No description
Find a file
Denison Barbosa 4bf36659c1
Properly disable Kerberos usage in AD tests (#1381)
We can't use Kerberos in the tests without a proper Kerberos server.
However, we were not propagating the actual disablement to the code,
which was resulting in Kerberos being enabled on all tests.

UDENG-9401
2026-03-18 05:37:33 -04:00
.github deps(ci): bump peter-evans/create-pull-request from 7 to 8 (#1353) 2026-02-06 07:52:18 -04:00
cmd Remove deprecated key from dconf definitions 2025-10-28 08:18:13 -04:00
conf.example [Changed] Adsys configuration example gpo list timeout to 10 seconds 2024-09-13 10:22:08 -03:00
debian Release adsys 0.16.4 2025-11-24 06:43:06 -04:00
docs ensure nested certs dir is embedded for docs tests 2026-03-10 10:59:29 +00:00
e2e Update Jammy/Noble patches for the e2e tests 2025-10-28 09:03:54 -04:00
installer
internal Properly disable Kerberos usage in AD tests 2026-03-13 09:08:30 -04:00
pam Fix issues pointed by linter 2025-11-13 08:55:06 -04:00
po
policies Refresh policy definition files 2026-01-28 02:56:26 +00:00
systemd
tools deps(go-tools): bump github.com/golangci/golangci-lint/v2 in /tools 2025-11-17 12:08:29 +00:00
.clang-format
.gitignore
.golangci.yaml Update golangci-lint to v2 and migrate its config 2025-09-04 22:49:10 +02:00
adsys.pb.go Regenerate proto files 2025-09-04 23:54:05 +02:00
adsys.proto
adsys_grpc.pb.go Regenerate proto files 2025-09-04 23:54:05 +02:00
CONTRIBUTING.md
generate.go
go.mod deps(go): bump google.golang.org/grpc/cmd/protoc-gen-go-grpc from 1.5.1 to 1.6.0 (#1343) 2026-02-06 07:51:34 -04:00
go.sum deps(go): bump google.golang.org/grpc/cmd/protoc-gen-go-grpc from 1.5.1 to 1.6.0 (#1343) 2026-02-06 07:51:34 -04:00
LICENSE
NOTICE
package-build-tool.go
README.md fix quality badge 2025-12-05 14:00:47 +00:00
SECURITY.md change to adsysctl for version check 2024-12-09 14:38:47 +00:00

adsys

Active Directory GPO support.

Code quality Code coverage Go Reference Go Report Card License

Documentation and Usage

The documentation and the command line reference is available on Read The Docs as well as the documentation for the current development release.

Installing development versions

For every commit on the main branch of the adsys repository, the GitHub Actions CI builds a development version of the adwatchd project. This is NOT a stable version of the application and should not be used for production purposes. However, it may prove useful to preview features or bugfixes not yet available as part of a stable release.

To get access to the build artifact you need to be logged in on GitHub. Then, click on any passing run of the QA workflow that has the Windows tests for adwatchd job, and look for the adwatchd_setup file.

Troubleshooting

If AD authentication works but adsys fails to fetch GPOs (e.g. you see can't get policies errors on login), please perform the following steps:

  1. Add the following to /etc/samba/smb.conf:
log level = 10
  1. Run sudo login {user}@{domain} in a terminal, replacing with your AD credentials

  2. Paste the output in the bug report

The adsysctl command can also be useful to fetch logs for the daemon and client:

# You can increase the amount of information that will be displayed by using a more verbose tag (-vv or -vvv).
# Note that this command will start a watcher that will print logs as they are generated, so you will need to perform
# actions (such as trying to login) while the command is running.
adsysctl service cat -v

Additionally, you can check the system journal to look at more logs about adsys: Remember that adsys runs with privileges, so you will need to run the following commands as root.

# You can use the -b flag to control how many boots the log will show (e.g. -b 0 will show the current boot only)
journalctl -b0 | grep adsys

# You can also get the logs of the individual units:
systemctl list-units | grep adsys # this will show all adsys related systemd units

# The -u flag will show the logs of the specified unit
journalctl -b0 -u adsysd.service # this command will only show the adsysd.service logs of the current boot