Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature: Ubuntu 22 Support #534

Open
2 tasks done
akertis opened this issue Sep 13, 2024 · 5 comments
Open
2 tasks done

Feature: Ubuntu 22 Support #534

akertis opened this issue Sep 13, 2024 · 5 comments

Comments

@akertis
Copy link

akertis commented Sep 13, 2024

Is there an existing request for this feature?

  • I have searched the existing issues and found none that matched mine

Describe the feature

Ubuntu 22 support. Intune still doesn't support Ubuntu 24 and Ubuntu 22 still needs to be used until Ubuntu 24 support is rolled out for Intune.

Describe the ideal solution

PPA repo has Ubuntu 22 packages that will work similarly to how it configured on Ubuntu 24.

Alternatives and current workarounds

No response

System information and logs

Environment

  • broker version: please run snap info authd-msentraid
  • authd version: please run /usr/libexec/authd version
  • gnome shell version: please run apt policy gnome-shell
  • Distribution: (NAME in /etc/os-release)
  • Distribution version: (VERSION_ID on /etc/os-release):

Log files

Please redact/remove sensitive information:

Authd entries:

journalctl -u authd.service

MS Entra ID broker entries:

journalctl -u snap.authd-msentraid.authd-msentraid.service

Application settings

Please redact/remove sensitive information:

Broker configuration:

cat /var/snap/authd-msentraid/current/broker.conf

Broker authd configuration:

cat /etc/authd/brokers.d/msentraid.conf

Relevant information

No response

Double check your logs

  • I have redacted any sensitive information from the logs
@3v1n0
Copy link
Collaborator

3v1n0 commented Sep 29, 2024

While authd per se can easily support Ubuntu 22.04, this implies some non-trivial work in the GDM side of it.

@namato1
Copy link

namato1 commented Oct 9, 2024

You can also get intune to work on 24.04. It takes some effort, but it's working well right now for us

@valluwtf
Copy link

While authd per se can easily support Ubuntu 22.04, this implies some non-trivial work in the GDM side of it.

do you think it would be an option to offer authd for 22.04 Ubuntu Server until the gdm side is implemented? it would be great for us as we still have a lot of 22.04 servers

@3v1n0
Copy link
Collaborator

3v1n0 commented Oct 14, 2024

Server version would just work I think, although we may need to backport openssh/openssh-portable#452 to 22.04, but it shouldn't be a big issue since the patch is already part of 24.04.

It looks like compiling the nss module is more problematic in 22.04 right now (as per some rust debian toolchain lacks), so that would also require some dedication. At the same time, authd (the daemon) and the "pure" PAM sides are all working properly in 22.04 right now.

3v1n0 added a commit that referenced this issue Oct 17, 2024
…ame (#584)

We forget to update this.

Also in this way authd can be easily compiled on other versions such as
22.04,
and in case that we forget to update this value when bumping our go.mod
toolchain, then we'll fail at debian build phase (as expected)

Helps: #534
@michaelwildvarian
Copy link

michaelwildvarian commented Nov 6, 2024

Problem for 22.04 is the Go compiler version (I opted for the PPA) and that dh-rust does not expect the vendored packages to be in vendor_rust/, but only in debian/cargo_registry/. Also, dh_dwz does not yet have the exception-rule for Go, so override_dh_dwz is needed in debian/rules.

If it is desired, I could clean up my patches and submit as PR. But as was previously mentioned, this won't be sufficient to get Authd to be useful on 22.04 alone due to GDM and SSHD also needing changes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants