Bug 1782572
Summary: | "Internal Server Error" reported for minor issues implies IPA is broken [IdmHackfest2019] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Josip Vilicic <jvilicic> |
Component: | ipa | Assignee: | Thomas Woerner <twoerner> |
Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 8.1 | CC: | abokovoy, fcami, frenaud, ksiddiqu, myusuf, pasik, pcech, rcritten, tscherf |
Target Milestone: | rc | Keywords: | TestCaseProvided |
Target Release: | 8.0 | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-28 15:44:43 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Josip Vilicic
2019-12-11 21:14:54 UTC
Upstream ticket: https://pagure.io/freeipa/issue/8163 Fixed upstream master: https://pagure.io/freeipa/c/e2d69380fbae6dab244fce3fd5afe5fdc28a2663 Fixed upstream ipa-4-8: https://pagure.io/freeipa/c/4db18be5467c0b8f7633b281c724f469f907e573 ipa-4-7: https://pagure.io/freeipa/c/f9f822ac10c0a5fffca906d5f5412c8d35adcc18 ~~~~~~~~~~~~~~ older version: ~~~~~~~~~~~~~~ ipa-server-4.8.0-13.module+el8.1.0+4923+c6efe041.x86_64 ipa-server-trust-ad-4.8.0-13.module+el8.1.0+4923+c6efe041.x86_64 ipa-server-dns-4.8.0-13.module+el8.1.0+4923+c6efe041.noarch Default principal: Administrator Valid starting Expires Service principal 03/03/2020 07:38:29 03/03/2020 17:38:29 krbtgt/WIN2016.TEST renew until 03/04/2020 07:38:26 [root@master ~]# [root@master ~]# [root@master ~]# ipa ping ipa: ERROR: cannot connect to 'https://master.testrealm.test/ipa/json': Internal Server Error ~~~~~~~~~~~~~~ Fixed version: ~~~~~~~~~~~~~~ version: ipa-server-trust-ad-4.8.4-6.module+el8.2.0+5773+68ace8c5.x86_64 ipa-server-4.8.4-6.module+el8.2.0+5773+68ace8c5.x86_64 ipa-server-dns-4.8.4-6.module+el8.2.0+5773+68ace8c5.noarch Steps: mentioned in description Actual result: [root@master ~]# kinit etuser1 Password for etuser1: [root@master ~]# ipa ping ipa: ERROR: Insufficient access: SASL(-14): authorization failure: Invalid credentials The error message seems more promising after the fix. Thus marking the bug verifed. Fixed upstream master: https://pagure.io/freeipa/c/a02df530a6b4b5f5f6f9661da33aa2fb0cd47211 Fixed upstream ipa-4-8: https://pagure.io/freeipa/c/90eef2f84d3ad61894a1656c529000072e6cb036 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1640 |