[Bug 2065349] Re: [SRU] Default user created by cloud-init confuses WSLg

2024-05-10 Thread Didier Roche-Tolomelli
I have sponsored the package to oracular first. This one is 0.5.3. I did
change the VCS to update debian/changelog. And tag it as v0.5.3.

I have changed the SRU (noble) backport to:
- target noble as release series in the SRU bug.
- have a version that is SRU compatible (it needs to be ealier than the one in 
oracular, so it’s 0.5.3~24.04)
- not removing previous rebuild upload changelog in noble (we don't really 
remove changelog in the SRU, to minimize the diff and not remove the package 
history in a given pocket).

Subscribing SRU team.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065349

Title:
  [SRU] Default user created by cloud-init confuses WSLg

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsl-setup/+bug/2065349/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065349] Re: [SRU] Default user created by cloud-init confuses WSLg

2024-05-10 Thread Didier Roche-Tolomelli
** Also affects: wsl-setup (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065349

Title:
  [SRU] Default user created by cloud-init confuses WSLg

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsl-setup/+bug/2065349/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059756] Re: [SRU] adsys 0.14.1

2024-05-03 Thread Didier Roche-Tolomelli
golang 1.22 is now in mantic NEW queue and adsys 0.14.1~23.10 is in the
unapproved queue (the only change on the last one is that I adapted the
debdiff to not remove the rebuild upload changelog entry).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059756

Title:
  [SRU] adsys 0.14.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/adsys/+bug/2059756/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059756] Re: [SRU] adsys 0.14.1

2024-04-25 Thread Didier Roche-Tolomelli
** Description changed:

  [context]
  ADSys is a tool designed for administering and implementing Group Policy 
Objects (GPOs) from Active Directory on Linux systems. It includes a suite of 
services and commands that empower administrators to efficiently manage policy 
updates and maintain compliance with organizational business rules.
  
  Given that ADSys directly interfaces with Active Directory and needs to
  align with new business requirements in LTS releases, it has been
  essential to keep the package consistently updated with the latest
  changes of ADSys upstream source. As ADSys is a key component of our
  commercial offerings, our customers anticipate the availability of
  recently implemented features in the 22.04 release.
  
  Now that ADSys has a complete set of features, the request is to proceed
  with a one-off release of ADSys 0.14.1 to 22.04. Please note that any
  new features introduced in subsequent versions will be exclusively
  available in 24.04 and later releases.
  
  This version includes a comprehensive end to end automated test suite
  that runs ADSys against a real Active directory environment.
  
  Version 0.14.1 is available for 22.04 in a PPA
  (https://launchpad.net/~ubuntu-enterprise-desktop/+archive/ubuntu/adsys)
  and already used in production by customers.
  
  At this time of writing the number of open issues is 1 in Launchpad and
  16 in GitHub including 6 enhancements. None of them have a high or
  critical importance.
  
  [references]
  LP: https://launchpad.net/ubuntu/+source/adsys
  LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys
  GitHub: https://github.com/ubuntu/adsys/
  GH Bugs: https://github.com/ubuntu/adsys/issues
  Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/
  Initial SRU discussion: 
https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html
  
  [changes]
  Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog
   * New features
     * New policies:
   - Add mount / network shares policy manager
   - Add AppArmor policy manager
   - Support multiple AD backends and implement Winbind support
   - Add system proxy policy manager
   - Add certificate policy manager for machines
   - Add adsysctl policy purge command to purge applied policies
   - Full documentation
   - Full end to end automated test suite.
  
   * Enhancements
    * Add a --machine / -m flag to adsysctl applied, indicating the policies 
applied to the current machine
    * Expose Ubuntu Pro status in the "status" command
    * Update scripts manager creation
    * List Pro policy types in service status output
    * Warn when Pro-only rules are configured
    * Use systemd via D-Bus instead of systemctl commands
    * Add placeholder notes for entry types
    * Rework Kerberos ticket handling logic to satisfy the Heimdal 
implementation of Kerberos
    * Rework policy application sync strategy
    * Print logs when policies are up to date
    * Update policy definitions to include dconf key for dark mode background
    * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061)
    * Allow sssd backend to work without ad_domain being set (LP: #2054445)
    * Update apport hook to include journal errors and package logs
  
   * Bug fixes
    * Fix policy update failing when GPT.INI contains no version key
    * Fix object lookup for users having a FQDN as their hostname
    * Support special characters in domains when parsing sssd configuration
    * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf
    * Ensure empty state for dconf policy
    * Handle case mismatches in GPT.INI file name
    * Ensure GPO URLs contain the FQDN of the domain controller
    * Add runtime dependency on nfs-common
  
   * Other
    * Updates to latest versions of Go (fixing known Go vulnerabilities)
    * Updates to latest versions of the Go dependencies
    * Updates and improvements to CI and QoL
    * Migrate translation support to native approach using go-i18n + gotext and 
switch to upstream gotext version
  
  Dependencies:
  * Build-dep: golang-go (>= 2:1.22~)
  
  * Dependencies to backport to 22.04:
    * golang-go >= 2:1.22
    * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will 
be disabled otherwise)
    * python3-cepces (suggest. Required for Certificates autoenrollment support 
- feature will be disabled otherwise)
    * Note: Both are currently in the new queue of 22.04 : 
https://launchpad.net/ubuntu/jammy/+queue?queue_state=0_text=
  
  [test plan]
  # Process
  Adsys follows a robust continuous integration and testing process. It is 
covered by a comprehensive automated tests suite 
(https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated 
end to end test suite that runs in a real active directory environment 
(https://github.com/ubuntu/adsys/actions/workflows/e2e-tests.yaml).
  
  The team applied the following quality 

[Bug 2059756] Re: [SRU] adsys 0.14.1

2024-04-24 Thread Didier Roche-Tolomelli
** Description changed:

  [context]
  ADSys is a tool designed for administering and implementing Group Policy 
Objects (GPOs) from Active Directory on Linux systems. It includes a suite of 
services and commands that empower administrators to efficiently manage policy 
updates and maintain compliance with organizational business rules.
  
  Given that ADSys directly interfaces with Active Directory and needs to
  align with new business requirements in LTS releases, it has been
  essential to keep the package consistently updated with the latest
  changes of ADSys upstream source. As ADSys is a key component of our
  commercial offerings, our customers anticipate the availability of
  recently implemented features in the 22.04 release.
  
  Now that ADSys has a complete set of features, the request is to proceed
  with a one-off release of ADSys 0.14.1 to 22.04. Please note that any
  new features introduced in subsequent versions will be exclusively
  available in 24.04 and later releases.
  
  This version includes a comprehensive end to end automated test suite
  that runs ADSys against a real Active directory environment.
  
  Version 0.14.1 is available for 22.04 in a PPA
  (https://launchpad.net/~ubuntu-enterprise-desktop/+archive/ubuntu/adsys)
  and already used in production by customers.
  
  At this time of writing the number of open issues is 1 in Launchpad and
  16 in GitHub including 6 enhancements. None of them have a high or
  critical importance.
  
  [references]
  LP: https://launchpad.net/ubuntu/+source/adsys
  LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys
  GitHub: https://github.com/ubuntu/adsys/
  GH Bugs: https://github.com/ubuntu/adsys/issues
  Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/
  Initial SRU discussion: 
https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html
  
  [changes]
  Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog
   * New features
     * New policies:
   - Add mount / network shares policy manager
   - Add AppArmor policy manager
   - Support multiple AD backends and implement Winbind support
   - Add system proxy policy manager
   - Add certificate policy manager for machines
   - Add adsysctl policy purge command to purge applied policies
   - Full documentation
   - Full end to end automated test suite.
  
   * Enhancements
    * Add a --machine / -m flag to adsysctl applied, indicating the policies 
applied to the current machine
    * Expose Ubuntu Pro status in the "status" command
    * Update scripts manager creation
    * List Pro policy types in service status output
    * Warn when Pro-only rules are configured
    * Use systemd via D-Bus instead of systemctl commands
    * Add placeholder notes for entry types
    * Rework Kerberos ticket handling logic to satisfy the Heimdal 
implementation of Kerberos
    * Rework policy application sync strategy
    * Print logs when policies are up to date
    * Update policy definitions to include dconf key for dark mode background
    * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061)
    * Allow sssd backend to work without ad_domain being set (LP: #2054445)
    * Update apport hook to include journal errors and package logs
  
   * Bug fixes
    * Fix policy update failing when GPT.INI contains no version key
    * Fix object lookup for users having a FQDN as their hostname
    * Support special characters in domains when parsing sssd configuration
    * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf
    * Ensure empty state for dconf policy
    * Handle case mismatches in GPT.INI file name
    * Ensure GPO URLs contain the FQDN of the domain controller
    * Add runtime dependency on nfs-common
  
   * Other
    * Updates to latest versions of Go (fixing known Go vulnerabilities)
    * Updates to latest versions of the Go dependencies
    * Updates and improvements to CI and QoL
    * Migrate translation support to native approach using go-i18n + gotext and 
switch to upstream gotext version
  
  Dependencies:
  * Build-dep: golang-go (>= 2:1.22~)
  
  * Dependencies to backport to 22.04:
    * golang-go >= 2:1.22
    * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will 
be disabled otherwise)
    * python3-cepces (suggest. Required for Certificates autoenrollment support 
- feature will be disabled otherwise)
    * Note: Both are currently in the new queue of 22.04 : 
https://launchpad.net/ubuntu/jammy/+queue?queue_state=0_text=
  
  [test plan]
  # Process
  Adsys follows a robust continuous integration and testing process. It is 
covered by a comprehensive automated tests suite 
(https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated 
end to end test suite that runs in a real active directory environment 
(https://github.com/ubuntu/adsys/actions/workflows/e2e-tests.yaml).
  
  The team applied the following quality 

[Bug 2048232] Re: [SRU] Backport to 22.04 LTS

2024-04-23 Thread Didier Roche-Tolomelli
** Description changed:

  As part of our entreprise desktop offering, there is the request to
  backport ubuntu-proxy-manager to 22.04 LTS. The package is in universe
  for now.
  
  Ubuntu Proxy Manager is a D-Bus mediated service intended to be
  triggered by ADSys, our Active Directory GPO integration. ADSys has been
  available starting Ubuntu 21.04, and Ubuntu Proxy Manager was first
  released in Ubuntu 23.04.
+ 
+ It depends on the new golang 1.22 SRU attached to
+ https://bugs.launchpad.net/ubuntu/+source/golang-1.22/+bug/2059756
  
  [Impact]
  
   * ubuntu-proxy-manager is a new package. Impact is thus only for people 
installing.
   * To leverage the functionality of the package, a recent enough ADSys 
version must be used (at least 0.11.0, not currently in Jammy but there are 
approved plans to backport ADSys 0.13.2).
   * In addition to the ADSys requirement above, the machine must be 
Pro-enabled and a Proxy GPO must be configured on the Windows AD controller.
   * No impact is expected if the conditions above are not met.
   * This is a entreprise feature requested by desktop customers running LTS.
  
  [Test Plan]
  
   1. Configure your machine with AD, with a correctly configured SSSD and KRB5 
(AD user should be able to log in). Instructions can be found on 
https://github.com/ubuntu/adsys/wiki/2.-Prerequisites
   2. Install admx and adml files on your AD controller: 
https://canonical-adsys.readthedocs-hosted.com/en/stable/how-to/set-up-ad/
   3. Join machine to Ubuntu Pro to enable proxy policy application
   4. Configure some proxy settings in AD 
(https://canonical-adsys.readthedocs-hosted.com/en/stable/explanation/proxy/), 
for instance:
    * HTTP Proxy
    * Ignored hosts
   5. Install ADSys (at least version 0.11.0) and ubuntu-proxy-manager, then 
run `adsysctl update -m` to force a refresh of the policies
   6. Ensure GSettings/APT/environment proxy values are correctly set (full 
list of supported proxy backends can be seen here: 
https://github.com/ubuntu/ubuntu-proxy-manager#supported-backends)
   7. Remove/purge the ubuntu-proxy-manager package and run `adsysctl update 
-m` again -- a warning should show reflecting that ADSys has detected a 
configured proxy policy but ubuntu-proxy-manager is not installed for it to be 
applied. ADSys's exit code will remain 0.
  
  [Where problems could occur]
  
   * Network access of various programs will be hindered if incorrect
  proxy settings are configured.
  
  [Other Info]
  
   * The current version of ADSys in Jammy does not interact with this package 
whatsoever, but there are plans to backport the latest version.
   * A passing PPA build for ubuntu-proxy-manager can be seen here: 
https://launchpad.net/~gabuscus/+archive/ubuntu/ppa/+sourcepub/15678628/+listing-archive-extra
-  * We have previously requested a FFe for ubuntu-proxy-manager for Focal: 
https://bugs.launchpad.net/ubuntu/jammy/+source/adsys/+bug/2012371
+  * We have previously requested a FFe for ubuntu-proxy-manager for Focal: 
https://bugs.launchpad.net/ubuntu/jammy/+source/adsys/+bug/2012371

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048232

Title:
  [SRU] Backport to 22.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-proxy-manager/+bug/2048232/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2048514] Re: [SRU] Backport to 22.04 LTS

2024-04-23 Thread Didier Roche-Tolomelli
** Changed in: python-cepces (Ubuntu)
   Status: In Progress => New

** Changed in: python-requests-gssapi (Ubuntu)
   Status: In Progress => New

** Also affects: python-requests-gssapi (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: python-cepces (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: python-cepces (Ubuntu)
   Status: New => Fix Released

** Changed in: python-requests-gssapi (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048514

Title:
  [SRU] Backport to 22.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-cepces/+bug/2048514/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2048232] Re: [SRU] Backport to 22.04 LTS

2024-04-23 Thread Didier Roche-Tolomelli
** Changed in: ubuntu-proxy-manager (Ubuntu)
   Status: In Progress => New

** Also affects: ubuntu-proxy-manager (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: ubuntu-proxy-manager (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048232

Title:
  [SRU] Backport to 22.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-proxy-manager/+bug/2048232/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059756] Re: [SRU] adsys 0.14.1

2024-04-23 Thread Didier Roche-Tolomelli
** Changed in: golang-1.22 (Ubuntu)
   Status: New => Fix Released

** Description changed:

  [context]
  ADSys is a tool designed for administering and implementing Group Policy 
Objects (GPOs) from Active Directory on Linux systems. It includes a suite of 
services and commands that empower administrators to efficiently manage policy 
updates and maintain compliance with organizational business rules.
  
  Given that ADSys directly interfaces with Active Directory and needs to
  align with new business requirements in LTS releases, it has been
  essential to keep the package consistently updated with the latest
  changes of ADSys upstream source. As ADSys is a key component of our
  commercial offerings, our customers anticipate the availability of
  recently implemented features in the 22.04 release.
  
  Now that ADSys has a complete set of features, the request is to proceed
  with a one-off release of ADSys 0.14.1 to 22.04. Please note that any
  new features introduced in subsequent versions will be exclusively
  available in 24.04 and later releases.
  
  This version includes a comprehensive end to end automated test suite
  that runs ADSys against a real Active directory environment.
  
  Version 0.14.1 is available for 22.04 in a PPA
  (https://launchpad.net/~ubuntu-enterprise-desktop/+archive/ubuntu/adsys)
  and already used in production by customers.
  
  At this time of writing the number of open issues is 1 in Launchpad and
  16 in GitHub including 6 enhancements. None of them have a high or
  critical importance.
  
  [references]
  LP: https://launchpad.net/ubuntu/+source/adsys
  LP Bugs: https://bugs.launchpad.net/ubuntu/+source/adsys
  GitHub: https://github.com/ubuntu/adsys/
  GH Bugs: https://github.com/ubuntu/adsys/issues
  Documentation: https://canonical-adsys.readthedocs-hosted.com/en/stable/
  Initial SRU discussion: 
https://lists.ubuntu.com/archives/ubuntu-release/2023-June/005650.html
  
  [changes]
  Full LP Changelog: https://launchpad.net/ubuntu/+source/adsys/+changelog
   * New features
     * New policies:
   - Add mount / network shares policy manager
   - Add AppArmor policy manager
   - Support multiple AD backends and implement Winbind support
   - Add system proxy policy manager
   - Add certificate policy manager for machines
   - Add adsysctl policy purge command to purge applied policies
   - Full documentation
   - Full end to end automated test suite.
  
   * Enhancements
    * Add a --machine / -m flag to adsysctl applied, indicating the policies 
applied to the current machine
    * Expose Ubuntu Pro status in the "status" command
    * Update scripts manager creation
    * List Pro policy types in service status output
    * Warn when Pro-only rules are configured
    * Use systemd via D-Bus instead of systemctl commands
    * Add placeholder notes for entry types
    * Rework Kerberos ticket handling logic to satisfy the Heimdal 
implementation of Kerberos
    * Rework policy application sync strategy
    * Print logs when policies are up to date
    * Update policy definitions to include dconf key for dark mode background
    * Infer user KRB5CCNAME path via the libkrb5 API (LP: #2049061)
    * Allow sssd backend to work without ad_domain being set (LP: #2054445)
    * Update apport hook to include journal errors and package logs
  
   * Bug fixes
    * Fix policy update failing when GPT.INI contains no version key
    * Fix object lookup for users having a FQDN as their hostname
    * Support special characters in domains when parsing sssd configuration
    * Fix DCONF_PROFILE not considering default_domain_suffix on sssd.conf
    * Ensure empty state for dconf policy
    * Handle case mismatches in GPT.INI file name
    * Ensure GPO URLs contain the FQDN of the domain controller
    * Add runtime dependency on nfs-common
  
   * Other
    * Updates to latest versions of Go (fixing known Go vulnerabilities)
    * Updates to latest versions of the Go dependencies
    * Updates and improvements to CI and QoL
    * Migrate translation support to native approach using go-i18n + gotext and 
switch to upstream gotext version
  
  Dependencies:
  * Build-dep: golang-go (>= 2:1.22~)
  
  * Dependencies to backport to 22.04:
-   * golang-go >= 2:1.22
+   * golang-go >= 2:1.22
    * ubuntu-proxy-manager (suggest. Required for Proxy support - feature will 
be disabled otherwise)
    * python3-cepces (suggest. Required for Certificates autoenrollment support 
- feature will be disabled otherwise)
    * Note: Both are currently in the new queue of 22.04 : 
https://launchpad.net/ubuntu/jammy/+queue?queue_state=0_text=
- 
  
  [test plan]
  # Process
  Adsys follows a robust continuous integration and testing process. It is 
covered by a comprehensive automated tests suite 
(https://github.com/ubuntu/adsys/actions/workflows/qa.yaml) and an automated 
end to end test suite that runs in a real active directory environment 

[Bug 2061850] Re: Can't authenticate in TTY after installing authd, but sudo works

2024-04-22 Thread Didier Roche-Tolomelli
The issue had been identified to be in GDM.

** Package changed: authd (Ubuntu) => gdm3 (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061850

Title:
  Can't authenticate in TTY after installing authd, but sudo works

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/2061850/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2048781] Re: [MIR] authd

2024-04-22 Thread Didier Roche-Tolomelli
We decided to remove the authd package in noble for the time being.

The current implementation (in particular the one in the PAM module) is
not up to our standard in terms of quality and what we are confortable
to support in the long term. Rather than releasing as is and having
risky SRUs in the future changing a large part of the implementation, we
decided against this and rather polishing the code, securing it, adding
even more tests and releasing all that as a new package SRUed to the
24.04 LTS in the coming months.

That way, we won’t risk to regress any potential users and we will use an 
architecture we are more confortable supporting for the next 5/10 years of the 
LTS release.
It means that when we reintroduce it, we will rerequest a new MIR too as the 
PAM module will largely change and we want to ensure we follow the process and 
quality standard we expect for the Ubuntu distribution.


** Changed in: authd (Ubuntu)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048781

Title:
  [MIR] authd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2048781/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060546] Re: [FFe] Update authd to current version

2024-04-22 Thread Didier Roche-Tolomelli
Removing packages from noble:
authd 0.2.1 in noble
authd 0.2.1 in noble amd64
authd 0.2.1 in noble arm64
authd 0.2.1 in noble armhf
authd 0.2.1 in noble ppc64el
authd 0.2.1 in noble riscv64
authd 0.2.1 in noble s390x
Comment: Removing from noble for now. See the rationale in LP: #2060546
Remove [y|N]? y
1 package successfully removed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060546

Title:
  [FFe] Update authd to current version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2060546/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060546] Re: [FFe] Update authd to current version

2024-04-22 Thread Didier Roche-Tolomelli
We decided to remove the authd package in noble for the time being.

The current implementation (in particular the one in the PAM module) is
not up to our standard in terms of quality and what we are confortable
to support in the long term. Rather than releasing as is and having
risky SRUs in the future changing a large part of the implementation, we
decided against this and rather polishing the code, securing it, adding
even more tests and releasing all that as a new package SRUed to the
24.04 LTS in the coming months.

That way, we won’t risk to regress any potential users and we will use an 
architecture we are more confortable supporting for the next 5/10 years of the 
LTS release.
It means that when we reintroduce it, we will rerequest a new MIR too as the 
PAM module will largely change and we want to ensure we follow the process and 
quality standard we expect for the Ubuntu distribution.


** Changed in: authd (Ubuntu)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060546

Title:
  [FFe] Update authd to current version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2060546/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2052495] Re: [MIR] wsl-pro-service

2024-04-19 Thread Didier Roche-Tolomelli
The last security request (having per user certificate to secure the
gRPC communication so that they can’t be hijacked cross-users) is now
addressed with 0.1.4 with many other enhancements fixing some
recommended TODOs.

I’m proceeding thus with the promotion.

** Changed in: wsl-pro-service (Ubuntu Noble)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052495

Title:
  [MIR] wsl-pro-service

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsl-pro-service/+bug/2052495/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062133] Re: Migration to the snap issues

2024-04-18 Thread Didier Roche-Tolomelli
yeah, informing the user will go a long way IMHO!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062133

Title:
  Migration to the snap issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/2062133/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062133] [NEW] Migration to the snap issues

2024-04-18 Thread Didier Roche-Tolomelli
Public bug reported:

After migrating to the snap, I noticed the following:
- the launcher icon disappeared (I guess it’s because the .desktop file is now 
"thunderbird_thunderbird.desktop"
- the snap migration took a good 5 minutes on my machine (I guess it’s the copy 
of the email folder), without any feedbacks that something is happening if you 
don’t look at ps output. You don’t have any visual feedback about the migration 
and we should have a progress window (maybe zenity?) to reassure on this one 
time transition
- all unread emails triggered notification (I guess it’s because the state is 
considered "New") on any folders.
- I know have 2 15G folders now: ~/snap/thunderbird/common/ and ~/.thunderbird. 
I think the latter was the old one which is unused right now and it should be 
cleaned up after the migration to the snap?

ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: thunderbird 2:1snap1-0ubuntu1
ProcVersionSignature: Ubuntu 6.8.0-11.11-generic 6.8.0-rc4
Uname: Linux 6.8.0-11-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia zfs
ApportVersion: 2.28.0-0ubuntu1
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Thu Apr 18 09:28:35 2024
InstallationDate: Installed on 2020-04-24 (1455 days ago)
InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
SnapChanges:
 Identifiant  État  DescendancePrêt   Résumé
 700  Done  2024-04-18T09:06:12+02:00  2024-04-18T09:07:34+02:00  
Installer le paquet Snap "thunderbird"
SourcePackage: thunderbird
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: thunderbird (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062133

Title:
  Migration to the snap issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/2062133/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061079] Re: GTK-ngl (new default backend) rendering issues with the nvidia 470 driver

2024-04-16 Thread Didier Roche-Tolomelli
Confirming that it’s fixed on the same machine with 550.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061079

Title:
  GTK-ngl (new default backend) rendering issues with the nvidia 470
  driver

To manage notifications about this bug go to:
https://bugs.launchpad.net/gtk/+bug/2061079/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061079] [NEW] Rendering issues on text with nvidia driver

2024-04-12 Thread Didier Roche-Tolomelli
Public bug reported:

With nvidia driver, all GTK4 applications have label rendering issues.

They are not refresh until passing the cursor over them, giving blank
windows. The corner are white and not themed. Passing from one app scren
to another one reproduces the issue.

gnome-control-center or files, for instance, are blank by default.

As suggested by seb128, exporting GSK_RENDERER=gl fixes the issue.

Related upstream bugs and discussions are:
- https://blog.gtk.org/2024/01/28/new-renderers-for-gtk/
- https://gitlab.gnome.org/GNOME/gtk/-/issues/6574
- https://gitlab.gnome.org/GNOME/gtk/-/issues/6411
- https://gitlab.gnome.org/GNOME/gtk/-/issues/6542


--


$ glxinfo
name of display: :1
display: :1  screen: 0
direct rendering: Yes
server glx vendor string: NVIDIA Corporation
server glx version string: 1.4
server glx extensions:
GLX_ARB_context_flush_control, GLX_ARB_create_context, 
GLX_ARB_create_context_no_error, GLX_ARB_create_context_profile, 
GLX_ARB_create_context_robustness, GLX_ARB_fbconfig_float, 
GLX_ARB_multisample, GLX_EXT_buffer_age, 
GLX_EXT_create_context_es2_profile, GLX_EXT_create_context_es_profile, 
GLX_EXT_framebuffer_sRGB, GLX_EXT_import_context, GLX_EXT_libglvnd, 
GLX_EXT_stereo_tree, GLX_EXT_swap_control, GLX_EXT_swap_control_tear, 
GLX_EXT_texture_from_pixmap, GLX_EXT_visual_info, GLX_EXT_visual_rating, 
GLX_NV_copy_image, GLX_NV_delay_before_swap, GLX_NV_float_buffer, 
GLX_NV_multigpu_context, GLX_NV_robustness_video_memory_purge, 
GLX_SGIX_fbconfig, GLX_SGIX_pbuffer, GLX_SGI_swap_control, 
GLX_SGI_video_sync
client glx vendor string: NVIDIA Corporation
client glx version string: 1.4
client glx extensions:
GLX_ARB_context_flush_control, GLX_ARB_create_context, 
GLX_ARB_create_context_no_error, GLX_ARB_create_context_profile, 
GLX_ARB_create_context_robustness, GLX_ARB_fbconfig_float, 
GLX_ARB_get_proc_address, GLX_ARB_multisample, GLX_EXT_buffer_age, 
GLX_EXT_create_context_es2_profile, GLX_EXT_create_context_es_profile, 
GLX_EXT_fbconfig_packed_float, GLX_EXT_framebuffer_sRGB, 
GLX_EXT_import_context, GLX_EXT_stereo_tree, GLX_EXT_swap_control, 
GLX_EXT_swap_control_tear, GLX_EXT_texture_from_pixmap, 
GLX_EXT_visual_info, GLX_EXT_visual_rating, GLX_NV_copy_buffer, 
GLX_NV_copy_image, GLX_NV_delay_before_swap, GLX_NV_float_buffer, 
GLX_NV_multigpu_context, GLX_NV_multisample_coverage, 
GLX_NV_robustness_video_memory_purge, GLX_NV_swap_group, 
GLX_SGIX_fbconfig, GLX_SGIX_pbuffer, GLX_SGI_swap_control, 
GLX_SGI_video_sync
GLX version: 1.4
GLX extensions:
GLX_ARB_context_flush_control, GLX_ARB_create_context, 
GLX_ARB_create_context_no_error, GLX_ARB_create_context_profile, 
GLX_ARB_create_context_robustness, GLX_ARB_fbconfig_float, 
GLX_ARB_get_proc_address, GLX_ARB_multisample, GLX_EXT_buffer_age, 
GLX_EXT_create_context_es2_profile, GLX_EXT_create_context_es_profile, 
GLX_EXT_framebuffer_sRGB, GLX_EXT_import_context, GLX_EXT_stereo_tree, 
GLX_EXT_swap_control, GLX_EXT_swap_control_tear, 
GLX_EXT_texture_from_pixmap, GLX_EXT_visual_info, GLX_EXT_visual_rating, 
GLX_NV_copy_image, GLX_NV_delay_before_swap, GLX_NV_float_buffer, 
GLX_NV_multigpu_context, GLX_NV_robustness_video_memory_purge, 
GLX_SGIX_fbconfig, GLX_SGIX_pbuffer, GLX_SGI_swap_control, 
GLX_SGI_video_sync
Memory info (GL_NVX_gpu_memory_info):
Dedicated video memory: 4096 MB
Total available memory: 4096 MB
Currently available dedicated video memory: 3041 MB
OpenGL vendor string: NVIDIA Corporation
OpenGL renderer string: NVIDIA GeForce GTX 1050/PCIe/SSE2
OpenGL core profile version string: 4.6.0 NVIDIA 470.239.06
OpenGL core profile shading language version string: 4.60 NVIDIA
OpenGL core profile context flags: (none)
OpenGL core profile profile mask: core profile
OpenGL core profile extensions:
GL_AMD_multi_draw_indirect, GL_AMD_seamless_cubemap_per_texture, 
GL_AMD_vertex_shader_layer, GL_AMD_vertex_shader_viewport_index, 
GL_ARB_ES2_compatibility, GL_ARB_ES3_1_compatibility, 
GL_ARB_ES3_2_compatibility, GL_ARB_ES3_compatibility, 
GL_ARB_arrays_of_arrays, GL_ARB_base_instance, GL_ARB_bindless_texture, 
GL_ARB_blend_func_extended, GL_ARB_buffer_storage, 
GL_ARB_clear_buffer_object, GL_ARB_clear_texture, GL_ARB_clip_control, 
GL_ARB_color_buffer_float, GL_ARB_compressed_texture_pixel_storage, 
GL_ARB_compute_shader, GL_ARB_compute_variable_group_size, 
GL_ARB_conditional_render_inverted, GL_ARB_conservative_depth, 
GL_ARB_copy_buffer, GL_ARB_copy_image, GL_ARB_cull_distance, 
GL_ARB_debug_output, GL_ARB_depth_buffer_float, GL_ARB_depth_clamp, 
GL_ARB_depth_texture, GL_ARB_derivative_control, 
GL_ARB_direct_state_access, GL_ARB_draw_buffers, 
GL_ARB_draw_buffers_blend, GL_ARB_draw_elements_base_vertex, 
GL_ARB_draw_indirect, GL_ARB_draw_instanced, GL_ARB_enhanced_layouts, 

[Bug 2060546] Re: [FFe] Update authd to current version

2024-04-08 Thread Didier Roche-Tolomelli
** Summary changed:

- Update authd to current version
+ [FFe] Update authd to current version

** Description changed:

  Authd is a new package in noble, in universe.
  
  This package is not shipped by default, we made many improvements and
  fixes in the current version. We don’t plan to seed it this release,
  despite the MIR being approved.
  
  Update contains a lot of vendoring updates, and code changes (using a C
  wrapper to wrap around the Go code in the PAM module to fix some
  instability), multiple thousands of line due to the C wrapper in
  particular. The diff itself will not be meaningful.
  
  Part of meaningful fixes are the default group being added and ssh
  precheck API. Full changelog is available at
  https://github.com/ubuntu/authd/pull/237/files.
  
+ It also fixes a vulnerability by depending on latest Go and latest
+ x/net/http.
+ 
  This is the code level we are testing and relying on.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060546

Title:
  [FFe] Update authd to current version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2060546/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060548] Re: [FFe] Update and seed wsl-pro-service in the WSL images

2024-04-08 Thread Didier Roche-Tolomelli
** Summary changed:

- Update and seed wsl-pro-service in the WSL images
+ [FFe] Update and seed wsl-pro-service in the WSL images

** Description changed:

  This is a new package for this release. It’s only functional with a
  Windows agent which is not publically released and under beta for now.
  
  As the end of the beta will be after the 24.04 release, we want to get
  as close as possible to the current code level, knowing that current
  code will still certainly grow feature-wise once with the Beta user
  feedback.
  
  However, having it seeded (the MIR is approved and security issues fixed
  but the certificate one, which has been discussed as minor for now) with
  the current code level will be great to diminish the diff when the SRU
  that will be needed then.
  
  The impact is on existing non beta users (and beta users are using a ppa
  with the ppa containing the current code level).
  
  Current diff is large as the development is very active and won’t really
  provide anything more. Note that it contains also a packaging change to
  fix bug #2057651.
+ 
+ It also fixes a vulnerability by depending on latest Go and latest
+ x/net/http.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060548

Title:
  [FFe] Update and seed wsl-pro-service in the WSL images

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/2060548/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060548] [NEW] Update and seed wsl-pro-service in the WSL images

2024-04-08 Thread Didier Roche-Tolomelli
Public bug reported:

This is a new package for this release. It’s only functional with a
Windows agent which is not publically released and under beta for now.

As the end of the beta will be after the 24.04 release, we want to get
as close as possible to the current code level, knowing that current
code will still certainly grow feature-wise once with the Beta user
feedback.

However, having it seeded (the MIR is approved and security issues fixed
but the certificate one, which has been discussed as minor for now) with
the current code level will be great to diminish the diff when the SRU
that will be needed then.

The impact is on existing non beta users (and beta users are using a ppa
with the ppa containing the current code level).

Current diff is large as the development is very active and won’t really
provide anything more. Note that it contains also a packaging change to
fix bug #2057651.

** Affects: ubuntu-meta (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: wsl-pro-service (Ubuntu)
 Importance: Undecided
 Status: New

** Also affects: ubuntu-meta (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060548

Title:
  Update and seed wsl-pro-service in the WSL images

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/2060548/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060546] [NEW] Update authd to current version

2024-04-08 Thread Didier Roche-Tolomelli
Public bug reported:

Authd is a new package in noble, in universe.

This package is not shipped by default, we made many improvements and
fixes in the current version. We don’t plan to seed it this release,
despite the MIR being approved.

Update contains a lot of vendoring updates, and code changes (using a C
wrapper to wrap around the Go code in the PAM module to fix some
instability), multiple thousands of line due to the C wrapper in
particular. The diff itself will not be meaningful.

Part of meaningful fixes are the default group being added and ssh
precheck API. Full changelog is available at
https://github.com/ubuntu/authd/pull/237/files.

This is the code level we are testing and relying on.

** Affects: authd (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060546

Title:
  Update authd to current version

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2060546/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060273] [NEW] secondary users are not listed in polkit graphical prompt

2024-04-06 Thread Didier Roche-Tolomelli
Public bug reported:

Tested with 124-1ubuntu1 on noble

1. Create 3 users on the machine:
- sudo-user1, part of sudo group
- sudo-user2, part of sudo group
- normal-user, not part of the sudo group
2. Login with normal-user
3. Try to execute pkexec or any other command prompting for polkit
-> only sudo-user1 password auth is proposed, before, we had a listbox to 
select all eligible user
4. Remove sudo-user1
5. Try pkexec again:
-> now sudo-user2 is proposed, showing that the configuration for this user is 
correct.

It seems that only the first "admin" of the machine is taken into
account. However, as normal-user, I may not have sudo-user1 around, but
only sudo-user2.

** Affects: policykit-1 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060273

Title:
  secondary users are not listed in polkit graphical prompt

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/2060273/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054480] Re: [MIR] nbd-client

2024-04-02 Thread Didier Roche-Tolomelli
With this in light (but we have the wider "everything that is in main
for a very long time in ubuntu, even being security reviewed and got
multiple uploads), I would agree that -server could have another
security/fresh look. Do you think it’s something the security team has
the capacity to look?

Otherwise, we may not want to special case this case, as the problem is
really linked to the pre-existing packages in main (even GNOME for
instance in general, didn’t get a security review… and even if it did,
GNOME has nothing looking like the one released in 2004).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054480

Title:
  [MIR] nbd-client

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nbd/+bug/2054480/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2004442] Re: [MIR] aom (dependency of libheif)

2024-04-02 Thread Didier Roche-Tolomelli
Confirming that the only REQUIRED TODO is now fixed. Thanks for checking
it slyon!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2004442

Title:
  [MIR] aom (dependency of libheif)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aom/+bug/2004442/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051916] Re: [MIR] promote libtraceevent as a trace-cmd dependency

2024-04-02 Thread Didier Roche-Tolomelli
Hey everyone and Paul. First, sorry for the delayed answered (I was
thinking you would get me reassign and for some reason, I missed
subscribing to the bug)

> But I do not really understand the harm of having these entries kept
for documentation, except this could pile up and become a mess at some
point. Do we have a policy regarding the removal of these entries (count
of version, age)?

There is no strict policy, I understand the historical part of having it
for documenting. I suggest to keep it for some release, but if this is
doable, cleanup after a while. It’s not something we want to keep
hanging around forever. I see that you want to remove them in a future
upload, good!

All the required TODOs are now fullfilled, thanks for working on those!
I’m thus happy to MIR ack this package now!


** Changed in: libtraceevent (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051916

Title:
  [MIR] promote libtraceevent as a trace-cmd dependency

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libtraceevent/+bug/2051916/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2048781] Re: [MIR] authd

2024-03-26 Thread Didier Roche-Tolomelli
I continued exploring this topic myself last week and was able to rely
on a tool developed for this: https://github.com/coreos/cargo-vendor-
filterer/.

This tool is not ideal in the sense that:
- it vendorize the whole content
- then, it filters by replacing entire crates based on some filtering rules, 
like arch, platform or file exclusion. The replacement is done by empty module, 
and rechecksumming.

So basically, cargo and rustc still thinks the crate is available, it
just happens to be empty. Consequently, we wouldn’t know if we are
impacted or not by security issue before manual checking.

However, I see this as a step in the right direction, so I implemented this in 
authd: https://github.com/ubuntu/authd/pull/270/files. Here, we are filtering 
to only keep Linux platform, on all our supported architectures (which is tier 
1 and 2 in Rust world).
The benefit is that we are now able to remove our manual recheckshumming after 
purging the binary library archive files which are part of some crates.

This tool run during the package source build. I would feel better if
this was packaged and maintained in ubuntu (as this injects potentially
some code), and part of our standard tooling. I will reach out the Rust
maintainer for the incoming engineering sprint. I think we can still
trust this repository as it’s part of a well-known organization with
multi-decades open source famous maintainers.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048781

Title:
  [MIR] authd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2048781/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054480] Re: [MIR] nbd-client

2024-03-12 Thread Didier Roche-Tolomelli
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
- test suite fails will fail the build upon error.
- does have a non-trivial test suite that runs as autopkgtest
- no new python2 dependency

Problems:
- there is a really trivial autopkgtests (which is good for bootstrapping), but 
does not cover most of the functionality of the package. We should either get a 
more exhaustive autopkgtest testsuite or (as a fallback) a manual test plan

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking not applicable for this kind of code.
- Upstream update history is good
- Debian/Ubuntu update history is good
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- debian/rules is rather clean
- It is not on the lto-disabled list

Problems:
- debian/watch is not present, but the debian maintainer is upstream too :)

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (as far as we can check it)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH (usage is OK inside
  tests)
- no use of user nobody
 (consider at least `grep -Hrn nobody` for it
 and run `find . -user nobody` in source and built binaries)
- use of setuid, but ok because this is not in the -client package but -server 
which already had a security review
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks
- no translation present, but none needed for this case

Problems:
- Some usage of setuid, but ok as this is not in the -client package but 
-server.


** Changed in: nbd (Ubuntu)
   Status: New => Incomplete

** Changed in: nbd (Ubuntu)
 Assignee: Didier Roche-Tolomelli (didrocks) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054480

Title:
  [MIR] nbd-client

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nbd/+bug/2054480/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2048781] Re: [MIR] authd

2024-02-28 Thread Didier Roche-Tolomelli
We agreed during the MIR meeting that a generic tooling as part of
debhelper would be the best way, didn’t we?

See my arguments above different upstream policies in different source
packages, where if we start introducing this in a per-package base, that
would create divergences between projects. Does it make sense to have
this centrally managed (by our Rust toolchain expert, ideally?).

That way, we can go beyond trimming the windows crates, like tree
shaking and so on?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048781

Title:
  [MIR] authd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2048781/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs