Bug 1034236
| Summary: | ldap ssl connections fails to load LDAP groups available for role | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [JBoss] JBoss Operations Network | Reporter: | Sunil Kondkar <skondkar> | ||||||
| Component: | UI | Assignee: | Simeon Pinder <spinder> | ||||||
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Mike Foley <mfoley> | ||||||
| Severity: | urgent | Docs Contact: | |||||||
| Priority: | unspecified | ||||||||
| Version: | JON 3.2 | CC: | skondkar, spinder | ||||||
| Target Milestone: | CR01 | ||||||||
| Target Release: | JON 3.2.0 | ||||||||
| Hardware: | Unspecified | ||||||||
| OS: | Unspecified | ||||||||
| Whiteboard: | |||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | Type: | Bug | |||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Bug Depends On: | |||||||||
| Bug Blocks: | 1012435 | ||||||||
| Attachments: |
|
||||||||
|
Description
Sunil Kondkar
2013-11-25 13:21:05 UTC
Created attachment 828671 [details]
Screenshot_RoleAssignment_UI
Created attachment 828672 [details]
Server_log
added GA blocker to flag this for discussion and triage sunil ... can you verify the validity of this BZ ... "Caused by: org.rhq.enterprise.server.exception.LdapCommunicationException: javax.naming.ServiceUnavailableException: 10.65.201.128:636; socket closed" -- that probably means SSL is not set up correctly. skondkar did not write in the BZ if he imported any server certificate or public key etc. into his JON jvm. If he did not, then SSL handshake probably failed and the LDAP-server closed the connection for that reason Tested with JON 3.2 alpha53 build where the SSL connection was working.. (Version: 3.2.0.ALPHA_QA Build Number: 1878d58:5e6b489 ) More details on steps: 1. Navigate to Administration->system Settings 2. Enter below details in LDAP Configuration Properties: 3. Enable LDAP : Yes 4. Search Base: dc=pnq,dc=redhat,dc=com 5. Username: cn=Administrator,cn=users,dc=pnq,dc=redhat,dc=com 6. Password: redhat 7. Search Filter: objectclass=* 8. Group Search Filter: objectclass=group 9. Group Member Filter: member 10. Use Group Query Paging: Yes 11. Group Search Page Size: 1000 12. Is PosixGroup: No 13. Login Property: cn 14. LDAP URL: ldap://10.65.201.128:636 15. SSL: Yes 16. Click save 17. Navigate to role assignment UI. The connection works on JON3.2 Alpha53 build and displays available LDAP groups in role assignment UI The connection fails to display LDAP roles in JON3.2 ER7 build as described in the bug. This is fixed with commit e5887ddb552e80 to release/jon3.2.x. Moving this to MODIFIED for testing/re-testing with next brew build. The fix is a one line fix in the LDAPGroupManagerBean around ssl handling and does not affect any other functionality. We missed this in manual testing as I am not currently aware of any automated cli or UI testing that covers this specific use case. Automated testing in this area will involve installation, configuration and integration of an additional server with a running JON server. We should put some more effort into this area if possible although if it was easier we would have already added such automation. From the dev side, this is leftover fallout from property migration throughout the product that occurred several months ago. This permutation was not explicitly exercised since that change. Moving to ON_QA for testing in latest(CR1) brew build. Verified on Version : 3.2.0.CR1 Build Number :6ecd678:d0dc0b6 LDAP ssl connection works and LDAP groups are available in role assignment UI. Verified ldap authentication and authorization is working with ssl and non-ssl connections. Verified on Windows 2003 Active directory server and Redhat Directory Server 8.2.0. |