your upload is low risk.
* This both shows the SRU team that the risks have been considered,
and provides guidance to testers in regression-testing the SRU.
[Other Info]
* Anything else you think is useful to include
* Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board
* and address these questions in advance |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
[Test Plan]
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-03-25 11:17:13 |
Jean-Baptiste Lallement |
description |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
[Test Plan]
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
[Test Plan]
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-03-25 11:18:17 |
Jean-Baptiste Lallement |
nominated for series |
|
Ubuntu Focal |
|
2021-03-25 11:18:17 |
Jean-Baptiste Lallement |
bug task added |
|
ubiquity (Ubuntu Focal) |
|
2021-03-25 11:18:21 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): importance |
Undecided |
High |
|
2021-03-25 11:18:24 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu): importance |
Undecided |
High |
|
2021-03-25 11:18:26 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu): status |
New |
Fix Released |
|
2021-05-11 10:01:09 |
Jean-Baptiste Lallement |
bug |
|
|
added subscriber Didier Roche |
2021-05-11 10:01:12 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): assignee |
|
Jean-Baptiste Lallement (jibel) |
|
2021-05-11 10:01:15 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): milestone |
|
ubuntu-20.04.3 |
|
2021-05-11 10:01:19 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): status |
New |
In Progress |
|
2021-05-19 16:00:42 |
Jean-Baptiste Lallement |
description |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
[Test Plan]
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
and to the dependencies of Ubiquity to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-05-21 14:41:46 |
Jean-Baptiste Lallement |
bug task added |
|
livecd-rootfs (Ubuntu) |
|
2021-05-21 14:42:07 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu): status |
New |
Fix Released |
|
2021-05-21 14:42:11 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu): importance |
Undecided |
High |
|
2021-05-21 14:42:13 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): importance |
Undecided |
High |
|
2021-05-21 14:42:16 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): status |
New |
In Progress |
|
2021-05-21 14:43:50 |
Jean-Baptiste Lallement |
description |
TODO
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
and to the dependencies of Ubiquity to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required:
1. a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-05-21 14:44:01 |
Jean-Baptiste Lallement |
description |
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required:
1. a change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required:
1. A change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-05-21 14:45:47 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): assignee |
|
Jean-Baptiste Lallement (jibel) |
|
2021-05-21 14:48:37 |
Jean-Baptiste Lallement |
description |
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required:
1. A change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal.
[Test Plan]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
[Impact]
This feature allows to join a machine to an Active Directory domain at installation time.
It adds a check box in the user info stage, which once selected displays a page to enter the credentials to join the domain.
It installs the required packages on the target filesystem and configures SSSD and Kerberos so it works on first boot.
This feature also required:
1. A change to the seed to include additional packages for AD connectivity.
https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/ubuntu/commit/?id=a83c543f5fb98d4a539815b89b43cf9076c00283
2. A change to livecd-rootfs to add the required dependencies via a chroot hook for the project ubuntu to workaround bug 1921862 in Focal.
[Test Plan Ubiquity]
Prerequisites:
A network with an up and running AD controller, DHCP and DNS.
1. Start the installer either from a live session or ubiquity-dm
2. Proceed to the step "Who are you?"
3. Enter the user and computer information. For the computer name, you must use the FQDN.
4. Check box "Use Active Directory" and press continue.
5. Enter the address of the Active Directory controller and credentials of the user allowed to add machines to the domain.
6. Verify that the server is reachable by pressing "Test Connection".
7. Once all the information has been entered and is valid, press "Continue" to proceed with the remaining usual steps of the installation.
8. At the end of the installation you can reboot the machine and you are ready to log in as a user of the domain on first boot
More information about initial installation on the ADSys' Wiki:
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
*Verification*
- Log in as a user of the domain must succeed.
- The home directory of the user must be created dynamically.
[Test Plan livecd-rootfs]
1. Build an image with the patched version of livecd-rootfs
2. Compare the manifest to an image without the patch
*Verification*
- No package should be removed with the patched version
- The following packages and their dependencies should be added: sssd, realmd, adcli, krb5-config
[Where problems could occur]
If the python code and debconf templates, Ubiquity won't start at all or the user info page will not be displayed. So it will highly visible and easy to diagnose.
Otherwise, SSSD and Kerberos may not be configured correctly and will prevent login as an AD user. In this case, we still keep the local user and it is possible to log in and diagnose and fix the issue.
[Other Info]
Built and tested on latest focal daily image. |
|
2021-05-21 15:21:55 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): status |
In Progress |
New |
|
2021-05-21 15:21:58 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): status |
In Progress |
New |
|
2021-05-21 15:22:03 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): assignee |
Jean-Baptiste Lallement (jibel) |
|
|
2021-05-21 15:22:06 |
Jean-Baptiste Lallement |
ubiquity (Ubuntu Focal): assignee |
Jean-Baptiste Lallement (jibel) |
|
|
2021-05-21 15:22:09 |
Jean-Baptiste Lallement |
livecd-rootfs (Ubuntu Focal): milestone |
|
ubuntu-20.04.3 |
|
2021-05-21 15:25:53 |
Jean-Baptiste Lallement |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2021-05-27 11:20:32 |
Łukasz Zemczak |
ubiquity (Ubuntu Focal): status |
New |
Fix Committed |
|
2021-05-27 11:20:35 |
Łukasz Zemczak |
bug |
|
|
added subscriber SRU Verification |
2021-05-27 11:20:38 |
Łukasz Zemczak |
tags |
|
verification-needed verification-needed-focal |
|
2021-05-27 11:56:33 |
Łukasz Zemczak |
livecd-rootfs (Ubuntu Focal): status |
New |
Fix Committed |
|
2021-06-03 10:34:31 |
Jean-Baptiste Lallement |
tags |
verification-needed verification-needed-focal |
verification-done verification-done-focal |
|
2021-06-03 16:34:34 |
Launchpad Janitor |
livecd-rootfs (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2021-06-03 16:34:40 |
Brian Murray |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2021-06-03 16:35:31 |
Launchpad Janitor |
ubiquity (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|