Bug 1651834
| Summary: | searching for ipa users by certificate fails | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | joel <jwooten> | |
| Component: | ipa | Assignee: | IPA Maintainers <ipa-maint> | |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 7.6 | CC: | frenaud, kresss, mrhodes, myusuf, ndehadra, pvoborni, rcritten, ssidhaye, tscherf | |
| Target Milestone: | rc | Keywords: | Regression, ZStream | |
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.6.5-1.el7 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1659492 (view as bug list) | Environment: | ||
| Last Closed: | 2019-08-06 13:09:16 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1659492 | |||
|
Description
joel
2018-11-21 01:33:44 UTC
Note: issue is reproducible on 7.6 but not on 7.5, hence I am adding the Regression keyword. Example of back-end LDAP query resulting from the query: [20/Nov/2018:12:23:20.798191384 -0800] conn=174 op=0 BIND dn="" method=sasl version=3 mech=GSS-SPNEGO [20/Nov/2018:12:23:20.803536777 -0800] conn=174 op=0 RESULT err=0 tag=97 nentries=0 etime=0.0005518597 dn="uid=admin,cn=users,cn=accounts,dc=ipa,dc=corp,dc=example,dc=com" [20/Nov/2018:12:23:20.820725143 -0800] conn=174 op=1 SRCH base="cn=ipaconfig,cn=etc,dc=ipa,dc=corp,dc=example,dc=com" scope=0 filter="(objectClass=*)" attrs=ALL [20/Nov/2018:12:23:20.821582814 -0800] conn=174 op=1 RESULT err=0 tag=101 nentries=1 etime=0.0000957180 [20/Nov/2018:12:23:20.823373463 -0800] conn=174 op=2 SRCH base="cn=users,cn=accounts,dc=ipa,dc=corp,dc=example,dc=com" scope=1 filter="(&(objectClass=posixaccount)(userCertificate=<ipalib.x509.IPACertificate object at 0x7fc0a5575b90>))" attrs="telephoneNumber sshpubkeyfp ipaSshPubKey uid krbCanonicalName title loginShell homeDirectory uidNumber gidNumber sn userCertificate mail krbPrincipalName givenName nsAccountLock" [20/Nov/2018:12:23:20.823971607 -0800] conn=174 op=2 RESULT err=0 tag=101 nentries=0 etime=0.0000692357 [20/Nov/2018:12:23:20.824984586 -0800] conn=174 op=3 UNBIND Upstream ticket: https://pagure.io/freeipa/issue/7770 Fixed upstream master: https://pagure.io/freeipa/c/372c2fc99021c037f00a6819baa44b64900de479 https://pagure.io/freeipa/c/d2fa2ecb4be1e00a2b5f45ed0129175fc5f4dbb1 ipa-4-7: https://pagure.io/freeipa/c/77d814b73ff7d8237b249922c46ec0d2ee2a96df https://pagure.io/freeipa/c/769003074a63faec7da29194eddb777a319d2729 Fixed upstream ipa-4-6: https://pagure.io/freeipa/c/d9cbf8bfe4b64a3834f81220b104285531786e71 https://pagure.io/freeipa/c/653934071fdb1f71d83f230359531b631a0fb959 Automation added in test_xmlrpc/test_host_plugin.py::TestCRUD::test_simple_update test_xmlrpc/test_user_plugin.py::TestUser::test_find_cert Build used for verification: [root@master ~]# rpm -qa ipa-server ipa-server-4.6.5-7.el7.x86_64 [root@master ~]# openssl req -x509 -newkey rsa:2048 -days 365 -nodes -keyout private.key -out cert.pem -subj '/CN=jdoe2' Generating a 2048 bit RSA private key ..........................................+++ ..........................................................+++ writing new private key to 'private.key' ----- [root@master ~]# openssl x509 -outform der -in cert.pem -out cert.der [root@master ~]# [root@master ~]# ipa user-add jdoe2 --first=jdoe2 --last=jdoe2 --certificate="$(base64 cert.der)" ------------------ Added user "jdoe2" ------------------ User login: jdoe2 First name: jdoe2 Last name: jdoe2 Full name: jdoe2 jdoe2 Display name: jdoe2 jdoe2 Initials: jj Home directory: /home/jdoe2 GECOS: jdoe2 jdoe2 Login shell: /bin/sh Principal name: jdoe2 Principal alias: jdoe2 Email address: jdoe2 UID: 811200005 GID: 811200005 Certificate: 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 Password: False Member of groups: ipausers Kerberos keys available: False [root@master ~]# ipa user-find --certificate="$(base64 cert.der)" -------------- 1 user matched -------------- User login: jdoe2 First name: jdoe2 Last name: jdoe2 Home directory: /home/jdoe2 Login shell: /bin/sh Principal name: jdoe2 Principal alias: jdoe2 Email address: jdoe2 UID: 811200005 GID: 811200005 Certificate: MIIC8zCCAdugAwIBAgIJANihM/4qpGlCMA0GCSqGSIb3DQEBCwUAMBAxDjAMBgNVBAMMBWpkb2UyMB4XDTE5MDUxNTA0MTAyMloXDTIwMDUxNDA0MTAyMlowEDEOMAwGA1UEAwwFamRvZTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC92lsqMDZkrS3IZRdJOhs3xpCpIKyTjCC03ny2rgNOegtVGP6NtnApfOBMn1tpCJfcP3WSYF/DEosWMmgyctCfGPbRwePMHLZHJXAX54nbmPiLVsRRmDKq9SChuDadaS6xhFMCkPljcbcsWNkHRK3exfVbyLMg/0D0pDy/KYvoGYhaA1hOHPVPiUSYPV33j/DFlBmIsIUKnuYENn0dppeWlzYICOEewz/y4ihI2f+h8xanFyIwnPnUyTAYbMqCML9lblDW2C72AON5v2jGxdDz6+C/72AEQmq3IfntTLX1zNIdxkM2p+Yfgl53T96TA/lOb2U7AKUiCX95Zj7B+OD1AgMBAAGjUDBOMB0GA1UdDgQWBBQ8K0ct3cl9gQe6asPHa+7AxSbGGTAfBgNVHSMEGDAWgBQ8K0ct3cl9gQe6asPHa+7AxSbGGTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQB/sZvJszJHwpOOM/1aSOgCRQg8GmTG0r4bDIz5moRGLDN0TWKT2PGL4OTUxZD9Fa9z7HEjej2gB8eaP0B4T7x4Ca2IsuVvGuDbtI3JvzGDEzYaUqFERJTct27uK/TqbFbV5wH98lF22NVO5UiJDysl48miexhNjAExbx9BDFK7W6hFJ+bghIFfydqKt4ILnfIoRfKuUm2lH2fIAOcRA/f0TM693LTqdT01CyEYUUa+of7K/tx4TUC5rs5OojixyUVBvoDqSRKnEzLN/A1NtuBKVxUGUGKHhi2rVjSTQHGsOMNjJumVsWFJc0fjxMf1g3tFuEv0zGfUPnvuxP45wlAq Account disabled: False ---------------------------- Number of entries returned 1 ---------------------------- Since ipa user-find --certificate="$(base64 cert.der)" returns the appropriate user, marking this Bugzilla verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:2241 |