Red Hat Bugzilla – Bug 830337
usn + mmr = deletions are not replicated
Last modified: 2013-02-21 03:17:30 EST
This bug is created as a clone of upstream ticket: https://fedorahosted.org/389/ticket/383 I believe this is the root cause of https://fedorahosted.org/freeipa/ticket/2772 When you have 389 with usn and mmr enabled, and delete an entry, the delete operation is not changelogged and not replicated.
see upstream tickets for information on reproducing/verifying
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux.
This request was erroneously removed from consideration in Red Hat Enterprise Linux 6.4, which is currently under development. This request will be evaluated for inclusion in Red Hat Enterprise Linux 6.4.
automated regression test bug830337 in mmrepl/accept/accept.sh
Steps to verify: 1) Setup two suppliers on ports $S1PORT and S2PORT 2) Enable USN plugin on both suppliers ldapmodify -p $S1PORT -D "cn=directory manager" -w password << EOF dn: cn=USN,cn=plugins,cn=config changetype: modify replace: nsslapd-pluginEnabled nsslapd-pluginEnabled: on EOF ldapmodify -p $S1PORT -D "cn=directory manager" -w password << EOF dn: cn=USN,cn=plugins,cn=config changetype: modify replace: nsslapd-pluginEnabled nsslapd-pluginEnabled: on EOF 3) Add user to supplier 1 ldapmodify -p $S1PORT -D "cn=directory manager" -w password -a << EOF dn: uid=bug830337,o=Airius.com cn: Bug 830337 sn: 830337 uid: bug830337 objectclass: top objectclass: person objectclass: organizationalperson objectclass: inetorgperson EOF 4) Check that user entry was propagated to supplier 2 ldapsearch -p $S2PORT -D "cn=directory manager" -w password -b "o=airius.com" "uid=bug830337" uid | grep -i "uid:" | awk '{print $2}' bug830337 5) Check user`s USN on supplier 1: ldapsearch -p $S1PORT -D "cn=directory manager" -w password -b "o=airius.com" "uid=$MYUID" entryusn | grep -i "entryusn" | awk '{print $2}' 0 6) Check user`s USN on supplier 2: ldapsearch -p $S2PORT -D "cn=directory manager" -w password -b "o=airius.com" "uid=$MYUID" entryusn | grep -i "entryusn" | awk '{print $2}' 0 7) Delete user on supplier 2: ldapmodify -h localhost -p $S2PORT -D "cn=directory manager" -w password << EOF dn: uid=bug830337,o=Airius.com changetype: delete EOF 8) Check that deletion has propagated to supplier 1: ldapsearch -p $S1PORT -D "cn=directory manager" -w password -b "o=airius.com" "uid=bug830337" uid | grep -i "uid" echo $? 1 Verified
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2013-0503.html