e) Okay. I ported sssd-smart-card-pam-auth-configs-tester.sh and sssd-
softhism2-certificates-tests.sh from noble, along with d/t/control to
the jammy package, and ran the autopkgtests.

The debdiff is attached, and logs from the autopkgtest run are attached
too.

In short:

442s ldap-user-group-ldap-auth PASS
442s ldap-user-group-krb5-auth PASS
442s sssd-softhism2-certificates-tests.sh PASS
442s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2
442s qemu-system-x86_64: terminating on signal 15 from pid 34021 
(/usr/bin/python3)

sssd-softhism2-certificates-tests.sh runs OK, but sssd-smart-card-pam-
auth-configs.sh fails.

437s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required
437s + for alternative in "${alternative_pam_configs[@]}"
437s + pam-auth-update --enable sss-smart-card-optional
437s + cat /etc/pam.d/common-auth
437s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate
437s + echo -n -e 123456
437s #
437s # /etc/pam.d/common-auth - authentication settings common to all services
437s #
437s # This file is included from other service-specific PAM config files,
437s # and should contain a list of the authentication modules that define
437s # the central authentication scheme for use on the system
437s # (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
437s # traditional Unix authentication mechanisms.
437s #
437s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
437s # To take advantage of this, it is recommended that you configure any
437s # local modules either before or after the default block, and use
437s # pam-auth-update to manage selection of other modules.  See
437s # pam-auth-update(8) for details.
437s 
437s # here are the per-package modules (the "Primary" block)
437s auth       [success=2 default=ignore]      pam_unix.so nullok
437s auth       [success=1 default=ignore]      pam_sss.so use_first_pass
437s # here's the fallback if no module succeeds
437s auth       requisite                       pam_deny.so
437s # prime the stack with a positive return value if there isn't one already;
437s # this avoids us returning an error just because nothing sets a success 
code
437s # since the modules above will each just jump around
437s auth       required                        pam_permit.so
437s # and here are more per-package modules (the "Additional" block)
437s auth       optional                        pam_cap.so 
437s # end of pam-auth-update config
437s pamtester: invoking pam_start(login, ubuntu, ...)
437s pamtester: performing operation - authenticate
440s Password: pamtester: Authentication failure
440s + return 2
440s + handle_exit
440s + exit_code=2

So, it would require additional work to fix up these testcases.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2081129

Title:
  libpam-sss: require_cert_auth is not absolute, will fall back to
  password auth on smartcard removal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2081129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to