Source: sssd
Version: 2.7.3-2
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of sssd the autopkgtest of sssd fails in testing when that autopkgtest is run with the binary packages of sssd from unstable. It passes when run with only packages from testing. In tabular form:

                       pass            fail
sssd                   from testing    2.7.3-2
all others             from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration to testing [1]. Can you please investigate the situation and fix it?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=sssd

https://ci.debian.net/data/autopkgtest/testing/amd64/s/sssd/25725560/log.gz

+ . debian/tests/util
+ . debian/tests/common-tests
+ mydomain=example.com
+ myhostname=ldap.example.com
+ mysuffix=dc=example,dc=com
+ admin_dn=cn=admin,dc=example,dc=com
+ admin_pw=secret
+ ldap_user=testuser1
+ ldap_user_pw=testuser1secret
+ ldap_group=ldapusers
+ adjust_hostname ldap.example.com
+ local myhostname=ldap.example.com
+ echo ldap.example.com
+ hostname ldap.example.com
+ grep -qE ldap.example.com /etc/hosts
+ echo 127.0.1.10 ldap.example.com
+ reconfigure_slapd
+ debconf-set-selections
+ rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb
+ dpkg-reconfigure -fnoninteractive -pcritical slapd
Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.5.12+dfsg-2+b1... done.
  Moving old database directory to /var/backups:
  - directory unknown... done.
  Creating initial configuration... done.
  Creating LDAP directory... done.
+ generate_certs ldap.example.com
+ local cn=ldap.example.com
+ local cert=/etc/ldap/server.pem
+ local key=/etc/ldap/server.key
+ local cnf=/etc/ldap/openssl.cnf
+ cat
+ openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf
..............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
....................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-----
+ chmod 0640 /etc/ldap/server.key
+ chgrp openldap /etc/ldap/server.key
+ [ ! -f /etc/ldap/server.pem ]
+ [ ! -f /etc/ldap/server.key ]
+ enable_ldap_ssl
+ cat
+ cat
+ ldapmodify -H ldapi:/// -Y EXTERNAL -Q
modifying entry "cn=config"

+ populate_ldap_rfc2307
+ cat
+ ldapadd -x -D cn=admin,dc=example,dc=com -w secret
adding new entry "ou=People,dc=example,dc=com"

adding new entry "ou=Group,dc=example,dc=com"

adding new entry "uid=testuser1,ou=People,dc=example,dc=com"

adding new entry "cn=testuser1,ou=Group,dc=example,dc=com"

adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com"

+ configure_sssd_ldap_rfc2307
+ cat
+ chmod 0600 /etc/sssd/sssd.conf
+ systemctl restart sssd
+ enable_pam_mkhomedir
+ grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session
+ echo session optional pam_mkhomedir.so
+ run_common_tests
+ echo Assert local user databases do not have our LDAP test data
+ check_local_user testuser1
+ local local_user=testuser1
+ grep -q ^testuser1 /etc/passwd
Assert local user databases do not have our LDAP test data
+ check_local_group testuser1
+ local local_group=testuser1
+ grep -q ^testuser1 /etc/group
+ check_local_group ldapusers
+ local local_group=ldapusers
+ grep -q ^ldapusers /etc/group
+ echo The LDAP user is known to the system via getent
+ check_getent_user testuser1
+ local getent_user=testuser1
+ local output
The LDAP user is known to the system via getent
+ getent passwd testuser1
+ output=
autopkgtest [23:15:03]: test ldap-user-group-ldap-auth

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to