Red Hat Bugzilla – Bug 1442932
ipa restore fails to restore IPA user
Last modified: 2017-08-01 05:48:56 EDT
Description of problem: ipa restore fails to restore IPA user after restoring backup which contains specified IPA User. Version-Release number of selected component (if applicable): # rpm -qa ipa-server selinux-policy 389-ds-base pki-server selinux-policy-3.13.1-142.el7.100.noarch ipa-server-4.5.0-6.el7.x86_64 pki-server-10.4.1-1.el7.noarch 389-ds-base-1.3.6.1-7.el7.x86_64 How reproducible: 100% Steps to Reproduce: 1. Install IPA server on fresh installation 2. Create a IPA user 3. Take a full backup of IPA server 4. Uninstall IPA server 5. Restore backup using ipa-restore 6. Check if user exists Actual results: IPA User not found Expected results: IPA user should be available
Created attachment 1272225 [details] console.log
Is the test correct? The user is added with: [root@ipaserver01 ~]# echo Password | ipa user-add --first testuser1 --last testuser1 testuser1 --password but checked with: [root@ipaserver01 ~]# ipa user-find f@TESTRELM.TEST which is completely different user
(In reply to Petr Vobornik from comment #4) > Is the test correct? > > The user is added with: > > [root@ipaserver01 ~]# echo Password | ipa user-add --first testuser1 --last > testuser1 testuser1 --password > > but checked with: > > [root@ipaserver01 ~]# ipa user-find f@TESTRELM.TEST > > which is completely different user My bad. I meant to say [root@ipaserver01 ~]# ipa user-find testuser1@TESTRELM.TEST
Tried, backup and restore. It works for me, but I encountered other issue after backup which looks like bug 1436642 - user find ended with "RuntimeError: maximum recursion depth exceeded in cmp". After # systemctl restart gssproxy # systemctl restart httpd.service # kdestroy -A # kinit admin User find returned expected output (test user was there). # rpm -q ipa-server gssproxy mod_auth_gssapi ipa-server-4.5.0-7.el7.x86_64 gssproxy-0.7.0-3.el7.x86_64 mod_auth_gssapi-1.5.1-2.el7.x86_64
Upstream ticket: https://pagure.io/freeipa/issue/6902
Fixed upstream master: https://pagure.io/freeipa/c/3a4c8e39c3e38ec651cfcbb3cac59e0e92e04fe0 ipa-4-5: https://pagure.io/freeipa/c/04ed1fa3acdf002ecc37dde4f5d226c0fbe5aa30
Verified using IPA server :: ipa-server-4.5.0-9.el7.x86_64 Marking BZ as verified.
Created attachment 1275850 [details] console.log
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:2304