Bug 1031073 - sss_cache does not povide options to invalidate sudo rules from cache
Summary: sss_cache does not povide options to invalidate sudo rules from cache
Status: CLOSED DUPLICATE of bug 1031074
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: sssd
Version: 6.4
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: Jakub Hrozek
QA Contact: Kaushik Banerjee
Depends On:
Blocks: 1031074
TreeView+ depends on / blocked
Reported: 2013-11-15 14:51 UTC by Ron van der Wees
Modified: 2020-05-02 17:28 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 1031074 (view as bug list)
Last Closed: 2013-12-03 13:23:29 UTC
Target Upstream Version:

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 3123 0 None None None 2020-05-02 17:28:11 UTC
Red Hat Knowledge Base (Solution) 542803 0 None None None Never

Description Ron van der Wees 2013-11-15 14:51:47 UTC
Description of problem:
The sss_cache utility performs cleanups of the SSSD cache. Currently there is no option to clear the cached sudo rules.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. Configure IPA server and add sudo rules
2. Configure SSSD client and enable sudo caching as per the RHEL-6 Identity
   Management guide as found at:
3. Use sudo to cache some rules
4. Check the cache with
ldbsearch -H /var/lib/sss/db/cache_<domain>.ldb \
  -b cn=sudorules,cn=custom,cn=LDAP,cn=sysdb
5. Invalidate the cached sudo rules with sss_cache

Actual results:
The sss_cache utility does not have options to invalidate the sudo rules.

Expected results:
Same as with for example users and groups, be able to invalidate the cached
sudo rules with sss_cache.

Additional info:
Upstream ticket: https://fedorahosted.org/sssd/ticket/2081

Comment 1 Jakub Hrozek 2013-11-15 15:08:19 UTC
Upstream ticket:

Comment 4 Jakub Hrozek 2013-12-03 13:23:29 UTC
With comment #3 in mind I'm going to close this report and track the RFE in the RHEL7 bugzilla for the time being.

*** This bug has been marked as a duplicate of bug 1031074 ***

Note You need to log in before you can comment on or make changes to this bug.