Bug 1781153
Summary: | After upgrade AD Trust Agents were removed from LDAP [rhel-7.7.z] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | RAD team bot copy to z-stream <autobot-eus-copy> |
Component: | ipa | Assignee: | Florence Blanc-Renaud <frenaud> |
Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 7.7 | CC: | abokovoy, aheverle, frenaud, ksiddiqu, mpolovka, rcritten, tborcin, tscherf |
Target Milestone: | rc | Keywords: | Regression, ZStream |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ipa-4.6.5-11.el7_7.4 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | 1778777 | Environment: | |
Last Closed: | 2020-02-04 19:32:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1778777 | ||
Bug Blocks: |
Description
RAD team bot copy to z-stream
2019-12-09 12:41:03 UTC
Manually verified using following steps, automation pending. [root@ci-vm-10-0-137-248 ~]# rpm -q ipa-server ipa-server-4.6.5-11.el7_7.4.x86_64 [root@ci-vm-10-0-137-248 ~]# hostname -f ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.com [root@ci-vm-10-0-137-248 ~]# ipa-server-install --setup-dns --domain dom-$(hostname -f) --realm DOM-$(hostname -f | tr '[:lower:]' '[:upper:]') -a Secret123 -p Secret123 -U --auto-forwarders [root@ci-vm-10-0-137-248 ~]# ipa-adtrust-install --add-agents --add-sids [root@ci-vm-10-0-137-248 ~]# ldapsearch -xLLL -D "cn=directory manager" -w "Secret123" -b "cn=adtrust agents,cn=sysaccounts, cn=etc, dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com" objectClass: GroupOfNames objectClass: top objectClass: nestedgroup cn: adtrust agents memberOf: cn=ADTrust Agents,cn=privileges,cn=pbac,dc=dom-ci-vm-10-0-137-248,dc =hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com memberOf: cn=System: Read system trust accounts,cn=permissions,cn=pbac,dc=dom- ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com member: krbprincipalname=cifs/ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.co m.upshift.rdu2.redhat.com,cn=services,cn=accoun ts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com member: fqdn=ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.com,cn=computers,cn =accounts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc =com [root@ci-vm-10-0-137-248 ~]# cat delete_fqdn.ldif dn: cn=adtrust agents,cn=sysaccounts,cn=etc,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com changetype: modify delete: member member: fqdn=ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.com,cn=computers,cn=accounts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com [root@ci-vm-10-0-137-248 ~]# ldapmodify -D cn=directory\ manager -w Secret123 -h 10.0.137.248 -f delete_fqdn.ldif modifying entry "cn=adtrust agents,cn=sysaccounts,cn=etc,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com" root@ci-vm-10-0-137-248 ~]# ldapsearch -xLLL -D "cn=directory manager" -w "Secret123" -b "cn=adtrust agents,cn=sysaccounts, cn=etc, dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com" dn: cn=adtrust agents,cn=sysaccounts,cn=etc,dc=dom-ci-vm-10-0-137-248,dc=hoste d,dc=upshift,dc=rdu2,dc=redhat,dc=com objectClass: GroupOfNames objectClass: top objectClass: nestedgroup cn: adtrust agents memberOf: cn=ADTrust Agents,cn=privileges,cn=pbac,dc=dom-ci-vm-10-0-137-248,dc =hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com memberOf: cn=System: Read system trust accounts,cn=permissions,cn=pbac,dc=dom- ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com member: krbprincipalname=cifs/ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.co m.upshift.rdu2.redhat.com,cn=services,cn=accoun ts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com [root@ci-vm-10-0-137-248 ~]# ipa-server-upgrade ... hbac service systemd-user already exists [Setup PKINIT] [Enable certauth] The IPA services were upgraded The ipa-server-upgrade command was successful [root@ci-vm-10-0-137-248 ~]# ldapsearch -xLLL -D "cn=directory manager" -w "Secret123" -b "cn=adtrust agents,cn=sysaccounts, cn=etc, dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com" dn: cn=adtrust agents,cn=sysaccounts,cn=etc,dc=dom-ci-vm-10-0-137-248,dc=hoste d,dc=upshift,dc=rdu2,dc=redhat,dc=com objectClass: GroupOfNames objectClass: top objectClass: nestedgroup cn: adtrust agents memberOf: cn=ADTrust Agents,cn=privileges,cn=pbac,dc=dom-ci-vm-10-0-137-248,dc =hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com memberOf: cn=System: Read system trust accounts,cn=permissions,cn=pbac,dc=dom- ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com member: krbprincipalname=cifs/ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.co m.upshift.rdu2.redhat.com,cn=services,cn=accoun ts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc=com member: fqdn=ci-vm-10-0-137-248.hosted.upshift.rdu2.redhat.com,cn=computers,cn =accounts,dc=dom-ci-vm-10-0-137-248,dc=hosted,dc=upshift,dc=rdu2,dc=redhat,dc =com Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:0378 |