Bug 1677665 - IPA: Deleted user from trusted domain is not removed properly from the cache on IPA clients
Summary: IPA: Deleted user from trusted domain is not removed properly from the cache ...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sssd
Version: 7.6
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: SSSD Maintainers
QA Contact: ipa-qe
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-02-15 14:13 UTC by Sumit Bose
Modified: 2020-05-02 19:08 UTC (History)
8 users (show)

Fixed In Version: sssd-1.16.4-1.el7
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-08-06 13:02:47 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 4956 0 None closed IPA: Deleted user from trusted domain is not removed properly from the cache on IPA clients 2021-02-16 12:19:04 UTC
Red Hat Product Errata RHSA-2019:2177 0 None None None 2019-08-06 13:03:05 UTC

Description Sumit Bose 2019-02-15 14:13:56 UTC
Description of problem:
In an IPA environment with trust to AD a deleted user from a trusted domain is not properly removed from the cache on IPA clients.

Version-Release number of selected component (if applicable):
sssd-1.16.0-19.el7.x86_64

Comment 4 RHEL Program Management 2019-02-19 11:51:22 UTC
Since this bug report was entered in Red Hat Bugzilla, the release flag has been set to ? to ensure that it is properly evaluated for this release.

Comment 7 Sumit Bose 2019-03-13 17:16:39 UTC
Upstream ticket:
https://pagure.io/SSSD/sssd/issue/3984

Comment 9 Jakub Hrozek 2019-03-19 22:27:28 UTC
* master:
    50641d4
    5d50621
    89d8962
    e8b2f0d
    b1d288b
* sssd-1-16
    3bed774
    b424c8a
    c382167
    19fbcd1
    cca3394

Comment 11 Kaleem 2019-06-25 14:43:34 UTC
Verifying based on following output

IPA master:
============
(1) Creating AD user and requesting it

[root@master ~]# adcli create-user --domain=ipaad2k16cin.test testaduser1
Password for Administrator: 
[root@master ~]# getent  passwd 'IPAAD2K16CIN\testaduser1'
testaduser1:*:879005770:879005770:testaduser1:/home/ipaad2k16cin.test/testaduser1:

(2) Deleting AD user, clearing the sssd cache and requesting user again which fails now on master

[root@master ~]# adcli delete-user --domain=ipaad2k16cin.test testaduser1
Password for Administrator: 
[root@master ~]# sss_cache -E
[root@master ~]# getent  passwd 'IPAAD2K16CIN\testaduser1';echo $?
2
[root@master ~]# rpm -q sssd
sssd-1.16.4-21.el7.x86_64
[root@master ~]# 


IPA client:
============
(1) Requesting AD user created on Master in step(1)

[root@replica1 ~]# getent  passwd 'IPAAD2K16CIN\testaduser1'
testaduser1:*:879005770:879005770:testaduser1:/home/ipaad2k16cin.test/testaduser1:
[root@replica1 ~]#

(2) Clearing the sssd cache and requesting user again which fails now on client 

[root@replica1 ~]# sss_cache -E
[root@replica1 ~]# getent  passwd 'IPAAD2K16CIN\testaduser1';echo $?
2
[root@replica1 ~]# rpm -q sssd
sssd-1.16.4-21.el7.x86_64
[root@replica1 ~]#

Comment 13 errata-xmlrpc 2019-08-06 13:02:47 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2019:2177

Comment 14 James Hartsock 2019-08-08 18:53:35 UTC
BZ not letting me link solution, so doing as a comment
https://access.redhat.com/solutions/4341951


Note You need to log in before you can comment on or make changes to this bug.