Source: sssd Version: 2.7.3-2 Severity: serious User: debian...@lists.debian.org Usertags: regression
Dear maintainer(s),With a recent upload of sssd the autopkgtest of sssd fails in testing when that autopkgtest is run with the binary packages of sssd from unstable. It passes when run with only packages from testing. In tabular form:
pass fail sssd from testing 2.7.3-2 all others from testing from testing I copied some of the output at the bottom of this report.Currently this regression is blocking the migration to testing [1]. Can you please investigate the situation and fix it?
More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=sssd https://ci.debian.net/data/autopkgtest/testing/amd64/s/sssd/25725560/log.gz + . debian/tests/util + . debian/tests/common-tests + mydomain=example.com + myhostname=ldap.example.com + mysuffix=dc=example,dc=com + admin_dn=cn=admin,dc=example,dc=com + admin_pw=secret + ldap_user=testuser1 + ldap_user_pw=testuser1secret + ldap_group=ldapusers + adjust_hostname ldap.example.com + local myhostname=ldap.example.com + echo ldap.example.com + hostname ldap.example.com + grep -qE ldap.example.com /etc/hosts + echo 127.0.1.10 ldap.example.com + reconfigure_slapd + debconf-set-selections + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb + dpkg-reconfigure -fnoninteractive -pcritical slapdBacking up /etc/ldap/slapd.d in /var/backups/slapd-2.5.12+dfsg-2+b1... done.
Moving old database directory to /var/backups: - directory unknown... done. Creating initial configuration... done. Creating LDAP directory... done. + generate_certs ldap.example.com + local cn=ldap.example.com + local cert=/etc/ldap/server.pem + local key=/etc/ldap/server.key + local cnf=/etc/ldap/openssl.cnf + cat+ openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf
..............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ....................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- + chmod 0640 /etc/ldap/server.key + chgrp openldap /etc/ldap/server.key + [ ! -f /etc/ldap/server.pem ] + [ ! -f /etc/ldap/server.key ] + enable_ldap_ssl + cat + cat + ldapmodify -H ldapi:/// -Y EXTERNAL -Q modifying entry "cn=config" + populate_ldap_rfc2307 + cat + ldapadd -x -D cn=admin,dc=example,dc=com -w secret adding new entry "ou=People,dc=example,dc=com" adding new entry "ou=Group,dc=example,dc=com" adding new entry "uid=testuser1,ou=People,dc=example,dc=com" adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" + configure_sssd_ldap_rfc2307 + cat + chmod 0600 /etc/sssd/sssd.conf + systemctl restart sssd + enable_pam_mkhomedir + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session + echo session optional pam_mkhomedir.so + run_common_tests + echo Assert local user databases do not have our LDAP test data + check_local_user testuser1 + local local_user=testuser1 + grep -q ^testuser1 /etc/passwd Assert local user databases do not have our LDAP test data + check_local_group testuser1 + local local_group=testuser1 + grep -q ^testuser1 /etc/group + check_local_group ldapusers + local local_group=ldapusers + grep -q ^ldapusers /etc/group + echo The LDAP user is known to the system via getent + check_getent_user testuser1 + local getent_user=testuser1 + local output The LDAP user is known to the system via getent + getent passwd testuser1 + output= autopkgtest [23:15:03]: test ldap-user-group-ldap-auth
OpenPGP_signature
Description: OpenPGP digital signature