Bug 2227831
| Summary: | Interrupt request processing in ipadb_fill_info3() if connection to 389ds is lost [rhel-9] | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Julien Rische <jrische> | |
| Component: | ipa | Assignee: | Julien Rische <jrische> | |
| Status: | CLOSED ERRATA | QA Contact: | Ganna Kaihorodova <gkaihoro> | |
| Severity: | high | Docs Contact: | Filip Hanzelka <fhanzelk> | |
| Priority: | high | |||
| Version: | 9.2 | CC: | abokovoy, bgollahe, cheimes, frenaud, gfialova, gkaihoro, ipa-qe, jrische, mpolovka, pkulkarn, rakkumar, rcritten, sumenon, tmihinto, tscherf | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.10.2-3.el9 | Doc Type: | Bug Fix | |
| Doc Text: |
.`ipa-kdb` no longer causes `krb5kdc` to fail
Previously, the `ipa-kdb` driver did not differentiate between the absence of a server host object and a connection failure. Consequently, the `krb5kdc` server sometimes stopped unexpectedly because of a `NULL` LDAP context produced by a connection issue with the LDAP server.
With this update, the `ipa-kdb` driver correctly identifies connection failures and differentiates between them and the absence of a server host object. As a result, the `krb5kdc` server does not fail anymore.
|
Story Points: | --- | |
| Clone Of: | 2214638 | |||
| : | 2230074 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-07 08:34:14 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 2214638, 2227832 | |||
| Bug Blocks: | 2230074 | |||
| Deadline: | 2023-08-07 | |||
|
Description
Julien Rische
2023-07-31 15:45:23 UTC
Fixed upstream master: https://pagure.io/freeipa/c/c84c59c66f1b22ebc671960cae90088a024d2d62 Fixed upstream ipa-4-10: https://pagure.io/freeipa/c/fd32e6a3d95f28d2d11d41ee5dabb0d563cb5d51 ipa-4-9: https://pagure.io/freeipa/c/b5793c854035a122ed4c66f917cc427e5024e46a Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ipa bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6477 |