Bug 1143836

Summary: engine-manage-domains does not honor the --ldapservers flag in a correct way
Product: Red Hat Enterprise Virtualization Manager Reporter: Martin Tessun <mtessun>
Component: ovirt-engineAssignee: Nobody <nobody>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 3.4.0CC: ecohen, gklein, iheim, lpeer, rbalakri, Rhev-m-bugs, yeylon
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-09-19 14:35:47 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Martin Tessun 2014-09-18 06:04:09 UTC
Description of problem:
When adding an IPA domain without DNS SRV entries, but specifying --ldapservers, the setup still complains about no KDC servers available, although it should use the ldap-servers as KDC.

Example:
[root@rhevm ~]# host -t SRV _kerberos._tcp.example.com
Host _kerberos._tcp.example.com not found: 3(NXDOMAIN)
[root@rhevm ~]# host -t SRV _ldap._tcp.example.com
Host _ldap._tcp.example.com not found: 3(NXDOMAIN)

[root@rhevm ~]# engine-manage-domains add --domain=example.com --provider=IPA --user=admin --ldap-servers=ldap.example.com
No KDC can be obtained for domain example.com
[root@rhevm ~]# 


Version-Release number of selected component (if applicable):
RHEV-M 3.4.2

How reproducible:
always

Steps to Reproduce:
1. Setup an IPA Server without DNS
2. Try to add this IPA Server to RHEV using --ldapservers, as described above
3. Use dnsmasq to provide _kerberos._tcp. SRV entry
4. Try (2) again. Now it works

Actual results:
Although --resolve-kdc is not specified KDC is looked up as DNS SRV record. This should not be the case.

Expected results:
--ldapservers should check for the kerberos on the same host, as described in the manpage. Only adding --resolve-kdc should try to resolve the KDC via DNS SRV entry

Comment 2 Martin Tessun 2014-09-19 14:35:47 UTC

*** This bug has been marked as a duplicate of bug 1136087 ***