Bug 1724521

Summary: goa-daemon spams log file due to expired Kerberos logins
Product: Red Hat Enterprise Linux 7 Reporter: Florian Faltermeier <florian.faltermeier>
Component: gnome-online-accountsAssignee: Debarshi Ray <debarshir>
Status: CLOSED DUPLICATE QA Contact: Desktop QE <desktop-qa-list>
Severity: medium Docs Contact:
Priority: medium    
Version: 7.6CC: brclark, jwedgeco, pbhoot, thalunil-redhat-bugzilla, tpelka
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-03-06 16:50:34 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Florian Faltermeier 2019-06-27 08:26:56 UTC
Description of problem:


Jun 27 10:03:54 zid-gpl journal: goa_provider_get_for_provider_type: assertion 'provider_type != NULL' failed
Jun 27 10:03:54 zid-gpl journal: Unsupported account type (null) for identity (null) (no provider)
Jun 27 10:03:54 zid-gpl journal: Unsupported account type (null) for ID account_1560933624_45994 (no provider)


See also:

https://bugzilla.redhat.com/show_bug.cgi?id=1601438
https://bugzilla.redhat.com/show_bug.cgi?id=1379070

Comment 3 Debarshi Ray 2020-03-06 16:50:34 UTC

*** This bug has been marked as a duplicate of bug 1722210 ***