Okay, so running the noble dep8 tests against the plain pre-sru package also fails:
788s autopkgtest [03:29:53]: @@@@@@@@@@@@@@@@@@@@ summary 788s ldap-user-group-ldap-auth PASS 788s ldap-user-group-krb5-auth PASS 788s sssd-softhism2-certificates-tests.sh PASS 788s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2 788s qemu-system-x86_64: terminating on signal 15 from pid 12145 (/usr/bin/python3) The failure is the same. 622s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 623s + for alternative in "${alternative_pam_configs[@]}" 623s + pam-auth-update --enable sss-smart-card-optional 623s + cat /etc/pam.d/common-auth 623s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 623s + echo -n -e 123456 623s # 623s # /etc/pam.d/common-auth - authentication settings common to all services 623s # 623s # This file is included from other service-specific PAM config files, 623s # and should contain a list of the authentication modules that define 623s # the central authentication scheme for use on the system 623s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 623s # traditional Unix authentication mechanisms. 623s # 623s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 623s # To take advantage of this, it is recommended that you configure any 623s # local modules either before or after the default block, and use 623s # pam-auth-update to manage selection of other modules. See 623s # pam-auth-update(8) for details. 623s 623s # here are the per-package modules (the "Primary" block) 623s auth [success=2 default=ignore] pam_unix.so nullok 623s auth [success=1 default=ignore] pam_sss.so use_first_pass 623s # here's the fallback if no module succeeds 623s auth requisite pam_deny.so 623s # prime the stack with a positive return value if there isn't one already; 623s # this avoids us returning an error just because nothing sets a success code 623s # since the modules above will each just jump around 623s auth required pam_permit.so 623s # and here are more per-package modules (the "Additional" block) 623s auth optional pam_cap.so 623s # end of pam-auth-update config 623s pamtester: invoking pam_start(login, ubuntu, ...) 623s pamtester: performing operation - authenticate 626s Password: pamtester: Authentication failure 626s + return 2 626s + handle_exit 626s + exit_code=2 Thus, the patch is not causing the testfailure, as it failed before the SRU. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2081129 Title: libpam-sss: require_cert_auth is not absolute, will fall back to password auth on smartcard removal To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2081129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs