RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1265915 - idoverrideuser-find fails if any SID anchor is not resolvable anymore
Summary: idoverrideuser-find fails if any SID anchor is not resolvable anymore
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ipa
Version: 7.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: IPA Maintainers
QA Contact: Namita Soman
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-09-24 07:22 UTC by Sudhir Menon
Modified: 2016-11-04 05:46 UTC (History)
4 users (show)

Fixed In Version: ipa-4.4.0-0.el7.1.alpha1
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-11-04 05:46:53 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2016:2404 0 normal SHIPPED_LIVE ipa bug fix and enhancement update 2016-11-03 13:56:18 UTC

Description Sudhir Menon 2015-09-24 07:22:57 UTC
Description of problem: When AD trust is deleted post winsync migrate, the Default trust View is not listed in UI. 


Version-Release number of selected component (if applicable): 


How reproducible: Always.


Steps to Reproduce:
1. Establish Winsync Agreement with AD
2. Ensure users are replicated to IPA.
3. Now AD trust with POSIX i.e ipa trust-add --range-type='ipa-ad-trust-posix'
4. Ensure trust is established successfully
5. Ensure that the users are listed in 'Default Trust View'
6. Now delete the trust.

Actual results:
The trust gets removed successfully, but when we navigate to IDViews tab it displays the below error in UI

Operations Error:  invalid 'sid': SID is not valid
An error has occurred (IPA Error 3009: ValidationError)

Error on Console.
[root@ipa01 ipa]# ipa idoverrideuser-find "Default Trust View"
ipa: ERROR: invalid 'sid': SID is not valid


Expected results:
Should the ID Views be removed here? Default Trust View shouldn't be removed.
If they are to be removed, shouldn't we fix the error seen on the UI and console.

Additional info:

Comment 2 Tomas Babej 2015-09-24 08:58:03 UTC
Upstream ticket:
https://fedorahosted.org/freeipa/ticket/5322

Comment 3 Tomas Babej 2015-09-24 08:58:25 UTC
The "Default Trust View" should not be removed after the trust is deleted. However, the failure of idoverrideuser-find is a legitimate one, it should be able to cope with SIDs that are no longer resolvable.

Comment 4 Petr Vobornik 2015-10-19 20:51:48 UTC
master:
    4c2276f7ec9a049ea9088030b23badecd88c73e4 idoverride: Ignore ValidationErrors when converting the anchor
    eaeb40328cf80f615684ffc692b9416e1c08d544 tests: Add tests for idoverride object integrity 

ipa-4-2:
    52680a1a08a040b99e1a843126f5588e14237691 idoverride: Ignore ValidationErrors when converting the anchor
    cc085d240dc4c6a02ef39752043059c1d35b591a tests: Add tests for idoverride object integrity

Comment 5 Mike McCune 2016-03-28 22:43:24 UTC
This bug was accidentally moved from POST to MODIFIED via an error in automation, please see mmccune with any questions

Comment 7 Sudhir Menon 2016-07-21 07:18:22 UTC
Default Trust View is not removed.
Also the SID's are also handled which are no longer resolvable.

Fix is seen in ipa-server-4.4.0-2.1.el7.x86_64


[root@server ~]# ipa idoverrideuser-find
ID View Name: Default Trust View
---------------------------
5 User ID overrides matched
---------------------------
  Anchor to override: user1
  User login: user1
  UID: 1081400003
  GECOS: user1
  GID: 1081400003
  Login shell: /bin/sh

  Anchor to override: user2
  User login: user2
  UID: 1081400001
  GECOS: user2
  GID: 1081400001
  Login shell: /bin/sh

  Anchor to override: user3
  User login: user3
  UID: 1081400004
  GECOS: user3
  GID: 1081400004
  Login shell: /bin/sh

  Anchor to override: user4
  User login: user4
  UID: 1081400005
  GECOS: t
  GID: 1081400005
  Login shell: /bin/sh

  Anchor to override: user5
  User login: user5
  UID: 1081400006
  GECOS: user5
  GID: 1081400006
  Login shell: /bin/sh
----------------------------
Number of entries returned 5
----------------------------
[root@server ~]# ipa trust-del pne.qe
----------------------
Deleted trust "pne.qe"
----------------------
[root@server ~]# ipa idoverrideuser-find 'Default Trust View'
---------------------------
5 User ID overrides matched
---------------------------
  Anchor to override: :SID:S-1-5-21-3912719521-1967590360-1136226524-1403
  User login: user1
  UID: 1081400003
  GECOS: user1
  GID: 1081400003
  Login shell: /bin/sh

  Anchor to override: :SID:S-1-5-21-3912719521-1967590360-1136226524-1405
  User login: user2
  UID: 1081400001
  GECOS: user2
  GID: 1081400001
  Login shell: /bin/sh

  Anchor to override: :SID:S-1-5-21-3912719521-1967590360-1136226524-1413
  User login: user3
  UID: 1081400004
  GECOS: user3
  GID: 1081400004
  Login shell: /bin/sh

  Anchor to override: :SID:S-1-5-21-3912719521-1967590360-1136226524-1415
  User login: user4
  UID: 1081400005
  GECOS: t
  GID: 1081400005
  Login shell: /bin/sh

  Anchor to override: :SID:S-1-5-21-3912719521-1967590360-1136226524-1419
  User login: user5
  UID: 1081400006
  GECOS: user5
  GID: 1081400006
  Login shell: /bin/sh
----------------------------
Number of entries returned 5
----------------------------

Comment 9 errata-xmlrpc 2016-11-04 05:46:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-2404.html


Note You need to log in before you can comment on or make changes to this bug.