Activity log for bug #1572908

Date Who What changed Old value New value Message
2016-04-21 09:09:50 Franz bug added bug
2016-04-26 15:16:11 Launchpad Janitor sssd (Ubuntu): status New Confirmed
2016-05-03 10:27:53 Robie Basak sssd (Ubuntu): status Confirmed Invalid
2016-05-04 08:20:08 Timo Aaltonen sssd (Ubuntu): status Invalid Confirmed
2017-07-17 21:42:25 RN bug added subscriber RN
2017-07-18 12:41:15 Andreas Hasenack sssd (Ubuntu): status Confirmed Incomplete
2017-07-18 12:41:20 Andreas Hasenack bug added subscriber Andreas Hasenack
2017-09-17 04:17:29 Launchpad Janitor sssd (Ubuntu): status Incomplete Expired
2018-02-06 16:12:58 gst bug added subscriber gst
2019-02-25 15:29:37 Victor Tapia description User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd: Installed: 1.13.4-1ubuntu1 Candidate: 1.13.4-1ubuntu1 Version table: *** 1.13.4-1ubuntu1 500 500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages 100 /var/lib/dpkg/status sssd-ad: Installed: 1.13.4-1ubuntu1 Candidate: 1.13.4-1ubuntu1 Version table: *** 1.13.4-1ubuntu1 500 500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages 100 /var/lib/dpkg/status libpam-sss: Installed: 1.13.4-1ubuntu1 Candidate: 1.13.4-1ubuntu1 Version table: *** 1.13.4-1ubuntu1 500 500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages 100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false [Impact] SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled. [Test Case] - With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task: logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^# * * * * * true /tmp/crontest - If the default is set to "crond" the task is blocked: # ag pam /var/log/ | grep -i denied | head -n 2 /var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) /var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) - Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue. [Regression potential] [Other Info] [Original description] User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status sssd-ad:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status libpam-sss:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false
2019-02-25 15:31:25 Victor Tapia nominated for series Ubuntu Xenial
2019-02-25 15:31:25 Victor Tapia bug task added sssd (Ubuntu Xenial)
2019-02-25 15:31:25 Victor Tapia nominated for series Ubuntu Bionic
2019-02-25 15:31:25 Victor Tapia bug task added sssd (Ubuntu Bionic)
2019-02-25 15:31:25 Victor Tapia nominated for series Ubuntu Disco
2019-02-25 15:31:25 Victor Tapia bug task added sssd (Ubuntu Disco)
2019-02-25 15:31:25 Victor Tapia nominated for series Ubuntu Cosmic
2019-02-25 15:31:25 Victor Tapia bug task added sssd (Ubuntu Cosmic)
2019-02-25 15:31:35 Victor Tapia sssd (Ubuntu Xenial): assignee Victor Tapia (vtapia)
2019-02-25 15:31:37 Victor Tapia sssd (Ubuntu Bionic): assignee Victor Tapia (vtapia)
2019-02-25 15:31:39 Victor Tapia sssd (Ubuntu Cosmic): assignee Victor Tapia (vtapia)
2019-02-25 15:31:40 Victor Tapia sssd (Ubuntu Disco): assignee Victor Tapia (vtapia)
2019-02-28 08:01:24 Victor Tapia sssd (Ubuntu Disco): status Expired Confirmed
2019-02-28 08:01:50 Victor Tapia sssd (Ubuntu Disco): importance Undecided Medium
2019-02-28 09:55:44 Victor Tapia description [Impact] SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled. [Test Case] - With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task: logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^# * * * * * true /tmp/crontest - If the default is set to "crond" the task is blocked: # ag pam /var/log/ | grep -i denied | head -n 2 /var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) /var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) - Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue. [Regression potential] [Other Info] [Original description] User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status sssd-ad:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status libpam-sss:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false [Impact] SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled. [Test Case] - With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task: logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^# * * * * * true /tmp/crontest - If the default is set to "crond" the task is blocked: # ag pam /var/log/ | grep -i denied | head -n 2 /var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) /var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) - Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue. [Regression potential] Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied. [Other Info] Upstream commit: https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524 [Original description] User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status sssd-ad:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status libpam-sss:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false
2019-02-28 16:26:24 Dan Streetman bug added subscriber Dan Streetman
2019-03-11 16:04:01 Victor Tapia tags sts
2019-03-11 16:04:31 Victor Tapia attachment added disco-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245455/+files/disco-sssd-gpo.debdiff
2019-03-11 16:05:14 Victor Tapia attachment added cosmic-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245456/+files/cosmic-sssd-gpo.debdiff
2019-03-11 16:05:27 Victor Tapia attachment added bionic-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245457/+files/bionic-sssd-gpo.debdiff
2019-03-11 16:05:41 Victor Tapia attachment added xenial-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5245458/+files/xenial-sssd-gpo.debdiff
2019-03-11 16:20:37 Ubuntu Foundations Team Bug Bot tags sts patch sts
2019-03-11 16:20:45 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Sponsors Team
2019-03-11 16:23:09 Victor Tapia bug added subscriber Ubuntu SRU developers
2019-03-11 16:32:12 Dan Streetman tags patch sts patch sts sts-sponsor
2019-03-12 06:25:25 Mathew Hodson sssd (Ubuntu Xenial): importance Undecided Medium
2019-03-12 06:25:28 Mathew Hodson sssd (Ubuntu Bionic): importance Undecided Medium
2019-03-12 06:25:30 Mathew Hodson sssd (Ubuntu Cosmic): importance Undecided Medium
2019-03-21 14:29:07 Eric Desrochers bug added subscriber STS Sponsors
2019-03-21 14:35:06 Eric Desrochers description [Impact] SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled. [Test Case] - With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task: logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^# * * * * * true /tmp/crontest - If the default is set to "crond" the task is blocked: # ag pam /var/log/ | grep -i denied | head -n 2 /var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) /var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) - Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue. [Regression potential] Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied. [Other Info] Upstream commit: https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524 [Original description] User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status sssd-ad:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status libpam-sss:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false [Impact] SSSD has GPO_CROND set to "crond" in its code while Debian/Ubuntu use "cron" as a PAM service. This difference makes AD users have cron blocked by default, instead of having it enabled. [Test Case] - With an Active Directory user created (e.g. logonuser@TESTS.LOCAL), set a cron task: logonuser@tests.local@xenial-sssd-ad:~$ crontab -l | grep -v ^# * * * * * true /tmp/crontest - If the default is set to "crond" the task is blocked: # ag pam /var/log/ | grep -i denied | head -n 2 /var/log/auth.log.1:772:Feb 21 11:00:01 xenial-sssd-ad CRON[2387]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) /var/log/auth.log.1:773:Feb 21 11:01:01 xenial-sssd-ad CRON[2390]: pam_sss(cron:account): Access denied for user logonuser@tests.local: 6 (Permission denied) - Setting GPO_CROND to "cron" or adding "ad_gpo_map_batch = +cron" to the configuration file solves the issue. [Regression potential] Minimal. The default value does not apply to Debian/Ubuntu, and those who added a configuration option to circumvent the issue ("ad_gpo_map_batch = +cron") will continue working after this patch is applied. [Other Info] Upstream commit: https://github.com/SSSD/sssd/commit/bc65ba9a07a924a58b13a0d5a935114ab72b7524 # git describe --contains bc65ba9a07a924a58b13a0d5a935114ab72b7524 sssd-2_1_0~14 # rmadison sssd => sssd | 1.13.4-1ubuntu1.13 | xenial-proposed => sssd | 1.16.1-1ubuntu1.1 | bionic-updates => sssd | 1.16.3-1ubuntu2 | cosmic => sssd | 1.16.3-3ubuntu1 | disco [Original description] User cron jobs has Access denied for user pr 21 11:05:02 edvlw08 CRON[6848]: pam_sss(cron:account): Access denied for user XXXX: 6 (Zugriff verweigert) Apr 21 11:05:02 edvlw08 CRON[6848]: Zugriff verweigert Apr 21 11:05:02 edvlw08 cron[965]: Zugriff verweigert SSSD-AD Login works, i see also my AD groups Description: Ubuntu 16.04 LTS Release: 16.04 sssd:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status sssd-ad:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status libpam-sss:   Installed: 1.13.4-1ubuntu1   Candidate: 1.13.4-1ubuntu1   Version table:  *** 1.13.4-1ubuntu1 500         500 http://at.archive.ubuntu.com/ubuntu xenial/main amd64 Packages         100 /var/lib/dpkg/status /ect/sssd/sssd.conf [sssd] services = nss, pam config_file_version = 2 domains = test.at [nss] default_shell = /bin/false [domain/test.at] decription = TEST - ActiveDirectory enumerate = false cache_credentials = true id_provider = ad auth_provider = ad chpass_provider = ad ad_domain = test.at access_provider = ad subdomains_provider = none ldap_use_tokengroups = false dyndns_update = true krb5_realm = TEST.AT krb5_store_password_if_offline = true ldap_id_mapping = false krb5_keytab = /etc/krb5.host.keytab ldap_krb5_keytab = /etc/krb5.host.keytab ldap_use_tokengroups = false ldap_referrals = false
2019-03-21 14:35:10 Eric Desrochers sssd (Ubuntu Disco): status Confirmed In Progress
2019-04-07 13:21:07 Dan Streetman removed subscriber Ubuntu Sponsors Team
2019-04-23 14:25:43 Victor Tapia attachment added eoan-sssd-gpo.debdiff https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908/+attachment/5258263/+files/eoan-sssd-gpo.debdiff
2019-04-24 15:53:38 Victor Tapia nominated for series Ubuntu Eoan
2019-04-24 15:53:38 Victor Tapia bug task added sssd (Ubuntu Eoan)
2019-04-24 16:02:37 Eric Desrochers removed subscriber Ubuntu SRU developers
2019-04-25 20:20:39 Eric Desrochers sssd (Ubuntu Eoan): status In Progress Fix Committed
2019-04-26 20:54:09 Launchpad Janitor sssd (Ubuntu Eoan): status Fix Committed Fix Released
2019-04-29 12:06:32 Eric Desrochers sssd (Ubuntu Cosmic): status New In Progress
2019-04-29 12:06:34 Eric Desrochers sssd (Ubuntu Bionic): status New In Progress
2019-04-29 12:06:38 Eric Desrochers sssd (Ubuntu Xenial): status New Confirmed
2019-05-01 13:19:07 Eric Desrochers sssd (Ubuntu Xenial): status Confirmed In Progress
2019-05-01 13:26:28 Eric Desrochers bug added subscriber Eric Desrochers
2019-05-01 13:26:31 Eric Desrochers removed subscriber STS Sponsors
2019-05-03 08:12:54 Timo Aaltonen sssd (Ubuntu Cosmic): status In Progress Fix Committed
2019-05-03 08:12:57 Timo Aaltonen bug added subscriber Ubuntu Stable Release Updates Team
2019-05-03 08:15:30 Timo Aaltonen bug added subscriber SRU Verification
2019-05-03 08:15:49 Timo Aaltonen tags patch sts sts-sponsor patch sts sts-sponsor verification-needed verification-needed-cosmic
2019-05-03 08:16:52 Timo Aaltonen sssd (Ubuntu Disco): status In Progress Fix Committed
2019-05-03 08:16:58 Timo Aaltonen tags patch sts sts-sponsor verification-needed verification-needed-cosmic patch sts sts-sponsor verification-needed verification-needed-cosmic verification-needed-disco
2019-05-03 08:18:28 Timo Aaltonen sssd (Ubuntu Bionic): status In Progress Fix Committed
2019-05-03 08:18:35 Timo Aaltonen tags patch sts sts-sponsor verification-needed verification-needed-cosmic verification-needed-disco patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco
2019-05-03 08:20:27 Timo Aaltonen sssd (Ubuntu Xenial): status In Progress Fix Committed
2019-05-03 08:20:35 Timo Aaltonen tags patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco verification-needed-xenial
2019-05-06 15:12:02 Victor Tapia tags patch sts sts-sponsor verification-needed verification-needed-bionic verification-needed-cosmic verification-needed-disco verification-needed-xenial patch sts sts-sponsor verification-done verification-done-bionic verification-done-cosmic verification-done-disco verification-done-xenial
2019-05-13 08:40:02 Łukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team
2019-05-13 08:50:07 Launchpad Janitor sssd (Ubuntu Disco): status Fix Committed Fix Released
2019-05-13 08:57:08 Launchpad Janitor sssd (Ubuntu Cosmic): status Fix Committed Fix Released
2019-05-13 10:43:16 Launchpad Janitor sssd (Ubuntu Bionic): status Fix Committed Fix Released
2019-05-13 10:46:14 Launchpad Janitor sssd (Ubuntu Xenial): status Fix Committed Fix Released
2019-05-22 21:41:42 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/367807
2019-05-22 21:47:51 Andreas Hasenack merge proposal unlinked https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/367807
2019-07-31 14:21:16 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/370825
2019-07-31 20:18:53 Andreas Hasenack merge proposal unlinked https://code.launchpad.net/~ahasenack/ubuntu/+source/sssd/+git/sssd/+merge/370825