Activity log for bug #1302780

Date Who What changed Old value New value Message
2014-04-04 19:20:40 David Barth bug added bug
2014-04-04 19:20:46 David Barth webbrowser-app: importance Undecided High
2014-04-04 19:20:48 David Barth webbrowser-app: status New Confirmed
2014-04-04 19:20:56 David Barth tags webapps-hotlist
2014-04-17 14:49:10 David Barth summary [webapp-container] SSO for Google Apps for Your Domain break when the URL containment is in effect [webapp-container] Google Apps For Business support when using an external SSO provider
2014-04-17 14:49:57 David Barth description When using an SSD provider and Google Apps for Your Domain, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in. When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in. We have released a solution for that particular case. All Google Apps webapps have been patched to support their "Business" version almost transparently, except when using an external SSO provider. In that case, users need to manually add the URL of that specific SSO provider to a configuration file, to authorize it within the webapp-container For example, to authorize Gmail to verify your password using login.mycompany.com, you need to create the file ~/.local/share/Gmailmailgooglecom/extra-url-patterns.conf: [Extra Patterns] Patterns=https://login.mycompany.com/* On the phone, the name of the file is: ~/.local/share/com.ubuntu.developer.webapps.webapp-gmail/extra-url-patterns.conf
2014-04-22 11:04:55 Nobuto Murata bug added subscriber Nobuto MURATA
2014-04-22 16:19:18 David Barth webbrowser-app: assignee Alberto Mardegan (mardy)
2014-04-23 13:00:12 Launchpad Janitor branch linked lp:~mardy/webbrowser-app/lp1302780
2014-04-25 13:02:51 David Barth description When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in. We have released a solution for that particular case. All Google Apps webapps have been patched to support their "Business" version almost transparently, except when using an external SSO provider. In that case, users need to manually add the URL of that specific SSO provider to a configuration file, to authorize it within the webapp-container For example, to authorize Gmail to verify your password using login.mycompany.com, you need to create the file ~/.local/share/Gmailmailgooglecom/extra-url-patterns.conf: [Extra Patterns] Patterns=https://login.mycompany.com/* On the phone, the name of the file is: ~/.local/share/com.ubuntu.developer.webapps.webapp-gmail/extra-url-patterns.conf [Impact] When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in from within the webapp itself. [Testcase] - Open the Gmail webapp (look for Gmail in the Dash, then click on the application launcher) - At the Google login prompt, authenticate with your Google Apps for Businness acccount: username@mydomain.com Expected result: - You authenticate successfully and can access Gmail Actual result: - As soon as you validate your login, you are redirected to the default browser where the transaction finishes, and are then logged to Gmail, from within your browser; not inside the webapp itself [Regression potential] None, the issue itself is a regression compared to the previous releases where the browser was used as the webapp container and was sharing credentials in a way sufficient to allow a successful authentication with Google Apps for Business.
2014-04-28 10:14:32 David Barth webbrowser-app (Ubuntu Trusty): importance Undecided High
2014-04-28 10:14:35 David Barth webbrowser-app (Ubuntu Trusty): status New Fix Committed
2014-04-28 10:14:39 David Barth webbrowser-app: status Confirmed Fix Committed
2014-04-28 10:14:42 David Barth webbrowser-app (Ubuntu Trusty): milestone trusty-updates
2014-04-28 17:12:19 Robert Bruce Park bug added subscriber Ubuntu Stable Release Updates Team
2014-05-02 10:05:51 Colin Watson bug added subscriber SRU Verification
2014-05-02 10:05:59 Colin Watson tags webapps-hotlist verification-needed webapps-hotlist
2014-05-04 02:21:25 Launchpad Janitor branch linked lp:ubuntu/trusty-proposed/webbrowser-app
2014-05-16 05:35:49 Timo Jyrinki tags verification-needed webapps-hotlist verification-done webapps-hotlist
2014-05-19 09:15:00 Launchpad Janitor webbrowser-app (Ubuntu Trusty): status Fix Committed Fix Released
2014-05-19 09:15:05 Colin Watson removed subscriber Ubuntu Stable Release Updates Team
2014-05-27 16:01:17 David Barth webbrowser-app: status Fix Committed Fix Released