2016-04-21 09:09:50 |
Franz |
bug |
|
|
added bug |
2016-04-26 15:16:11 |
Launchpad Janitor |
sssd (Ubuntu): status |
New |
Confirmed |
|
2016-05-03 10:27:53 |
Robie Basak |
sssd (Ubuntu): status |
Confirmed |
Invalid |
|
2016-05-04 08:20:08 |
Timo Aaltonen |
sssd (Ubuntu): status |
Invalid |
Confirmed |
|
2017-07-17 21:42:25 |
RN |
bug |
|
|
added subscriber RN |
2017-07-18 12:41:15 |
Andreas Hasenack |
sssd (Ubuntu): status |
Confirmed |
Incomplete |
|
2017-07-18 12:41:20 |
Andreas Hasenack |
bug |
|
|
added subscriber Andreas Hasenack |
2017-09-17 04:17:29 |
Launchpad Janitor |
sssd (Ubuntu): status |
Incomplete |
Expired |
|
2018-02-06 16:12:58 |
gst |
bug |
|
|
added subscriber gst |
2019-02-25 15:29:37 |
Victor Tapia |
description |
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
[Impact]
SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled.
[Test Case]
- With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task:
logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^#
* * * * * true /tmp/crontest
- If the default is set to "crond" the task is blocked:
# ag pam /var/log/ | grep -i denied | head -n 2
/var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
/var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
- Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue.
[Regression potential]
[Other Info]
[Original description]
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
|
2019-02-25 15:31:25 |
Victor Tapia |
nominated for series |
|
Ubuntu Xenial |
|
2019-02-25 15:31:25 |
Victor Tapia |
bug task added |
|
sssd (Ubuntu Xenial) |
|
2019-02-25 15:31:25 |
Victor Tapia |
nominated for series |
|
Ubuntu Bionic |
|
2019-02-25 15:31:25 |
Victor Tapia |
bug task added |
|
sssd (Ubuntu Bionic) |
|
2019-02-25 15:31:25 |
Victor Tapia |
nominated for series |
|
Ubuntu Disco |
|
2019-02-25 15:31:25 |
Victor Tapia |
bug task added |
|
sssd (Ubuntu Disco) |
|
2019-02-25 15:31:25 |
Victor Tapia |
nominated for series |
|
Ubuntu Cosmic |
|
2019-02-25 15:31:25 |
Victor Tapia |
bug task added |
|
sssd (Ubuntu Cosmic) |
|
2019-02-25 15:31:35 |
Victor Tapia |
sssd (Ubuntu Xenial): assignee |
|
Victor Tapia (vtapia) |
|
2019-02-25 15:31:37 |
Victor Tapia |
sssd (Ubuntu Bionic): assignee |
|
Victor Tapia (vtapia) |
|
2019-02-25 15:31:39 |
Victor Tapia |
sssd (Ubuntu Cosmic): assignee |
|
Victor Tapia (vtapia) |
|
2019-02-25 15:31:40 |
Victor Tapia |
sssd (Ubuntu Disco): assignee |
|
Victor Tapia (vtapia) |
|
2019-02-28 08:01:24 |
Victor Tapia |
sssd (Ubuntu Disco): status |
Expired |
Confirmed |
|
2019-02-28 08:01:50 |
Victor Tapia |
sssd (Ubuntu Disco): importance |
Undecided |
Medium |
|
2019-02-28 09:55:44 |
Victor Tapia |
description |
[Impact]
SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled.
[Test Case]
- With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task:
logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^#
* * * * * true /tmp/crontest
- If the default is set to "crond" the task is blocked:
# ag pam /var/log/ | grep -i denied | head -n 2
/var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
/var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
- Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue.
[Regression potential]
[Other Info]
[Original description]
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
[Impact]
SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled.
[Test Case]
- With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task:
logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^#
* * * * * true /tmp/crontest
- If the default is set to "crond" the task is blocked:
# ag pam /var/log/ | grep -i denied | head -n 2
/var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
/var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
- Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue.
[Regression potential]
Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied.
[Other Info]
Upstream commit:
https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524
[Original description]
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
|
2019-02-28 16:26:24 |
Dan Streetman |
bug |
|
|
added subscriber Dan Streetman |
2019-03-11 16:04:01 |
Victor Tapia |
tags |
|
sts |
|
2019-03-11 16:04:31 |
Victor Tapia |
attachment added |
|
disco-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245455/+files/disco-sssd-gpo.debdiff |
|
2019-03-11 16:05:14 |
Victor Tapia |
attachment added |
|
cosmic-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245456/+files/cosmic-sssd-gpo.debdiff |
|
2019-03-11 16:05:27 |
Victor Tapia |
attachment added |
|
bionic-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245457/+files/bionic-sssd-gpo.debdiff |
|
2019-03-11 16:05:41 |
Victor Tapia |
attachment added |
|
xenial-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245458/+files/xenial-sssd-gpo.debdiff |
|
2019-03-11 16:20:37 |
Ubuntu Foundations Team Bug Bot |
tags |
sts |
patch sts |
|
2019-03-11 16:20:45 |
Ubuntu Foundations Team Bug Bot |
bug |
|
|
added subscriber Ubuntu Sponsors Team |
2019-03-11 16:23:09 |
Victor Tapia |
bug |
|
|
added subscriber Ubuntu SRU developers |
2019-03-11 16:32:12 |
Dan Streetman |
tags |
patch sts |
patch sts sts-sponsor |
|
2019-03-12 06:25:25 |
Mathew Hodson |
sssd (Ubuntu Xenial): importance |
Undecided |
Medium |
|
2019-03-12 06:25:28 |
Mathew Hodson |
sssd (Ubuntu Bionic): importance |
Undecided |
Medium |
|
2019-03-12 06:25:30 |
Mathew Hodson |
sssd (Ubuntu Cosmic): importance |
Undecided |
Medium |
|
2019-03-21 14:29:07 |
Eric Desrochers |
bug |
|
|
added subscriber STS Sponsors |
2019-03-21 14:35:06 |
Eric Desrochers |
description |
[Impact]
SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled.
[Test Case]
- With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task:
logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^#
* * * * * true /tmp/crontest
- If the default is set to "crond" the task is blocked:
# ag pam /var/log/ | grep -i denied | head -n 2
/var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
/var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
- Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue.
[Regression potential]
Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied.
[Other Info]
Upstream commit:
https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524
[Original description]
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
[Impact]
SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled.
[Test Case]
- With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task:
logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^#
* * * * * true /tmp/crontest
- If the default is set to "crond" the task is blocked:
# ag pam /var/log/ | grep -i denied | head -n 2
/var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
/var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied)
- Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue.
[Regression potential]
Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied.
[Other Info]
Upstream commit:
https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524
# git describe --contains bc65ba9a07a924a58b13a0d5a935114ab72b7524
sssd-2_1_0~14
# rmadison sssd
=> sssd | 1.13.4-1ubuntu1.13 | xenial-proposed
=> sssd | 1.16.1-1ubuntu1.1 | bionic-updates
=> sssd | 1.16.3-1ubuntu2 | cosmic
=> sssd | 1.16.3-3ubuntu1 | disco
[Original description]
User cron jobs has Access denied for user
pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert)
Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert
Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert
SSSD-AD Login works, i see also my AD groups
Description: Ubuntu 16.04 LTS
Release: 16.04
sssd:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
sssd-ad:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
libpam-sss:
Installed: 1.13.4-1ubuntu1
Candidate: 1.13.4-1ubuntu1
Version table:
*** 1.13.4-1ubuntu1 500
500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
100 /var/lib/dpkg/status
/ect/sssd/sssd.conf
[sssd]
services = nss, pam
config_file_version = 2
domains = test.at
[nss]
default_shell = /bin/false
[domain/test.at]
decription = TEST - ActiveDirectory
enumerate = false
cache_credentials = true
id_provider = ad
auth_provider = ad
chpass_provider = ad
ad_domain = test.at
access_provider = ad
subdomains_provider = none
ldap_use_tokengroups = false
dyndns_update = true
krb5_realm = TEST.AT
krb5_store_password_if_offline = true
ldap_id_mapping = false
krb5_keytab = /etc/krb5.host.keytab
ldap_krb5_keytab = /etc/krb5.host.keytab
ldap_use_tokengroups = false
ldap_referrals = false |
|
2019-03-21 14:35:10 |
Eric Desrochers |
sssd (Ubuntu Disco): status |
Confirmed |
In Progress |
|
2019-04-07 13:21:07 |
Dan Streetman |
removed subscriber Ubuntu Sponsors Team |
|
|
|
2019-04-23 14:25:43 |
Victor Tapia |
attachment added |
|
eoan-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5258263/+files/eoan-sssd-gpo.debdiff |
|
2019-04-24 15:53:38 |
Victor Tapia |
nominated for series |
|
Ubuntu Eoan |
|
2019-04-24 15:53:38 |
Victor Tapia |
bug task added |
|
sssd (Ubuntu Eoan) |
|
2019-04-24 16:02:37 |
Eric Desrochers |
removed subscriber Ubuntu SRU developers |
|
|
|
2019-04-25 20:20:39 |
Eric Desrochers |
sssd (Ubuntu Eoan): status |
In Progress |
Fix Committed |
|
2019-04-26 20:54:09 |
Launchpad Janitor |
sssd (Ubuntu Eoan): status |
Fix Committed |
Fix Released |
|
2019-04-29 12:06:32 |
Eric Desrochers |
sssd (Ubuntu Cosmic): status |
New |
In Progress |
|
2019-04-29 12:06:34 |
Eric Desrochers |
sssd (Ubuntu Bionic): status |
New |
In Progress |
|
2019-04-29 12:06:38 |
Eric Desrochers |
sssd (Ubuntu Xenial): status |
New |
Confirmed |
|
2019-05-01 13:19:07 |
Eric Desrochers |
sssd (Ubuntu Xenial): status |
Confirmed |
In Progress |
|
2019-05-01 13:26:28 |
Eric Desrochers |
bug |
|
|
added subscriber Eric Desrochers |
2019-05-01 13:26:31 |
Eric Desrochers |
removed subscriber STS Sponsors |
|
|
|
2019-05-03 08:12:54 |
Timo Aaltonen |
sssd (Ubuntu Cosmic): status |
In Progress |
Fix Committed |
|
2019-05-03 08:12:57 |
Timo Aaltonen |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2019-05-03 08:15:30 |
Timo Aaltonen |
bug |
|
|
added subscriber SRU Verification |
2019-05-03 08:15:49 |
Timo Aaltonen |
tags |
patch sts sts-sponsor |
patch sts sts-sponsor verification-needed verification-needed-cosmic |
|
2019-05-03 08:16:52 |
Timo Aaltonen |
sssd (Ubuntu Disco): status |
In Progress |
Fix Committed |
|
2019-05-03 08:16:58 |
Timo Aaltonen |
tags |
patch sts sts-sponsor verification-needed verification-needed-cosmic |
patch sts sts-sponsor verification-needed verification-needed-cosmic verification-needed-disco |
|
2019-05-03 08:18:28 |
Timo Aaltonen |
sssd (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2019-05-03 08:18:35 |
Timo Aaltonen |
tags |
patch sts sts-sponsor verification-needed verification-needed-cosmic verification-needed-disco |
patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco |
|
2019-05-03 08:20:27 |
Timo Aaltonen |
sssd (Ubuntu Xenial): status |
In Progress |
Fix Committed |
|
2019-05-03 08:20:35 |
Timo Aaltonen |
tags |
patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco |
patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco verification-needed-xenial |
|
2019-05-06 15:12:02 |
Victor Tapia |
tags |
patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco verification-needed-xenial |
patch sts sts-sponsor verification-done verification-done-bionic verification-done-cosmic verification-done-disco verification-done-xenial |
|
2019-05-13 08:40:02 |
Łukasz Zemczak |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2019-05-13 08:50:07 |
Launchpad Janitor |
sssd (Ubuntu Disco): status |
Fix Committed |
Fix Released |
|
2019-05-13 08:57:08 |
Launchpad Janitor |
sssd (Ubuntu Cosmic): status |
Fix Committed |
Fix Released |
|
2019-05-13 10:43:16 |
Launchpad Janitor |
sssd (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2019-05-13 10:46:14 |
Launchpad Janitor |
sssd (Ubuntu Xenial): status |
Fix Committed |
Fix Released |
|
2019-05-22 21:41:42 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/367807 |
|
2019-05-22 21:47:51 |
Andreas Hasenack |
merge proposal unlinked |
https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/367807 |
|
|
2019-07-31 14:21:16 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/370825 |
|
2019-07-31 20:18:53 |
Andreas Hasenack |
merge proposal unlinked |
https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/370825 |
|
|