Bug 1833266
| Summary: | [dirsrv] set 'nsslapd-enable-upgrade-hash: off' as this raises warnings | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Andreas Bleischwitz <ableisch> | |
| Component: | ipa | Assignee: | Thomas Woerner <twoerner> | |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
| Severity: | high | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 8.2 | CC: | abokovoy, cheimes, ksiddiqu, mreynolds, pcech, rcritten, sumenon, tscherf | |
| Target Milestone: | rc | Keywords: | TestCaseProvided | |
| Target Release: | 8.2 | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.8.7-1 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1833515 (view as bug list) | Environment: | ||
| Last Closed: | 2020-11-04 02:50:41 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1833515 | |||
|
Description
Andreas Bleischwitz
2020-05-08 09:20:20 UTC
The change to do password-schema updates was introduced with this: https://pagure.io/389-ds-base/issue/49421 Upstream ticket: https://pagure.io/freeipa/issue/8315 DS upstream ticket to update schema to include "nsslapd-enable-upgrade-hash": https://pagure.io/389-ds-base/issue/51078 Fixed in upstream master: * https://pagure.io/freeipa/c/aa341020c883b3d8e6117f6f515f5ed0e19c04e7 Disable password schema update on LDAP bind ipa-4-8: * https://pagure.io/freeipa/c/27656669f7126ef92272530118d2d52122bb3008 Disable password schema update on LDAP bind Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:4670 |