** Description changed: [context] ADSys is a tool designed for administering and implementing Group Policy Objects (GPOs) from Active Directory on Linux systems. It includes a suite of services and commands that empower administrators to efficiently manage policy updates and maintain compliance with organizational business rules. Given that ADSys directly interfaces with Active Directory and needs to align with new business requirements in LTS releases, it has been essential to keep the package consistently updated with the latest changes of ADSys upstream source. As ADSys is a key component of our commercial offerings, our customers anticipate the availability of recently implemented features in the 22.04 release. Now that ADSys has a complete set of features, the request is to proceed with a one-off release of ADSys 0.14.1 to 22.04. Please note that any new features introduced in subsequent versions will be exclusively available in 24.04 and later releases. This version includes a comprehensive end to end automated test suite that runs ADSys against a real Active directory environment. + Version 0.14.1 is available for 22.04 in a PPA and already used in + production by customers. + [references] LP: https://launchpad.net/ubuntu/+source/adsys LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys GitHub: https://github.com/ubuntu/adsys/ GH Bugs: https://github.com/ubuntu/adsys/issues - Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ + Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ Initial SRU discussion: https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html [changes] - Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog - * New features - * New policies: - - Add mount / network shares policy manager - - Add AppArmor policy manager - - Support multiple AD backends and implement Winbind support - - Add system proxy policy manager - - Add certificate policy manager for machines - - Add adsysctl policy purge command to purge applied policies - - Full documentation - - Full end to end automated test suite. + Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog + * New features + * New policies: + - Add mount / network shares policy manager + - Add AppArmor policy manager + - Support multiple AD backends and implement Winbind support + - Add system proxy policy manager + - Add certificate policy manager for machines + - Add adsysctl policy purge command to purge applied policies + - Full documentation + - Full end to end automated test suite. - * Enhancements - * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine - * Expose Ubuntu Pro status in the "status" command - * Update scripts manager creation - * List Pro policy types in service status output - * Warn when Pro-only rules are configured - * Use systemd via D-Bus instead of systemctl commands - * Add placeholder notes for entry types - * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos - * Rework policy application sync strategy - * Print logs when policies are up to date - * Update policy definitions to include dconf key for dark mode background - * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) - * Allow sssd backend to work without ad_domain being set (LP: #2054445) - * Update apport hook to include journal errors and package logs + * Enhancements + * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine + * Expose Ubuntu Pro status in the "status" command + * Update scripts manager creation + * List Pro policy types in service status output + * Warn when Pro-only rules are configured + * Use systemd via D-Bus instead of systemctl commands + * Add placeholder notes for entry types + * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos + * Rework policy application sync strategy + * Print logs when policies are up to date + * Update policy definitions to include dconf key for dark mode background + * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) + * Allow sssd backend to work without ad_domain being set (LP: #2054445) + * Update apport hook to include journal errors and package logs - * Bug fixes - * Fix policy update failing when GPT.INI contains no version key - * Fix object lookup for users having a FQDN as their hostname - * Support special characters in domains when parsing sssd configuration - * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf - * Ensure empty state for dconf policy - * Handle case mismatches in GPT.INI file name - * Ensure GPO URLs contain the FQDN of the domain controller - * Add runtime dependency on nfs-common + * Bug fixes + * Fix policy update failing when GPT.INI contains no version key + * Fix object lookup for users having a FQDN as their hostname + * Support special characters in domains when parsing sssd configuration + * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf + * Ensure empty state for dconf policy + * Handle case mismatches in GPT.INI file name + * Ensure GPO URLs contain the FQDN of the domain controller + * Add runtime dependency on nfs-common - * Other - * Updates to latest versions of Go (fixing known Go vulnerabilities) - * Updates to latest versions of the Go dependencies - * Updates and improvements to CI and QoL - * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version + * Other + * Updates to latest versions of Go (fixing known Go vulnerabilities) + * Updates to latest versions of the Go dependencies + * Updates and improvements to CI and QoL + * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version + + Dependencies: + * Build-dep: golang-go (>= 2:1.22~) + + * Dependencies to backport to 22.04: + * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) + * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) + + + [test plan] + Process: + Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. + + The team applied the following quality criteria: + * All changes are thoroughly reviewed and approved by core team members before integration. + * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. + * All bugs fixed in this release must have a link to the pull request that fixes them. + * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. + * New and existing features are tested in a real Active Directory environment. + * There are no unfixed bugs tagged "blocker" on the milestone. + + Packaging QA: + To prepare the release to 22.04, the following procedures will be completed to ensure quality: + * All autopkgtests pass. + * The package does not break when upgrading. + * The binary is identical to the CI build, with only Debian packaging changes. + * The copyrights and changelog are up to date. + * An upgrade test from the previous package version has been performed using apt install/upgrade. + + Code sanity: + Code sanity checks are performed automatically on each build. They verify: + * Code linting + * Go module files are up to date + * Generated files are up to date + * Any binary in the project builds + * Vulnerabilities + Example report: https://github.com/ubuntu/adsys/actions/runs/6955264244 + + Code coverage: + * Code coverage is computed on every build and a report generated. + * Codecov report: https://app.codecov.io/gh/ubuntu/adsys + * Coverage as of today: 90.78% + + [where problems could occur] + For AD users: + * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly + * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. + + * For local users, no impact will occur.
** Description changed: [context] ADSys is a tool designed for administering and implementing Group Policy Objects (GPOs) from Active Directory on Linux systems. It includes a suite of services and commands that empower administrators to efficiently manage policy updates and maintain compliance with organizational business rules. Given that ADSys directly interfaces with Active Directory and needs to align with new business requirements in LTS releases, it has been essential to keep the package consistently updated with the latest changes of ADSys upstream source. As ADSys is a key component of our commercial offerings, our customers anticipate the availability of recently implemented features in the 22.04 release. Now that ADSys has a complete set of features, the request is to proceed with a one-off release of ADSys 0.14.1 to 22.04. Please note that any new features introduced in subsequent versions will be exclusively available in 24.04 and later releases. This version includes a comprehensive end to end automated test suite that runs ADSys against a real Active directory environment. Version 0.14.1 is available for 22.04 in a PPA and already used in production by customers. [references] LP: https://launchpad.net/ubuntu/+source/adsys LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys GitHub: https://github.com/ubuntu/adsys/ GH Bugs: https://github.com/ubuntu/adsys/issues Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ Initial SRU discussion: https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html [changes] Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog * New features * New policies: - Add mount / network shares policy manager - Add AppArmor policy manager - Support multiple AD backends and implement Winbind support - Add system proxy policy manager - Add certificate policy manager for machines - Add adsysctl policy purge command to purge applied policies - Full documentation - Full end to end automated test suite. * Enhancements * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine * Expose Ubuntu Pro status in the "status" command * Update scripts manager creation * List Pro policy types in service status output * Warn when Pro-only rules are configured * Use systemd via D-Bus instead of systemctl commands * Add placeholder notes for entry types * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos * Rework policy application sync strategy * Print logs when policies are up to date * Update policy definitions to include dconf key for dark mode background * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) * Allow sssd backend to work without ad_domain being set (LP: #2054445) * Update apport hook to include journal errors and package logs * Bug fixes * Fix policy update failing when GPT.INI contains no version key * Fix object lookup for users having a FQDN as their hostname * Support special characters in domains when parsing sssd configuration * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf * Ensure empty state for dconf policy * Handle case mismatches in GPT.INI file name * Ensure GPO URLs contain the FQDN of the domain controller * Add runtime dependency on nfs-common * Other * Updates to latest versions of Go (fixing known Go vulnerabilities) * Updates to latest versions of the Go dependencies * Updates and improvements to CI and QoL * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version Dependencies: * Build-dep: golang-go (>= 2:1.22~) - * Dependencies to backport to 22.04: - * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) - * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) - + * Dependencies to backport to 22.04: + * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) + * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) [test plan] - Process: - Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. + # Process + Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. The team applied the following quality criteria: - * All changes are thoroughly reviewed and approved by core team members before integration. - * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. - * All bugs fixed in this release must have a link to the pull request that fixes them. - * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. - * New and existing features are tested in a real Active Directory environment. - * There are no unfixed bugs tagged "blocker" on the milestone. + * All changes are thoroughly reviewed and approved by core team members before integration. + * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. + * All bugs fixed in this release must have a link to the pull request that fixes them. + * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. + * New and existing features are tested in a real Active Directory environment. + * There are no unfixed bugs tagged "blocker" on the milestone. - Packaging QA: + # Packaging QA To prepare the release to 22.04, the following procedures will be completed to ensure quality: - * All autopkgtests pass. - * The package does not break when upgrading. - * The binary is identical to the CI build, with only Debian packaging changes. - * The copyrights and changelog are up to date. - * An upgrade test from the previous package version has been performed using apt install/upgrade. + * All autopkgtests pass. + * The package does not break when upgrading. + * The binary is identical to the CI build, with only Debian packaging changes. + * The copyrights and changelog are up to date. + * An upgrade test from the previous package version has been performed using apt install/upgrade. - Code sanity: + # Code sanity Code sanity checks are performed automatically on each build. They verify: - * Code linting - * Go module files are up to date - * Generated files are up to date - * Any binary in the project builds - * Vulnerabilities + * Code linting + * Go module files are up to date + * Generated files are up to date + * Any binary in the project builds + * Vulnerabilities Example report: https://github.com/ubuntu/adsys/actions/runs/6955264244 Code coverage: - * Code coverage is computed on every build and a report generated. - * Codecov report: https://app.codecov.io/gh/ubuntu/adsys - * Coverage as of today: 90.78% + * Code coverage is computed on every build and a report generated. + * Codecov report: https://app.codecov.io/gh/ubuntu/adsys + * Coverage as of today: 90.78% [where problems could occur] For AD users: - * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly - * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. + * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly + * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. - * For local users, no impact will occur. + * For local users, no impact will occur. ** Changed in: adsys (Ubuntu) Importance: Undecided => High ** Also affects: adsys (Ubuntu Jammy) Importance: Undecided Status: New ** Description changed: [context] ADSys is a tool designed for administering and implementing Group Policy Objects (GPOs) from Active Directory on Linux systems. It includes a suite of services and commands that empower administrators to efficiently manage policy updates and maintain compliance with organizational business rules. Given that ADSys directly interfaces with Active Directory and needs to align with new business requirements in LTS releases, it has been essential to keep the package consistently updated with the latest changes of ADSys upstream source. As ADSys is a key component of our commercial offerings, our customers anticipate the availability of recently implemented features in the 22.04 release. Now that ADSys has a complete set of features, the request is to proceed with a one-off release of ADSys 0.14.1 to 22.04. Please note that any new features introduced in subsequent versions will be exclusively available in 24.04 and later releases. This version includes a comprehensive end to end automated test suite that runs ADSys against a real Active directory environment. Version 0.14.1 is available for 22.04 in a PPA and already used in production by customers. + + At this time of writing the number of open issues is 1 in Launchpad and + 16 in GitHub including 6 enhancements. [references] LP: https://launchpad.net/ubuntu/+source/adsys LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys GitHub: https://github.com/ubuntu/adsys/ GH Bugs: https://github.com/ubuntu/adsys/issues Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ Initial SRU discussion: https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html [changes] Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog * New features * New policies: - Add mount / network shares policy manager - Add AppArmor policy manager - Support multiple AD backends and implement Winbind support - Add system proxy policy manager - Add certificate policy manager for machines - Add adsysctl policy purge command to purge applied policies - Full documentation - Full end to end automated test suite. * Enhancements * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine * Expose Ubuntu Pro status in the "status" command * Update scripts manager creation * List Pro policy types in service status output * Warn when Pro-only rules are configured * Use systemd via D-Bus instead of systemctl commands * Add placeholder notes for entry types * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos * Rework policy application sync strategy * Print logs when policies are up to date * Update policy definitions to include dconf key for dark mode background * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) * Allow sssd backend to work without ad_domain being set (LP: #2054445) * Update apport hook to include journal errors and package logs * Bug fixes * Fix policy update failing when GPT.INI contains no version key * Fix object lookup for users having a FQDN as their hostname * Support special characters in domains when parsing sssd configuration * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf * Ensure empty state for dconf policy * Handle case mismatches in GPT.INI file name * Ensure GPO URLs contain the FQDN of the domain controller * Add runtime dependency on nfs-common * Other * Updates to latest versions of Go (fixing known Go vulnerabilities) * Updates to latest versions of the Go dependencies * Updates and improvements to CI and QoL * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version Dependencies: * Build-dep: golang-go (>= 2:1.22~) * Dependencies to backport to 22.04: * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) [test plan] # Process Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. The team applied the following quality criteria: * All changes are thoroughly reviewed and approved by core team members before integration. * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. * All bugs fixed in this release must have a link to the pull request that fixes them. * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. * New and existing features are tested in a real Active Directory environment. * There are no unfixed bugs tagged "blocker" on the milestone. # Packaging QA To prepare the release to 22.04, the following procedures will be completed to ensure quality: * All autopkgtests pass. * The package does not break when upgrading. * The binary is identical to the CI build, with only Debian packaging changes. * The copyrights and changelog are up to date. * An upgrade test from the previous package version has been performed using apt install/upgrade. # Code sanity Code sanity checks are performed automatically on each build. They verify: * Code linting * Go module files are up to date * Generated files are up to date * Any binary in the project builds * Vulnerabilities Example report: https://github.com/ubuntu/adsys/actions/runs/6955264244 Code coverage: * Code coverage is computed on every build and a report generated. * Codecov report: https://app.codecov.io/gh/ubuntu/adsys * Coverage as of today: 90.78% [where problems could occur] For AD users: * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. * For local users, no impact will occur. ** Description changed: [context] ADSys is a tool designed for administering and implementing Group Policy Objects (GPOs) from Active Directory on Linux systems. It includes a suite of services and commands that empower administrators to efficiently manage policy updates and maintain compliance with organizational business rules. Given that ADSys directly interfaces with Active Directory and needs to align with new business requirements in LTS releases, it has been essential to keep the package consistently updated with the latest changes of ADSys upstream source. As ADSys is a key component of our commercial offerings, our customers anticipate the availability of recently implemented features in the 22.04 release. Now that ADSys has a complete set of features, the request is to proceed with a one-off release of ADSys 0.14.1 to 22.04. Please note that any new features introduced in subsequent versions will be exclusively available in 24.04 and later releases. This version includes a comprehensive end to end automated test suite that runs ADSys against a real Active directory environment. Version 0.14.1 is available for 22.04 in a PPA and already used in production by customers. At this time of writing the number of open issues is 1 in Launchpad and - 16 in GitHub including 6 enhancements. + 16 in GitHub including 6 enhancements. None of them have a high or + critical importance. [references] LP: https://launchpad.net/ubuntu/+source/adsys LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys GitHub: https://github.com/ubuntu/adsys/ GH Bugs: https://github.com/ubuntu/adsys/issues Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ Initial SRU discussion: https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html [changes] Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog * New features * New policies: - Add mount / network shares policy manager - Add AppArmor policy manager - Support multiple AD backends and implement Winbind support - Add system proxy policy manager - Add certificate policy manager for machines - Add adsysctl policy purge command to purge applied policies - Full documentation - Full end to end automated test suite. * Enhancements * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine * Expose Ubuntu Pro status in the "status" command * Update scripts manager creation * List Pro policy types in service status output * Warn when Pro-only rules are configured * Use systemd via D-Bus instead of systemctl commands * Add placeholder notes for entry types * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos * Rework policy application sync strategy * Print logs when policies are up to date * Update policy definitions to include dconf key for dark mode background * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) * Allow sssd backend to work without ad_domain being set (LP: #2054445) * Update apport hook to include journal errors and package logs * Bug fixes * Fix policy update failing when GPT.INI contains no version key * Fix object lookup for users having a FQDN as their hostname * Support special characters in domains when parsing sssd configuration * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf * Ensure empty state for dconf policy * Handle case mismatches in GPT.INI file name * Ensure GPO URLs contain the FQDN of the domain controller * Add runtime dependency on nfs-common * Other * Updates to latest versions of Go (fixing known Go vulnerabilities) * Updates to latest versions of the Go dependencies * Updates and improvements to CI and QoL * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version Dependencies: * Build-dep: golang-go (>= 2:1.22~) * Dependencies to backport to 22.04: * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) [test plan] # Process Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. The team applied the following quality criteria: * All changes are thoroughly reviewed and approved by core team members before integration. * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. * All bugs fixed in this release must have a link to the pull request that fixes them. * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. * New and existing features are tested in a real Active Directory environment. * There are no unfixed bugs tagged "blocker" on the milestone. # Packaging QA To prepare the release to 22.04, the following procedures will be completed to ensure quality: * All autopkgtests pass. * The package does not break when upgrading. * The binary is identical to the CI build, with only Debian packaging changes. * The copyrights and changelog are up to date. * An upgrade test from the previous package version has been performed using apt install/upgrade. # Code sanity Code sanity checks are performed automatically on each build. They verify: * Code linting * Go module files are up to date * Generated files are up to date * Any binary in the project builds * Vulnerabilities Example report: https://github.com/ubuntu/adsys/actions/runs/6955264244 Code coverage: * Code coverage is computed on every build and a report generated. * Codecov report: https://app.codecov.io/gh/ubuntu/adsys * Coverage as of today: 90.78% [where problems could occur] For AD users: * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. * For local users, no impact will occur. ** Description changed: [context] ADSys is a tool designed for administering and implementing Group Policy Objects (GPOs) from Active Directory on Linux systems. It includes a suite of services and commands that empower administrators to efficiently manage policy updates and maintain compliance with organizational business rules. Given that ADSys directly interfaces with Active Directory and needs to align with new business requirements in LTS releases, it has been essential to keep the package consistently updated with the latest changes of ADSys upstream source. As ADSys is a key component of our commercial offerings, our customers anticipate the availability of recently implemented features in the 22.04 release. Now that ADSys has a complete set of features, the request is to proceed with a one-off release of ADSys 0.14.1 to 22.04. Please note that any new features introduced in subsequent versions will be exclusively available in 24.04 and later releases. This version includes a comprehensive end to end automated test suite that runs ADSys against a real Active directory environment. - Version 0.14.1 is available for 22.04 in a PPA and already used in - production by customers. + Version 0.14.1 is available for 22.04 in a PPA + (https://launchpad.net/~ubuntu-enterprise-desktop/+archive/ubuntu/adsys) + and already used in production by customers. At this time of writing the number of open issues is 1 in Launchpad and 16 in GitHub including 6 enhancements. None of them have a high or critical importance. [references] LP: https://launchpad.net/ubuntu/+source/adsys LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys GitHub: https://github.com/ubuntu/adsys/ GH Bugs: https://github.com/ubuntu/adsys/issues Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/ Initial SRU discussion: https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html [changes] Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog * New features * New policies: - Add mount / network shares policy manager - Add AppArmor policy manager - Support multiple AD backends and implement Winbind support - Add system proxy policy manager - Add certificate policy manager for machines - Add adsysctl policy purge command to purge applied policies - Full documentation - Full end to end automated test suite. * Enhancements * Add a --machine / -m flag to adsysctl applied, indicating the policies applied to the current machine * Expose Ubuntu Pro status in the "status" command * Update scripts manager creation * List Pro policy types in service status output * Warn when Pro-only rules are configured * Use systemd via D-Bus instead of systemctl commands * Add placeholder notes for entry types * Rework Kerberos ticket handling logic to satisfy the Heimdal implementation of Kerberos * Rework policy application sync strategy * Print logs when policies are up to date * Update policy definitions to include dconf key for dark mode background * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061) * Allow sssd backend to work without ad_domain being set (LP: #2054445) * Update apport hook to include journal errors and package logs * Bug fixes * Fix policy update failing when GPT.INI contains no version key * Fix object lookup for users having a FQDN as their hostname * Support special characters in domains when parsing sssd configuration * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf * Ensure empty state for dconf policy * Handle case mismatches in GPT.INI file name * Ensure GPO URLs contain the FQDN of the domain controller * Add runtime dependency on nfs-common * Other * Updates to latest versions of Go (fixing known Go vulnerabilities) * Updates to latest versions of the Go dependencies * Updates and improvements to CI and QoL * Migrate translation support to native approach using go-i18n + gotext and switch to upstream gotext version Dependencies: * Build-dep: golang-go (>= 2:1.22~) * Dependencies to backport to 22.04: * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will be disabled otherwise) * python3-cepces (suggest. Required for Certificates autoenrollment support - feature will be disabled otherwise) [test plan] # Process Adsys follows a robust continuous integration and testing process. It is covered by a comprehensive automated tests suite (https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated end to end test suite that runs in a real active directory environment. The team applied the following quality criteria: * All changes are thoroughly reviewed and approved by core team members before integration. * Each change is thoroughly tested at the unit, integration and system levels. * All the tests pass in all supported architectures. * All bugs fixed in this release must have a link to the pull request that fixes them. * All bug fixes and new features are verified in a system by executing automated or manual tests. Most of these tests are automated and executed in the autopkgtest suite. Tests that are not automated are executed manually. * New and existing features are tested in a real Active Directory environment. * There are no unfixed bugs tagged "blocker" on the milestone. # Packaging QA To prepare the release to 22.04, the following procedures will be completed to ensure quality: * All autopkgtests pass. * The package does not break when upgrading. * The binary is identical to the CI build, with only Debian packaging changes. * The copyrights and changelog are up to date. * An upgrade test from the previous package version has been performed using apt install/upgrade. # Code sanity Code sanity checks are performed automatically on each build. They verify: * Code linting * Go module files are up to date * Generated files are up to date * Any binary in the project builds * Vulnerabilities Example report: https://github.com/ubuntu/adsys/actions/runs/6955264244 Code coverage: * Code coverage is computed on every build and a report generated. * Codecov report: https://app.codecov.io/gh/ubuntu/adsys * Coverage as of today: 90.78% [where problems could occur] For AD users: * ADSys can prevent authentication of AD users if some policies can't be applied or fail to apply properly * Note: The categories of bugs we've identified typically revolve around Active Directory setup or network configuration. Extensive and detailed logging of both SSSD and ADSys aids in resolving these issues promptly. * For local users, no impact will occur. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2059756 Title: [SRU] adsys 0.14.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adsys/+bug/2059756/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs