report.html

Report generated on 26-Jul-2018 at 21:57:21 by pytest-html v1.19.0

Environment

389-ds-base 1.4.0.11-2.fc28
Packages {'pytest': '3.6.3', 'py': '1.5.4', 'pluggy': '0.6.0'}
Platform Linux-4.17.3-200.fc28.x86_64-x86_64-with-fedora-28-Twenty_Eight
Plugins {'metadata': '1.7.0', 'html': '1.19.0'}
Python 3.6.6
cyrus-sasl 2.1.27-0.2rc7.fc28
nspr 4.19.0-1.fc28
nss 3.38.0-1.0.fc28
openldap 2.4.46-2.fc28

Summary

780 tests ran in 9417.65 seconds.

722 passed, 17 skipped, 54 failed, 0 errors, 4 expected failures, 0 unexpected passes

Results

Result Test Duration Links
Failed suites/ds_tools/replcheck_test.py::test_inconsistencies 20.57
topo_tls_ldapi = <lib389.topologies.TopologyMain object at 0x7fcba6f97e48>

def test_inconsistencies(topo_tls_ldapi):
"""Check that the report mentions inconsistencies with attributes

:id: c8fe3e84-b346-4969-8f5d-3462b643a1d2
:setup: Two master replication
:steps:
1. Add an entry to master and wait for replication
2. Pause replication between master and replica
3. Set different description attr values to master and replica
4. Add telephoneNumber attribute to master and not to replica
5. Generate the report
6. Check that attribute values are mentioned in the report
7. Generate the report with -i option to ignore some attributes
8. Check that attribute values are mentioned in the report
:expectedresults:
1. It should be successful
2. It should be successful
3. It should be successful
4. It should be successful
5. It should be successful
6. The attribute values should be mentioned in the report
7. It should be successful
8. The attribute values should not be mentioned in the report
"""

m1 = topo_tls_ldapi.ms["master1"]
m2 = topo_tls_ldapi.ms["master2"]
attr_m1 = "m1_inconsistency"
attr_m2 = "m2_inconsistency"
attr_m1_only = "123123123"

try:
users_m1 = UserAccounts(m1, DEFAULT_SUFFIX)
users_m2 = UserAccounts(m2, DEFAULT_SUFFIX)
user_m1 = users_m1.create(properties=TEST_USER_PROPERTIES)
time.sleep(1)
user_m2 = users_m2.get(user_m1.rdn)
topo_tls_ldapi.pause_all_replicas()
user_m1.set("description", attr_m1)
user_m2.set("description", attr_m2)
user_m1.set("telephonenumber", attr_m1_only)
time.sleep(2)

for tool_cmd in replcheck_cmd_list(topo_tls_ldapi):
> result = subprocess.check_output(tool_cmd, encoding='utf-8').lower()

suites/ds_tools/replcheck_test.py:335:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib64/python3.6/subprocess.py:336: in check_output
**kwargs).stdout
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

input = None, timeout = None, check = True
popenargs = (['/usr/bin/ds-replcheck', '-b', 'dc=example,dc=com', '-D', 'cn=Directory Manager', '-w', ...],)
kwargs = {'encoding': 'utf-8', 'stdout': -1}
process = <subprocess.Popen object at 0x7fcba64f2dd8>
stdout = "Performing online report...\nConnecting to servers...\nGathering Master's RUV...\nGathering Replica's RUV...\nStart searching and comparing...\n"
stderr = None, retcode = 1

def run(*popenargs, input=None, timeout=None, check=False, **kwargs):
"""Run command with arguments and return a CompletedProcess instance.

The returned instance will have attributes args, returncode, stdout and
stderr. By default, stdout and stderr are not captured, and those attributes
will be None. Pass stdout=PIPE and/or stderr=PIPE in order to capture them.

If check is True and the exit code was non-zero, it raises a
CalledProcessError. The CalledProcessError object will have the return code
in the returncode attribute, and output & stderr attributes if those streams
were captured.

If timeout is given, and the process takes too long, a TimeoutExpired
exception will be raised.

There is an optional argument "input", allowing you to
pass a string to the subprocess's stdin. If you use this argument
you may not also use the Popen constructor's "stdin" argument, as
it will be used internally.

The other arguments are the same as for the Popen constructor.

If universal_newlines=True is passed, the "input" argument must be a
string and stdout/stderr in the returned object will be strings rather than
bytes.
"""
if input is not None:
if 'stdin' in kwargs:
raise ValueError('stdin and input arguments may not both be used.')
kwargs['stdin'] = PIPE

with Popen(*popenargs, **kwargs) as process:
try:
stdout, stderr = process.communicate(input, timeout=timeout)
except TimeoutExpired:
process.kill()
stdout, stderr = process.communicate()
raise TimeoutExpired(process.args, timeout, output=stdout,
stderr=stderr)
except:
process.kill()
process.wait()
raise
retcode = process.poll()
if check and retcode:
raise CalledProcessError(retcode, process.args,
> output=stdout, stderr=stderr)
E subprocess.CalledProcessError: Command '['/usr/bin/ds-replcheck', '-b', 'dc=example,dc=com', '-D', 'cn=Directory Manager', '-w', 'password', '-l', '1', '-m', 'ldap://server.example.com:39001', '--conflict', '-r', 'ldap://server.example.com:39002']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:418: CalledProcessError
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
Traceback (most recent call last): File "/usr/bin/ds-replcheck", line 1290, in <module> main() File "/usr/bin/ds-replcheck", line 1282, in main do_online_report(opts, OUTPUT_FILE) File "/usr/bin/ds-replcheck", line 1065, in do_online_report report, opts) File "/usr/bin/ds-replcheck", line 742, in check_for_diffs diff = cmp_entry(mentry, rentry, opts) File "/usr/bin/ds-replcheck", line 442, in cmp_entry if report_conflict(mentry, mattr, opts): File "/usr/bin/ds-replcheck", line 158, in report_conflict if val.lower().startswith(attr + ';'): TypeError: startswith first arg must be bytes or a tuple of bytes, not str
Failed suites/import/regression_test.py::test_import_be_default 6.31
topo = <lib389.topologies.TopologyMain object at 0x7fcba65a5c88>

def test_import_be_default(topo):
""" Create a backend using the name "default". previously this name was
used int

:id: 8e507beb-e917-4330-8cac-1ff0eee10508
:feature: Import
:setup: Standalone instance
:steps:
1. Create a test suffix using the be name of "default"
2. Create an ldif for the "default" backend
3. Import ldif
4. Verify all entries were imported
:expectedresults:
1. Success
2. Success
3. Success
4. Success
"""
log.info('Adding suffix:{} and backend: {}...'.format(TEST_DEFAULT_SUFFIX,
TEST_DEFAULT_NAME))
backends = Backends(topo.standalone)
backends.create(properties={BACKEND_SUFFIX: TEST_DEFAULT_SUFFIX,
BACKEND_NAME: TEST_DEFAULT_NAME})

log.info('Create LDIF file and import it...')
ldif_dir = topo.standalone.get_ldif_dir()
ldif_file = os.path.join(ldif_dir, 'default.ldif')
dbgen(topo.standalone, 5, ldif_file, TEST_DEFAULT_SUFFIX)

log.info('Stopping the server and running offline import...')
topo.standalone.stop()
assert topo.standalone.ldif2db(TEST_DEFAULT_NAME, None, None,
None, ldif_file)
topo.standalone.start()

log.info('Verifying entry count after import...')
entries = topo.standalone.search_s(TEST_DEFAULT_SUFFIX,
ldap.SCOPE_SUBTREE,
> "(objectclass=*)")

suites/import/regression_test.py:70:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:846: in search_ext_s
return self.result(msgid,all=1,timeout=timeout)[1]
/usr/lib/python3.6/site-packages/lib389/__init__.py:135: in inner
objtype, data = f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:738: in result
resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:742: in result2
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba67f1828>
func = <built-in method result4 of LDAP object at 0x7fcba696f350>
args = (2, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.NO_SUCH_OBJECT: {'desc': 'No such object'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: NO_SUCH_OBJECT
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.import.regression_test:Adding suffix:dc=default,dc=com and backend: default... INFO:tests.suites.import.regression_test:Create LDIF file and import it... INFO:tests.suites.import.regression_test:Stopping the server and running offline import... INFO:tests.suites.import.regression_test:Verifying entry count after import... ------------------------------ Captured log call -------------------------------
regression_test.py 51 INFO Adding suffix:dc=default,dc=com and backend: default... regression_test.py 56 INFO Create LDIF file and import it... regression_test.py 61 INFO Stopping the server and running offline import... regression_test.py 67 INFO Verifying entry count after import...
Failed suites/paged_results/paged_results_test.py::test_search_dns_ip_aci[ip = "10.8.248.156"] 4.67
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb9e84abe0>
test_user = <lib389.idm.user.UserAccount object at 0x7fcba67ddcf8>
aci_subject = 'ip = "10.8.248.156"'

@pytest.mark.parametrize('aci_subject',
('dns = "{}"'.format(HOSTNAME),
'ip = "{}"'.format(IP_ADDRESS)))
def test_search_dns_ip_aci(topology_st, test_user, aci_subject):
"""Verify that after performing multiple simple paged searches
to completion on the suffix with DNS or IP based ACI

:id: bbfddc46-a8c8-49ae-8c90-7265d05b22a9
:setup: Standalone instance, test user for binding,
varying number of users for the search base
:steps:
1. Back up and remove all previous ACI from suffix
2. Add an anonymous ACI for DNS check
3. Bind as test user
4. Search through added users with a simple paged control
5. Perform steps 4 three times in a row
6. Return ACI to the initial state
7. Go through all steps once again, but use IP subject dn
instead of DNS
:expectedresults:
1. Operation should be successful
2. Anonymous ACI should be successfully added
3. Bind should be successful
4. No error happens, all users should be found and sorted
5. Results should remain the same
6. ACI should be successfully returned
7. Results should be the same with ACI with IP subject dn
"""

users_num = 100
page_size = 5
users_list = add_users(topology_st, users_num, DEFAULT_SUFFIX)
search_flt = r'(uid=test*)'
searchreq_attrlist = ['dn', 'sn']

try:
log.info('Back up current suffix ACI')
acis_bck = topology_st.standalone.aci.list(DEFAULT_SUFFIX, ldap.SCOPE_BASE)

log.info('Add test ACI')
ACI_TARGET = '(targetattr != "userPassword")'
ACI_ALLOW = '(version 3.0;acl "Anonymous access within domain"; allow (read,compare,search)'
ACI_SUBJECT = '(userdn = "ldap:///anyone") and (%s);)' % aci_subject
ACI_BODY = ensure_bytes(ACI_TARGET + ACI_ALLOW + ACI_SUBJECT)
topology_st.standalone.modify_s(DEFAULT_SUFFIX, [(ldap.MOD_REPLACE, 'aci', ACI_BODY)])
log.info('Set user bind')
conn = test_user.bind(TEST_USER_PWD)

log.info('Create simple paged results control instance')
req_ctrl = SimplePagedResultsControl(True, size=page_size, cookie='')
controls = [req_ctrl]

log.info('Initiate three searches with a paged results control')
for ii in range(3):
log.info('%d search' % (ii + 1))
all_results = paged_search(conn, DEFAULT_SUFFIX, controls,
search_flt, searchreq_attrlist)
log.info('%d results' % len(all_results))
> assert len(all_results) == len(users_list)
E assert 0 == 100
E + where 0 = len([])
E + and 100 = len([<lib389.idm.user.UserAccount object at 0x7fcba6975c18>, <lib389.idm.user.UserAccount object at 0x7fcba67ddb38>, <lib3...>, <lib389.idm.user.UserAccount object at 0x7fcb930b8048>, <lib389.idm.user.UserAccount object at 0x7fcba67d10b8>, ...])

suites/paged_results/paged_results_test.py:564: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 100 users INFO:tests.suites.paged_results.paged_results_test:Back up current suffix ACI INFO:tests.suites.paged_results.paged_results_test:Add test ACI INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate three searches with a paged results control INFO:tests.suites.paged_results.paged_results_test:1 search INFO:tests.suites.paged_results.paged_results_test:Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba686be48>]. INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:0 results INFO:tests.suites.paged_results.paged_results_test:Restore ACI INFO:tests.suites.paged_results.paged_results_test:Deleting 100 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 542 INFO Back up current suffix ACI paged_results_test.py 545 INFO Add test ACI paged_results_test.py 551 INFO Set user bind paged_results_test.py 554 INFO Create simple paged results control instance paged_results_test.py 558 INFO Initiate three searches with a paged results control paged_results_test.py 560 INFO 1 search paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba686be48>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 563 INFO 0 results paged_results_test.py 568 INFO Restore ACI paged_results_test.py 153 INFO Deleting 100 users
Failed suites/password/pbkdf2_upgrade_plugin_test.py::test_pbkdf2_upgrade 2.86
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6855d68>

def test_pbkdf2_upgrade(topology_st):
"""On upgrade pbkdf2 doesn't ship. We need to be able to
provide this on upgrade to make sure default hashes work.
However, password plugins are special - they need really
early bootstap so that setting the default has specs work.

This tests that the removal of the pbkdf2 plugin causes
it to be re-bootstrapped and added.

:id: c2198692-7c02-433b-af5b-3be54920571a
:setup: Single instance
:steps: 1. Remove the PBKDF2 plugin
2. Restart the server
3. Restart the server
:expectedresults:
1. Plugin is removed (IE pre-upgrade state)
2. The plugin is bootstrapped and added
3. No change (already bootstrapped)

"""
# Remove the pbkdf2 plugin config
p1 = PBKDF2Plugin(topology_st.standalone)
assert(p1.exists())
p1._protected = False
p1.delete()
# Restart
> topology_st.standalone.restart()

suites/password/pbkdf2_upgrade_plugin_test.py:39:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:1327: in restart
self.start(timeout, post_open)
/usr/lib/python3.6/site-packages/lib389/__init__.py:1197: in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

popenargs = (['/usr/bin/systemctl', 'start', 'dirsrv@standalone1'],)
kwargs = {}, retcode = 1
cmd = ['/usr/bin/systemctl', 'start', 'dirsrv@standalone1']

def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.

The arguments are the same as for the call function. Example:

check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
> raise CalledProcessError(retcode, cmd)
E subprocess.CalledProcessError: Command '['/usr/bin/systemctl', 'start', 'dirsrv@standalone1']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:291: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Failed suites/replication/cleanallruv_test.py::test_abort_certify 133.14
topology_m4 = <lib389.topologies.TopologyMain object at 0x7fcb9eb2d908>
m4rid = '4'

def test_abort_certify(topology_m4, m4rid):
"""Test the abort task with a replica-certify-all option

:id: 78959966-d644-44a8-b98c-1fcf21b45eb0
:setup: Replication setup with four masters
:steps:
1. Disable replication on master 4
2. Remove agreements to master 4 from other masters
3. Stop master 2
4. Run a cleanallruv task on master 1
5. Run a cleanallruv abort task on master 1 with a replica-certify-all option
:expectedresults: No hanging tasks left
1. Replication on master 4 should be disabled
2. Agreements to master 4 should be removed
3. Master 2 should be stopped
4. Operation should be successful
5. Operation should be successful
"""

log.info('Running test_abort_certify...')

# Remove the agreements from the other masters that point to master 4
remove_master4_agmts("test_abort_certify", topology_m4)

# Stop master 2
log.info('test_abort_certify: stop master 2 to freeze the cleanAllRUV task...')
topology_m4.ms["master2"].stop()

# Run the task
log.info('test_abort_certify: add the cleanAllRUV task...')
cruv_task = CleanAllRUVTask(topology_m4.ms["master1"])
cruv_task.create(properties={
'replica-id': m4rid,
'replica-base-dn': DEFAULT_SUFFIX
})
# Wait a bit
time.sleep(2)

# Abort the task
log.info('test_abort_certify: abort the cleanAllRUV task...')
abort_task = cruv_task.abort(certify=True)

# Wait a while and make sure the abort task is still running
log.info('test_abort_certify: sleep for 5 seconds')
time.sleep(5)

if task_done(topology_m4, abort_task.dn, 60):
log.fatal('test_abort_certify: abort task incorrectly finished')
assert False

# Now start master 2 so it can be aborted
log.info('test_abort_certify: start master 2 to allow the abort task to finish...')
topology_m4.ms["master2"].start()

# Wait for the abort task to stop
if not task_done(topology_m4, abort_task.dn, 60):
log.fatal('test_abort_certify: The abort CleanAllRUV task was not aborted')
> assert False
E assert False

suites/replication/cleanallruv_test.py:515: AssertionError
---------------------------- Captured stderr setup -----------------------------
DEBUG:tests.suites.replication.cleanallruv_test:-------------- BEGIN RESET of m4 ----------------- INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39004 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39003 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39004 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39004 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39003 is working DEBUG:tests.suites.replication.cleanallruv_test:-------------- FINISH RESET of m4 ----------------- ------------------------------ Captured log setup ------------------------------
cleanallruv_test.py 141 DEBUG -------------- BEGIN RESET of m4 ----------------- replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39004 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39003 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39004 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39004 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39001 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39003 is working cleanallruv_test.py 162 DEBUG -------------- FINISH RESET of m4 ---------------------------------------------- Captured stderr call -----------------------------
INFO:tests.suites.replication.cleanallruv_test:Running test_abort_certify... INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: remove all the agreements to master 4... INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: stop master 2 to freeze the cleanAllRUV task... INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: add the cleanAllRUV task... INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: abort the cleanAllRUV task... INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: sleep for 5 seconds INFO:tests.suites.replication.cleanallruv_test:test_abort_certify: start master 2 to allow the abort task to finish... CRITICAL:tests.suites.replication.cleanallruv_test:test_abort_certify: The abort CleanAllRUV task was not aborted ------------------------------ Captured log call -------------------------------
cleanallruv_test.py 477 INFO Running test_abort_certify... cleanallruv_test.py 67 INFO test_abort_certify: remove all the agreements to master 4... cleanallruv_test.py 483 INFO test_abort_certify: stop master 2 to freeze the cleanAllRUV task... cleanallruv_test.py 487 INFO test_abort_certify: add the cleanAllRUV task... cleanallruv_test.py 497 INFO test_abort_certify: abort the cleanAllRUV task... cleanallruv_test.py 501 INFO test_abort_certify: sleep for 5 seconds cleanallruv_test.py 509 INFO test_abort_certify: start master 2 to allow the abort task to finish... cleanallruv_test.py 514 CRITICAL test_abort_certify: The abort CleanAllRUV task was not aborted
Failed suites/replication/encryption_cl5_test.py::test_algorithm_unhashed[AES] 2.86
topology_with_tls = <lib389.topologies.TopologyMain object at 0x7fcba6e072e8>
encryption = 'AES'

@pytest.mark.parametrize("encryption", ["AES", "3DES"])
def test_algorithm_unhashed(topology_with_tls, encryption):
"""Check encryption algowithm AES and 3DES.
And check unhashed#user#password attribute for encryption.

:id: b7a37bf8-4b2e-4dbd-9891-70117d67558c
:setup: Replication with two masters and SSL configured.
:steps: 1. Enable changelog encrytion on master1 (try AES and 3DES).
2. Add a user to master1/master2
3. Run dbscan -f on m1 to check unhashed#user#password
attribute is encrypted.
4. Run dbscan -f on m2 to check unhashed#user#password
attribute is in cleartext.
5. Modify password in master2/master1
6. Run dbscan -f on m1 to check unhashed#user#password
attribute is encrypted.
7. Run dbscan -f on m2 to check unhashed#user#password
attribute is in cleartext.
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
"""

m1 = topology_with_tls.ms['master1']
m2 = topology_with_tls.ms['master2']
test_passw = 'm2Test199'

> _enable_changelog_encryption(m1, encryption)

suites/replication/encryption_cl5_test.py:107:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
suites/replication/encryption_cl5_test.py:49: in _enable_changelog_encryption
inst.start()
/usr/lib/python3.6/site-packages/lib389/__init__.py:1197: in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

popenargs = (['/usr/bin/systemctl', 'start', 'dirsrv@master1'],), kwargs = {}
retcode = 1, cmd = ['/usr/bin/systemctl', 'start', 'dirsrv@master1']

def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.

The arguments are the same as for the call function. Example:

check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
> raise CalledProcessError(retcode, cmd)
E subprocess.CalledProcessError: Command '['/usr/bin/systemctl', 'start', 'dirsrv@master1']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:291: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.replica:SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists replica.py 1873 INFO SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.replication.encryption_cl5_test:Configuring changelog encryption:master1 for: AES Job for dirsrv@master1.service failed because the control process exited with error code. See "systemctl status dirsrv@master1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
encryption_cl5_test.py 44 INFO Configuring changelog encryption:master1 for: AES
Failed suites/replication/encryption_cl5_test.py::test_algorithm_unhashed[3DES] 0.49
topology_with_tls = <lib389.topologies.TopologyMain object at 0x7fcba6e072e8>
encryption = '3DES'

@pytest.mark.parametrize("encryption", ["AES", "3DES"])
def test_algorithm_unhashed(topology_with_tls, encryption):
"""Check encryption algowithm AES and 3DES.
And check unhashed#user#password attribute for encryption.

:id: b7a37bf8-4b2e-4dbd-9891-70117d67558c
:setup: Replication with two masters and SSL configured.
:steps: 1. Enable changelog encrytion on master1 (try AES and 3DES).
2. Add a user to master1/master2
3. Run dbscan -f on m1 to check unhashed#user#password
attribute is encrypted.
4. Run dbscan -f on m2 to check unhashed#user#password
attribute is in cleartext.
5. Modify password in master2/master1
6. Run dbscan -f on m1 to check unhashed#user#password
attribute is encrypted.
7. Run dbscan -f on m2 to check unhashed#user#password
attribute is in cleartext.
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
"""

m1 = topology_with_tls.ms['master1']
m2 = topology_with_tls.ms['master2']
test_passw = 'm2Test199'

> _enable_changelog_encryption(m1, encryption)

suites/replication/encryption_cl5_test.py:107:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
suites/replication/encryption_cl5_test.py:49: in _enable_changelog_encryption
inst.start()
/usr/lib/python3.6/site-packages/lib389/__init__.py:1197: in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

popenargs = (['/usr/bin/systemctl', 'start', 'dirsrv@master1'],), kwargs = {}
retcode = 1, cmd = ['/usr/bin/systemctl', 'start', 'dirsrv@master1']

def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.

The arguments are the same as for the call function. Example:

check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
> raise CalledProcessError(retcode, cmd)
E subprocess.CalledProcessError: Command '['/usr/bin/systemctl', 'start', 'dirsrv@master1']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:291: CalledProcessError
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.replication.encryption_cl5_test:Configuring changelog encryption:master1 for: 3DES Job for dirsrv@master1.service failed because the control process exited with error code. See "systemctl status dirsrv@master1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
encryption_cl5_test.py 44 INFO Configuring changelog encryption:master1 for: 3DES
Failed suites/replication/regression_test.py::test_fetch_bindDnGroup 22.86
topo_m2 = <lib389.topologies.TopologyMain object at 0x7fcb9cbeb358>

def test_fetch_bindDnGroup(topo_m2):
"""Check the bindDNGroup is fetched on first replication session

:id: 5f1b1f59-6744-4260-b091-c82d22130025
:setup: 2 Master Instances
:steps:
1. Create a replication bound user and group, but the user *not* member of the group
2. Check that replication is working
3. Some preparation is required because of lib389 magic that already define a replication via group
- define the group as groupDN for replication and 60sec as fetch interval
- pause RA in both direction
- Define the user as bindDn of the RAs
4. restart servers.
It sets the fetch time to 0, so next session will refetch the group
5. Before resuming RA, add user to groupDN (on both side as replication is not working at that time)
6. trigger an update and check replication is working and
there is no failure logged on supplier side 'does not have permission to supply replication updates to the replica'
:expectedresults:
1. Success
2. Success
3. Success
4. Success
5. Success
6. Success
"""

# If you need any test suite initialization,
# please, write additional fixture for that (including finalizer).
# Topology for suites are predefined in lib389/topologies.py.

# If you need host, port or any other data about instance,
# Please, use the instance object attributes for that (for example, topo.ms["master1"].serverid)
M1 = topo_m2.ms['master1']
M2 = topo_m2.ms['master2']

# Enable replication log level. Not really necessary
M1.modify_s('cn=config',[(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', b'8192')])
M2.modify_s('cn=config',[(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', b'8192')])

# Create a group and a user
PEOPLE = "ou=People,%s" % SUFFIX
PASSWD = 'password'
REPL_MGR_BOUND_DN='repl_mgr_bound_dn'

uid = REPL_MGR_BOUND_DN.encode()
users = UserAccounts(M1, PEOPLE, rdn=None)
user_props = TEST_USER_PROPERTIES.copy()
user_props.update({'uid': uid, 'cn': uid, 'sn': '_%s' % uid, 'userpassword': PASSWD.encode(), 'description': b'value creation'})
test_user = users.create(properties=user_props)

groups_M1 = Groups(M1, DEFAULT_SUFFIX)
group_properties = {
'cn' : 'group1',
'description' : 'testgroup'}
group_M1 = groups_M1.create(properties=group_properties)
group_M2 = Group(M2, group_M1.dn)
assert(not group_M1.is_member(test_user.dn))



# Check that M1 and M2 are in sync
repl = ReplicationManager(DEFAULT_SUFFIX)
repl.wait_for_replication(M1, M2, timeout=20)

# Define the group as the replication manager and fetch interval as 60sec
replicas = Replicas(M1)
replica = replicas.list()[0]
replica.apply_mods([(ldap.MOD_REPLACE, 'nsDS5ReplicaBindDnGroupCheckInterval', '60'),
(ldap.MOD_REPLACE, 'nsDS5ReplicaBindDnGroup', group_M1.dn)])


replicas = Replicas(M2)
replica = replicas.list()[0]
replica.apply_mods([(ldap.MOD_REPLACE, 'nsDS5ReplicaBindDnGroupCheckInterval', '60'),
(ldap.MOD_REPLACE, 'nsDS5ReplicaBindDnGroup', group_M1.dn)])


# Then pause the replication agreement to prevent them trying to acquire
# while the user is not member of the group
topo_m2.pause_all_replicas()

# Define the user as the bindDN of the RAs
for inst in (M1, M2):
agmts = Agreements(inst)
agmt = agmts.list()[0]
agmt.replace('nsDS5ReplicaBindDN', test_user.dn.encode())
agmt.replace('nsds5ReplicaCredentials', PASSWD.encode())


# Key step
# The restart will fetch the group/members define in the replica
#
# The user NOT member of the group replication will not work until bindDNcheckInterval
#
# With the fix, the first fetch is not taken into account (fetch time=0)
# so on the first session, the group will be fetched
M1.restart()
M2.restart()

# Replication being broken here we need to directly do the same update.
# Sorry not found another solution except total update
group_M1.add_member(test_user.dn)
group_M2.add_member(test_user.dn)

topo_m2.resume_all_replicas()

# trigger updates to be sure to have a replication session, giving some time
M1.modify_s(test_user.dn,[(ldap.MOD_ADD, 'description', b'value_1_1')])
M2.modify_s(test_user.dn,[(ldap.MOD_ADD, 'description', b'value_2_2')])
time.sleep(10)

# Check replication is working
ents = M1.search_s(test_user.dn, ldap.SCOPE_BASE, '(objectclass=*)')
for ent in ents:
assert (ent.hasAttr('description'))
found = 0
for val in ent.getValues('description'):
if (val == b'value_1_1'):
found = found + 1
elif (val == b'value_2_2'):
found = found + 1
> assert (found == 2)
E assert 1 == 2

suites/replication/regression_test.py:416: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working ------------------------------ Captured log call -------------------------------
replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working
Failed suites/replication/tombstone_test.py::test_purge_success 0.03
topology_m1 = <lib389.topologies.TopologyMain object at 0x7fcb9ea393c8>

def test_purge_success(topology_m1):
"""Verify that tombstones are created successfully

:id: adb86f50-ae76-4ed6-82b4-3cdc30ccab78
:setup: Standalone instance
:steps:
1. Enable replication to unexisting instance
2. Add an entry to the replicated suffix
3. Delete the entry
4. Check that tombstone entry exists (objectclass=nsTombstone)
:expectedresults: Tombstone entry exist
1. Operation should be successful
2. The entry should be successfully added
3. The entry should be successfully deleted
4. Tombstone entry should exist
"""
m1 = topology_m1.ms['master1']

users = UserAccounts(m1, DEFAULT_SUFFIX)
user = users.create(properties=TEST_USER_PROPERTIES)

tombstones = Tombstones(m1, DEFAULT_SUFFIX)

assert len(tombstones.list()) == 0

user.delete()

assert len(tombstones.list()) == 1
assert len(users.list()) == 0

ts = tombstones.get('testuser')
assert ts.exists()

if not ds_is_older('1.4.0'):
> ts.revive()

suites/replication/tombstone_test.py:52:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/tombstone.py:39: in revive
orig_dn = self.get_attr_val_utf8('nscpEntryDN')
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:528: in get_attr_val_utf8
return ensure_str(self.get_attr_val(key))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.tombstone.Tombstone object at 0x7fcb9cbcb278>
key = 'nscpEntryDN', use_json = False

def get_attr_val(self, key, use_json=False):
self._log.debug("%s getVal(%r)" % (self._dn, key))
# We might need to add a state check for NONE dn.
if self._instance.state != DIRSRV_STATE_ONLINE:
raise ValueError("Invalid state. Cannot get properties on instance that is not ONLINE")
# In the future, I plan to add a mode where if local == true, we
# can use get on dse.ldif to get values offline.
else:
> entry = self._instance.search_ext_s(self._dn, ldap.SCOPE_BASE, self._object_filter, attrlist=[key], serverctrls=self._server_controls, clientctrls=self._client_controls)[0]
E IndexError: list index out of range

/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:494: IndexError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology.
Failed suites/sasl/regression_test.py::test_openldap_no_nss_crypto 57.06
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb9e7ee240>

def test_openldap_no_nss_crypto(topology_m2):
"""Check that we allow usage of OpenLDAP libraries
that don't use NSS for crypto

:id: 0a622f3d-8ba5-4df2-a1de-1fb2237da40a
:setup: Replication with two masters:
master_1 ----- startTLS -----> master_2;
master_1 <-- TLS_clientAuth -- master_2;
nsslapd-extract-pemfiles set to 'on' on both masters
without specifying cert names
:steps:
1. Add 5 users to master 1 and 2
2. Check that the users were successfully replicated
3. Relocate PEM files on master 1
4. Check PEM files in master 1 config directory
5. Add 5 users more to master 1 and 2
6. Check that the users were successfully replicated
7. Export userRoot on master 1
:expectedresults:
1. Users should be successfully added
2. Users should be successfully replicated
3. Operation should be successful
4. PEM files should be found
5. Users should be successfully added
6. Users should be successfully replicated
7. Operation should be successful
"""

log.info("Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto")

create_keys_certs(topology_m2)
> config_tls_agreements(topology_m2)

suites/sasl/regression_test.py:400:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
suites/sasl/regression_test.py:316: in config_tls_agreements
rentry = m1.search_s(replmgr, ldap.SCOPE_BASE, 'objectclass=*')
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:846: in search_ext_s
return self.result(msgid,all=1,timeout=timeout)[1]
/usr/lib/python3.6/site-packages/lib389/__init__.py:135: in inner
objtype, data = f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:738: in result
resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:742: in result2
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb9eb6be10>
func = <built-in method result4 of LDAP object at 0x7fcb9ea11c88>
args = (5, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.NO_SUCH_OBJECT: {'desc': 'No such object'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: NO_SUCH_OBJECT
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stdout call -----------------------------
Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 IMPORT SUCCESSFUL ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.sasl.regression_test:Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto INFO:tests.suites.sasl.regression_test: ######################### Creating SSL Keys and Certs ###################### INFO:tests.suites.sasl.regression_test:##### Ensure that nsslapd-extract-pemfiles is 'off' on master1 INFO:tests.suites.sasl.regression_test:##### restart master1 INFO:tests.suites.sasl.regression_test:##### Ensure that nsslapd-extract-pemfiles is 'off' on master2 INFO:tests.suites.sasl.regression_test:##### restart master2 INFO:tests.suites.sasl.regression_test:##### shutdown master1 INFO:tests.suites.sasl.regression_test:##### Creating a password file INFO:tests.suites.sasl.regression_test:##### create the pin file INFO:tests.suites.sasl.regression_test:##### Creating a noise file INFO:tests.suites.sasl.regression_test:##### Create key3.db and cert8.db database (master1): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master1', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### Creating encryption key for CA (master1): ['certutil', '-G', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### Creating self-signed CA certificate (master1) -- nickname CAcertificate Generating key. This may take a few moments... INFO:tests.suites.sasl.regression_test:##### Creating Server certificate -- nickname Server-Cert1: ['certutil', '-S', '-n', 'Server-Cert1', '-s', 'CN=server.example.com,OU=389 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1001', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### Creating Server certificate -- nickname Server-Cert2: ['certutil', '-S', '-n', 'Server-Cert2', '-s', 'CN=server.example.com,OU=390 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1002', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### start master1 INFO:tests.suites.sasl.regression_test:##### enable SSL in master1 with all ciphers INFO:tests.suites.sasl.regression_test: ######################### Enabling SSL LDAPSPORT 41636 ###################### INFO:tests.suites.sasl.regression_test:##### Check the cert db: ['certutil', '-L', '-d', '/etc/dirsrv/slapd-master1'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: INFO:tests.suites.sasl.regression_test: Certificate Nickname Trust Attributes INFO:tests.suites.sasl.regression_test: SSL,S/MIME,JAR/XPI INFO:tests.suites.sasl.regression_test: INFO:tests.suites.sasl.regression_test: CAcertificate CTu,u,u INFO:tests.suites.sasl.regression_test: Server-Cert1 u,u,u INFO:tests.suites.sasl.regression_test: Server-Cert2 u,u,u INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### restart master1 INFO:tests.suites.sasl.regression_test:##### Check PEM files of master1 (before setting nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test: ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) not in /etc/dirsrv/slapd-master1 ###################### INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/CAcertificate.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/Server-Cert1.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:##### Set on to nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test:##### restart master1 INFO:tests.suites.sasl.regression_test:##### Check PEM files of master1 (after setting nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test: ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) in /etc/dirsrv/slapd-master1 ###################### INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/CAcertificate.pem is successfully generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/Server-Cert1.pem is successfully generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is successfully generated. INFO:tests.suites.sasl.regression_test:##### Extract PK12 file for master2: pk12util -o /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master1 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt INFO:tests.suites.sasl.regression_test:##### Check PK12 files INFO:tests.suites.sasl.regression_test:/tmp/Server-Cert2.pk12 is successfully extracted. INFO:tests.suites.sasl.regression_test:##### stop master2 INFO:tests.suites.sasl.regression_test:##### Initialize Cert DB for master2 INFO:tests.suites.sasl.regression_test:##### Create key3.db and cert8.db database (master2): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master2', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] INFO:tests.suites.sasl.regression_test: OUT: INFO:tests.suites.sasl.regression_test: ERR: INFO:tests.suites.sasl.regression_test:##### Import certs to master2 INFO:tests.suites.sasl.regression_test:Importing CAcertificate INFO:tests.suites.sasl.regression_test:##### Importing Server-Cert2 to master2: pk12util -i /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master2 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt INFO:tests.suites.sasl.regression_test:copy /etc/dirsrv/slapd-master1/pin.txt to /etc/dirsrv/slapd-master2/pin.txt INFO:tests.suites.sasl.regression_test:##### start master2 INFO:tests.suites.sasl.regression_test:##### enable SSL in master2 with all ciphers INFO:tests.suites.sasl.regression_test: ######################### Enabling SSL LDAPSPORT 42636 ###################### INFO:tests.suites.sasl.regression_test:##### restart master2 INFO:tests.suites.sasl.regression_test:##### Check PEM files of master2 (before setting nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test: ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) not in /etc/dirsrv/slapd-master2 ###################### INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/CAcertificate.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/Server-Cert2.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is correctly not generated. INFO:tests.suites.sasl.regression_test:##### Set on to nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test:##### restart master2 INFO:tests.suites.sasl.regression_test:##### Check PEM files of master2 (after setting nsslapd-extract-pemfiles INFO:tests.suites.sasl.regression_test: ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) in /etc/dirsrv/slapd-master2 ###################### INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/CAcertificate.pem is successfully generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/Server-Cert2.pem is successfully generated. INFO:tests.suites.sasl.regression_test:/etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is successfully generated. INFO:tests.suites.sasl.regression_test:##### restart master1 INFO:tests.suites.sasl.regression_test: ######################### Creating SSL Keys and Certs Done ###################### INFO:tests.suites.sasl.regression_test:######################### Configure SSL/TLS agreements ###################### INFO:tests.suites.sasl.regression_test:######################## master1 -- startTLS -> master2 ##################### INFO:tests.suites.sasl.regression_test:##################### master1 <- tls_clientAuth -- master2 ################## INFO:tests.suites.sasl.regression_test:##### Update the agreement of master1 INFO:tests.suites.sasl.regression_test:##### Add the cert to the repl manager on master1 INFO:tests.suites.sasl.regression_test:##### master2 Server Cert in base64 format: MIICxzCCAa+gAwIBAgICA+owDQYJKoZIhvcNAQELBQAwETEPMA0GA1UEAxMGQ0FjZXJ0MB4XDTE4MDcyNzAwNDkwOVoXDTI4MDcyNzAwNDkwOVowPDEdMBsGA1UECxMUMzkwIERpcmVjdG9yeSBTZXJ2ZXIxGzAZBgNVBAMTEnNlcnZlci5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM0q917LAx4ZMtg1ag7lcxiynLtzuhqKh8QqUXJ2dgfkj8x+950aLeU7dDMLHneB3FwgA+qp1RZWNXka2Rz9JX9+u5N78us+pVDh5U1ZStVe+MR9F7fH5JrA3cKRjQm9alnhrJ7EERVe2W2+AKsdOXx0AuvWQvuUluvaUTwxQK511xnKOkYKhdRpzTbAPREc3nNqkybE1DzODFKhNkVQKO+RE9/H7lPwA/bCUU/QJjwdffYQ74D/AJ4oJ2mVswrBO66PUoiiI16l8+VRXtvzo14cKFRt818tY/pfAiIQwmrzkRTDXFHxHZ3XCkztTXXbntI+hc8EpAoq2xQNkhfL3wcCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEANg3WfKa2Yl3mh1CBAx3yh9NDhsMgQungyYQ+Zga9jGyVZs85pfxae3Y9J0j4o63IjGt1mALwSkfR2oDWfHHqjtjGhn5q+jrJgvPeS7pKhbsf0AZuu3Yt89n275bafD4d77POE6gaEM6vprdl7Erf2jycRMxAH+hwTyfXPrT8uY0NIt4AihP9P9kAFf7QITZq0Id4z1FzrMwFLrokOiTT0wg8SeGB4rDjEQIU87FjSgbhT/ZSrZHuCVnyjLkAjvabZrvhRj1xZ5AEf7qsxdMh22Fi2fZQJoCKQg1wPRFeY1ee2gjcSP6wcg0EMm4+OX9S7sXOFEEPCAWM+AaTmPpepw== ------------------------------ Captured log call -------------------------------
regression_test.py 397 INFO Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto regression_test.py 127 INFO ######################### Creating SSL Keys and Certs ###################### regression_test.py 130 INFO ##### Ensure that nsslapd-extract-pemfiles is 'off' on master1 regression_test.py 132 INFO ##### restart master1 regression_test.py 130 INFO ##### Ensure that nsslapd-extract-pemfiles is 'off' on master2 regression_test.py 132 INFO ##### restart master2 regression_test.py 140 INFO ##### shutdown master1 regression_test.py 143 INFO ##### Creating a password file regression_test.py 152 INFO ##### create the pin file regression_test.py 163 INFO ##### Creating a noise file regression_test.py 172 INFO ##### Create key3.db and cert8.db database (master1): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master1', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 176 INFO ##### Creating encryption key for CA (master1): ['certutil', '-G', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 182 INFO ##### Creating self-signed CA certificate (master1) -- nickname CAcertificate regression_test.py 190 INFO ##### Creating Server certificate -- nickname Server-Cert1: ['certutil', '-S', '-n', 'Server-Cert1', '-s', 'CN=server.example.com,OU=389 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1001', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 198 INFO ##### Creating Server certificate -- nickname Server-Cert2: ['certutil', '-S', '-n', 'Server-Cert2', '-s', 'CN=server.example.com,OU=390 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1002', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 203 INFO ##### start master1 regression_test.py 206 INFO ##### enable SSL in master1 with all ciphers regression_test.py 46 INFO ######################### Enabling SSL LDAPSPORT 41636 ###################### regression_test.py 210 INFO ##### Check the cert db: ['certutil', '-L', '-d', '/etc/dirsrv/slapd-master1'] regression_test.py 111 INFO OUT: regression_test.py 116 INFO regression_test.py 116 INFO Certificate Nickname Trust Attributes regression_test.py 116 INFO SSL,S/MIME,JAR/XPI regression_test.py 116 INFO regression_test.py 116 INFO CAcertificate CTu,u,u regression_test.py 116 INFO Server-Cert1 u,u,u regression_test.py 116 INFO Server-Cert2 u,u,u regression_test.py 117 INFO ERR: regression_test.py 213 INFO ##### restart master1 regression_test.py 216 INFO ##### Check PEM files of master1 (before setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) not in /etc/dirsrv/slapd-master1 ###################### regression_test.py 80 INFO /etc/dirsrv/slapd-master1/CAcertificate.pem is correctly not generated. regression_test.py 93 INFO /etc/dirsrv/slapd-master1/Server-Cert1.pem is correctly not generated. regression_test.py 106 INFO /etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is correctly not generated. regression_test.py 219 INFO ##### Set on to nsslapd-extract-pemfiles regression_test.py 222 INFO ##### restart master1 regression_test.py 225 INFO ##### Check PEM files of master1 (after setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) in /etc/dirsrv/slapd-master1 ###################### regression_test.py 71 INFO /etc/dirsrv/slapd-master1/CAcertificate.pem is successfully generated. regression_test.py 84 INFO /etc/dirsrv/slapd-master1/Server-Cert1.pem is successfully generated. regression_test.py 97 INFO /etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is successfully generated. regression_test.py 232 INFO ##### Extract PK12 file for master2: pk12util -o /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master1 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt regression_test.py 235 INFO ##### Check PK12 files regression_test.py 237 INFO /tmp/Server-Cert2.pk12 is successfully extracted. regression_test.py 242 INFO ##### stop master2 regression_test.py 245 INFO ##### Initialize Cert DB for master2 regression_test.py 247 INFO ##### Create key3.db and cert8.db database (master2): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master2', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 250 INFO ##### Import certs to master2 regression_test.py 251 INFO Importing CAcertificate regression_test.py 255 INFO ##### Importing Server-Cert2 to master2: pk12util -i /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master2 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt regression_test.py 257 INFO copy /etc/dirsrv/slapd-master1/pin.txt to /etc/dirsrv/slapd-master2/pin.txt regression_test.py 261 INFO ##### start master2 regression_test.py 264 INFO ##### enable SSL in master2 with all ciphers regression_test.py 46 INFO ######################### Enabling SSL LDAPSPORT 42636 ###################### regression_test.py 267 INFO ##### restart master2 regression_test.py 270 INFO ##### Check PEM files of master2 (before setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) not in /etc/dirsrv/slapd-master2 ###################### regression_test.py 80 INFO /etc/dirsrv/slapd-master2/CAcertificate.pem is correctly not generated. regression_test.py 93 INFO /etc/dirsrv/slapd-master2/Server-Cert2.pem is correctly not generated. regression_test.py 106 INFO /etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is correctly not generated. regression_test.py 273 INFO ##### Set on to nsslapd-extract-pemfiles regression_test.py 276 INFO ##### restart master2 regression_test.py 279 INFO ##### Check PEM files of master2 (after setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) in /etc/dirsrv/slapd-master2 ###################### regression_test.py 71 INFO /etc/dirsrv/slapd-master2/CAcertificate.pem is successfully generated. regression_test.py 84 INFO /etc/dirsrv/slapd-master2/Server-Cert2.pem is successfully generated. regression_test.py 97 INFO /etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is successfully generated. regression_test.py 282 INFO ##### restart master1 regression_test.py 285 INFO ######################### Creating SSL Keys and Certs Done ###################### regression_test.py 289 INFO ######################### Configure SSL/TLS agreements ###################### regression_test.py 290 INFO ######################## master1 -- startTLS -> master2 ##################### regression_test.py 291 INFO ##################### master1 <- tls_clientAuth -- master2 ################## regression_test.py 293 INFO ##### Update the agreement of master1 regression_test.py 299 INFO ##### Add the cert to the repl manager on master1 regression_test.py 313 INFO ##### master2 Server Cert in base64 format: MIICxzCCAa+gAwIBAgICA+owDQYJKoZIhvcNAQELBQAwETEPMA0GA1UEAxMGQ0FjZXJ0MB4XDTE4MDcyNzAwNDkwOVoXDTI4MDcyNzAwNDkwOVowPDEdMBsGA1UECxMUMzkwIERpcmVjdG9yeSBTZXJ2ZXIxGzAZBgNVBAMTEnNlcnZlci5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM0q917LAx4ZMtg1ag7lcxiynLtzuhqKh8QqUXJ2dgfkj8x+950aLeU7dDMLHneB3FwgA+qp1RZWNXka2Rz9JX9+u5N78us+pVDh5U1ZStVe+MR9F7fH5JrA3cKRjQm9alnhrJ7EERVe2W2+AKsdOXx0AuvWQvuUluvaUTwxQK511xnKOkYKhdRpzTbAPREc3nNqkybE1DzODFKhNkVQKO+RE9/H7lPwA/bCUU/QJjwdffYQ74D/AJ4oJ2mVswrBO66PUoiiI16l8+VRXtvzo14cKFRt818tY/pfAiIQwmrzkRTDXFHxHZ3XCkztTXXbntI+hc8EpAoq2xQNkhfL3wcCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEANg3WfKa2Yl3mh1CBAx3yh9NDhsMgQungyYQ+Zga9jGyVZs85pfxae3Y9J0j4o63IjGt1mALwSkfR2oDWfHHqjtjGhn5q+jrJgvPeS7pKhbsf0AZuu3Yt89n275bafD4d77POE6gaEM6vprdl7Erf2jycRMxAH+hwTyfXPrT8uY0NIt4AihP9P9kAFf7QITZq0Id4z1FzrMwFLrokOiTT0wg8SeGB4rDjEQIU87FjSgbhT/ZSrZHuCVnyjLkAjvabZrvhRj1xZ5AEf7qsxdMh22Fi2fZQJoCKQg1wPRFeY1ee2gjcSP6wcg0EMm4+OX9S7sXOFEEPCAWM+AaTmPpepw==
Failed tickets/ticket47462_test.py::test_ticket47462 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba6671470>

def test_ticket47462(topology_m2):
"""
Test that AES properly replaces DES during an update/restart, and that
replication also works correctly.
"""

#
# First set config as if it's an older version. Set DES to use
# libdes-plugin, MMR to depend on DES, delete the existing AES plugin,
# and set a DES password for the replication agreement.
#
# Add an extra attribute to the DES plugin args
#
try:
topology_m2.ms["master1"].modify_s(DES_PLUGIN,
> [(ldap.MOD_REPLACE, 'nsslapd-pluginEnabled', 'on')])

tickets/ticket47462_test.py:47:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb9e7c9400>
func = <built-in method modify_ext of LDAP object at 0x7fcba64b80f8>
args = ('cn=DES,cn=Password Storage Schemes,cn=plugins,cn=config', [(2, 'nsslapd-pluginEnabled', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket47721_test.py::test_ticket47721_1 3.22
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba66844a8>

def test_ticket47721_1(topology_m2):
log.info('Running test 1...')
# topology_m2.ms["master1"].log.info("Attach debugger\n\n")
# time.sleep(30)

new = _add_custom_at_definition()
topology_m2.ms["master1"].log.info("Add (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('attributetypes', new)

new = _chg_std_at_defintion()
topology_m2.ms["master1"].log.info("Chg (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('attributetypes', new)

new = _add_custom_oc_defintion()
topology_m2.ms["master1"].log.info("Add (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('objectClasses', new)

new = _chg_std_oc_defintion()
topology_m2.ms["master1"].log.info("Chg (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('objectClasses', new)

mod = [(ldap.MOD_REPLACE, 'description', b'Hello world 1')]
dn = "cn=%s0,%s" % (OTHER_NAME, SUFFIX)
topology_m2.ms["master2"].modify_s(dn, mod)

replication_check(topology_m2)
ent = topology_m2.ms["master1"].getEntry(dn, ldap.SCOPE_BASE, "(objectclass=*)")
> assert ensure_str(ent.getValue('description')) == 'Hello world 1'
E AssertionError: assert None == 'Hello world 1'
E + where None = ensure_str(None)
E + where None = <bound method Entry.getValue of dn: cn=other_entry0,dc=example,dc=com\ncn: other_entry0\nobjectClass: top\nobjectClass: person\nsn: other_entry0\n\n>('description')
E + where <bound method Entry.getValue of dn: cn=other_entry0,dc=example,dc=com\ncn: other_entry0\nobjectClass: top\nobjectClass: person\nsn: other_entry0\n\n> = dn: cn=other_entry0,dc=example,dc=com\ncn: other_entry0\nobjectClass: top\nobjectClass: person\nsn: other_entry0\n\n.getValue

tickets/ticket47721_test.py:151: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket47721_test:Running test 1... INFO:lib389:Add (M2) b"( ATticket47721-oid NAME 'ATticket47721' DESC 'test AT ticket 47721' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 X-ORIGIN ( 'Test 47721' 'user defined' ) )" INFO:lib389:Chg (M2) b"( 2.16.840.1.113730.3.1.569 NAME 'cosPriority' DESC 'Netscape defined attribute type' SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 X-ORIGIN 'Netscape Directory Server' )" INFO:lib389:Add (M2) b"( OCticket47721-oid NAME 'OCticket47721' DESC 'An group of related automount objects' SUP top STRUCTURAL MUST ou X-ORIGIN 'draft-howard-rfc2307bis' )" INFO:lib389:Chg (M2) b"( 5.3.6.1.1.1.2.0 NAME 'trustAccount' DESC 'Sets trust accounts information' SUP top AUXILIARY MUST trustModel MAY ( accessTo $ ou ) X-ORIGIN 'nss_ldap/pam_ldap' )" INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working ------------------------------ Captured log call -------------------------------
ticket47721_test.py 125 INFO Running test 1... ticket47721_test.py 130 INFO Add (M2) b"( ATticket47721-oid NAME 'ATticket47721' DESC 'test AT ticket 47721' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 X-ORIGIN ( 'Test 47721' 'user defined' ) )" ticket47721_test.py 134 INFO Chg (M2) b"( 2.16.840.1.113730.3.1.569 NAME 'cosPriority' DESC 'Netscape defined attribute type' SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 X-ORIGIN 'Netscape Directory Server' )" ticket47721_test.py 138 INFO Add (M2) b"( OCticket47721-oid NAME 'OCticket47721' DESC 'An group of related automount objects' SUP top STRUCTURAL MUST ou X-ORIGIN 'draft-howard-rfc2307bis' )" ticket47721_test.py 142 INFO Chg (M2) b"( 5.3.6.1.1.1.2.0 NAME 'trustAccount' DESC 'Sets trust accounts information' SUP top AUXILIARY MUST trustModel MAY ( accessTo $ ou ) X-ORIGIN 'nss_ldap/pam_ldap' )" replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working
Failed tickets/ticket47721_test.py::test_ticket47721_3 77.50
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba66844a8>

def test_ticket47721_3(topology_m2):
'''
Check that the supplier can update its schema from consumer schema
Update M2 schema, then trigger a replication M1->M2
'''
log.info('Running test 3...')

# stop RA M2->M1, so that M1 can only learn being a supplier
ents = topology_m2.ms["master2"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
topology_m2.ms["master2"].agreement.pause(ents[0].dn)

new = _add_custom_at_definition('ATtest3')
topology_m2.ms["master1"].log.info("Update schema (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('attributetypes', new)
time.sleep(1)

new = _add_custom_oc_defintion('OCtest3')
topology_m2.ms["master1"].log.info("Update schema (M2) %s " % new)
topology_m2.ms["master2"].schema.add_schema('objectClasses', new)
time.sleep(1)

mod = [(ldap.MOD_REPLACE, 'description', b'Hello world 3')]
dn = "cn=%s0,%s" % (OTHER_NAME, SUFFIX)
topology_m2.ms["master1"].modify_s(dn, mod)

replication_check(topology_m2)
ent = topology_m2.ms["master2"].getEntry(dn, ldap.SCOPE_BASE, "(objectclass=*)")
assert ensure_str(ent.getValue('description')) == 'Hello world 3'

time.sleep(5)
schema_csn_master1 = topology_m2.ms["master1"].schema.get_schema_csn()
schema_csn_master2 = topology_m2.ms["master2"].schema.get_schema_csn()
log.debug('Master 1 schemaCSN: %s' % schema_csn_master1)
log.debug('Master 2 schemaCSN: %s' % schema_csn_master2)
if schema_csn_master1 == schema_csn_master2:
# We need to give the server a little more time, then check it again
log.info('Schema CSNs are not in sync yet: m1 (%s) vs m2 (%s), wait a little...'
% (schema_csn_master1, schema_csn_master2))
time.sleep(SLEEP_INTERVAL)
schema_csn_master1 = topology_m2.ms["master1"].schema.get_schema_csn()
schema_csn_master2 = topology_m2.ms["master2"].schema.get_schema_csn()

assert schema_csn_master1 is not None
# schema csn on M2 is larger that on M1. M1 only took the new definitions
> assert schema_csn_master1 != schema_csn_master2
E AssertionError: assert b'5b5a6e34000000000000' != b'5b5a6e34000000000000'

tickets/ticket47721_test.py:233: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket47721_test:Running test 3... INFO:lib389:Pausing replication cn=001,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config INFO:lib389:Update schema (M2) b"( ATtest3-oid NAME 'ATtest3' DESC 'test AT ticket 47721' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 X-ORIGIN ( 'Test 47721' 'user defined' ) )" INFO:lib389:Update schema (M2) b"( OCtest3-oid NAME 'OCtest3' DESC 'An group of related automount objects' SUP top STRUCTURAL MUST ou X-ORIGIN 'draft-howard-rfc2307bis' )" INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working DEBUG:tests.tickets.ticket47721_test:Master 1 schemaCSN: b'5b5a6e34000000000000' DEBUG:tests.tickets.ticket47721_test:Master 2 schemaCSN: b'5b5a6e34000000000000' INFO:tests.tickets.ticket47721_test:Schema CSNs are not in sync yet: m1 (b'5b5a6e34000000000000') vs m2 (b'5b5a6e34000000000000'), wait a little... ------------------------------ Captured log call -------------------------------
ticket47721_test.py 193 INFO Running test 3... agreement.py 830 INFO Pausing replication cn=001,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config ticket47721_test.py 201 INFO Update schema (M2) b"( ATtest3-oid NAME 'ATtest3' DESC 'test AT ticket 47721' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 X-ORIGIN ( 'Test 47721' 'user defined' ) )" ticket47721_test.py 206 INFO Update schema (M2) b"( OCtest3-oid NAME 'OCtest3' DESC 'An group of related automount objects' SUP top STRUCTURAL MUST ou X-ORIGIN 'draft-howard-rfc2307bis' )" replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working ticket47721_test.py 221 DEBUG Master 1 schemaCSN: b'5b5a6e34000000000000' ticket47721_test.py 222 DEBUG Master 2 schemaCSN: b'5b5a6e34000000000000' ticket47721_test.py 226 INFO Schema CSNs are not in sync yet: m1 (b'5b5a6e34000000000000') vs m2 (b'5b5a6e34000000000000'), wait a little...
Failed tickets/ticket47838_test.py::test_47838_init 9.94
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba66d3550>

def test_47838_init(topology_st):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
"""
_header(topology_st, 'Testing Ticket 47838 - harden the list of ciphers available by default')
onss_version = os.popen("rpm -q nss | awk -F'-' '{print $2}'", "r")
global nss_version
nss_version = onss_version.readline()
nss_ssl = NssSsl(dbpath=topology_st.standalone.get_cert_dir())
nss_ssl.reinit()
nss_ssl.create_rsa_ca()
nss_ssl.create_rsa_key_and_cert()

log.info("\n######################### enable SSL in the directory server with all ciphers ######################\n")
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3', b'off'),
(ldap.MOD_REPLACE, 'nsTLS1', b'on'),
(ldap.MOD_REPLACE, 'nsSSLClientAuth', b'allowed'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on'),
(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'+all')])

topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-security', b'on'),
(ldap.MOD_REPLACE, 'nsslapd-ssl-check-hostname', b'off'),
(ldap.MOD_REPLACE, 'nsslapd-secureport', ensure_bytes(MY_SECURE_PORT))])

topology_st.standalone.add_s(Entry((RSA_DN, {'objectclass': "top nsEncryptionModule".split(),
'cn': RSA,
'nsSSLPersonalitySSL': SERVERCERT,
'nsSSLToken': 'internal (software)',
> 'nsSSLActivation': 'on'})))

tickets/ticket47838_test.py:85:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba6838f28>
func = <built-in method result4 of LDAP object at 0x7fcb93040350>
args = (6, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.ALREADY_EXISTS: {'desc': 'Already exists'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: ALREADY_EXISTS
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### Testing Ticket 47838 - harden the list of ciphers available by default INFO:lib389:####### INFO:lib389:############################################### INFO:lib389.utils: ######################### enable SSL in the directory server with all ciphers ###################### ------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Testing Ticket 47838 - harden the list of ciphers available by default ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 69 INFO ######################### enable SSL in the directory server with all ciphers ######################
Failed tickets/ticket47838_test.py::test_47838_run_4 5.15
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba66d3550>

def test_47838_run_4(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
default allowWeakCipher
"""
_header(topology_st, 'Test Case 5 - Check no nsSSL3Ciphers (default setting) with default allowWeakCipher')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_DELETE, 'nsSSL3Ciphers', b'-all')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_3' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)
enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:283: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### Test Case 5 - Check no nsSSL3Ciphers (default setting) with default allowWeakCipher INFO:lib389:####### INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Enabled ciphers: 24 INFO:lib389.utils:Disabled ciphers: 47 ------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 5 - Check no nsSSL3Ciphers (default setting) with default allowWeakCipher ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 267 INFO ######################### Restarting the server ###################### ticket47838_test.py 278 INFO Enabled ciphers: 24 ticket47838_test.py 279 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_5 5.11
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba66d3550>

def test_47838_run_5(topology_st):
"""
Check nsSSL3Ciphers: default
Default ciphers are enabled.
default allowWeakCipher
"""
_header(topology_st, 'Test Case 6 - Check default nsSSL3Ciphers (default setting) with default allowWeakCipher')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'default')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_4' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:326: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### Test Case 6 - Check default nsSSL3Ciphers (default setting) with default allowWeakCipher INFO:lib389:####### INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Enabled ciphers: 24 INFO:lib389.utils:Disabled ciphers: 47 ------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 6 - Check default nsSSL3Ciphers (default setting) with default allowWeakCipher ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 309 INFO ######################### Restarting the server ###################### ticket47838_test.py 321 INFO Enabled ciphers: 24 ticket47838_test.py 322 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_8 5.17
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba66d3550>

def test_47838_run_8(topology_st):
"""
Check nsSSL3Ciphers: default + allowWeakCipher: off
Strong Default ciphers are enabled.
"""
_header(topology_st, 'Test Case 9 - Check default nsSSL3Ciphers (default setting + allowWeakCipher: off)')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'default'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'off')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_7' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:439: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### Test Case 9 - Check default nsSSL3Ciphers (default setting + allowWeakCipher: off) INFO:lib389:####### INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Enabled ciphers: 24 INFO:lib389.utils:Disabled ciphers: 47 ------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 9 - Check default nsSSL3Ciphers (default setting + allowWeakCipher: off) ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 422 INFO ######################### Restarting the server ###################### ticket47838_test.py 434 INFO Enabled ciphers: 24 ticket47838_test.py 435 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_9 5.07
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba66d3550>

def test_47838_run_9(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
allowWeakCipher: on
nsslapd-errorlog-level: 0
"""
_header(topology_st,
'Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', None),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on')])
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', None)])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_8' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
if nss_version >= NSS330:
> assert ecount == 33
E assert 24 == 33

tickets/ticket47838_test.py:484: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on INFO:lib389:####### INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Enabled ciphers: 24 INFO:lib389.utils:Disabled ciphers: 0 ------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 469 INFO ######################### Restarting the server ###################### ticket47838_test.py 481 INFO Enabled ciphers: 24 ticket47838_test.py 482 INFO Disabled ciphers: 0
Failed tickets/ticket47950_test.py::test_ticket47950 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6632a58>

def test_ticket47950(topology_st):
"""
Testing nsslapd-plugin-binddn-tracking does not cause issues around
access control and reconfiguring replication/repl agmt.
"""

log.info('Testing Ticket 47950 - Testing nsslapd-plugin-binddn-tracking')

#
# Turn on bind dn tracking
#
try:
> topology_st.standalone.modify_s("cn=config", [(ldap.MOD_REPLACE, 'nsslapd-plugin-binddn-tracking', 'on')])

tickets/ticket47950_test.py:39:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba6434748>
func = <built-in method modify_ext of LDAP object at 0x7fcb9305a468>
args = ('cn=config', [(2, 'nsslapd-plugin-binddn-tracking', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket47950_test:Testing Ticket 47950 - Testing nsslapd-plugin-binddn-tracking ------------------------------ Captured log call -------------------------------
ticket47950_test.py 33 INFO Testing Ticket 47950 - Testing nsslapd-plugin-binddn-tracking
Failed tickets/ticket47966_test.py::test_ticket47966 0.01
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba60045c0>

def test_ticket47966(topology_m2):
'''
Testing bulk import when the backend with VLV was recreated.
If the test passes without the server crash, 47966 is verified.
'''
log.info('Testing Ticket 47966 - [VLV] slapd crashes during Dogtag clone reinstallation')
M1 = topology_m2.ms["master1"]
M2 = topology_m2.ms["master2"]
m1_m2_agmt = M1.agreement.list(suffix=DEFAULT_SUFFIX)[0].dn

log.info('0. Create a VLV index on Master 2.')
# get the backend entry
be = M2.replica.conn.backend.list(suffix=DEFAULT_SUFFIX)
if not be:
log.fatal("ticket47966: enable to retrieve the backend for %s" % DEFAULT_SUFFIX)
raise ValueError("no backend for suffix %s" % DEFAULT_SUFFIX)
bent = be[0]
beName = bent.getValue('cn')
beDn = "cn=%s,cn=ldbm database,cn=plugins,cn=config" % beName

# generate vlvSearch entry
vlvSrchDn = "cn=vlvSrch,%s" % beDn
log.info('0-1. vlvSearch dn: %s' % vlvSrchDn)
vlvSrchEntry = Entry(vlvSrchDn)
vlvSrchEntry.setValues('objectclass', 'top', 'vlvSearch')
vlvSrchEntry.setValues('cn', 'vlvSrch')
vlvSrchEntry.setValues('vlvBase', DEFAULT_SUFFIX)
vlvSrchEntry.setValues('vlvFilter', '(|(objectclass=*)(objectclass=ldapsubentry))')
vlvSrchEntry.setValues('vlvScope', '2')
> M2.add_s(vlvSrchEntry)

tickets/ticket47966_test.py:50:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba66c8160>
func = <built-in method result4 of LDAP object at 0x7fcba66c1ee0>
args = (29, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.NO_SUCH_OBJECT: {'desc': 'No such object'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: NO_SUCH_OBJECT
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket47966_test:Testing Ticket 47966 - [VLV] slapd crashes during Dogtag clone reinstallation INFO:tests.tickets.ticket47966_test:0. Create a VLV index on Master 2. INFO:lib389:List backend with suffix=dc=example,dc=com INFO:tests.tickets.ticket47966_test:0-1. vlvSearch dn: cn=vlvSrch,cn=b'userRoot',cn=ldbm database,cn=plugins,cn=config ------------------------------ Captured log call -------------------------------
ticket47966_test.py 26 INFO Testing Ticket 47966 - [VLV] slapd crashes during Dogtag clone reinstallation ticket47966_test.py 31 INFO 0. Create a VLV index on Master 2. backend.py 71 INFO List backend with suffix=dc=example,dc=com ticket47966_test.py 43 INFO 0-1. vlvSearch dn: cn=vlvSrch,cn=b'userRoot',cn=ldbm database,cn=plugins,cn=config
Failed tickets/ticket47988_test.py::test_ticket47988_init 4.93
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_init(topology_m2):
"""
It adds
- Objectclass with MAY 'member'
- an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
It deletes the anonymous aci

"""

_header(topology_m2, 'test_ticket47988_init')

# enable acl error logging
mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', ensure_bytes(str(8192)))] # REPL
topology_m2.ms["master1"].modify_s(DN_CONFIG, mod)
topology_m2.ms["master2"].modify_s(DN_CONFIG, mod)

mod = [(ldap.MOD_REPLACE, 'nsslapd-accesslog-level', ensure_bytes(str(260)))] # Internal op
topology_m2.ms["master1"].modify_s(DN_CONFIG, mod)
topology_m2.ms["master2"].modify_s(DN_CONFIG, mod)

# add dummy entries
for cpt in range(MAX_OTHERS):
name = "%s%d" % (OTHER_NAME, cpt)
topology_m2.ms["master1"].add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
'objectclass': "top person".split(),
'sn': name,
'cn': name})))

# check that entry 0 is replicated before
loop = 0
entryDN = "cn=%s0,%s" % (OTHER_NAME, SUFFIX)
while loop <= 10:
try:
ent = topology_m2.ms["master2"].getEntry(entryDN, ldap.SCOPE_BASE, "(objectclass=*)", ['telephonenumber'])
break
except ldap.NO_SUCH_OBJECT:
time.sleep(1)
loop += 1
assert (loop <= 10)

topology_m2.ms["master1"].stop(timeout=10)
topology_m2.ms["master2"].stop(timeout=10)

# install the specific schema M1: ipa3.3, M2: ipa4.1
schema_file = os.path.join(topology_m2.ms["master1"].getDir(__file__, DATA_DIR), "ticket47988/schema_ipa3.3.tar.gz")
_install_schema(topology_m2.ms["master1"], schema_file)
schema_file = os.path.join(topology_m2.ms["master1"].getDir(__file__, DATA_DIR), "ticket47988/schema_ipa4.1.tar.gz")
_install_schema(topology_m2.ms["master2"], schema_file)

> topology_m2.ms["master1"].start(timeout=10)

/export/tests/tickets/ticket47988_test.py:155:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:1197: in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

popenargs = (['/usr/bin/systemctl', 'start', 'dirsrv@master1'],), kwargs = {}
retcode = 1, cmd = ['/usr/bin/systemctl', 'start', 'dirsrv@master1']

def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.

The arguments are the same as for the call function. Example:

check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
> raise CalledProcessError(retcode, cmd)
E subprocess.CalledProcessError: Command '['/usr/bin/systemctl', 'start', 'dirsrv@master1']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:291: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_init INFO:lib389:####### INFO:lib389:################################################### INFO:lib389:add /etc/dirsrv/slapd-master1/schema/02common.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-admin.ldif INFO:lib389:replace /etc/dirsrv/slapd-master1/schema/99user.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60nss-ldap.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60autofs.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-web.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60samba.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/10dna-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/05rfc4523.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60basev2.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/10automember-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/05rfc2927.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/10mep-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60ipadns.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/10rfc2307.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-mail.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/05rfc4524.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60trust.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60ipaconfig.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-directory.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60eduperson.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60mozilla.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/65ipasudo.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60rfc3712.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60rfc2739.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-value.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60acctpolicy.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/01core389.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60sabayon.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60pam-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/00core.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/25java-object.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60sudo.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/70ipaotp.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60pureftpd.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/61kerberos-ipav3.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60kerberos.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60basev3.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/06inetorgperson.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/30ns-common.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/28pilot.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/20subscriber.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/50ns-certificate.ldif INFO:lib389:add /etc/dirsrv/slapd-master1/schema/60posix-winsync-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/02common.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-admin.ldif INFO:lib389:replace /etc/dirsrv/slapd-master2/schema/99user.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60nss-ldap.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60autofs.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-web.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60samba.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/10dna-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/05rfc4523.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60basev2.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/10automember-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/05rfc2927.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/10mep-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60ipadns.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/10rfc2307.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-mail.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/05rfc4524.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60trust.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60ipaconfig.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-directory.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60eduperson.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60mozilla.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/65ipasudo.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60rfc3712.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60rfc2739.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-value.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60acctpolicy.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/01core389.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60sabayon.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60pam-plugin.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/00core.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/25java-object.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60sudo.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/70ipaotp.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60pureftpd.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/61kerberos-ipav3.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60kerberos.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60basev3.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/06inetorgperson.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/30ns-common.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/28pilot.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/20subscriber.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/50ns-certificate.ldif INFO:lib389:add /etc/dirsrv/slapd-master2/schema/60posix-winsync-plugin.ldif Job for dirsrv@master1.service failed because the control process exited with error code. See "systemctl status dirsrv@master1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_init ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ################################################### ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/02common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-admin.ldif ticket47988_test.py 96 INFO replace /etc/dirsrv/slapd-master1/schema/99user.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60nss-ldap.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60autofs.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-web.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60samba.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10dna-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc4523.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60basev2.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10automember-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc2927.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10mep-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60ipadns.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10rfc2307.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-mail.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc4524.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60trust.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60ipaconfig.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-directory.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60eduperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60mozilla.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/65ipasudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60rfc3712.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60rfc2739.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-value.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60acctpolicy.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/01core389.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60sabayon.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60pam-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/00core.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/25java-object.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60sudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/70ipaotp.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60pureftpd.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/61kerberos-ipav3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60kerberos.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60basev3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/06inetorgperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/30ns-common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/28pilot.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/20subscriber.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-certificate.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60posix-winsync-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/02common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-admin.ldif ticket47988_test.py 96 INFO replace /etc/dirsrv/slapd-master2/schema/99user.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60nss-ldap.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60autofs.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-web.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60samba.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10dna-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc4523.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60basev2.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10automember-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc2927.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10mep-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60ipadns.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10rfc2307.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-mail.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc4524.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60trust.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60ipaconfig.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-directory.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60eduperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60mozilla.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/65ipasudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60rfc3712.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60rfc2739.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-value.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60acctpolicy.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/01core389.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60sabayon.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60pam-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/00core.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/25java-object.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60sudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/70ipaotp.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60pureftpd.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/61kerberos-ipav3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60kerberos.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60basev3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/06inetorgperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/30ns-common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/28pilot.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/20subscriber.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-certificate.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60posix-winsync-plugin.ldif
Failed tickets/ticket47988_test.py::test_ticket47988_1 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_1(topology_m2):
'''
Check that replication is working and pause replication M2->M1
'''
_header(topology_m2, 'test_ticket47988_1')

topology_m2.ms["master1"].log.debug("\n\nCheck that replication is working and pause replication M2->M1\n")
> _do_update_entry(supplier=topology_m2.ms["master2"], consumer=topology_m2.ms["master1"], attempts=5)

/export/tests/tickets/ticket47988_test.py:232:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:182: in _do_update_entry
supplier.modify_s(entryDN, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93042eb8>
func = <built-in method result4 of LDAP object at 0x7fcba638da80>
args = (31, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_1 INFO:lib389:####### INFO:lib389:################################################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_1 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_2 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_2(topology_m2):
'''
Update M1 schema and trigger update M1->M2
So M1 should learn new/extended definitions that are in M2 schema
'''
_header(topology_m2, 'test_ticket47988_2')

topology_m2.ms["master1"].log.debug("\n\nUpdate M1 schema and an entry on M1\n")
> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:244:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:126: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:846: in search_ext_s
return self.result(msgid,all=1,timeout=timeout)[1]
/usr/lib/python3.6/site-packages/lib389/__init__.py:135: in inner
objtype, data = f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:738: in result
resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:742: in result2
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba629c128>
func = <built-in method result4 of LDAP object at 0x7fcba64450d0>
args = (67, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_2 INFO:lib389:####### INFO:lib389:################################################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_2 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_3 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_3(topology_m2):
'''
Resume replication M2->M1 and check replication is still working
'''
_header(topology_m2, 'test_ticket47988_3')

> _resume_M2_to_M1(topology_m2)

/export/tests/tickets/ticket47988_test.py:281:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:220: in _resume_M2_to_M1
ents = topology_m2.ms["master2"].agreement.list(suffix=SUFFIX)
/usr/lib/python3.6/site-packages/lib389/agreement.py:542: in list
replica_entries = self.conn.replica.list(suffix)
/usr/lib/python3.6/site-packages/lib389/replica.py:174: in list
ents = self.conn.search_s(base, ldap.SCOPE_SUBTREE, filtr)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93042eb8>
func = <built-in method search_ext of LDAP object at 0x7fcba638da80>
args = ('cn=mapping tree,cn=config', 2, '(&(objectclass=nsds5Replica)(nsDS5ReplicaRoot=dc=example,dc=com))', None, 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_3 INFO:lib389:####### INFO:lib389:################################################### INFO:lib389: ######################### resume RA M2->M1 ###################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_3 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ################################################### ticket47988_test.py 219 INFO ######################### resume RA M2->M1 ######################
Failed tickets/ticket47988_test.py::test_ticket47988_4 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_4(topology_m2):
'''
Check schemaCSN is identical on both server
And save the nsschemaCSN to later check they do not change unexpectedly
'''
_header(topology_m2, 'test_ticket47988_4')

> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:293:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:126: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba629c128>
func = <built-in method search_ext of LDAP object at 0x7fcba64450d0>
args = ('cn=schema', 0, 'objectclass=*', ['nsSchemaCSN'], 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_4 INFO:lib389:####### INFO:lib389:################################################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_4 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_5 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_5(topology_m2):
'''
Check schemaCSN do not change unexpectedly
'''
_header(topology_m2, 'test_ticket47988_5')

> _do_update_entry(supplier=topology_m2.ms["master1"], consumer=topology_m2.ms["master2"], attempts=5)

/export/tests/tickets/ticket47988_test.py:311:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:182: in _do_update_entry
supplier.modify_s(entryDN, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba629c128>
func = <built-in method modify_ext of LDAP object at 0x7fcba64450d0>
args = ('cn=other_entry0,dc=example,dc=com', [(2, 'telephonenumber', b'142')], None, None)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_5 INFO:lib389:####### INFO:lib389:################################################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_5 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_6 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba642bb00>

def test_ticket47988_6(topology_m2):
'''
Update M1 schema and trigger update M2->M1
So M2 should learn new/extended definitions that are in M1 schema
'''

_header(topology_m2, 'test_ticket47988_6')

topology_m2.ms["master1"].log.debug("\n\nUpdate M1 schema and an entry on M1\n")
> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:334:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:126: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba629c128>
func = <built-in method search_ext of LDAP object at 0x7fcba64450d0>
args = ('cn=schema', 0, 'objectclass=*', ['nsSchemaCSN'], 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### INFO:lib389:####### test_ticket47988_6 INFO:lib389:####### INFO:lib389:################################################### ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_6 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket48194_test.py::test_init 5.22
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6431a20>

def test_init(topology_st):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
"""
_header(topology_st, 'Testing Ticket 48194 - harden the list of ciphers available by default')

nss_ssl = NssSsl(dbpath=topology_st.standalone.get_cert_dir())
nss_ssl.reinit()
nss_ssl.create_rsa_ca()
nss_ssl.create_rsa_key_and_cert()

log.info("\n######################### enable SSL in the directory server with all ciphers ######################\n")
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3', b'off'),
(ldap.MOD_REPLACE, 'nsTLS1', b'on'),
(ldap.MOD_REPLACE, 'nsSSLClientAuth', b'allowed'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on'),
(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'+all')])

topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-security', b'on'),
(ldap.MOD_REPLACE, 'nsslapd-ssl-check-hostname', b'off'),
(ldap.MOD_REPLACE, 'nsslapd-secureport', ensure_bytes(LDAPSPORT))])

topology_st.standalone.add_s(Entry((RSA_DN, {'objectclass': "top nsEncryptionModule".split(),
'cn': RSA,
'nsSSLPersonalitySSL': SERVERCERT,
'nsSSLToken': 'internal (software)',
> 'nsSSLActivation': 'on'})))

/export/tests/tickets/ticket48194_test.py:72:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb9edc4630>
func = <built-in method result4 of LDAP object at 0x7fcb9edb9af8>
args = (6, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.ALREADY_EXISTS: {'desc': 'Already exists'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: ALREADY_EXISTS
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### Testing Ticket 48194 - harden the list of ciphers available by default INFO:lib389:############################################### INFO:lib389.utils: ######################### enable SSL in the directory server with all ciphers ###################### ------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Testing Ticket 48194 - harden the list of ciphers available by default ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 56 INFO ######################### enable SSL in the directory server with all ciphers ######################
Failed tickets/ticket48194_test.py::test_run_0 5.94
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6431a20>

def test_run_0(topology_st):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
Note: allowWeakCipher: on
"""
_header(topology_st, 'Test Case 1 - Check the ciphers availability for "+all"; allowWeakCipher: on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', b'64')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.restart(timeout=120)

> connectWithOpenssl(topology_st, 'DES-CBC3-SHA', True)

/export/tests/tickets/ticket48194_test.py:132:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6431a20>
cipher = 'DES-CBC3-SHA', expect = True

def connectWithOpenssl(topology_st, cipher, expect):
"""
Connect with the given cipher
Condition:
If expect is True, the handshake should be successful.
If expect is False, the handshake should be refused with
access log: "Cannot communicate securely with peer:
no common encryption algorithm(s)."
"""
log.info("Testing %s -- expect to handshake %s", cipher, "successfully" if expect else "failed")

myurl = 'localhost:%s' % LDAPSPORT
cmdline = ['/usr/bin/openssl', 's_client', '-connect', myurl, '-cipher', cipher]

strcmdline = '/usr/bin/openssl s_client -connect localhost:%s -cipher %s' % (LDAPSPORT, cipher)
log.info("Running cmdline: %s", strcmdline)

try:
proc = subprocess.Popen(cmdline, stdout=subprocess.PIPE, stdin=subprocess.PIPE, stderr=subprocess.STDOUT)
except ValueError:
log.info("%s failed: %s", cmdline, ValueError)
proc.kill()

while True:
l = proc.stdout.readline()
if l == b"":
break
if b'Cipher is' in l:
log.info("Found: %s", l)
if expect:
if b'(NONE)' in l:
> assert False
E assert False

/export/tests/tickets/ticket48194_test.py:106: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### Test Case 1 - Check the ciphers availability for "+all"; allowWeakCipher: on INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Testing DES-CBC3-SHA -- expect to handshake successfully INFO:lib389.utils:Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA INFO:lib389.utils:Found: b'New, (NONE), Cipher is (NONE)\n' ------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Test Case 1 - Check the ciphers availability for "+all"; allowWeakCipher: on ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 129 INFO ######################### Restarting the server ###################### ticket48194_test.py 84 INFO Testing DES-CBC3-SHA -- expect to handshake successfully ticket48194_test.py 90 INFO Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA ticket48194_test.py 103 INFO Found: b'New, (NONE), Cipher is (NONE)\n'
Failed tickets/ticket48194_test.py::test_run_9 6.15
topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6431a20>

def test_run_9(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
allowWeakCipher: on
nsslapd-errorlog-level: 0
"""
_header(topology_st,
'Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', None),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on')])
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', None)])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.48194_8' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(2)
topology_st.standalone.start(timeout=120)

> connectWithOpenssl(topology_st, 'DES-CBC3-SHA', True)

/export/tests/tickets/ticket48194_test.py:321:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcba6431a20>
cipher = 'DES-CBC3-SHA', expect = True

def connectWithOpenssl(topology_st, cipher, expect):
"""
Connect with the given cipher
Condition:
If expect is True, the handshake should be successful.
If expect is False, the handshake should be refused with
access log: "Cannot communicate securely with peer:
no common encryption algorithm(s)."
"""
log.info("Testing %s -- expect to handshake %s", cipher, "successfully" if expect else "failed")

myurl = 'localhost:%s' % LDAPSPORT
cmdline = ['/usr/bin/openssl', 's_client', '-connect', myurl, '-cipher', cipher]

strcmdline = '/usr/bin/openssl s_client -connect localhost:%s -cipher %s' % (LDAPSPORT, cipher)
log.info("Running cmdline: %s", strcmdline)

try:
proc = subprocess.Popen(cmdline, stdout=subprocess.PIPE, stdin=subprocess.PIPE, stderr=subprocess.STDOUT)
except ValueError:
log.info("%s failed: %s", cmdline, ValueError)
proc.kill()

while True:
l = proc.stdout.readline()
if l == b"":
break
if b'Cipher is' in l:
log.info("Found: %s", l)
if expect:
if b'(NONE)' in l:
> assert False
E assert False

/export/tests/tickets/ticket48194_test.py:106: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ############################################### INFO:lib389:####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on INFO:lib389:############################################### INFO:lib389.utils: ######################### Restarting the server ###################### INFO:lib389.utils:Testing DES-CBC3-SHA -- expect to handshake successfully INFO:lib389.utils:Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA INFO:lib389.utils:Found: b'New, (NONE), Cipher is (NONE)\n' ------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 314 INFO ######################### Restarting the server ###################### ticket48194_test.py 84 INFO Testing DES-CBC3-SHA -- expect to handshake successfully ticket48194_test.py 90 INFO Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA ticket48194_test.py 103 INFO Found: b'New, (NONE), Cipher is (NONE)\n'
Failed tickets/ticket48226_test.py::test_ticket48226_set_purgedelay 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93295208>

def test_ticket48226_set_purgedelay(topology_m2):
args = {REPLICA_PURGE_DELAY: '5',
REPLICA_PURGE_INTERVAL: '5'}
try:
> topology_m2.ms["master1"].replica.setProperties(DEFAULT_SUFFIX, None, None, args)

/export/tests/tickets/ticket48226_test.py:25:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.replica.ReplicaLegacy object at 0x7fcba63ffe48>
suffix = 'dc=example,dc=com', replica_dn = None, replica_entry = None
properties = {'ReplicaPurgeDelay': '5', 'ReplicaTombstonePurgeInterval': '5'}

def setProperties(self, suffix=None, replica_dn=None, replica_entry=None,
properties=None):
'''
Set the properties of the replica. If an 'replica_entry' (Entry) is
provided, it updates the entry, else it updates the entry on the
server. If the 'replica_dn' is provided it retrieves the entry
using it, else it retrieve the replica using the 'suffix'.

@param suffix : suffix stored in that replica (online update)
@param replica_dn: DN of the replica (online update)
@param replica_entry: Entry of a replica (offline update)
@param properties: dictionary of properties
Supported properties are:
REPLICA_SUFFIX
REPLICA_ID
REPLICA_TYPE
REPLICA_BINDDN
REPLICA_PURGE_DELAY
REPLICA_PRECISE_PURGING
REPLICA_REFERRAL
REPLICA_FLAGS

@return None

@raise ValueError: if unknown properties
ValueError: if invalid replica_entry
ValueError: if replica_dn or suffix are not associated to
a replica

'''

# No properties provided
if len(properties) == 0:
return

# check that the given properties are valid
for prop in properties:
# skip the prefix to add/del value
if not inProperties(prop, REPLICA_PROPNAME_TO_ATTRNAME):
raise ValueError("unknown property: %s" % prop)
else:
self.log.debug("setProperties: %s:%s" %
(prop, properties[prop]))

# At least we need to have suffix/replica_dn/replica_entry
if not suffix and not replica_dn and not replica_entry:
raise InvalidArgumentError("suffix and replica_dn and replica_" +
"entry are missing")

# the caller provides a set of properties to set into a replica entry
if replica_entry:
if not isinstance(replica_entry, Entry):
raise ValueError("invalid instance of the replica_entry")

# that is fine, now set the values
for prop in properties:
val = rawProperty(prop)

# for Entry update it is a replace
replica_entry.update({REPLICA_PROPNAME_TO_ATTRNAME[val]:
properties[prop]})

return

# If it provides the suffix or the replicaDN, replica.list will
# return the appropriate entry
ents = self.conn.replica.list(suffix=suffix, replica_dn=replica_dn)
if len(ents) != 1:
if replica_dn:
raise ValueError("invalid replica DN: %s" % replica_dn)
else:
raise ValueError("invalid suffix: %s" % suffix)

# build the MODS
mods = []
for prop in properties:
# take the operation type from the property name
val = rawProperty(prop)
if str(prop).startswith('+'):
op = ldap.MOD_ADD
elif str(prop).startswith('-'):
op = ldap.MOD_DELETE
else:
op = ldap.MOD_REPLACE

mods.append((op, REPLICA_PROPNAME_TO_ATTRNAME[val],
properties[prop]))

# that is fine now to apply the MOD
> self.conn.modify_s(ents[0].dn, mods)

/usr/lib/python3.6/site-packages/lib389/replica.py:266:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')])
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:167:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93287e48>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]

def modify_s(self,dn,modlist):
> return self.modify_ext_s(dn,modlist,None,None)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:167:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93287e48>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]
serverctrls = None, clientctrls = None

def modify_ext_s(self,dn,modlist,serverctrls=None,clientctrls=None):
> msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:167:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93287e48>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]
serverctrls = None, clientctrls = None

def modify_ext(self,dn,modlist,serverctrls=None,clientctrls=None):
"""
modify_ext(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> int
"""
if PY2:
dn = self._bytesify_input('dn', dn)
modlist = self._bytesify_modlist('modlist', modlist, with_opcode=True)
> return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method modify_ext of LDAP object at 0x7fcba63f1378>, 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:167:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93287e48>
func = <built-in method modify_ext of LDAP object at 0x7fcba63f1378>
args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '5')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError

During handling of the above exception, another exception occurred:

topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93295208>

def test_ticket48226_set_purgedelay(topology_m2):
args = {REPLICA_PURGE_DELAY: '5',
REPLICA_PURGE_INTERVAL: '5'}
try:
topology_m2.ms["master1"].replica.setProperties(DEFAULT_SUFFIX, None, None, args)
except:
log.fatal('Failed to configure replica')
> assert False
E assert False

/export/tests/tickets/ticket48226_test.py:28: AssertionError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
CRITICAL:tests.tickets.ticket48226_test:Failed to configure replica ------------------------------ Captured log call -------------------------------
ticket48226_test.py 27 CRITICAL Failed to configure replica
Failed tickets/ticket48226_test.py::test_ticket48226_1 0.01
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93295208>

def test_ticket48226_1(topology_m2):
name = 'test_entry'
dn = "cn=%s,%s" % (name, SUFFIX)

topology_m2.ms["master1"].add_s(Entry((dn, {'objectclass': "top person".split(),
'sn': name,
'cn': name})))

# First do an update that is replicated
mods = [(ldap.MOD_ADD, 'description', '5')]
> topology_m2.ms["master1"].modify_s(dn, mods)

/export/tests/tickets/ticket48226_test.py:50:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93287e48>
func = <built-in method modify_ext of LDAP object at 0x7fcba63f1378>
args = ('cn=test_entry,dc=example,dc=com', [(0, 'description', '5')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '5')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48252_test.py::test_ticket48252_run_0 4.19
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9908>

def test_ticket48252_run_0(topology_st):
"""
Delete an entry cn=test_entry0
Check it is not in the 'cn' index file
"""
log.info("Case 1 - Check deleted entry is not in the 'cn' index file")
uas = UserAccounts(topology_st.standalone, DEFAULT_SUFFIX)
del_rdn = "uid=%s0" % TEST_USER
del_entry = uas.get('%s0' % TEST_USER)
log.info(" Deleting a test entry %s..." % del_entry)
del_entry.delete()

> assert in_index_file(topology_st, 0, 'cn') is False

/export/tests/tickets/ticket48252_test.py:78:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9908>, id = 0
index = 'cn'

def in_index_file(topology_st, id, index):
key = "%s%s" % (TEST_USER, id)
log.info(" dbscan - checking %s is in index file %s..." % (key, index))
dbscanOut = topology_st.standalone.dbscan(DEFAULT_BENAME, index)

> if key in dbscanOut:
E TypeError: a bytes-like object is required, not 'str'

/export/tests/tickets/ticket48252_test.py:56: TypeError
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48252_test:Case 1 - Check deleted entry is not in the 'cn' index file INFO:tests.tickets.ticket48252_test: Deleting a test entry test_user0... INFO:tests.tickets.ticket48252_test: dbscan - checking test_user0 is in index file cn... INFO:lib389:Running script: ['/usr/bin/dbscan', '-f', '/var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db'] ------------------------------ Captured log call -------------------------------
ticket48252_test.py 71 INFO Case 1 - Check deleted entry is not in the 'cn' index file ticket48252_test.py 75 INFO Deleting a test entry test_user0... ticket48252_test.py 53 INFO dbscan - checking test_user0 is in index file cn... __init__.py 3048 INFO Running script: ['/usr/bin/dbscan', '-f', '/var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db']
Failed tickets/ticket48252_test.py::test_ticket48252_run_1 0.03
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9908>

def test_ticket48252_run_1(topology_st):
"""
Delete an entry cn=test_entry1
Check it is in the 'objectclass' index file as a tombstone entry
"""
log.info("Case 2 - Check deleted entry is in the 'objectclass' index file as a tombstone entry")
uas = UserAccounts(topology_st.standalone, DEFAULT_SUFFIX)
del_rdn = "uid=%s1" % TEST_USER
del_entry = uas.get('%s1' % TEST_USER)
log.info(" Deleting a test entry %s..." % del_rdn)
del_entry.delete()

entry = topology_st.standalone.search_s(SUFFIX, ldap.SCOPE_SUBTREE, '(&(objectclass=nstombstone)(%s))' % del_rdn)
assert len(entry) == 1
log.info(" entry %s is in the objectclass index file." % del_rdn)

log.info(" db2index - reindexing %s ..." % 'objectclass')
> assert topology_st.standalone.db2index(DEFAULT_BENAME, 'objectclass')
E AssertionError: assert False
E + where False = <bound method DirSrv.db2index of <lib389.DirSrv object at 0x7fcb93cc9d30>>('userRoot', 'objectclass')
E + where <bound method DirSrv.db2index of <lib389.DirSrv object at 0x7fcb93cc9d30>> = <lib389.DirSrv object at 0x7fcb93cc9d30>.db2index
E + where <lib389.DirSrv object at 0x7fcb93cc9d30> = <lib389.topologies.TopologyMain object at 0x7fcb93cc9908>.standalone

/export/tests/tickets/ticket48252_test.py:105: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48252_test:Case 2 - Check deleted entry is in the 'objectclass' index file as a tombstone entry INFO:tests.tickets.ticket48252_test: Deleting a test entry uid=test_user1... INFO:tests.tickets.ticket48252_test: entry uid=test_user1 is in the objectclass index file. INFO:tests.tickets.ticket48252_test: db2index - reindexing objectclass ... ERROR:lib389:db2index: Can not operate while directory server is running ------------------------------ Captured log call -------------------------------
ticket48252_test.py 93 INFO Case 2 - Check deleted entry is in the 'objectclass' index file as a tombstone entry ticket48252_test.py 97 INFO Deleting a test entry uid=test_user1... ticket48252_test.py 102 INFO entry uid=test_user1 is in the objectclass index file. ticket48252_test.py 104 INFO db2index - reindexing objectclass ... __init__.py 2950 ERROR db2index: Can not operate while directory server is running
Failed tickets/ticket48266_test.py::test_ticket48266_fractional 0.02
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93c4a1d0>
entries = None

def test_ticket48266_fractional(topology_m2, entries):
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1

mod = [(ldap.MOD_REPLACE, 'nsDS5ReplicatedAttributeList', ['(objectclass=*) $ EXCLUDE telephonenumber']),
(ldap.MOD_REPLACE, 'nsds5ReplicaStripAttrs', ['modifiersname modifytimestamp'])]
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
m1_m2_agmt = ents[0].dn
> topology_m2.ms["master1"].modify_s(ents[0].dn, mod)

/export/tests/tickets/ticket48266_test.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93cc98d0>
func = <built-in method modify_ext of LDAP object at 0x7fcb93c7ef80>
args = ('cn=002,cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsDS5ReplicatedAttributeList', ['(...ctclass=*) $ EXCLUDE telephonenumber']), (2, 'nsds5ReplicaStripAttrs', ['modifiersname modifytimestamp'])], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '(objectclass=*) $ EXCLUDE telephonenumber')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket48266_test.py::test_ticket48266_check_repl_desc 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93c4a1d0>
entries = None

def test_ticket48266_check_repl_desc(topology_m2, entries):
name = "cn=%s1,%s" % (NEW_ACCOUNT, SUFFIX)
value = 'check repl. description'
mod = [(ldap.MOD_REPLACE, 'description', value)]
> topology_m2.ms["master1"].modify_s(name, mod)

/export/tests/tickets/ticket48266_test.py:61:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93cc98d0>
func = <built-in method modify_ext of LDAP object at 0x7fcb93c7ef80>
args = ('cn=new_account1,dc=example,dc=com', [(2, 'description', 'check repl. description')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'c')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48266_test.py::test_ticket48266_count_csn_evaluation 0.01
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb93c4a1d0>
entries = None

def test_ticket48266_count_csn_evaluation(topology_m2, entries):
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
> first_csn = _get_first_not_replicated_csn(topology_m2)

/export/tests/tickets/ticket48266_test.py:172:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket48266_test.py:116: in _get_first_not_replicated_csn
topology_m2.ms["master1"].modify_s(name, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93cc98d0>
func = <built-in method modify_ext of LDAP object at 0x7fcb93c7ef80>
args = ('cn=new_account2,dc=example,dc=com', [(2, 'telephonenumber', '123456')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '1')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48325_test.py::test_ticket48325 0.00
topology_m1h1c1 = <lib389.topologies.TopologyMain object at 0x7fcb93286080>

def test_ticket48325(topology_m1h1c1):
"""
Test that the RUV element order is correctly maintained when promoting
a hub or consumer.
"""

#
# Promote consumer to master
#
try:
> topology_m1h1c1.cs["consumer1"].changelog.create()

/export/tests/tickets/ticket48325_test.py:46:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93c4a160>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39101 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39201 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 471 INFO Creating replication topology. replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39101 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working replica.py 1588 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39201 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created replica.py 1645 INFO SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working
Failed tickets/ticket48759_test.py::test_ticket48759 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93c5dba8>

def test_ticket48759(topology_st):
"""
The fix for ticket 48759 has to prevent plugin calls for tombstone purging

The test uses the memberof and retrocl plugins to verify this.
In tombstone purging without the fix the mmeberof plugin is called,
if the tombstone entry is a group,
it modifies the user entries for the group
and if retrocl is enabled this mod is written to the retrocl

The test sequence is:
- enable replication
- enable memberof and retro cl plugin
- add user entries
- add a group and add the users as members
- verify memberof is set to users
- delete the group
- verify memberof is removed from users
- add group again
- verify memberof is set to users
- get number of changes in retro cl for one user
- configure tombstone purging
- wait for purge interval to pass
- add a dummy entry to increase maxcsn
- wait for purge interval to pass two times
- get number of changes in retro cl for user again
- assert there was no additional change
"""

log.info('Testing Ticket 48759 - no plugin calls for tombstone purging')

#
# Setup Replication
#
log.info('Setting up replication...')
topology_st.standalone.replica.enableReplication(suffix=DEFAULT_SUFFIX, role=ReplicaRole.MASTER,
> replicaId=REPLICAID_MASTER_1)

/export/tests/tickets/ticket48759_test.py:109:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/replica.py:560: in enableReplication
self.conn.changelog.create()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93cc94a8>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48759_test:Testing Ticket 48759 - no plugin calls for tombstone purging INFO:tests.tickets.ticket48759_test:Setting up replication... INFO:lib389:List backend with suffix=dc=example,dc=com ------------------------------ Captured log call -------------------------------
ticket48759_test.py 102 INFO Testing Ticket 48759 - no plugin calls for tombstone purging ticket48759_test.py 107 INFO Setting up replication... backend.py 71 INFO List backend with suffix=dc=example,dc=com
Failed tickets/ticket48906_test.py::test_ticket48906_setup 0.18
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>

def test_ticket48906_setup(topology_st):
"""
Check there is no core
Create a second backend
stop DS (that should trigger the core)
check there is no core
"""
log.info('Testing Ticket 48906 - ns-slapd crashes during the shutdown after adding attribute with a matching rule')

# bind as directory manager
topology_st.standalone.log.info("Bind as %s" % DN_DM)
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

# check there is no core
entry = topology_st.standalone.search_s(CONFIG_DN, ldap.SCOPE_BASE, "(cn=config)", ['nsslapd-workingdir'])
assert entry
assert entry[0]
assert entry[0].hasAttr('nsslapd-workingdir')
path = entry[0].getValue('nsslapd-workingdir')
> cores = fnmatch.filter(os.listdir(path), 'core.*')

/export/tests/tickets/ticket48906_test.py:70:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

names = [b'errors.rotationinfo', b'audit.rotationinfo', b'audit', b'access.rotationinfo', b'access', b'errors']
pat = 'core.*'

def filter(names, pat):
"""Return the subset of the list NAMES that match PAT."""
result = []
pat = os.path.normcase(pat)
match = _compile_pattern(pat)
if os.path is posixpath:
# normcase on posix is NOP. Optimize it away from the loop.
for name in names:
> if match(name):
E TypeError: cannot use a string pattern on a bytes-like object

/usr/lib64/python3.6/fnmatch.py:56: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48906_test:Testing Ticket 48906 - ns-slapd crashes during the shutdown after adding attribute with a matching rule INFO:lib389:Bind as cn=Directory Manager ------------------------------ Captured log call -------------------------------
ticket48906_test.py 58 INFO Testing Ticket 48906 - ns-slapd crashes during the shutdown after adding attribute with a matching rule ticket48906_test.py 61 INFO Bind as cn=Directory Manager
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_default 0.01
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>

def test_ticket48906_dblock_default(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that before any change config/monitor')
topology_st.standalone.log.info('### contains the default value')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')
> _check_monitored_value(topology_st, DBLOCK_DEFAULT)

/export/tests/tickets/ticket48906_test.py:153:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>
expected_value = '10000'

def _check_monitored_value(topology_st, expected_value):
entries = topology_st.standalone.search_s(ldbm_monitor, ldap.SCOPE_BASE, '(objectclass=*)')
> assert (entries[0].hasValue(DBLOCK_ATTR_MONITOR) and entries[0].getValue(DBLOCK_ATTR_MONITOR) == expected_value)
E AssertionError: assert (True and b'10000' == '10000')
E + where True = <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.hasValue
E + and b'10000' = <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.getValue

/export/tests/tickets/ticket48906_test.py:103: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389:################################### INFO:lib389:### INFO:lib389:### Check that before any change config/monitor INFO:lib389:### contains the default value INFO:lib389:### INFO:lib389:################################### ------------------------------ Captured log call -------------------------------
ticket48906_test.py 147 INFO ################################### ticket48906_test.py 148 INFO ### ticket48906_test.py 149 INFO ### Check that before any change config/monitor ticket48906_test.py 150 INFO ### contains the default value ticket48906_test.py 151 INFO ### ticket48906_test.py 152 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_ldap_update 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>

def test_ticket48906_dblock_ldap_update(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that after ldap update')
topology_st.standalone.log.info('### - monitor contains DEFAULT')
topology_st.standalone.log.info('### - configured contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - After stop dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - After stop guardian contains DEFAULT')
topology_st.standalone.log.info('### In fact guardian should differ from config to recreate the env')
topology_st.standalone.log.info('### Check that after restart (DBenv recreated)')
topology_st.standalone.log.info('### - monitor contains DBLOCK_LDAP_UPDATE ')
topology_st.standalone.log.info('### - configured contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

> topology_st.standalone.modify_s(ldbm_config, [(ldap.MOD_REPLACE, DBLOCK_ATTR_CONFIG, DBLOCK_LDAP_UPDATE)])

/export/tests/tickets/ticket48906_test.py:173:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba63a45c0>
func = <built-in method modify_ext of LDAP object at 0x7fcb9eddf3c8>
args = ('cn=config,cn=ldbm database,cn=plugins,cn=config', [(2, 'nsslapd-db-locks', '20000')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '2')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
----------------------------- Captured stderr call -----------------------------
INFO:lib389:################################### INFO:lib389:### INFO:lib389:### Check that after ldap update INFO:lib389:### - monitor contains DEFAULT INFO:lib389:### - configured contains DBLOCK_LDAP_UPDATE INFO:lib389:### - After stop dse.ldif contains DBLOCK_LDAP_UPDATE INFO:lib389:### - After stop guardian contains DEFAULT INFO:lib389:### In fact guardian should differ from config to recreate the env INFO:lib389:### Check that after restart (DBenv recreated) INFO:lib389:### - monitor contains DBLOCK_LDAP_UPDATE INFO:lib389:### - configured contains DBLOCK_LDAP_UPDATE INFO:lib389:### - dse.ldif contains DBLOCK_LDAP_UPDATE INFO:lib389:### INFO:lib389:################################### ------------------------------ Captured log call -------------------------------
ticket48906_test.py 158 INFO ################################### ticket48906_test.py 159 INFO ### ticket48906_test.py 160 INFO ### Check that after ldap update ticket48906_test.py 161 INFO ### - monitor contains DEFAULT ticket48906_test.py 162 INFO ### - configured contains DBLOCK_LDAP_UPDATE ticket48906_test.py 163 INFO ### - After stop dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 164 INFO ### - After stop guardian contains DEFAULT ticket48906_test.py 165 INFO ### In fact guardian should differ from config to recreate the env ticket48906_test.py 166 INFO ### Check that after restart (DBenv recreated) ticket48906_test.py 167 INFO ### - monitor contains DBLOCK_LDAP_UPDATE ticket48906_test.py 168 INFO ### - configured contains DBLOCK_LDAP_UPDATE ticket48906_test.py 169 INFO ### - dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 170 INFO ### ticket48906_test.py 171 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_edit_update 2.47
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>

def test_ticket48906_dblock_edit_update(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that after stop')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - guardian contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### Check that edit dse+restart')
topology_st.standalone.log.info('### - monitor contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### - configured contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### Check that after stop')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### - guardian contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

topology_st.standalone.stop(timeout=10)
> _check_dse_ldif_value(topology_st, attr=DBLOCK_ATTR_CONFIG, expected_value=DBLOCK_LDAP_UPDATE)

/export/tests/tickets/ticket48906_test.py:204:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>
attr = 'nsslapd-db-locks', expected_value = '20000'

def _check_dse_ldif_value(topology_st, attr=DBLOCK_ATTR_CONFIG, expected_value=DBLOCK_LDAP_UPDATE):
dse_ref_ldif = topology_st.standalone.confdir + '/dse.ldif'
dse_ref = open(dse_ref_ldif, "r")

# Check the DBLOCK in dse.ldif
value = None
while True:
line = dse_ref.readline()
if (line == ''):
break
elif attr in line.lower():
value = line.split()[1]
> assert (value == expected_value)
E AssertionError: assert '10000' == '20000'
E - 10000
E ? ^
E + 20000
E ? ^

/export/tests/tickets/ticket48906_test.py:118: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389:################################### INFO:lib389:### INFO:lib389:### Check that after stop INFO:lib389:### - dse.ldif contains DBLOCK_LDAP_UPDATE INFO:lib389:### - guardian contains DBLOCK_LDAP_UPDATE INFO:lib389:### Check that edit dse+restart INFO:lib389:### - monitor contains DBLOCK_EDIT_UPDATE INFO:lib389:### - configured contains DBLOCK_EDIT_UPDATE INFO:lib389:### Check that after stop INFO:lib389:### - dse.ldif contains DBLOCK_EDIT_UPDATE INFO:lib389:### - guardian contains DBLOCK_EDIT_UPDATE INFO:lib389:### INFO:lib389:################################### ------------------------------ Captured log call -------------------------------
ticket48906_test.py 189 INFO ################################### ticket48906_test.py 190 INFO ### ticket48906_test.py 191 INFO ### Check that after stop ticket48906_test.py 192 INFO ### - dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 193 INFO ### - guardian contains DBLOCK_LDAP_UPDATE ticket48906_test.py 194 INFO ### Check that edit dse+restart ticket48906_test.py 195 INFO ### - monitor contains DBLOCK_EDIT_UPDATE ticket48906_test.py 196 INFO ### - configured contains DBLOCK_EDIT_UPDATE ticket48906_test.py 197 INFO ### Check that after stop ticket48906_test.py 198 INFO ### - dse.ldif contains DBLOCK_EDIT_UPDATE ticket48906_test.py 199 INFO ### - guardian contains DBLOCK_EDIT_UPDATE ticket48906_test.py 200 INFO ### ticket48906_test.py 201 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_robust 2.21
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>

def test_ticket48906_dblock_robust(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that the following values are rejected')
topology_st.standalone.log.info('### - negative value')
topology_st.standalone.log.info('### - insuffisant value')
topology_st.standalone.log.info('### - invalid value')
topology_st.standalone.log.info('### Check that minimum value is accepted')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

topology_st.standalone.start(timeout=10)
> _check_monitored_value(topology_st, DBLOCK_EDIT_UPDATE)

/export/tests/tickets/ticket48906_test.py:254:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93cc9748>
expected_value = '40000'

def _check_monitored_value(topology_st, expected_value):
entries = topology_st.standalone.search_s(ldbm_monitor, ldap.SCOPE_BASE, '(objectclass=*)')
> assert (entries[0].hasValue(DBLOCK_ATTR_MONITOR) and entries[0].getValue(DBLOCK_ATTR_MONITOR) == expected_value)
E AssertionError: assert (True and b'10000' == '40000')
E + where True = <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.hasValue
E + and b'10000' = <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.getValue

/export/tests/tickets/ticket48906_test.py:103: AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389:################################### INFO:lib389:### INFO:lib389:### Check that the following values are rejected INFO:lib389:### - negative value INFO:lib389:### - insuffisant value INFO:lib389:### - invalid value INFO:lib389:### Check that minimum value is accepted INFO:lib389:### INFO:lib389:################################### ------------------------------ Captured log call -------------------------------
ticket48906_test.py 243 INFO ################################### ticket48906_test.py 244 INFO ### ticket48906_test.py 245 INFO ### Check that the following values are rejected ticket48906_test.py 246 INFO ### - negative value ticket48906_test.py 247 INFO ### - insuffisant value ticket48906_test.py 248 INFO ### - invalid value ticket48906_test.py 249 INFO ### Check that minimum value is accepted ticket48906_test.py 250 INFO ### ticket48906_test.py 251 INFO ###################################
Failed tickets/ticket48944_test.py::test_ticket48944 52.84
topo = <lib389.topologies.TopologyMain object at 0x7fcb93d0ccf8>

def test_ticket48944(topo):
"""On a read only replica invalid state info can accumulate

:ID: 833be131-f3bf-493e-97c6-3121438a07b1
:feature: Account Policy Plugin
:setup: Two master and two consumer setup
:steps: 1. Configure Account policy plugin with alwaysrecordlogin set to yes
2. Check if entries are synced across masters and consumers
3. Stop all masters and consumers
4. Start master1 and bind as user1 to create lastLoginTime attribute
5. Start master2 and wait for the sync of lastLoginTime attribute
6. Stop master1 and bind as user1 from master2
7. Check if lastLoginTime attribute is updated and greater than master1
8. Stop master2, start consumer1, consumer2 and then master2
9. Check if lastLoginTime attribute is updated on both consumers
10. Bind as user1 to both consumers and check the value is updated
11. Check if lastLoginTime attribute is not updated from consumers
12. Start master1 and make sure the lastLoginTime attribute is not updated on consumers
13. Bind as user1 from master1 and check if all masters and consumers have the same value
14. Check error logs of consumers for "deletedattribute;deleted" message
:expectedresults: No accumulation of replica invalid state info on consumers
"""

log.info("Ticket 48944 - On a read only replica invalid state info can accumulate")
user_name = 'newbzusr'
tuserdn = 'uid={}1,ou=people,{}'.format(user_name, SUFFIX)
inst_list = ['master1', 'master2', 'consumer1', 'consumer2']
for inst_name in inst_list:
_enable_plugin(topo, inst_name)

log.info('Sleep for 10secs for the server to come up')
time.sleep(10)
log.info('Add few entries to server and check if entries are replicated')
for nos in range(10):
userdn = 'uid={}{},ou=people,{}'.format(user_name, nos, SUFFIX)
try:
topo.ms['master1'].add_s(Entry((userdn, {
'objectclass': 'top person'.split(),
'objectclass': 'inetorgperson',
'cn': user_name,
'sn': user_name,
'userpassword': USER_PW,
'mail': '{}@redhat.com'.format(user_name)})))
except ldap.LDAPError as e:
log.error('Failed to add {} user: error {}'.format(userdn, e.message['desc']))
raise e

log.info('Checking if entries are synced across masters and consumers')
entries_m1 = topo.ms['master1'].search_s(SUFFIX, ldap.SCOPE_SUBTREE, 'uid={}*'.format(user_name), ['uid=*'])
exp_entries = str(entries_m1).count('dn: uid={}*'.format(user_name))
entries_m2 = topo.ms['master2'].search_s(SUFFIX, ldap.SCOPE_SUBTREE, 'uid={}*'.format(user_name), ['uid=*'])
act_entries = str(entries_m2).count('dn: uid={}*'.format(user_name))
assert act_entries == exp_entries
inst_list = ['consumer1', 'consumer2']
for inst in inst_list:
entries_other = topo.cs[inst].search_s(SUFFIX, ldap.SCOPE_SUBTREE, 'uid={}*'.format(user_name), ['uid=*'])
act_entries = str(entries_other).count('dn: uid={}*'.format(user_name))
assert act_entries == exp_entries

topo.ms['master2'].stop(timeout=10)
topo.ms['master1'].stop(timeout=10)
topo.cs['consumer1'].stop(timeout=10)
topo.cs['consumer2'].stop(timeout=10)

topo.ms['master1'].start(timeout=10)
lastLogin_m1_1 = _last_login_time(topo, tuserdn, 'master1', 'bind_n_check')

log.info('Start master2 to sync lastLoginTime attribute from master1')
topo.ms['master2'].start(timeout=10)
time.sleep(5)
log.info('Stop master1')
topo.ms['master1'].stop(timeout=10)
log.info('Bind as user1 to master2 and check if lastLoginTime attribute is greater than master1')
> lastLogin_m2_1 = _last_login_time(topo, tuserdn, 'master2', 'bind_n_check')

/export/tests/tickets/ticket48944_test.py:156:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket48944_test.py:34: in _last_login_time
topo.ms[inst_name].simple_bind_s(userdn, USER_PW)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444: in simple_bind_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba69f3b38>
func = <built-in method result4 of LDAP object at 0x7fcb93cd0788>
args = (2, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.INVALID_CREDENTIALS: {'desc': 'Invalid credentials'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: INVALID_CREDENTIALS
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39202, 'ldap-secureport': 63902, 'server-id': 'consumer2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Joining consumer consumer1 from master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39201 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39201 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39201 INFO:lib389.topologies:Joining consumer consumer2 from master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39202 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39202 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39202 is working INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39202 INFO:lib389.topologies:Ensuring consumer consumer1 from master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39201 already exists INFO:lib389.topologies:Ensuring consumer consumer2 from master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39202 already exists INFO:lib389.topologies:Ensuring consumer consumer1 from master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39201 is was created INFO:lib389.topologies:Ensuring consumer consumer2 from master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39202 is was created ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39202, 'ldap-secureport': 63902, 'server-id': 'consumer2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 166 INFO Joining consumer consumer1 from master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39201 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39201 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working replica.py 1645 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39201 topologies.py 166 INFO Joining consumer consumer2 from master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39202 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39202 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39202 is working replica.py 1645 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39202 topologies.py 171 INFO Ensuring consumer consumer1 from master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39201 already exists topologies.py 171 INFO Ensuring consumer consumer2 from master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39202 already exists topologies.py 171 INFO Ensuring consumer consumer1 from master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39201 is was created topologies.py 171 INFO Ensuring consumer consumer2 from master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39202 is was created----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48944_test:Ticket 48944 - On a read only replica invalid state info can accumulate INFO:tests.tickets.ticket48944_test:Enable account policy plugin and configure required attributes INFO:tests.tickets.ticket48944_test:Configure Account policy plugin on master1 INFO:tests.tickets.ticket48944_test:Enable account policy plugin and configure required attributes INFO:tests.tickets.ticket48944_test:Configure Account policy plugin on master2 INFO:tests.tickets.ticket48944_test:Enable account policy plugin and configure required attributes INFO:tests.tickets.ticket48944_test:Configure Account policy plugin on consumer1 INFO:tests.tickets.ticket48944_test:Enable account policy plugin and configure required attributes INFO:tests.tickets.ticket48944_test:Configure Account policy plugin on consumer2 INFO:tests.tickets.ticket48944_test:Sleep for 10secs for the server to come up INFO:tests.tickets.ticket48944_test:Add few entries to server and check if entries are replicated INFO:tests.tickets.ticket48944_test:Checking if entries are synced across masters and consumers INFO:tests.tickets.ticket48944_test:Start master2 to sync lastLoginTime attribute from master1 INFO:tests.tickets.ticket48944_test:Stop master1 INFO:tests.tickets.ticket48944_test:Bind as user1 to master2 and check if lastLoginTime attribute is greater than master1 ------------------------------ Captured log call -------------------------------
ticket48944_test.py 106 INFO Ticket 48944 - On a read only replica invalid state info can accumulate ticket48944_test.py 50 INFO Enable account policy plugin and configure required attributes ticket48944_test.py 52 INFO Configure Account policy plugin on master1 ticket48944_test.py 50 INFO Enable account policy plugin and configure required attributes ticket48944_test.py 52 INFO Configure Account policy plugin on master2 ticket48944_test.py 50 INFO Enable account policy plugin and configure required attributes ticket48944_test.py 67 INFO Configure Account policy plugin on consumer1 ticket48944_test.py 50 INFO Enable account policy plugin and configure required attributes ticket48944_test.py 67 INFO Configure Account policy plugin on consumer2 ticket48944_test.py 113 INFO Sleep for 10secs for the server to come up ticket48944_test.py 115 INFO Add few entries to server and check if entries are replicated ticket48944_test.py 130 INFO Checking if entries are synced across masters and consumers ticket48944_test.py 150 INFO Start master2 to sync lastLoginTime attribute from master1 ticket48944_test.py 153 INFO Stop master1 ticket48944_test.py 155 INFO Bind as user1 to master2 and check if lastLoginTime attribute is greater than master1
Failed tickets/ticket48961_test.py::test_ticket48961_storagescheme 0.05
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93d04c88>

def test_ticket48961_storagescheme(topology_st):
"""
Test deleting of the storage scheme.
"""

default = topology_st.standalone.config.get_attr_val('passwordStorageScheme')
# Change it
topology_st.standalone.config.set('passwordStorageScheme', 'CLEAR')
# Now delete it
> topology_st.standalone.config.remove('passwordStorageScheme', None)

/export/tests/tickets/ticket48961_test.py:27:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:282: in remove
self.set(key, value, action=ldap.MOD_DELETE)
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:352: in set
serverctrls=self._server_controls, clientctrls=self._client_controls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93a58cf8>
func = <built-in method result4 of LDAP object at 0x7fcb93b1b4e0>
args = (4, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.OPERATIONS_ERROR: {'desc': 'Operations error', 'info': 'passwordStorageScheme: deleting the value is not allowed.'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: OPERATIONS_ERROR
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Failed tickets/ticket48961_test.py::test_ticket48961_deleteall 12.94
topology_st = <lib389.topologies.TopologyMain object at 0x7fcb93d04c88>

def test_ticket48961_deleteall(topology_st):
"""
Test that we can delete all valid attrs, and that a few are rejected.
"""
attr_to_test = {
'nsslapd-listenhost': 'localhost',
'nsslapd-securelistenhost': 'localhost',
'nsslapd-allowed-sasl-mechanisms': 'GSSAPI',
'nsslapd-svrtab': 'Some bogus data', # This one could reset?
}
attr_to_fail = {
# These are the values that should always be dn dse.ldif too
'nsslapd-localuser': 'dirsrv',
'nsslapd-defaultnamingcontext': 'dc=example,dc=com', # Can't delete
'nsslapd-accesslog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/access',
'nsslapd-auditlog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/audit',
'nsslapd-errorlog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/errors',
'nsslapd-tmpdir': '/tmp',
'nsslapd-rundir': '/opt/dirsrv/var/run/dirsrv',
'nsslapd-bakdir': '/opt/dirsrv/var/lib/dirsrv/slapd-standalone/bak',
'nsslapd-certdir': '/opt/dirsrv/etc/dirsrv/slapd-standalone',
'nsslapd-instancedir': '/opt/dirsrv/lib/dirsrv/slapd-standalone',
'nsslapd-ldifdir': '/opt/dirsrv/var/lib/dirsrv/slapd-standalone/ldif',
'nsslapd-lockdir': '/opt/dirsrv/var/lock/dirsrv/slapd-standalone',
'nsslapd-schemadir': '/opt/dirsrv/etc/dirsrv/slapd-standalone/schema',
'nsslapd-workingdir': '/opt/dirsrv/var/log/dirsrv/slapd-standalone',
'nsslapd-localhost': 'localhost.localdomain',
# These can't be reset, but might be in dse.ldif. Probably in libglobs.
'nsslapd-certmap-basedn': 'cn=certmap,cn=config',
'nsslapd-port': '38931', # Can't delete
'nsslapd-secureport': '636', # Can't delete
'nsslapd-conntablesize': '1048576',
'nsslapd-rootpw': '{SSHA512}...',
# These are hardcoded server magic.
'nsslapd-hash-filters': 'off', # Can't delete
'nsslapd-requiresrestart': 'cn=config:nsslapd-port', # Can't change
'nsslapd-plugin': 'cn=case ignore string syntax,cn=plugins,cn=config', # Can't change
'nsslapd-privatenamespaces': 'cn=schema', # Can't change
'nsslapd-allowed-to-delete-attrs': 'None', # Can't delete
'nsslapd-accesslog-list': 'List!', # Can't delete
'nsslapd-auditfaillog-list': 'List!',
'nsslapd-auditlog-list': 'List!',
'nsslapd-errorlog-list': 'List!',
'nsslapd-config': 'cn=config',
'nsslapd-versionstring': '389-Directory/1.3.6.0',
'objectclass': '',
'cn': '',
# These are the odd values
'nsslapd-backendconfig': 'cn=config,cn=userRoot,cn=ldbm database,cn=plugins,cn=config', # Doesn't exist?
'nsslapd-betype': 'ldbm database', # Doesn't exist?
'nsslapd-connection-buffer': 1, # Has an ldap problem
'nsslapd-malloc-mmap-threshold': '-10', # Defunct anyway
'nsslapd-malloc-mxfast': '-10',
'nsslapd-malloc-trim-threshold': '-10',
'nsslapd-referralmode': '',
'nsslapd-saslpath': '',
'passwordadmindn': '',
}

config_entry = topology_st.standalone.config.raw_entry()

for attr in config_entry.getAttrs():
if attr.lower() in attr_to_fail:
# We know this will fail, so skip
pass
else:
log.info("Reseting %s" % (attr))
# Check if we have to do some override of this attr.
# Some attributes need specific syntax, so we override just these.
newval = topology_st.standalone.config.get_attr_vals(attr)
log.info(" --> %s" % newval)
if attr.lower() in attr_to_test:
newval = attr_to_test[attr]
log.info("override --> %s" % newval)
# We need to set the attr to its own value
# so that it's "written".
topology_st.standalone.config.set(attr, newval)
# Now we can really reset
> _reset_config_value(topology_st.standalone, attr)

/export/tests/tickets/ticket48961_test.py:119:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket48961_test.py:36: in _reset_config_value
inst.config.remove(attrname, None)
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:282: in remove
self.set(key, value, action=ldap.MOD_DELETE)
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:352: in set
serverctrls=self._server_controls, clientctrls=self._client_controls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93a58cf8>
func = <built-in method result4 of LDAP object at 0x7fcb93b1b4e0>
args = (712, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.OPERATIONS_ERROR: {'desc': 'Operations error', 'info': 'passwordStorageScheme: deleting the value is not allowed.'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: OPERATIONS_ERROR
----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-mode INFO:tests.tickets.ticket48961_test: --> [b'600'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-mode to b'600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logrotationsync-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logrotationsync-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logrotationsynchour INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logrotationsynchour to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logrotationsyncmin INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logrotationsyncmin to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logrotationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logrotationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-mode INFO:tests.tickets.ticket48961_test: --> [b'600'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-mode to b'600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-maxlogsperdir INFO:tests.tickets.ticket48961_test: --> [b'10'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-maxlogsperdir to b'10' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-level INFO:tests.tickets.ticket48961_test: --> [b'16384'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-level to b'16384' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logging-enabled INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logging-enabled to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-mode INFO:tests.tickets.ticket48961_test: --> [b'600'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-mode to b'600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logexpirationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logexpirationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logging-enabled INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logging-enabled to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-maxthreadsperconn INFO:tests.tickets.ticket48961_test: --> [b'5'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-maxthreadsperconn to b'5' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logexpirationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logexpirationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logrotationsync-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logrotationsync-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logrotationsynchour INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logrotationsynchour to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logrotationsyncmin INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logrotationsyncmin to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logrotationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logrotationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting passwordInHistory INFO:tests.tickets.ticket48961_test: --> [b'6'] INFO:tests.tickets.ticket48961_test:Reset passwordInHistory to b'6' INFO:tests.tickets.ticket48961_test:Reseting passwordUnlock INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset passwordUnlock to b'on' INFO:tests.tickets.ticket48961_test:Reseting passwordGraceLimit INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordGraceLimit to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logrotationsync-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logrotationsync-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logrotationsynchour INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logrotationsynchour to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logrotationsyncmin INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logrotationsyncmin to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logrotationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logrotationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting passwordMustChange INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordMustChange to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-pwpolicy-local INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-pwpolicy-local to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-pwpolicy-inherit-global INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-pwpolicy-inherit-global to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logmaxdiskspace INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logmaxdiskspace to b'100' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-sizelimit INFO:tests.tickets.ticket48961_test: --> [b'2000'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-sizelimit to b'2000' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-maxlogsize INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-maxlogsize to b'100' INFO:tests.tickets.ticket48961_test:Reseting passwordWarning INFO:tests.tickets.ticket48961_test: --> [b'86400'] INFO:tests.tickets.ticket48961_test:Reset passwordWarning to b'86400' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-readonly INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-readonly to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-sasl-mapping-fallback INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-sasl-mapping-fallback to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-threadnumber INFO:tests.tickets.ticket48961_test: --> [b'24'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-threadnumber to b'24' INFO:tests.tickets.ticket48961_test:Reseting passwordLockout INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordLockout to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-enquote-sup-oc INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-enquote-sup-oc to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ioblocktimeout INFO:tests.tickets.ticket48961_test: --> [b'300000'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ioblocktimeout to b'300000' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-max-filter-nest-level INFO:tests.tickets.ticket48961_test: --> [b'40'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-max-filter-nest-level to b'40' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logmaxdiskspace INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logmaxdiskspace to b'100' INFO:tests.tickets.ticket48961_test:Reseting passwordMinLength INFO:tests.tickets.ticket48961_test: --> [b'8'] INFO:tests.tickets.ticket48961_test:Reset passwordMinLength to b'8' INFO:tests.tickets.ticket48961_test:Reseting passwordMinDigits INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinDigits to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMinAlphas INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinAlphas to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMinUppers INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinUppers to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMinLowers INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinLowers to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMinSpecials INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinSpecials to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMin8bit INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMin8bit to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMaxRepeats INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMaxRepeats to b'0' INFO:tests.tickets.ticket48961_test:Reseting passwordMinCategories INFO:tests.tickets.ticket48961_test: --> [b'3'] INFO:tests.tickets.ticket48961_test:Reset passwordMinCategories to b'3' INFO:tests.tickets.ticket48961_test:Reseting passwordMinTokenLength INFO:tests.tickets.ticket48961_test: --> [b'3'] INFO:tests.tickets.ticket48961_test:Reset passwordMinTokenLength to b'3' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logexpirationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logexpirationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-schemacheck INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-schemacheck to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-schemamod INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-schemamod to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-syntaxcheck INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-syntaxcheck to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-syntaxlogging INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-syntaxlogging to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-dn-validate-strict INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-dn-validate-strict to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ds4-compatible-schema INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ds4-compatible-schema to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-schema-ignore-trailing-spaces INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-schema-ignore-trailing-spaces to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-schemareplace INFO:tests.tickets.ticket48961_test: --> [b'replication-only'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-schemareplace to b'replication-only' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logmaxdiskspace INFO:tests.tickets.ticket48961_test: --> [b'500'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logmaxdiskspace to b'500' INFO:tests.tickets.ticket48961_test:Reseting passwordMaxFailure INFO:tests.tickets.ticket48961_test: --> [b'3'] INFO:tests.tickets.ticket48961_test:Reset passwordMaxFailure to b'3' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-lastmod INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-lastmod to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-security INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-security to b'off' INFO:tests.tickets.ticket48961_test:Reseting passwordMaxAge INFO:tests.tickets.ticket48961_test: --> [b'8640000'] INFO:tests.tickets.ticket48961_test:Reset passwordMaxAge to b'8640000' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logrotationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'week'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logrotationtimeunit to b'week' INFO:tests.tickets.ticket48961_test:Reseting passwordResetFailureCount INFO:tests.tickets.ticket48961_test: --> [b'600'] INFO:tests.tickets.ticket48961_test:Reset passwordResetFailureCount to b'600' INFO:tests.tickets.ticket48961_test:Reseting passwordIsGlobalPolicy INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordIsGlobalPolicy to b'off' INFO:tests.tickets.ticket48961_test:Reseting passwordLegacyPolicy INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset passwordLegacyPolicy to b'on' INFO:tests.tickets.ticket48961_test:Reseting passwordTrackUpdateTime INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordTrackUpdateTime to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-maxlogsperdir INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-maxlogsperdir to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logexpirationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'month'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logexpirationtimeunit to b'month' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-groupevalnestlevel INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-groupevalnestlevel to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logexpirationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'month'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logexpirationtimeunit to b'month' INFO:tests.tickets.ticket48961_test:Reseting passwordChange INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset passwordChange to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-level INFO:tests.tickets.ticket48961_test: --> [b'256'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-level to b'256' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logrotationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'week'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logrotationtimeunit to b'week' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-timelimit INFO:tests.tickets.ticket48961_test: --> [b'3600'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-timelimit to b'3600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-maxlogsize INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-maxlogsize to b'100' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-reservedescriptors INFO:tests.tickets.ticket48961_test: --> [b'64'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-reservedescriptors to b'64' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-svrtab INFO:tests.tickets.ticket48961_test: --> [b''] INFO:tests.tickets.ticket48961_test:override --> Some bogus data INFO:tests.tickets.ticket48961_test:Reset nsslapd-svrtab to b'' INFO:tests.tickets.ticket48961_test:Reseting passwordExp INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordExp to b'off' INFO:tests.tickets.ticket48961_test:Reseting passwordSendExpiringTime INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordSendExpiringTime to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesscontrol INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesscontrol to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logrotationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'day'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logrotationtimeunit to b'day' INFO:tests.tickets.ticket48961_test:Reseting passwordLockoutDuration INFO:tests.tickets.ticket48961_test: --> [b'3600'] INFO:tests.tickets.ticket48961_test:Reset passwordLockoutDuration to b'3600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-maxlogsize INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-maxlogsize to b'100' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-idletimeout INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-idletimeout to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-nagle INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-nagle to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-logminfreediskspace INFO:tests.tickets.ticket48961_test: --> [b'5'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-logminfreediskspace to b'5' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logging-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logging-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logging-hide-unhashed-pw INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logging-hide-unhashed-pw to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logbuffering INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logbuffering to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-csnlogging INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-csnlogging to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logexpirationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'month'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logexpirationtimeunit to b'month' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-allow-hashed-passwords INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-allow-hashed-passwords to b'off' INFO:tests.tickets.ticket48961_test:Reseting passwordCheckSyntax INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset passwordCheckSyntax to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-listenhost INFO:tests.tickets.ticket48961_test: --> [b''] INFO:tests.tickets.ticket48961_test:override --> localhost INFO:tests.tickets.ticket48961_test:Reset nsslapd-listenhost to b'' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-snmp-index INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-snmp-index to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapifilepath INFO:tests.tickets.ticket48961_test: --> [b'/var/run/slapd-standalone1.socket'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapifilepath to b'/var/run/ldapi' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapilisten INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapilisten to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapiautobind INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapiautobind to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapimaprootdn INFO:tests.tickets.ticket48961_test: --> [b'cn=Directory Manager'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapimaprootdn to b'cn=Directory Manager' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapimaptoentries INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapimaptoentries to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapiuidnumbertype INFO:tests.tickets.ticket48961_test: --> [b'uidNumber'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapiuidnumbertype to b'uidNumber' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapigidnumbertype INFO:tests.tickets.ticket48961_test: --> [b'gidNumber'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapigidnumbertype to b'gidNumber' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ldapientrysearchbase INFO:tests.tickets.ticket48961_test: --> [b'dc=example,dc=com'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ldapientrysearchbase to b'dc=example,dc=com' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-anonlimitsdn INFO:tests.tickets.ticket48961_test: --> [b''] INFO:tests.tickets.ticket48961_test:Reset nsslapd-anonlimitsdn to b'' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-counters INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-counters to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-accesslog-logminfreediskspace INFO:tests.tickets.ticket48961_test: --> [b'5'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-accesslog-logminfreediskspace to b'5' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-errorlog-maxlogsperdir INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-errorlog-maxlogsperdir to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-securelistenhost INFO:tests.tickets.ticket48961_test: --> [b''] INFO:tests.tickets.ticket48961_test:override --> localhost INFO:tests.tickets.ticket48961_test:Reset nsslapd-securelistenhost to b'' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditlog-logminfreediskspace INFO:tests.tickets.ticket48961_test: --> [b'5'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditlog-logminfreediskspace to b'5' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-rootdn INFO:tests.tickets.ticket48961_test: --> [b'cn=Directory Manager'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-rootdn to b'cn=Directory Manager' INFO:tests.tickets.ticket48961_test:Reseting passwordMinAge INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset passwordMinAge to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-return-exact-case INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-return-exact-case to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-result-tweak INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-result-tweak to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-plugin-binddn-tracking INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-plugin-binddn-tracking to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-moddn-aci INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-moddn-aci to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-attribute-name-exceptions INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-attribute-name-exceptions to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-maxbersize INFO:tests.tickets.ticket48961_test: --> [b'2097152'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-maxbersize to b'2097152' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-maxsasliosize INFO:tests.tickets.ticket48961_test: --> [b'2097152'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-maxsasliosize to b'2097152' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-maxdescriptors INFO:tests.tickets.ticket48961_test: --> [b'1024'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-maxdescriptors to b'1024' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-SSLclientAuth INFO:tests.tickets.ticket48961_test: --> [b'allowed'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-SSLclientAuth to b'allowed' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-rewrite-rfc1274 INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-rewrite-rfc1274 to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-outbound-ldap-io-timeout INFO:tests.tickets.ticket48961_test: --> [b'300000'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-outbound-ldap-io-timeout to b'300000' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-allow-unauthenticated-binds INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-allow-unauthenticated-binds to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-require-secure-binds INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-require-secure-binds to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-allow-anonymous-access INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-allow-anonymous-access to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-localssf INFO:tests.tickets.ticket48961_test: --> [b'71'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-localssf to b'71' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-minssf INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-minssf to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-minssf-exclude-rootdse INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-minssf-exclude-rootdse to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-force-sasl-external INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-force-sasl-external to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-entryusn-global INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-entryusn-global to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-entryusn-import-initval INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-entryusn-import-initval to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-validate-cert INFO:tests.tickets.ticket48961_test: --> [b'warn'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-validate-cert to b'warn' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-pagedsizelimit INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-pagedsizelimit to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-disk-monitoring INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-disk-monitoring to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-disk-monitoring-threshold INFO:tests.tickets.ticket48961_test: --> [b'2097152'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-disk-monitoring-threshold to b'2097152' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-disk-monitoring-grace-period INFO:tests.tickets.ticket48961_test: --> [b'60'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-disk-monitoring-grace-period to b'60' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-disk-monitoring-logging-critical INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-disk-monitoring-logging-critical to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ndn-cache-enabled INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ndn-cache-enabled to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ndn-cache-max-size INFO:tests.tickets.ticket48961_test: --> [b'20971520'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ndn-cache-max-size to b'20971520' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-allowed-sasl-mechanisms INFO:tests.tickets.ticket48961_test: --> [b''] INFO:tests.tickets.ticket48961_test:override --> GSSAPI INFO:tests.tickets.ticket48961_test:Reset nsslapd-allowed-sasl-mechanisms to b'' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ignore-virtual-attrs INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ignore-virtual-attrs to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-unhashed-pw-switch INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-unhashed-pw-switch to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-sasl-max-buffer-size INFO:tests.tickets.ticket48961_test: --> [b'2097152'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-sasl-max-buffer-size to b'2097152' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-search-return-original-type-switch INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-search-return-original-type-switch to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-enable-turbo-mode INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-enable-turbo-mode to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-connection-nocanon INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-connection-nocanon to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-plugin-logging INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-plugin-logging to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-listen-backlog-size INFO:tests.tickets.ticket48961_test: --> [b'128'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-listen-backlog-size to b'128' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-dynamic-plugins INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-dynamic-plugins to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-cn-uses-dn-syntax-in-dns INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-cn-uses-dn-syntax-in-dns to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-ignore-time-skew INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-ignore-time-skew to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-global-backend-lock INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-global-backend-lock to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-maxsimplepaged-per-conn INFO:tests.tickets.ticket48961_test: --> [b'-1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-maxsimplepaged-per-conn to b'-1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-enable-nunc-stans INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-enable-nunc-stans to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-mode INFO:tests.tickets.ticket48961_test: --> [b'600'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-mode to b'600' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logrotationsync-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logrotationsync-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logrotationsynchour INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logrotationsynchour to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logrotationsyncmin INFO:tests.tickets.ticket48961_test: --> [b'0'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logrotationsyncmin to b'0' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logrotationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logrotationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logmaxdiskspace INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logmaxdiskspace to b'100' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-maxlogsize INFO:tests.tickets.ticket48961_test: --> [b'100'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-maxlogsize to b'100' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logexpirationtime INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logexpirationtime to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-maxlogsperdir INFO:tests.tickets.ticket48961_test: --> [b'1'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-maxlogsperdir to b'1' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logging-enabled INFO:tests.tickets.ticket48961_test: --> [b'off'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logging-enabled to b'off' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logging-hide-unhashed-pw INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logging-hide-unhashed-pw to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logexpirationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'month'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logexpirationtimeunit to b'month' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logminfreediskspace INFO:tests.tickets.ticket48961_test: --> [b'5'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logminfreediskspace to b'5' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog-logrotationtimeunit INFO:tests.tickets.ticket48961_test: --> [b'week'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog-logrotationtimeunit to b'week' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-auditfaillog INFO:tests.tickets.ticket48961_test: --> [b'/var/log/dirsrv/slapd-standalone1/audit'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-auditfaillog to b'' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-logging-hr-timestamps-enabled INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-logging-hr-timestamps-enabled to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-extract-pemfiles INFO:tests.tickets.ticket48961_test: --> [b'on'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-extract-pemfiles to b'on' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-logging-backend INFO:tests.tickets.ticket48961_test: --> [b'dirsrv-log'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-logging-backend to b'dirsrv-log' INFO:tests.tickets.ticket48961_test:Reseting nsslapd-tls-check-crl INFO:tests.tickets.ticket48961_test: --> [b'none'] INFO:tests.tickets.ticket48961_test:Reset nsslapd-tls-check-crl to b'none' INFO:tests.tickets.ticket48961_test:Reseting passwordStorageScheme INFO:tests.tickets.ticket48961_test: --> [b'CLEAR'] ------------------------------ Captured log call -------------------------------
ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-maxlogsperdir ticket48961_test.py 111 INFO --> [b'10'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-maxlogsperdir to b'10' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-level ticket48961_test.py 111 INFO --> [b'16384'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-level to b'16384' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logging-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logging-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logging-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logging-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-maxthreadsperconn ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-maxthreadsperconn to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting passwordInHistory ticket48961_test.py 111 INFO --> [b'6'] ticket48961_test.py 38 INFO Reset passwordInHistory to b'6' ticket48961_test.py 107 INFO Reseting passwordUnlock ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset passwordUnlock to b'on' ticket48961_test.py 107 INFO Reseting passwordGraceLimit ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordGraceLimit to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting passwordMustChange ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordMustChange to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-pwpolicy-local ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-pwpolicy-local to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-pwpolicy-inherit-global ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-pwpolicy-inherit-global to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logmaxdiskspace to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-sizelimit ticket48961_test.py 111 INFO --> [b'2000'] ticket48961_test.py 38 INFO Reset nsslapd-sizelimit to b'2000' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-maxlogsize ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-maxlogsize to b'100' ticket48961_test.py 107 INFO Reseting passwordWarning ticket48961_test.py 111 INFO --> [b'86400'] ticket48961_test.py 38 INFO Reset passwordWarning to b'86400' ticket48961_test.py 107 INFO Reseting nsslapd-readonly ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-readonly to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-sasl-mapping-fallback ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-sasl-mapping-fallback to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-threadnumber ticket48961_test.py 111 INFO --> [b'24'] ticket48961_test.py 38 INFO Reset nsslapd-threadnumber to b'24' ticket48961_test.py 107 INFO Reseting passwordLockout ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordLockout to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-enquote-sup-oc ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-enquote-sup-oc to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ioblocktimeout ticket48961_test.py 111 INFO --> [b'300000'] ticket48961_test.py 38 INFO Reset nsslapd-ioblocktimeout to b'300000' ticket48961_test.py 107 INFO Reseting nsslapd-max-filter-nest-level ticket48961_test.py 111 INFO --> [b'40'] ticket48961_test.py 38 INFO Reset nsslapd-max-filter-nest-level to b'40' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logmaxdiskspace to b'100' ticket48961_test.py 107 INFO Reseting passwordMinLength ticket48961_test.py 111 INFO --> [b'8'] ticket48961_test.py 38 INFO Reset passwordMinLength to b'8' ticket48961_test.py 107 INFO Reseting passwordMinDigits ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinDigits to b'0' ticket48961_test.py 107 INFO Reseting passwordMinAlphas ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinAlphas to b'0' ticket48961_test.py 107 INFO Reseting passwordMinUppers ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinUppers to b'0' ticket48961_test.py 107 INFO Reseting passwordMinLowers ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinLowers to b'0' ticket48961_test.py 107 INFO Reseting passwordMinSpecials ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinSpecials to b'0' ticket48961_test.py 107 INFO Reseting passwordMin8bit ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMin8bit to b'0' ticket48961_test.py 107 INFO Reseting passwordMaxRepeats ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMaxRepeats to b'0' ticket48961_test.py 107 INFO Reseting passwordMinCategories ticket48961_test.py 111 INFO --> [b'3'] ticket48961_test.py 38 INFO Reset passwordMinCategories to b'3' ticket48961_test.py 107 INFO Reseting passwordMinTokenLength ticket48961_test.py 111 INFO --> [b'3'] ticket48961_test.py 38 INFO Reset passwordMinTokenLength to b'3' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-schemacheck ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-schemacheck to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-schemamod ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-schemamod to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-syntaxcheck ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-syntaxcheck to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-syntaxlogging ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-syntaxlogging to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-dn-validate-strict ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-dn-validate-strict to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ds4-compatible-schema ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ds4-compatible-schema to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-schema-ignore-trailing-spaces ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-schema-ignore-trailing-spaces to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-schemareplace ticket48961_test.py 111 INFO --> [b'replication-only'] ticket48961_test.py 38 INFO Reset nsslapd-schemareplace to b'replication-only' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'500'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logmaxdiskspace to b'500' ticket48961_test.py 107 INFO Reseting passwordMaxFailure ticket48961_test.py 111 INFO --> [b'3'] ticket48961_test.py 38 INFO Reset passwordMaxFailure to b'3' ticket48961_test.py 107 INFO Reseting nsslapd-lastmod ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-lastmod to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-security ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-security to b'off' ticket48961_test.py 107 INFO Reseting passwordMaxAge ticket48961_test.py 111 INFO --> [b'8640000'] ticket48961_test.py 38 INFO Reset passwordMaxAge to b'8640000' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationtimeunit ticket48961_test.py 111 INFO --> [b'week'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationtimeunit to b'week' ticket48961_test.py 107 INFO Reseting passwordResetFailureCount ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset passwordResetFailureCount to b'600' ticket48961_test.py 107 INFO Reseting passwordIsGlobalPolicy ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordIsGlobalPolicy to b'off' ticket48961_test.py 107 INFO Reseting passwordLegacyPolicy ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset passwordLegacyPolicy to b'on' ticket48961_test.py 107 INFO Reseting passwordTrackUpdateTime ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordTrackUpdateTime to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-maxlogsperdir ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-maxlogsperdir to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logexpirationtimeunit ticket48961_test.py 111 INFO --> [b'month'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logexpirationtimeunit to b'month' ticket48961_test.py 107 INFO Reseting nsslapd-groupevalnestlevel ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-groupevalnestlevel to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logexpirationtimeunit ticket48961_test.py 111 INFO --> [b'month'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logexpirationtimeunit to b'month' ticket48961_test.py 107 INFO Reseting passwordChange ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset passwordChange to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-level ticket48961_test.py 111 INFO --> [b'256'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-level to b'256' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationtimeunit ticket48961_test.py 111 INFO --> [b'week'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationtimeunit to b'week' ticket48961_test.py 107 INFO Reseting nsslapd-timelimit ticket48961_test.py 111 INFO --> [b'3600'] ticket48961_test.py 38 INFO Reset nsslapd-timelimit to b'3600' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-maxlogsize ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-maxlogsize to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-reservedescriptors ticket48961_test.py 111 INFO --> [b'64'] ticket48961_test.py 38 INFO Reset nsslapd-reservedescriptors to b'64' ticket48961_test.py 107 INFO Reseting nsslapd-svrtab ticket48961_test.py 111 INFO --> [b''] ticket48961_test.py 114 INFO override --> Some bogus data ticket48961_test.py 38 INFO Reset nsslapd-svrtab to b'' ticket48961_test.py 107 INFO Reseting passwordExp ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordExp to b'off' ticket48961_test.py 107 INFO Reseting passwordSendExpiringTime ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordSendExpiringTime to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-accesscontrol ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-accesscontrol to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationtimeunit ticket48961_test.py 111 INFO --> [b'day'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationtimeunit to b'day' ticket48961_test.py 107 INFO Reseting passwordLockoutDuration ticket48961_test.py 111 INFO --> [b'3600'] ticket48961_test.py 38 INFO Reset passwordLockoutDuration to b'3600' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-maxlogsize ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-maxlogsize to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-idletimeout ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-idletimeout to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-nagle ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-nagle to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logminfreediskspace ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logminfreediskspace to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logging-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logging-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logging-hide-unhashed-pw ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logging-hide-unhashed-pw to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logbuffering ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logbuffering to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-csnlogging ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-csnlogging to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logexpirationtimeunit ticket48961_test.py 111 INFO --> [b'month'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logexpirationtimeunit to b'month' ticket48961_test.py 107 INFO Reseting nsslapd-allow-hashed-passwords ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-allow-hashed-passwords to b'off' ticket48961_test.py 107 INFO Reseting passwordCheckSyntax ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordCheckSyntax to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-listenhost ticket48961_test.py 111 INFO --> [b''] ticket48961_test.py 114 INFO override --> localhost ticket48961_test.py 38 INFO Reset nsslapd-listenhost to b'' ticket48961_test.py 107 INFO Reseting nsslapd-snmp-index ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-snmp-index to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-ldapifilepath ticket48961_test.py 111 INFO --> [b'/var/run/slapd-standalone1.socket'] ticket48961_test.py 38 INFO Reset nsslapd-ldapifilepath to b'/var/run/ldapi' ticket48961_test.py 107 INFO Reseting nsslapd-ldapilisten ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ldapilisten to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ldapiautobind ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ldapiautobind to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ldapimaprootdn ticket48961_test.py 111 INFO --> [b'cn=Directory Manager'] ticket48961_test.py 38 INFO Reset nsslapd-ldapimaprootdn to b'cn=Directory Manager' ticket48961_test.py 107 INFO Reseting nsslapd-ldapimaptoentries ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ldapimaptoentries to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ldapiuidnumbertype ticket48961_test.py 111 INFO --> [b'uidNumber'] ticket48961_test.py 38 INFO Reset nsslapd-ldapiuidnumbertype to b'uidNumber' ticket48961_test.py 107 INFO Reseting nsslapd-ldapigidnumbertype ticket48961_test.py 111 INFO --> [b'gidNumber'] ticket48961_test.py 38 INFO Reset nsslapd-ldapigidnumbertype to b'gidNumber' ticket48961_test.py 107 INFO Reseting nsslapd-ldapientrysearchbase ticket48961_test.py 111 INFO --> [b'dc=example,dc=com'] ticket48961_test.py 38 INFO Reset nsslapd-ldapientrysearchbase to b'dc=example,dc=com' ticket48961_test.py 107 INFO Reseting nsslapd-anonlimitsdn ticket48961_test.py 111 INFO --> [b''] ticket48961_test.py 38 INFO Reset nsslapd-anonlimitsdn to b'' ticket48961_test.py 107 INFO Reseting nsslapd-counters ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-counters to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logminfreediskspace ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logminfreediskspace to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-maxlogsperdir ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-maxlogsperdir to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-securelistenhost ticket48961_test.py 111 INFO --> [b''] ticket48961_test.py 114 INFO override --> localhost ticket48961_test.py 38 INFO Reset nsslapd-securelistenhost to b'' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logminfreediskspace ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logminfreediskspace to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-rootdn ticket48961_test.py 111 INFO --> [b'cn=Directory Manager'] ticket48961_test.py 38 INFO Reset nsslapd-rootdn to b'cn=Directory Manager' ticket48961_test.py 107 INFO Reseting passwordMinAge ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinAge to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-return-exact-case ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-return-exact-case to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-result-tweak ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-result-tweak to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-plugin-binddn-tracking ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-plugin-binddn-tracking to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-moddn-aci ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-moddn-aci to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-attribute-name-exceptions ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-attribute-name-exceptions to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-maxbersize ticket48961_test.py 111 INFO --> [b'2097152'] ticket48961_test.py 38 INFO Reset nsslapd-maxbersize to b'2097152' ticket48961_test.py 107 INFO Reseting nsslapd-maxsasliosize ticket48961_test.py 111 INFO --> [b'2097152'] ticket48961_test.py 38 INFO Reset nsslapd-maxsasliosize to b'2097152' ticket48961_test.py 107 INFO Reseting nsslapd-maxdescriptors ticket48961_test.py 111 INFO --> [b'1024'] ticket48961_test.py 38 INFO Reset nsslapd-maxdescriptors to b'1024' ticket48961_test.py 107 INFO Reseting nsslapd-SSLclientAuth ticket48961_test.py 111 INFO --> [b'allowed'] ticket48961_test.py 38 INFO Reset nsslapd-SSLclientAuth to b'allowed' ticket48961_test.py 107 INFO Reseting nsslapd-rewrite-rfc1274 ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-rewrite-rfc1274 to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-outbound-ldap-io-timeout ticket48961_test.py 111 INFO --> [b'300000'] ticket48961_test.py 38 INFO Reset nsslapd-outbound-ldap-io-timeout to b'300000' ticket48961_test.py 107 INFO Reseting nsslapd-allow-unauthenticated-binds ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-allow-unauthenticated-binds to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-require-secure-binds ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-require-secure-binds to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-allow-anonymous-access ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-allow-anonymous-access to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-localssf ticket48961_test.py 111 INFO --> [b'71'] ticket48961_test.py 38 INFO Reset nsslapd-localssf to b'71' ticket48961_test.py 107 INFO Reseting nsslapd-minssf ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-minssf to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-minssf-exclude-rootdse ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-minssf-exclude-rootdse to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-force-sasl-external ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-force-sasl-external to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-entryusn-global ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-entryusn-global to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-entryusn-import-initval ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-entryusn-import-initval to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-validate-cert ticket48961_test.py 111 INFO --> [b'warn'] ticket48961_test.py 38 INFO Reset nsslapd-validate-cert to b'warn' ticket48961_test.py 107 INFO Reseting nsslapd-pagedsizelimit ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-pagedsizelimit to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-disk-monitoring ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-disk-monitoring to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-disk-monitoring-threshold ticket48961_test.py 111 INFO --> [b'2097152'] ticket48961_test.py 38 INFO Reset nsslapd-disk-monitoring-threshold to b'2097152' ticket48961_test.py 107 INFO Reseting nsslapd-disk-monitoring-grace-period ticket48961_test.py 111 INFO --> [b'60'] ticket48961_test.py 38 INFO Reset nsslapd-disk-monitoring-grace-period to b'60' ticket48961_test.py 107 INFO Reseting nsslapd-disk-monitoring-logging-critical ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-disk-monitoring-logging-critical to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ndn-cache-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-ndn-cache-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-ndn-cache-max-size ticket48961_test.py 111 INFO --> [b'20971520'] ticket48961_test.py 38 INFO Reset nsslapd-ndn-cache-max-size to b'20971520' ticket48961_test.py 107 INFO Reseting nsslapd-allowed-sasl-mechanisms ticket48961_test.py 111 INFO --> [b''] ticket48961_test.py 114 INFO override --> GSSAPI ticket48961_test.py 38 INFO Reset nsslapd-allowed-sasl-mechanisms to b'' ticket48961_test.py 107 INFO Reseting nsslapd-ignore-virtual-attrs ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ignore-virtual-attrs to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-unhashed-pw-switch ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-unhashed-pw-switch to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-sasl-max-buffer-size ticket48961_test.py 111 INFO --> [b'2097152'] ticket48961_test.py 38 INFO Reset nsslapd-sasl-max-buffer-size to b'2097152' ticket48961_test.py 107 INFO Reseting nsslapd-search-return-original-type-switch ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-search-return-original-type-switch to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-enable-turbo-mode ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-enable-turbo-mode to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-connection-nocanon ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-connection-nocanon to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-plugin-logging ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-plugin-logging to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-listen-backlog-size ticket48961_test.py 111 INFO --> [b'128'] ticket48961_test.py 38 INFO Reset nsslapd-listen-backlog-size to b'128' ticket48961_test.py 107 INFO Reseting nsslapd-dynamic-plugins ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-dynamic-plugins to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-cn-uses-dn-syntax-in-dns ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-cn-uses-dn-syntax-in-dns to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ignore-time-skew ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-ignore-time-skew to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-global-backend-lock ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-global-backend-lock to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-maxsimplepaged-per-conn ticket48961_test.py 111 INFO --> [b'-1'] ticket48961_test.py 38 INFO Reset nsslapd-maxsimplepaged-per-conn to b'-1' ticket48961_test.py 107 INFO Reseting nsslapd-enable-nunc-stans ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-enable-nunc-stans to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logmaxdiskspace to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-maxlogsize ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-maxlogsize to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-maxlogsperdir ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-maxlogsperdir to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logging-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logging-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logging-hide-unhashed-pw ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logging-hide-unhashed-pw to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logexpirationtimeunit ticket48961_test.py 111 INFO --> [b'month'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logexpirationtimeunit to b'month' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logminfreediskspace ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logminfreediskspace to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog-logrotationtimeunit ticket48961_test.py 111 INFO --> [b'week'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog-logrotationtimeunit to b'week' ticket48961_test.py 107 INFO Reseting nsslapd-auditfaillog ticket48961_test.py 111 INFO --> [b'/var/log/dirsrv/slapd-standalone1/audit'] ticket48961_test.py 38 INFO Reset nsslapd-auditfaillog to b'' ticket48961_test.py 107 INFO Reseting nsslapd-logging-hr-timestamps-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-logging-hr-timestamps-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-extract-pemfiles ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-extract-pemfiles to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-logging-backend ticket48961_test.py 111 INFO --> [b'dirsrv-log'] ticket48961_test.py 38 INFO Reset nsslapd-logging-backend to b'dirsrv-log' ticket48961_test.py 107 INFO Reseting nsslapd-tls-check-crl ticket48961_test.py 111 INFO --> [b'none'] ticket48961_test.py 38 INFO Reset nsslapd-tls-check-crl to b'none' ticket48961_test.py 107 INFO Reseting passwordStorageScheme ticket48961_test.py 111 INFO --> [b'CLEAR']
Failed tickets/ticket49020_test.py::test_ticket49020 15.40
T = <lib389.topologies.TopologyMain object at 0x7fcb9391a4e0>

def test_ticket49020(T):
A = T.ms['master1']
B = T.ms['master2']
C = T.ms['master3']

A.enableReplLogging()
B.enableReplLogging()
C.enableReplLogging()

AtoB = A.agreement.list(suffix=DEFAULT_SUFFIX)[0].dn
AtoC = A.agreement.list(suffix=DEFAULT_SUFFIX)[1].dn
CtoB = C.agreement.list(suffix=DEFAULT_SUFFIX)[1].dn

A.agreement.pause(AtoB)
C.agreement.pause(CtoB)
time.sleep(5)
name = "userX"
dn = "cn={},{}".format(name, DEFAULT_SUFFIX)
A.add_s(Entry((dn, {'objectclass': "top person".split(),
'sn': name,'cn': name})))

> A.agreement.init(DEFAULT_SUFFIX, HOST_MASTER_3, PORT_MASTER_3)

/export/tests/tickets/ticket49020_test.py:45:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/agreement.py:794: in init
filt)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93baf438>
args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', 1, '(&(objectclass=nsds5replicationagreement)(nsds5replicahost=localhost)(nsds5replicaport=39003)(nsds5replicaroot=dc=example,dc=com))')
kwargs = {}, res = 100, restype = 101, obj = []

def getEntry(self, *args, **kwargs):
"""Wrapper around SimpleLDAPObject.search. It is common to just get
one entry.
@param - entry dn
@param - search scope, in ldap.SCOPE_BASE (default),
ldap.SCOPE_SUB, ldap.SCOPE_ONE
@param filterstr - filterstr, default '(objectClass=*)' from
SimpleLDAPObject
@param attrlist - list of attributes to retrieve. eg ['cn', 'uid']
@oaram attrsonly - default None from SimpleLDAPObject
eg. getEntry(dn, scope, filter, attributes)

XXX This cannot return None
"""
if self.verbose:
self.log.debug("Retrieving entry with %r" % [args])
if len(args) == 1 and 'scope' not in kwargs:
args += (ldap.SCOPE_BASE, )

res = self.search(*args, **kwargs)
restype, obj = self.result(res)
# TODO: why not test restype?
if not obj:
> raise NoSuchEntryError("no such entry for %r" % [args])
E lib389.exceptions.NoSuchEntryError: no such entry for [('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', 1, '(&(objectclass=nsds5replicationagreement)(nsds5replicahost=localhost)(nsds5replicaport=39003)(nsds5replicaroot=dc=example,dc=com))')]

/usr/lib/python3.6/site-packages/lib389/__init__.py:1806: NoSuchEntryError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Joining master master3 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39003 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master1 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master2 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created INFO:lib389.topologies:Ensuring master master3 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master3 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created----------------------------- Captured stderr call -----------------------------
INFO:lib389:Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config INFO:lib389:Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config CRITICAL:lib389:initAgreement: No replica agreement to localhost:39003 for suffix dc=example,dc=com ------------------------------ Captured log call -------------------------------
agreement.py 830 INFO Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config agreement.py 830 INFO Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config agreement.py 799 CRITICAL initAgreement: No replica agreement to localhost:39003 for suffix dc=example,dc=com
Failed tickets/ticket49039_test.py::test_ticket49039 1.70
topo = <lib389.topologies.TopologyMain object at 0x7fcb93db12b0>

def test_ticket49039(topo):
"""Test "password must change" verses "password min age". Min age should not
block password update if the password was reset.
"""

# Setup SSL (for ldappasswd test)
> ssl_init(topo)

/export/tests/tickets/ticket49039_test.py:70:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49039_test.py:35: in ssl_init
topo.standalone.nss_ssl.reinit()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93d3cda0>, name = 'nss_ssl'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'nss_ssl'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
Instance slapd-standalone1 removed. OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Failed tickets/ticket49073_test.py::test_ticket49073 11.40
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba407cb38>

def test_ticket49073(topology_m2):
"""Write your replication test here.

To access each DirSrv instance use: topology_m2.ms["master1"], topology_m2.ms["master2"],
..., topology_m2.hub1, ..., topology_m2.consumer1,...

Also, if you need any testcase initialization,
please, write additional fixture for that(include finalizer).
"""
topology_m2.ms["master1"].plugins.enable(name=PLUGIN_MEMBER_OF)
topology_m2.ms["master1"].restart(timeout=10)
topology_m2.ms["master2"].plugins.enable(name=PLUGIN_MEMBER_OF)
topology_m2.ms["master2"].restart(timeout=10)

# Configure fractional to prevent total init to send memberof
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
log.info('update %s to add nsDS5ReplicatedAttributeListTotal' % ents[0].dn)
topology_m2.ms["master1"].modify_s(ents[0].dn,
[(ldap.MOD_REPLACE,
'nsDS5ReplicatedAttributeListTotal',
'(objectclass=*) $ EXCLUDE '),
(ldap.MOD_REPLACE,
'nsDS5ReplicatedAttributeList',
> '(objectclass=*) $ EXCLUDE memberOf')])

/export/tests/tickets/ticket49073_test.py:102:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcba407c588>
func = <built-in method modify_ext of LDAP object at 0x7fcba4094f58>
args = ('cn=002,cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsDS5ReplicatedAttributeListTotal', '(objectclass=*) $ EXCLUDE '), (2, 'nsDS5ReplicatedAttributeList', '(objectclass=*) $ EXCLUDE memberOf')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '(')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket49073_test:update cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal ------------------------------ Captured log call -------------------------------
ticket49073_test.py 95 INFO update cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal
Failed tickets/ticket49121_test.py::test_ticket49121 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba69df9b0>

def test_ticket49121(topology_m2):
"""
Creating some users.
Deleting quite a number of attributes which may or may not be in the entry.
The attribute type names are to be long.
Under the conditions, it did not estimate the size of string format entry
shorter than the real size and caused the Invalid write / server crash.
"""
> reload(sys)
E NameError: name 'reload' is not defined

/export/tests/tickets/ticket49121_test.py:38: NameError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket49180_test.py::test_ticket49180 24.78
topology_m4 = <lib389.topologies.TopologyMain object at 0x7fcb93db1b70>

def test_ticket49180(topology_m4):

log.info('Running test_ticket49180...')

log.info('Check that replication works properly on all masters')
agmt_nums = {"master1": ("2", "3", "4"),
"master2": ("1", "3", "4"),
"master3": ("1", "2", "4"),
"master4": ("1", "2", "3")}

for inst_name, agmts in agmt_nums.items():
for num in agmts:
if not topology_m4.ms[inst_name].testReplication(DEFAULT_SUFFIX, topology_m4.ms["master{}".format(num)]):
log.fatal(
'test_replication: Replication is not working between {} and master {}.'.format(inst_name,
num))
assert False

# Disable master 4
log.info('test_clean: disable master 4...')
topology_m4.ms["master4"].replica.disableReplication(DEFAULT_SUFFIX)

# Remove the agreements from the other masters that point to master 4
remove_master4_agmts("test_clean", topology_m4)

# Cleanup - restore master 4
> restore_master4(topology_m4, 4444)

/export/tests/tickets/ticket49180_test.py:148:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49180_test.py:52: in restore_master4
replicaId=newReplicaId)
/usr/lib/python3.6/site-packages/lib389/replica.py:560: in enableReplication
self.conn.changelog.create()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93d3ccf8>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39004, 'ldap-secureport': 63704, 'server-id': 'master4', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Joining master master3 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39003 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 INFO:lib389.topologies:Joining master master4 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39004 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39004 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39004 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master1 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists INFO:lib389.topologies:Ensuring master master1 to master4 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master2 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created INFO:lib389.topologies:Ensuring master master2 to master4 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39004 is was created INFO:lib389.topologies:Ensuring master master3 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master3 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created INFO:lib389.topologies:Ensuring master master3 to master4 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39004 is was created INFO:lib389.topologies:Ensuring master master4 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master4 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39002 is was created INFO:lib389.topologies:Ensuring master master4 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39003 is was created ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39004, 'ldap-secureport': 63704, 'server-id': 'master4', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 153 INFO Joining master master4 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39004 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39004 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39004 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master1 to master4 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master2 to master4 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39004 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created topologies.py 161 INFO Ensuring master master3 to master4 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39004 is was created topologies.py 161 INFO Ensuring master master4 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master4 to master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39002 is was created topologies.py 161 INFO Ensuring master master4 to master3 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39003 is was created----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket49180_test:Running test_ticket49180... INFO:tests.tickets.ticket49180_test:Check that replication works properly on all masters INFO:tests.tickets.ticket49180_test:test_clean: disable master 4... INFO:tests.tickets.ticket49180_test:test_clean: remove all the agreements to master 4... INFO:lib389:Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed INFO:lib389:Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed INFO:lib389:Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed INFO:tests.tickets.ticket49180_test:Restoring master 4... INFO:lib389:List backend with suffix=dc=example,dc=com ------------------------------ Captured log call -------------------------------
ticket49180_test.py 124 INFO Running test_ticket49180... ticket49180_test.py 126 INFO Check that replication works properly on all masters ticket49180_test.py 141 INFO test_clean: disable master 4... ticket49180_test.py 32 INFO test_clean: remove all the agreements to master 4... agreement.py 731 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed agreement.py 731 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed agreement.py 731 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed ticket49180_test.py 48 INFO Restoring master 4... backend.py 71 INFO List backend with suffix=dc=example,dc=com
Failed tickets/ticket49287_test.py::test_ticket49287 0.02
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcb9ed2cf98>

def test_ticket49287(topology_m2):
"""
test case for memberof and conflict entries

"""

# return

M1 = topology_m2.ms["master1"]
M2 = topology_m2.ms["master2"]

> config_memberof(M1)

/export/tests/tickets/ticket49287_test.py:285:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49287_test.py:71: in config_memberof
'on')])
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:167: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93938390>
func = <built-in method modify_ext of LDAP object at 0x7fcb93921030>
args = ('cn=MemberOf Plugin,cn=plugins,cn=config', [(2, 'memberOfAllBackends', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket49303_test.py::test_ticket49303 1.73
topo = <lib389.topologies.TopologyMain object at 0x7fcb93938a90>

def test_ticket49303(topo):
"""
Test the nsTLSAllowClientRenegotiation setting.
"""
sslport = SECUREPORT_STANDALONE1

log.info("Ticket 49303 - Allow disabling of SSL renegotiation")

# No value set, defaults to reneg allowed
> enable_ssl(topo.standalone, sslport)

/export/tests/tickets/ticket49303_test.py:84:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49303_test.py:58: in enable_ssl
server.nss_ssl.reinit()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fcb93ccf2b0>, name = 'nss_ssl'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'nss_ssl'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.tickets.ticket49303_test:Ticket 49303 - Allow disabling of SSL renegotiation ------------------------------ Captured log call -------------------------------
ticket49303_test.py 81 INFO Ticket 49303 - Allow disabling of SSL renegotiation
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_memberof_groups 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fcb9144dc88>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba66496a0>
test_base = <lib389.idm.nscontainer.nsContainer object at 0x7fcb9ea307b8>

def test_memberof_groups(self, topology_m2, test_base):
"""Check that conflict properly resolved for operations
with memberOf and groups

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb3
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Enable memberOf plugin
2. Add 30 users to m1 and wait for replication to happen
3. Pause replication
4. Create a group on m1 and m2
5. Create a group on m1 and m2, delete from m1
6. Create a group on m1, delete from m1, and create on m2,
7. Create a group on m2 and m1, delete from m1
8. Create two different groups on m2
9. Resume replication
10. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
9. It should pass
10. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:399: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_managed_entries 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fcb9cc05cf8>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba66496a0>

def test_managed_entries(self, topology_m2):
"""Check that conflict properly resolved for operations
with managed entries

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb4
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Create ou=managed_users and ou=managed_groups under test container
2. Configure managed entries plugin and add a template to test container
3. Add a user to m1 and wait for replication to happen
4. Pause replication
5. Create a user on m1 and m2 with a same group ID on both master
6. Create a user on m1 and m2 with a different group ID on both master
7. Resume replication
8. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:490: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_nested_entries_with_children 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fcb9ea27160>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fcba66496a0>
test_base = <lib389.idm.nscontainer.nsContainer object at 0x7fcb9ea276d8>

def test_nested_entries_with_children(self, topology_m2, test_base):
"""Check that conflict properly resolved for operations
with nested entries with children

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb5
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Add 15 containers to m1 and wait for replication to happen
2. Pause replication
3. Create parent-child on master2 and master1
4. Create parent-child on master1 and master2
5. Create parent-child on master1 and master2 different child rdn
6. Create parent-child on master1 and delete parent on master2
7. Create parent on master1, delete it and parent-child on master2, delete them
8. Create parent on master1, delete it and parent-two children on master2
9. Create parent-two children on master1 and parent-child on master2, delete them
10. Create three subsets inside existing container entry, applying only part of changes on m2
11. Create more combinations of the subset with parent-child on m1 and parent on m2
12. Delete container on m1, modify user1 on m1, create parent on m2 and modify user2 on m2
13. Resume replication
14. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
9. It should pass
10. It should pass
11. It should pass
12. It should pass
13. It should pass
14. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:581: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestThreeMasters::()::test_nested_entries 0.00
self = <tests.suites.replication.conflict_resolve_test.TestThreeMasters object at 0x7fcba66492b0>
topology_m3 = <lib389.topologies.TopologyMain object at 0x7fcba6d1f978>
test_base_m3 = <lib389.idm.nscontainer.nsContainer object at 0x7fcb9cbd8438>

def test_nested_entries(self, topology_m3, test_base_m3):
"""Check that conflict properly resolved for operations
with nested entries with children

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb6
:setup: Three master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Add 15 containers to m1 and wait for replication to happen
2. Pause replication
3. Create two child entries under each of two entries
4. Create three child entries under each of three entries
5. Create two parents on m1 and m2, then on m1 - create a child and delete one parent,
on m2 - delete one parent and create a child
6. Test a few more parent-child combinations with three instances
7. Resume replication
8. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:794: XFailed
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Joining master master3 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39003 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master1 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master2 to master3 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created INFO:lib389.topologies:Ensuring master master3 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists INFO:lib389.topologies:Ensuring master master3 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created
Skipped suites/memory_leaks/range_search_test.py::test_range_search::setup 0.00
('suites/memory_leaks/range_search_test.py', 21, "Skipped: Don't run if ASAN is not enabled")
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaPort-0-65535-9999999999999999999999999999999999999999999999999999999999999999999-invalid-389]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaBusyWaitTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaSessionPauseTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaFlowControlWindow--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaFlowControlPause--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaProtocolTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 180, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaPort-0-65535-9999999999999999999999999999999999999999999999999999999999999999999-invalid-389]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaBusyWaitTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaSessionPauseTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaFlowControlWindow--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaFlowControlPause--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaProtocolTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6]::setup 0.00
('suites/replication/replica_config_test.py', 219, 'Skipped: Agreement validation current does not work.')
Skipped suites/replication/ruvstore_test.py::test_memoryruv_sync_with_databaseruv::setup 0.00
('suites/replication/ruvstore_test.py', 115, 'Skipped: No method to safety access DB ruv currenty exists online.')
Skipped tickets/ticket47815_test.py::test_ticket47815::setup 0.00
('tickets/ticket47815_test.py', 23, 'Skipped: Not implemented, or invalid by nsMemberOf')
Passed suites/acl/acl_deny_test.py::test_multi_deny_aci 12.55
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389:Add uid=tuser1,ou=People,dc=example,dc=com INFO:lib389:Add uid=tuser,ou=People,dc=example,dc=com ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. acl_deny_test.py 37 INFO Add uid=tuser1,ou=People,dc=example,dc=com acl_deny_test.py 48 INFO Add uid=tuser,ou=People,dc=example,dc=com----------------------------- Captured stderr call -----------------------------
INFO:lib389:Pass 1 INFO:lib389:Testing two searches behave the same... INFO:lib389:Testing search does not return any entries... INFO:lib389:Pass 2 INFO:lib389:Testing two searches behave the same... INFO:lib389:Testing search does not return any entries... INFO:lib389:Test PASSED ------------------------------ Captured log call -------------------------------
acl_deny_test.py 80 INFO Pass 1 acl_deny_test.py 83 INFO Testing two searches behave the same... acl_deny_test.py 126 INFO Testing search does not return any entries... acl_deny_test.py 80 INFO Pass 2 acl_deny_test.py 83 INFO Testing two searches behave the same... acl_deny_test.py 126 INFO Testing search does not return any entries... acl_deny_test.py 190 INFO Test PASSED
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[lang-ja] 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:tests.suites.acl.acl_test:========Executing test with 'lang-ja' subtype======== INFO:tests.suites.acl.acl_test: Add a target attribute INFO:tests.suites.acl.acl_test: Add a user attribute INFO:tests.suites.acl.acl_test:Add an ACI with attribute subtype ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists acl_test.py 75 INFO ========Executing test with 'lang-ja' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.acl.acl_test:Search for the added attribute INFO:tests.suites.acl.acl_test:The added attribute was found ------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[binary] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.acl.acl_test:========Executing test with 'binary' subtype======== INFO:tests.suites.acl.acl_test: Add a target attribute INFO:tests.suites.acl.acl_test: Add a user attribute INFO:tests.suites.acl.acl_test:Add an ACI with attribute subtype ------------------------------ Captured log setup ------------------------------
acl_test.py 75 INFO ========Executing test with 'binary' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.acl.acl_test:Search for the added attribute INFO:tests.suites.acl.acl_test:The added attribute was found ------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[phonetic] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.acl.acl_test:========Executing test with 'phonetic' subtype======== INFO:tests.suites.acl.acl_test: Add a target attribute INFO:tests.suites.acl.acl_test: Add a user attribute INFO:tests.suites.acl.acl_test:Add an ACI with attribute subtype ------------------------------ Captured log setup ------------------------------
acl_test.py 75 INFO ========Executing test with 'phonetic' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.acl.acl_test:Search for the added attribute INFO:tests.suites.acl.acl_test:The added attribute was found ------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_mode_default_add_deny 0.04
---------------------------- Captured stderr setup -----------------------------
INFO:lib389: ######## INITIALIZATION ######## INFO:lib389:Add uid=bind_entry,dc=example,dc=com INFO:lib389:Add cn=staged user,dc=example,dc=com INFO:lib389:Add cn=accounts,dc=example,dc=com INFO:lib389:Add cn=excepts,cn=accounts,dc=example,dc=com ------------------------------ Captured log setup ------------------------------
acl_test.py 231 INFO ######## INITIALIZATION ######## acl_test.py 234 INFO Add uid=bind_entry,dc=example,dc=com acl_test.py 244 INFO Add cn=staged user,dc=example,dc=com acl_test.py 248 INFO Add cn=accounts,dc=example,dc=com acl_test.py 252 INFO Add cn=excepts,cn=accounts,dc=example,dc=com----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## mode moddn_aci : ADD (should fail) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to add cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS ------------------------------ Captured log call -------------------------------
acl_test.py 284 INFO ######## mode moddn_aci : ADD (should fail) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 292 INFO Try to add cn=accounts,dc=example,dc=com acl_test.py 301 INFO Exception (expected): INSUFFICIENT_ACCESS
Passed suites/acl/acl_test.py::test_mode_default_delete_deny 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## DELETE (should fail) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to delete cn=staged user,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS ------------------------------ Captured log call -------------------------------
acl_test.py 319 INFO ######## DELETE (should fail) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 326 INFO Try to delete cn=staged user,dc=example,dc=com acl_test.py 331 INFO Exception (expected): INSUFFICIENT_ACCESS
Passed suites/acl/acl_test.py::test_moddn_staging_prod[0-cn=staged user,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.43
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (0) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (0) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[1-cn=staged user,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.40
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (1) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (1) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[2-cn=staged user,dc=example,dc=com-cn=bad*,dc=example,dc=com-True] 0.38
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (2) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (2) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com acl_test.py 398 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[3-cn=st*,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.38
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (3) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (3) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[4-cn=bad*,dc=example,dc=com-cn=accounts,dc=example,dc=com-True] 0.38
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (4) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (4) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com acl_test.py 398 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[5-cn=st*,dc=example,dc=com-cn=ac*,dc=example,dc=com-False] 0.41
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (5) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (5) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[6-None-cn=ac*,dc=example,dc=com-False] 0.39
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (6) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (6) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[7-cn=st*,dc=example,dc=com-None-False] 0.39
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (7) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (7) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[8-None-None-False] 0.40
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (8) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (8) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod_9 1.81
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (9) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Disable the moddn right INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Enable the moddn right INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######## MOVE staging -> Prod (10) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 441 INFO ######## MOVE staging -> Prod (9) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 454 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 461 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 467 INFO Disable the moddn right acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 472 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 480 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 487 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 509 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 520 INFO Enable the moddn right acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 524 INFO ######## MOVE staging -> Prod (10) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 536 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 543 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 560 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 567 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 576 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 582 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_prod_staging 0.75
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (11) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to move back MODDN uid=new_account11,cn=accounts,dc=example,dc=com -> uid=new_account11,cn=staged user,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 611 INFO ######## MOVE staging -> Prod (11) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 624 INFO Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 631 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 635 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 641 INFO Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 656 INFO Try to move back MODDN uid=new_account11,cn=accounts,dc=example,dc=com -> uid=new_account11,cn=staged user,dc=example,dc=com acl_test.py 663 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_check_repl_M2_to_M1 1.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389:Bind as cn=Directory Manager (M2) INFO:lib389:Update (M2) uid=new_account12,cn=staged user,dc=example,dc=com (description) INFO:lib389:Update uid=new_account12,cn=staged user,dc=example,dc=com (description) replicated on M1 ------------------------------ Captured log call -------------------------------
acl_test.py 693 INFO Bind as cn=Directory Manager (M2) acl_test.py 713 INFO Update (M2) uid=new_account12,cn=staged user,dc=example,dc=com (description) acl_test.py 726 INFO Update uid=new_account12,cn=staged user,dc=example,dc=com (description) replicated on M1
Passed suites/acl/acl_test.py::test_moddn_staging_prod_except 0.41
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## MOVE staging -> Prod (13) ######## INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389: ######## MOVE to and from equality filter ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389: ######## MOVE staging -> Prod/Except (14) ######## INFO:lib389:Try to MODDN uid=new_account14,cn=staged user,dc=example,dc=com -> uid=new_account14,cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 751 INFO ######## MOVE staging -> Prod (13) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 763 INFO Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 770 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 774 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 158 INFO Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 781 INFO Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 787 INFO ######## MOVE staging -> Prod/Except (14) ######## acl_test.py 793 INFO Try to MODDN uid=new_account14,cn=staged user,dc=example,dc=com -> uid=new_account14,cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 800 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 158 INFO Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_default_ger_no_moddn 0.01
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## mode moddn_aci : GER no moddn ######## INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' ------------------------------ Captured log call -------------------------------
acl_test.py 827 INFO ######## mode moddn_aci : GER no moddn ######## acl_test.py 838 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 841 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_mode_default_ger_with_moddn 0.36
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## mode moddn_aci: GER with moddn ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'vn' INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 865 INFO ######## mode moddn_aci: GER with moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 883 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 886 INFO ######## entryLevelRights: b'vn' acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_legacy_ger_no_moddn1 0.21
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## Disable the moddn aci mod ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######## mode legacy 1: GER no moddn ######## INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' ------------------------------ Captured log call -------------------------------
acl_test.py 916 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 920 INFO ######## mode legacy 1: GER no moddn ######## acl_test.py 930 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 933 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_mode_legacy_ger_no_moddn2 0.53
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## Disable the moddn aci mod ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######## mode legacy 2: GER no moddn ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com ------------------------------ Captured log call -------------------------------
acl_test.py 959 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 963 INFO ######## mode legacy 2: GER no moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 980 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 983 INFO ######## entryLevelRights: b'v' acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_legacy_ger_with_moddn 0.51
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## Disable the moddn aci mod ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######## mode legacy : GER with moddn ######## INFO:lib389:Bind as cn=Directory Manager INFO:lib389:Bind as uid=bind_entry,dc=example,dc=com INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'vn' INFO:lib389:Bind as cn=Directory Manager ------------------------------ Captured log call -------------------------------
acl_test.py 1019 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 1023 INFO ######## mode legacy : GER with moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 1045 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 1048 INFO ######## entryLevelRights: b'vn' acl_test.py 131 INFO Bind as cn=Directory Manager
Passed suites/acl/acl_test.py::test_rdn_write_get_ger 0.03
---------------------------- Captured stderr setup -----------------------------
INFO:lib389: ######## Add entry tuser ######## ------------------------------ Captured log setup ------------------------------
acl_test.py 1059 INFO ######## Add entry tuser ########----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######## GER rights for anonymous ######## INFO:lib389:dn: dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=Directory Administrators,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: ou=Groups,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: ou=People,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: ou=Special Users,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=Accounting Managers,ou=Groups,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=HR Managers,ou=Groups,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=QA Managers,ou=Groups,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=PD Managers,ou=Groups,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=replication_managers,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: ou=Services,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=server.example.com:63701,ou=Services,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=server.example.com:63702,ou=Services,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=bind_entry,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=excepts,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account0,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account1,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account2,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account3,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account4,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account5,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account6,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account7,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account8,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account9,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account10,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account11,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account12,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account13,cn=accounts,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account14,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account15,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account16,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account17,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account18,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: uid=new_account19,cn=staged user,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' INFO:lib389:dn: cn=tuser,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' ------------------------------ Captured log call -------------------------------
acl_test.py 1083 INFO ######## GER rights for anonymous ######## acl_test.py 1093 INFO dn: dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=Directory Administrators,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=People,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Special Users,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=Accounting Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=HR Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=QA Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=PD Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=replication_managers,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=server.example.com:63701,ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=server.example.com:63702,ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=bind_entry,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account2,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account4,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account12,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account14,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account15,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account16,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account17,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account18,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account19,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=tuser,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_rdn_write_modrdn_anonymous 0.20
----------------------------- Captured stderr call -----------------------------
INFO:lib389:dn: INFO:lib389:######## 'objectClass': [b'top'] INFO:lib389:######## 'defaultnamingcontext': [b'dc=example,dc=com'] INFO:lib389:######## 'dataversion': [b'020180726232131'] INFO:lib389:######## 'netscapemdsuffix': [b'cn=ldap://dc=server,dc=example,dc=com:39001'] INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:The entry was not renamed (expected) INFO:lib389:Bind as cn=Directory Manager ------------------------------ Captured log call -------------------------------
acl_test.py 1122 INFO dn: acl_test.py 1124 INFO ######## 'objectClass': [b'top'] acl_test.py 1124 INFO ######## 'defaultnamingcontext': [b'dc=example,dc=com'] acl_test.py 1124 INFO ######## 'dataversion': [b'020180726232131'] acl_test.py 1124 INFO ######## 'netscapemdsuffix': [b'cn=ldap://dc=server,dc=example,dc=com:39001'] acl_test.py 1129 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 1136 INFO The entry was not renamed (expected) acl_test.py 131 INFO Bind as cn=Directory Manager
Passed suites/acl/enhanced_aci_modrnd_test.py::test_enhanced_aci_modrnd 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:tests.suites.acl.enhanced_aci_modrnd_test:Add a container: ou=test_ou_1,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Add a container: ou=test_ou_2,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Add a user: cn=test_user,ou=test_ou_1,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_1,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_2,dc=example,dc=com ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. enhanced_aci_modrnd_test.py 30 INFO Add a container: ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 37 INFO Add a container: ou=test_ou_2,dc=example,dc=com enhanced_aci_modrnd_test.py 44 INFO Add a user: cn=test_user,ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 59 INFO Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 63 INFO Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_2,dc=example,dc=com----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.acl.enhanced_aci_modrnd_test:Bind as cn=test_user,ou=test_ou_1,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:User MODRDN operation from ou=test_ou_1,dc=example,dc=com to ou=test_ou_2,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Check there is no user in ou=test_ou_1,dc=example,dc=com INFO:tests.suites.acl.enhanced_aci_modrnd_test:Check there is our user in ou=test_ou_2,dc=example,dc=com ------------------------------ Captured log call -------------------------------
enhanced_aci_modrnd_test.py 93 INFO Bind as cn=test_user,ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 98 INFO User MODRDN operation from ou=test_ou_1,dc=example,dc=com to ou=test_ou_2,dc=example,dc=com enhanced_aci_modrnd_test.py 103 INFO Check there is no user in ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 109 INFO Check there is our user in ou=test_ou_2,dc=example,dc=com
Passed suites/acl/repeated_ldap_add_test.py::test_repeated_ldap_add 34.59
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stdout call -----------------------------
uid=buser123,ou=BOU,dc=example,dc=com inactivated. ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.acl.repeated_ldap_add_test:Testing Bug 1347760 - Information disclosure via repeated use of LDAP ADD operation, etc. INFO:tests.suites.acl.repeated_ldap_add_test:Disabling accesslog logbuffering INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {cn=Directory Manager,password} INFO:tests.suites.acl.repeated_ldap_add_test:Adding ou=BOU a bind user belongs to. INFO:tests.suites.acl.repeated_ldap_add_test:Adding a bind user. INFO:tests.suites.acl.repeated_ldap_add_test:Adding a test user. INFO:tests.suites.acl.repeated_ldap_add_test:Deleting aci in dc=example,dc=com. INFO:tests.suites.acl.repeated_ldap_add_test:While binding as DM, acquire an access log path and instance dir INFO:tests.suites.acl.repeated_ldap_add_test:Bind case 1. the bind user has no rights to read the entry itself, bind should be successful. INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} who has no access rights. INFO:tests.suites.acl.repeated_ldap_add_test:Access log path: /var/log/dirsrv/slapd-standalone1/access INFO:tests.suites.acl.repeated_ldap_add_test:Bind case 2-1. the bind user does not exist, bind should fail with error INVALID_CREDENTIALS INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=bogus,dc=example,dc=com,bogus} who does not exist. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INVALID_CREDENTIALS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Invalid credentials INFO:tests.suites.acl.repeated_ldap_add_test:Cause found - [26/Jul/2018:19:22:23.840045741 -0400] conn=1 op=10 RESULT err=49 tag=97 nentries=0 etime=0.0002218038 - No such entry INFO:tests.suites.acl.repeated_ldap_add_test:Bind case 2-2. the bind user's suffix does not exist, bind should fail with error INVALID_CREDENTIALS INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=bogus,ou=people,dc=bogus,bogus} who does not exist. INFO:tests.suites.acl.repeated_ldap_add_test:Cause found - 26/Jul/2018:19:22:24.845247229 -0400] conn=1 op=11 RESULT err=49 tag=97 nentries=0 etime=0.0002099494 - No suffix for bind dn found INFO:tests.suites.acl.repeated_ldap_add_test:Bind case 2-3. the bind user's password is wrong, bind should fail with error INVALID_CREDENTIALS INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} who does not exist. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INVALID_CREDENTIALS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Invalid credentials INFO:tests.suites.acl.repeated_ldap_add_test:Cause found - [26/Jul/2018:19:22:26.901974513 -0400] conn=1 op=12 RESULT err=49 tag=97 nentries=0 etime=0.0053646707 - Invalid credentials INFO:tests.suites.acl.repeated_ldap_add_test:Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to ou=BOU,dc=example,dc=com. INFO:tests.suites.acl.repeated_ldap_add_test:aci: (targetattr="*")(version 3.0; acl "buser123"; allow(all) userdn = "ldap:///uid=buser123,ou=BOU,dc=example,dc=com";) INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {cn=Directory Manager,password} INFO:tests.suites.acl.repeated_ldap_add_test:Bind case 3. the bind user has the right to read the entry itself, bind should be successful. INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should be ok. INFO:tests.suites.acl.repeated_ldap_add_test:The following operations are against the subtree the bind user uid=buser123,ou=BOU,dc=example,dc=com has no rights. INFO:tests.suites.acl.repeated_ldap_add_test:Search case 1. the bind user has no rights to read the search entry, it should return no search results with <class 'ldap.SUCCESS'> INFO:tests.suites.acl.repeated_ldap_add_test:Searching existing entry uid=tuser0,ou=people,dc=example,dc=com, which should be ok. INFO:tests.suites.acl.repeated_ldap_add_test:Search should return none INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Search case 2-1. the search entry does not exist, the search should return no search results with SUCCESS INFO:tests.suites.acl.repeated_ldap_add_test:Searching non-existing entry uid=bogus,dc=example,dc=com, which should be ok. INFO:tests.suites.acl.repeated_ldap_add_test:Search should return none INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Search case 2-2. the search entry does not exist, the search should return no search results with SUCCESS INFO:tests.suites.acl.repeated_ldap_add_test:Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should be ok. INFO:tests.suites.acl.repeated_ldap_add_test:Search should return none INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Add case 1. the bind user has no rights AND the adding entry exists, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Add case 2-1. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Adding non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Add case 2-2. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Adding non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modify case 1. the bind user has no rights AND the modifying entry exists, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Modifying existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modify case 2-1. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modify case 2-2. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Modifying non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 1. the bind user has no rights AND the renaming entry exists, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Renaming existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 2-1. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 2-2. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Renaming non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 3. the bind user has no rights AND the node moving an entry to exists, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Moving to existing superior ou=groups,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 4-1. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 4-2. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Delete case 1. the bind user has no rights AND the deleting entry exists, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Deleting existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Delete case 2-1. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Delete case 2-2. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Deleting non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): INSUFFICIENT_ACCESS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Insufficient access INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:EXTRA: Check no regressions INFO:tests.suites.acl.repeated_ldap_add_test:Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to dc=example,dc=com. INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {cn=Directory Manager,password} INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123}. INFO:tests.suites.acl.repeated_ldap_add_test:Search case. the search entry does not exist, the search should fail with NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Desc No such object INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Add case. the adding entry already exists, it should fail with ALREADY_EXISTS INFO:tests.suites.acl.repeated_ldap_add_test:Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with ALREADY_EXISTS. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): ALREADY_EXISTS INFO:tests.suites.acl.repeated_ldap_add_test:Desc Already exists INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modify case. the modifying entry does not exist, it should fail with NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Desc No such object INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 1. the renaming entry does not exist, it should fail with NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Desc No such object INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Modrdn case 2. the node moving an entry to does not, it should fail with NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Desc No such object INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Delete case. the deleting entry does not exist, it should fail with NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): NO_SUCH_OBJECT INFO:tests.suites.acl.repeated_ldap_add_test:Desc No such object INFO:tests.suites.acl.repeated_ldap_add_test:PASSED INFO:tests.suites.acl.repeated_ldap_add_test:Inactivate uid=buser123,ou=BOU,dc=example,dc=com INFO:tests.suites.acl.repeated_ldap_add_test:['/usr/sbin/ns-inactivate.pl', '-Z', 'standalone1', '-D', 'cn=Directory Manager', '-w', 'password', '-I', 'uid=buser123,ou=BOU,dc=example,dc=com'] INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should fail with UNWILLING_TO_PERFORM. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): UNWILLING_TO_PERFORM INFO:tests.suites.acl.repeated_ldap_add_test:Desc Server is unwilling to perform INFO:tests.suites.acl.repeated_ldap_add_test:Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} which should fail with UNWILLING_TO_PERFORM. INFO:tests.suites.acl.repeated_ldap_add_test:Exception (expected): UNWILLING_TO_PERFORM INFO:tests.suites.acl.repeated_ldap_add_test:Desc Server is unwilling to perform INFO:tests.suites.acl.repeated_ldap_add_test:SUCCESS ------------------------------ Captured log call -------------------------------
repeated_ldap_add_test.py 182 INFO Testing Bug 1347760 - Information disclosure via repeated use of LDAP ADD operation, etc. repeated_ldap_add_test.py 184 INFO Disabling accesslog logbuffering repeated_ldap_add_test.py 187 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 190 INFO Adding ou=BOU a bind user belongs to. repeated_ldap_add_test.py 195 INFO Adding a bind user. repeated_ldap_add_test.py 202 INFO Adding a test user. repeated_ldap_add_test.py 209 INFO Deleting aci in dc=example,dc=com. repeated_ldap_add_test.py 212 INFO While binding as DM, acquire an access log path and instance dir repeated_ldap_add_test.py 218 INFO Bind case 1. the bind user has no rights to read the entry itself, bind should be successful. repeated_ldap_add_test.py 219 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} who has no access rights. repeated_ldap_add_test.py 227 INFO Access log path: /var/log/dirsrv/slapd-standalone1/access repeated_ldap_add_test.py 230 INFO Bind case 2-1. the bind user does not exist, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 231 INFO Bind as {uid=bogus,dc=example,dc=com,bogus} who does not exist. repeated_ldap_add_test.py 235 INFO Exception (expected): INVALID_CREDENTIALS repeated_ldap_add_test.py 236 INFO Desc Invalid credentials repeated_ldap_add_test.py 244 INFO Cause found - [26/Jul/2018:19:22:23.840045741 -0400] conn=1 op=10 RESULT err=49 tag=97 nentries=0 etime=0.0002218038 - No such entry repeated_ldap_add_test.py 248 INFO Bind case 2-2. the bind user's suffix does not exist, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 249 INFO Bind as {uid=bogus,ou=people,dc=bogus,bogus} who does not exist. repeated_ldap_add_test.py 258 INFO Cause found - 26/Jul/2018:19:22:24.845247229 -0400] conn=1 op=11 RESULT err=49 tag=97 nentries=0 etime=0.0002099494 - No suffix for bind dn found repeated_ldap_add_test.py 262 INFO Bind case 2-3. the bind user's password is wrong, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 263 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} who does not exist. repeated_ldap_add_test.py 267 INFO Exception (expected): INVALID_CREDENTIALS repeated_ldap_add_test.py 268 INFO Desc Invalid credentials repeated_ldap_add_test.py 276 INFO Cause found - [26/Jul/2018:19:22:26.901974513 -0400] conn=1 op=12 RESULT err=49 tag=97 nentries=0 etime=0.0053646707 - Invalid credentials repeated_ldap_add_test.py 279 INFO Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to ou=BOU,dc=example,dc=com. repeated_ldap_add_test.py 281 INFO aci: (targetattr="*")(version 3.0; acl "buser123"; allow(all) userdn = "ldap:///uid=buser123,ou=BOU,dc=example,dc=com";) repeated_ldap_add_test.py 282 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 287 INFO Bind case 3. the bind user has the right to read the entry itself, bind should be successful. repeated_ldap_add_test.py 288 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should be ok. repeated_ldap_add_test.py 291 INFO The following operations are against the subtree the bind user uid=buser123,ou=BOU,dc=example,dc=com has no rights. repeated_ldap_add_test.py 296 INFO Search case 1. the bind user has no rights to read the search entry, it should return no search results with <class 'ldap.SUCCESS'> repeated_ldap_add_test.py 106 INFO Searching existing entry uid=tuser0,ou=people,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 302 INFO Search case 2-1. the search entry does not exist, the search should return no search results with SUCCESS repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 308 INFO Search case 2-2. the search entry does not exist, the search should return no search results with SUCCESS repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 315 INFO Add case 1. the bind user has no rights AND the adding entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 321 INFO Add case 2-1. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 327 INFO Add case 2-2. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 334 INFO Modify case 1. the bind user has no rights AND the modifying entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 340 INFO Modify case 2-1. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 346 INFO Modify case 2-2. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 353 INFO Modrdn case 1. the bind user has no rights AND the renaming entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 359 INFO Modrdn case 2-1. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 365 INFO Modrdn case 2-2. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 371 INFO Modrdn case 3. the bind user has no rights AND the node moving an entry to exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to existing superior ou=groups,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 377 INFO Modrdn case 4-1. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 383 INFO Modrdn case 4-2. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 390 INFO Delete case 1. the bind user has no rights AND the deleting entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 396 INFO Delete case 2-1. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 402 INFO Delete case 2-2. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 405 INFO EXTRA: Check no regressions repeated_ldap_add_test.py 406 INFO Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to dc=example,dc=com. repeated_ldap_add_test.py 408 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 413 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123}. repeated_ldap_add_test.py 423 INFO Search case. the search entry does not exist, the search should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 429 INFO Add case. the adding entry already exists, it should fail with ALREADY_EXISTS repeated_ldap_add_test.py 106 INFO Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with ALREADY_EXISTS. repeated_ldap_add_test.py 129 INFO Exception (expected): ALREADY_EXISTS repeated_ldap_add_test.py 130 INFO Desc Already exists repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 434 INFO Modify case. the modifying entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 439 INFO Modrdn case 1. the renaming entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 444 INFO Modrdn case 2. the node moving an entry to does not, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 449 INFO Delete case. the deleting entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 452 INFO Inactivate uid=buser123,ou=BOU,dc=example,dc=com repeated_ldap_add_test.py 459 INFO ['/usr/sbin/ns-inactivate.pl', '-Z', 'standalone1', '-D', 'cn=Directory Manager', '-w', 'password', '-I', 'uid=buser123,ou=BOU,dc=example,dc=com'] repeated_ldap_add_test.py 463 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should fail with UNWILLING_TO_PERFORM. repeated_ldap_add_test.py 467 INFO Exception (expected): UNWILLING_TO_PERFORM repeated_ldap_add_test.py 468 INFO Desc Server is unwilling to perform repeated_ldap_add_test.py 471 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} which should fail with UNWILLING_TO_PERFORM. repeated_ldap_add_test.py 475 INFO Exception (expected): UNWILLING_TO_PERFORM repeated_ldap_add_test.py 476 INFO Desc Server is unwilling to perform repeated_ldap_add_test.py 479 INFO SUCCESS
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_add 0.28
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389:Add OCticket47653 that allows 'member' attribute INFO:lib389:Add cn=bind_entry, dc=example,dc=com ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. selfdn_permissions_test.py 57 INFO Add OCticket47653 that allows 'member' attribute selfdn_permissions_test.py 62 INFO Add cn=bind_entry, dc=example,dc=com----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######################### ADD ###################### INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to add Add cn=test_entry, dc=example,dc=com (aci is missing): dn: cn=test_entry, dc=example,dc=com cn: test_entry member: cn=bind_entry, dc=example,dc=com objectclass: top objectclass: person objectclass: OCticket47653 postalAddress: here postalCode: 1234 sn: test_entry INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager and add the ADD SELFDN aci INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to add Add cn=test_entry, dc=example,dc=com (member is missing) INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Try to add Add cn=test_entry, dc=example,dc=com (with several member values) INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Try to add Add cn=test_entry, dc=example,dc=com should be successful ------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 105 INFO ######################### ADD ###################### selfdn_permissions_test.py 108 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 138 INFO Try to add Add cn=test_entry, dc=example,dc=com (aci is missing): dn: cn=test_entry, dc=example,dc=com cn: test_entry member: cn=bind_entry, dc=example,dc=com objectclass: top objectclass: person objectclass: OCticket47653 postalAddress: here postalCode: 1234 sn: test_entry selfdn_permissions_test.py 142 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 146 INFO Bind as cn=Directory Manager and add the ADD SELFDN aci selfdn_permissions_test.py 158 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 163 INFO Try to add Add cn=test_entry, dc=example,dc=com (member is missing) selfdn_permissions_test.py 171 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 177 INFO Try to add Add cn=test_entry, dc=example,dc=com (with several member values) selfdn_permissions_test.py 180 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 183 INFO Try to add Add cn=test_entry, dc=example,dc=com should be successful
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_search 0.25
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######################### SEARCH ###################### INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to search cn=test_entry, dc=example,dc=com (aci is missing) INFO:lib389:Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to search cn=test_entry, dc=example,dc=com should be successful ------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 204 INFO ######################### SEARCH ###################### selfdn_permissions_test.py 206 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 210 INFO Try to search cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 215 INFO Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci selfdn_permissions_test.py 228 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 232 INFO Try to search cn=test_entry, dc=example,dc=com should be successful
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_modify 0.28
----------------------------- Captured stderr call -----------------------------
INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389: ######################### MODIFY ###################### INFO:lib389:Try to modify cn=test_entry, dc=example,dc=com (aci is missing) INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager and add the WRITE SELFDN aci INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to modify cn=test_entry, dc=example,dc=com. It should succeeds ------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 255 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 258 INFO ######################### MODIFY ###################### selfdn_permissions_test.py 262 INFO Try to modify cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 266 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 270 INFO Bind as cn=Directory Manager and add the WRITE SELFDN aci selfdn_permissions_test.py 283 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 287 INFO Try to modify cn=test_entry, dc=example,dc=com. It should succeeds
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_delete 0.24
----------------------------- Captured stderr call -----------------------------
INFO:lib389: ######################### DELETE ###################### INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to delete cn=test_entry, dc=example,dc=com (aci is missing) INFO:lib389:Exception (expected): INSUFFICIENT_ACCESS INFO:lib389:Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci INFO:lib389:Bind as cn=bind_entry, dc=example,dc=com INFO:lib389:Try to delete cn=test_entry, dc=example,dc=com should be successful ------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 312 INFO ######################### DELETE ###################### selfdn_permissions_test.py 315 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 320 INFO Try to delete cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 323 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 327 INFO Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci selfdn_permissions_test.py 339 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 343 INFO Try to delete cn=test_entry, dc=example,dc=com should be successful
Passed suites/automember_plugin/automember_test.py::test_automemberscope 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/automember_plugin/automember_test.py::test_automemberfilter 0.02
No log output captured.
Passed suites/automember_plugin/automember_test.py::test_adduser 0.02
No log output captured.
Passed suites/basic/basic_test.py::test_basic_ops 0.13
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:tests.suites.basic.basic_test:Initializing the "basic" test suite INFO:lib389:Import task import_07262018_192332 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. basic_test.py 45 INFO Initializing the "basic" test suite tasks.py 338 INFO Import task import_07262018_192332 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_ops... INFO:tests.suites.basic.basic_test:test_basic_ops: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 109 INFO Running test_basic_ops... basic_test.py 218 INFO test_basic_ops: PASSED
Passed suites/basic/basic_test.py::test_basic_import_export 104.58
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_import_export... INFO:lib389:Import task import_07262018_192337 for file /var/lib/dirsrv/slapd-standalone1/ldif/basic_import.ldif completed successfully INFO:lib389:Export task export_07262018_192436 for file /var/lib/dirsrv/slapd-standalone1/ldif/export.ldif completed successfully INFO:lib389:Import task import_07262018_192516 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully INFO:tests.suites.basic.basic_test:test_basic_import_export: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 245 INFO Running test_basic_import_export... tasks.py 338 INFO Import task import_07262018_192337 for file /var/lib/dirsrv/slapd-standalone1/ldif/basic_import.ldif completed successfully tasks.py 407 INFO Export task export_07262018_192436 for file /var/lib/dirsrv/slapd-standalone1/ldif/export.ldif completed successfully tasks.py 338 INFO Import task import_07262018_192516 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully basic_test.py 312 INFO test_basic_import_export: PASSED
Passed suites/basic/basic_test.py::test_basic_backup 10.52
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_backup... INFO:lib389:Backup task backup_07262018_192519 completed successfully INFO:lib389:Restore task restore_07262018_192521 completed successfully INFO:tests.suites.basic.basic_test:test_basic_backup: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 335 INFO Running test_basic_backup... tasks.py 458 INFO Backup task backup_07262018_192519 completed successfully tasks.py 520 INFO Restore task restore_07262018_192521 completed successfully basic_test.py 367 INFO test_basic_backup: PASSED
Passed suites/basic/basic_test.py::test_basic_db2index 5.59
No log output captured.
Passed suites/basic/basic_test.py::test_basic_acl 0.35
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_acl... INFO:tests.suites.basic.basic_test:test_basic_acl: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 416 INFO Running test_basic_acl... basic_test.py 539 INFO test_basic_acl: PASSED
Passed suites/basic/basic_test.py::test_basic_searches 0.26
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_searches... INFO:tests.suites.basic.basic_test:test_basic_searches: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 558 INFO Running test_basic_searches... basic_test.py 591 INFO test_basic_searches: PASSED
Passed suites/basic/basic_test.py::test_basic_referrals 4.31
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_referrals... INFO:tests.suites.basic.basic_test:test_basic_referrals: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 618 INFO Running test_basic_referrals... basic_test.py 677 INFO test_basic_referrals: PASSED
Passed suites/basic/basic_test.py::test_basic_systemctl 13.32
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_systemctl... INFO:tests.suites.basic.basic_test:Stopping the server... INFO:tests.suites.basic.basic_test:Stopped the server. INFO:tests.suites.basic.basic_test:Starting the server... INFO:tests.suites.basic.basic_test:Started the server. INFO:tests.suites.basic.basic_test:Stopping the server... INFO:tests.suites.basic.basic_test:Stopped the server before breaking the dse.ldif. INFO:tests.suites.basic.basic_test:Attempting to start the server with broken dse.ldif... Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details. INFO:tests.suites.basic.basic_test:Server failed to start as expected INFO:tests.suites.basic.basic_test:Check the status... INFO:tests.suites.basic.basic_test:Server failed to start as expected INFO:tests.suites.basic.basic_test:Starting the server with good dse.ldif... INFO:tests.suites.basic.basic_test:Check the status... INFO:tests.suites.basic.basic_test:Server started after fixing dse.ldif. INFO:tests.suites.basic.basic_test:test_basic_systemctl: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 704 INFO Running test_basic_systemctl... basic_test.py 711 INFO Stopping the server... basic_test.py 713 INFO Stopped the server. basic_test.py 718 INFO Starting the server... basic_test.py 720 INFO Started the server. basic_test.py 726 INFO Stopping the server... basic_test.py 728 INFO Stopped the server before breaking the dse.ldif. basic_test.py 735 INFO Attempting to start the server with broken dse.ldif... basic_test.py 739 INFO Server failed to start as expected basic_test.py 740 INFO Check the status... basic_test.py 742 INFO Server failed to start as expected basic_test.py 750 INFO Starting the server with good dse.ldif... basic_test.py 752 INFO Check the status... basic_test.py 754 INFO Server started after fixing dse.ldif. basic_test.py 756 INFO test_basic_systemctl: PASSED
Passed suites/basic/basic_test.py::test_basic_ldapagent 5.04
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_ldapagent... DEBUG:tests.suites.basic.basic_test:test_basic_ldapagent: Terminating agent 6812 INFO:tests.suites.basic.basic_test:test_basic_ldapagent: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 775 INFO Running test_basic_ldapagent... basic_test.py 795 DEBUG test_basic_ldapagent: Terminating agent 6812 basic_test.py 798 INFO test_basic_ldapagent: PASSED
Passed suites/basic/basic_test.py::test_basic_dse 12.36
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test:Running test_basic_dse... INFO:tests.suites.basic.basic_test:dse.ldif was not corrupted, and the server was restarted INFO:tests.suites.basic.basic_test:test_basic_dse: PASSED ------------------------------ Captured log call -------------------------------
basic_test.py 818 INFO Running test_basic_dse... basic_test.py 828 INFO dse.ldif was not corrupted, and the server was restarted basic_test.py 830 INFO test_basic_dse: PASSED
Passed suites/basic/basic_test.py::test_def_rootdse_attr[namingContexts] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't namingContexts attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't namingContexts attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedLDAPVersion] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't supportedLDAPVersion attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't supportedLDAPVersion attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedControl] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't supportedControl attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't supportedControl attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedExtension] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't supportedExtension attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't supportedExtension attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedSASLMechanisms] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't supportedSASLMechanisms attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't supportedSASLMechanisms attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[vendorName] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't vendorName attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't vendorName attr
Passed suites/basic/basic_test.py::test_def_rootdse_attr[vendorVersion] 0.02
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search hasn't vendorVersion attr ------------------------------ Captured log call -------------------------------
basic_test.py 854 INFO Assert rootdse search hasn't vendorVersion attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[namingContexts] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'namingContexts' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'namingContexts' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'namingContexts' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'namingContexts' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedLDAPVersion] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'supportedLDAPVersion' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'supportedLDAPVersion' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'supportedLDAPVersion' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'supportedLDAPVersion' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedControl] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'supportedControl' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'supportedControl' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'supportedControl' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'supportedControl' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedExtension] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'supportedExtension' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'supportedExtension' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'supportedExtension' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'supportedExtension' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedSASLMechanisms] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'supportedSASLMechanisms' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'supportedSASLMechanisms' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'supportedSASLMechanisms' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'supportedSASLMechanisms' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[vendorName] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'vendorName' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'vendorName' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'vendorName' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'vendorName' attr
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[vendorVersion] 0.00
---------------------------- Captured stderr setup -----------------------------
INFO:tests.suites.basic.basic_test: Add the nsslapd-return-default-opattr: b'vendorVersion' to rootdse ------------------------------ Captured log setup ------------------------------
basic_test.py 67 INFO Add the nsslapd-return-default-opattr: b'vendorVersion' to rootdse----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.basic.basic_test: Assert rootdse search has b'vendorVersion' attr ------------------------------ Captured log call -------------------------------
basic_test.py 881 INFO Assert rootdse search has b'vendorVersion' attr
Passed suites/betxns/betxn_test.py::test_betxt_7bit 4.96
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.betxns.betxn_test:Running test_betxt_7bit... INFO:tests.suites.betxns.betxn_test:Modrdn failed as expected: error {'desc': 'Constraint violation', 'info': 'The value is not 7-bit clean: FuÄè'} INFO:tests.suites.betxns.betxn_test:test_betxt_7bit: PASSED ------------------------------ Captured log call -------------------------------
betxn_test.py 46 INFO Running test_betxt_7bit... betxn_test.py 65 INFO Modrdn failed as expected: error {'desc': 'Constraint violation', 'info': 'The value is not 7-bit clean: FuÄè'} betxn_test.py 77 INFO test_betxt_7bit: PASSED
Passed suites/betxns/betxn_test.py::test_betxn_attr_uniqueness 5.08
----------------------------- Captured stderr call -----------------------------
ERROR:tests.suites.betxns.betxn_test:test_betxn_attr_uniqueness: Failed to add test user as expected: INFO:tests.suites.betxns.betxn_test:test_betxn_attr_uniqueness: PASSED ------------------------------ Captured log call -------------------------------
betxn_test.py 131 ERROR test_betxn_attr_uniqueness: Failed to add test user as expected: betxn_test.py 135 INFO test_betxn_attr_uniqueness: PASSED
Passed suites/betxns/betxn_test.py::test_betxn_memberof 5.09
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.betxns.betxn_test:test_betxn_memberof: Group2 was correctly rejected (mod add): error INFO:tests.suites.betxns.betxn_test:test_betxn_memberof: PASSED ------------------------------ Captured log call -------------------------------
betxn_test.py 190 INFO test_betxn_memberof: Group2 was correctly rejected (mod add): error betxn_test.py 195 INFO test_betxn_memberof: PASSED
Passed suites/clu/clu_test.py::test_clu_pwdhash 0.08
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.clu.clu_test:Running test_clu_pwdhash... INFO:tests.suites.clu.clu_test:pwdhash generated: {SSHA}ztF/HKiPPhKyisw3tUUeqkTtAh9hPvo+GdbhQg== INFO:tests.suites.clu.clu_test:test_clu_pwdhash: PASSED ------------------------------ Captured log call -------------------------------
clu_test.py 38 INFO Running test_clu_pwdhash... clu_test.py 52 INFO pwdhash generated: {SSHA}ztF/HKiPPhKyisw3tUUeqkTtAh9hPvo+GdbhQg== clu_test.py 53 INFO test_clu_pwdhash: PASSED
Passed suites/clu/clu_test.py::test_clu_pwdhash_mod 0.14
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.clu.clu_test:Running test_clu_pwdhash_mod... INFO:tests.suites.clu.clu_test:pwdhash generated: {SSHA256}opATJm8fscxSgV9cGA57lT30DCerI7VqpQTZo0MLtdB6VNR0cju5+A== INFO:tests.suites.clu.clu_test:returned the hashed string using the algorithm set in nsslapd-rootpwstoragescheme ------------------------------ Captured log call -------------------------------
clu_test.py 76 INFO Running test_clu_pwdhash_mod... clu_test.py 85 INFO pwdhash generated: {SSHA256}opATJm8fscxSgV9cGA57lT30DCerI7VqpQTZo0MLtdB6VNR0cju5+A== clu_test.py 86 INFO returned the hashed string using the algorithm set in nsslapd-rootpwstoragescheme
Passed suites/config/autotuning_test.py::test_threads_basic 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: -1 to enable autotuning INFO:tests.suites.config.autotuning_test:Assert nsslapd-threadnumber is equal to the documented expected value ------------------------------ Captured log call -------------------------------
autotuning_test.py 37 INFO Set nsslapd-threadnumber: -1 to enable autotuning autotuning_test.py 40 INFO Assert nsslapd-threadnumber is equal to the documented expected value
Passed suites/config/autotuning_test.py::test_threads_invalid_value[-2] 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: -2. Operation should fail ------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: -2. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_invalid_value[0] 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: 0. Operation should fail ------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: 0. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_invalid_value[invalid] 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: invalid. Operation should fail ------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: invalid. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_back_from_manual_value 0.12
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: -1 to enable autotuning and save the new value INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber to the autotuned value decreased by 2 INFO:tests.suites.config.autotuning_test:Set nsslapd-threadnumber: -1 to enable autotuning INFO:tests.suites.config.autotuning_test:Assert nsslapd-threadnumber is back to the autotuned value ------------------------------ Captured log call -------------------------------
autotuning_test.py 78 INFO Set nsslapd-threadnumber: -1 to enable autotuning and save the new value autotuning_test.py 82 INFO Set nsslapd-threadnumber to the autotuned value decreased by 2 autotuning_test.py 87 INFO Set nsslapd-threadnumber: -1 to enable autotuning autotuning_test.py 90 INFO Assert nsslapd-threadnumber is back to the autotuned value
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-] 4.16
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize-split INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 151 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-0] 5.13
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 0 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-400] 5.14
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to 10 INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 40 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-40] 5.09
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 40 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-] 5.12
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to 10 INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize-split INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 151 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-401] 5.10
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to 10 INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 40 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-0] 5.10
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to 10 INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 0 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Trying to set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'10' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' ------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[0] 10.29
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 0 INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 0 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 0 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 0 INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' ------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 250 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[] 10.31
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'0' INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize-split INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 0 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 0 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'167257784' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'603979776' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Delete nsslapd-cache-autosize-split INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' ------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 222 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 230 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 250 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257784' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 230 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[40] 10.41
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'25' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 40 INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 0 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 0 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize before the test INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'267612454' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'469762048' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 40 INFO:tests.suites.config.autotuning_test:Set nsslapd-dbcachesize to 33333333 INFO:tests.suites.config.autotuning_test:Set nsslapd-cachememsize to 33333333 INFO:tests.suites.config.autotuning_test:Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. INFO:tests.suites.config.autotuning_test:nsslapd-dbcachesize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-cachememsize == b'33333333' INFO:tests.suites.config.autotuning_test:nsslapd-dncachememsize == b'67108864' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize == b'0' INFO:tests.suites.config.autotuning_test:nsslapd-cache-autosize-split == b'40' ------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 222 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 250 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'267612454' autotuning_test.py 222 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[-2] 0.03
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to -2 INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to -2 ------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to -2 autotuning_test.py 287 INFO Set nsslapd-cache-autosize to -2
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[102] 0.03
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to 102 INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to 102 ------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to 102 autotuning_test.py 287 INFO Set nsslapd-cache-autosize to 102
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[invalid] 0.03
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize-split to invalid INFO:tests.suites.config.autotuning_test:Set nsslapd-cache-autosize to invalid ------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to invalid autotuning_test.py 287 INFO Set nsslapd-cache-autosize to invalid
Passed suites/config/config_test.py::test_maxbersize_repl 19.10
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.config_test:Set nsslapd-maxbersize: 20K to master2 INFO:tests.suites.config.config_test:Try to add attribute with a big value to master2 - expect to FAIL INFO:tests.suites.config.config_test:Try to add attribute with a big value to master1 - expect to PASS INFO:tests.suites.config.config_test:Check if a big value was successfully added to master1 INFO:tests.suites.config.config_test:Check if a big value was successfully replicated to master2 ------------------------------ Captured log call -------------------------------
config_test.py 64 INFO Set nsslapd-maxbersize: 20K to master2 config_test.py 69 INFO Try to add attribute with a big value to master2 - expect to FAIL config_test.py 76 INFO Try to add attribute with a big value to master1 - expect to PASS config_test.py 81 INFO Check if a big value was successfully added to master1 config_test.py 85 INFO Check if a big value was successfully replicated to master2
Passed suites/config/config_test.py::test_config_listen_backport_size 0.10
No log output captured.
Passed suites/config/config_test.py::test_config_deadlock_policy 0.06
No log output captured.
Passed suites/config/regression_test.py::test_maxbersize_repl 8.18
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.regression_test:Set nsslapd-errorlog-maxlogsize before nsslapd-errorlog-logmaxdiskspace INFO:tests.suites.config.regression_test:Assert no init_dse_file errors in the error log INFO:tests.suites.config.regression_test:Set nsslapd-errorlog-maxlogsize after nsslapd-errorlog-logmaxdiskspace INFO:tests.suites.config.regression_test:Assert no init_dse_file errors in the error log ------------------------------ Captured log call -------------------------------
regression_test.py 41 INFO Set nsslapd-errorlog-maxlogsize before nsslapd-errorlog-logmaxdiskspace regression_test.py 45 INFO Assert no init_dse_file errors in the error log regression_test.py 49 INFO Set nsslapd-errorlog-maxlogsize after nsslapd-errorlog-logmaxdiskspace regression_test.py 53 INFO Assert no init_dse_file errors in the error log
Passed suites/config/removed_config_49298_test.py::test_restore_config 3.92
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.removed_config_49298_test:/etc/dirsrv/slapd-standalone1 ------------------------------ Captured log call -------------------------------
removed_config_49298_test.py 41 INFO /etc/dirsrv/slapd-standalone1
Passed suites/config/removed_config_49298_test.py::test_removed_config 1.95
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.config.removed_config_49298_test:/etc/dirsrv/slapd-standalone1 Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
removed_config_49298_test.py 70 INFO /etc/dirsrv/slapd-standalone1
Passed suites/cos/indirect_cos_test.py::test_indirect_cos 1.60
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:tests.suites.cos.indirect_cos_test:Add custom schema... INFO:tests.suites.cos.indirect_cos_test:Add test user... INFO:tests.suites.cos.indirect_cos_test:Setup indirect COS... ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. indirect_cos_test.py 106 INFO Add custom schema... indirect_cos_test.py 119 INFO Add test user... indirect_cos_test.py 136 INFO Setup indirect COS...----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.cos.indirect_cos_test:Checking user... INFO:tests.suites.cos.indirect_cos_test:Create password policy for subtree ou=people,dc=example,dc=com INFO:tests.suites.cos.indirect_cos_test:Checking user... ------------------------------ Captured log call -------------------------------
indirect_cos_test.py 156 INFO Checking user... indirect_cos_test.py 55 INFO Create password policy for subtree ou=people,dc=example,dc=com indirect_cos_test.py 163 INFO Checking user...
Passed suites/ds_logs/ds_logs_test.py::test_check_default 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
DEBUG:tests.suites.ds_logs.ds_logs_test:on ------------------------------ Captured log call -------------------------------
ds_logs_test.py 68 DEBUG on
Passed suites/ds_logs/ds_logs_test.py::test_plugin_set_invalid 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.ds_logs.ds_logs_test:test_plugin_set_invalid - Expect to fail with junk value ------------------------------ Captured log call -------------------------------
ds_logs_test.py 86 INFO test_plugin_set_invalid - Expect to fail with junk value
Passed suites/ds_logs/ds_logs_test.py::test_log_plugin_on 4.72
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.ds_logs.ds_logs_test:Bug 1273549 - Check access logs for millisecond, when attribute is ON INFO:tests.suites.ds_logs.ds_logs_test:perform any ldap operation, which will trigger the logs INFO:tests.suites.ds_logs.ds_logs_test:Adding 10 users INFO:tests.suites.ds_logs.ds_logs_test:Restart the server to flush the logs INFO:tests.suites.ds_logs.ds_logs_test:parse the access logs ------------------------------ Captured log call -------------------------------
ds_logs_test.py 112 INFO Bug 1273549 - Check access logs for millisecond, when attribute is ON ds_logs_test.py 113 INFO perform any ldap operation, which will trigger the logs ds_logs_test.py 27 INFO Adding 10 users ds_logs_test.py 117 INFO Restart the server to flush the logs ds_logs_test.py 120 INFO parse the access logs
Passed suites/ds_logs/ds_logs_test.py::test_log_plugin_off 14.43
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.ds_logs.ds_logs_test:Bug 1273549 - Check access logs for missing millisecond, when attribute is OFF INFO:tests.suites.ds_logs.ds_logs_test:test_log_plugin_off - set the configuration attribute to OFF INFO:tests.suites.ds_logs.ds_logs_test:Restart the server to flush the logs INFO:tests.suites.ds_logs.ds_logs_test:test_log_plugin_off - delete the previous access logs INFO:tests.suites.ds_logs.ds_logs_test:Restart the server to flush the logs INFO:tests.suites.ds_logs.ds_logs_test:check access log that microseconds are not present ------------------------------ Captured log call -------------------------------
ds_logs_test.py 151 INFO Bug 1273549 - Check access logs for missing millisecond, when attribute is OFF ds_logs_test.py 153 INFO test_log_plugin_off - set the configuration attribute to OFF ds_logs_test.py 156 INFO Restart the server to flush the logs ds_logs_test.py 159 INFO test_log_plugin_off - delete the previous access logs ds_logs_test.py 165 INFO Restart the server to flush the logs ds_logs_test.py 168 INFO check access log that microseconds are not present
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[24576] 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[16512] 0.04
No log output captured.
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[16385] 0.21
No log output captured.
Passed suites/ds_logs/regression_test.py::test_dse_config_loglevel_error 6.14
No log output captured.
Passed suites/ds_tools/logpipe_test.py::test_user_permissions 0.12
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:logpipe_test:Add system test user - dirsrv_testuser ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. logpipe_test.py 30 INFO Add system test user - dirsrv_testuser----------------------------- Captured stderr call -----------------------------
INFO:logpipe_test:Try to create a logpipe in the log directory with "-u" option specifying the user ------------------------------ Captured log call -------------------------------
logpipe_test.py 66 INFO Try to create a logpipe in the log directory with "-u" option specifying the user
Passed suites/ds_tools/replcheck_test.py::test_check_ruv 19.65
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists INFO:lib389.replica:SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working INFO:replcheck_test:Export LDAPTLS_CACERTDIR env variable for ds-replcheck INFO:lib389.replica:SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working INFO:lib389.replica:SUCCESS: Replication from ldaps://server.example.com:63702 to ldaps://server.example.com:63701 is working ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists replica.py 1873 INFO SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working replcheck_test.py 99 INFO Export LDAPTLS_CACERTDIR env variable for ds-replcheck replica.py 1873 INFO SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working replica.py 1873 INFO SUCCESS: Replication from ldaps://server.example.com:63702 to ldaps://server.example.com:63701 is working----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists
Passed suites/ds_tools/replcheck_test.py::test_missing_entries 20.67
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists
Passed suites/ds_tools/replcheck_test.py::test_tombstones 23.29
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists
Passed suites/ds_tools/replcheck_test.py::test_conflict_entries 30.66
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_acceptance 40.47
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Testing Dynamic Plugins Functionality (no replication)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Tested Dynamic Plugins Functionality (no replication). INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Resume replication and run everything one more time INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Testing Dynamic Plugins Functionality (replication enabled)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Tested Dynamic Plugins Functionality (replication enabled). INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if replication is in sync... INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if the data is the same between the replicas... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Data is consistent across the replicas. ------------------------------ Captured log call -------------------------------
dynamic_plugins_test.py 115 INFO #################################################################### dynamic_plugins_test.py 116 INFO Testing Dynamic Plugins Functionality (no replication)... dynamic_plugins_test.py 117 INFO #################################################################### acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 121 INFO #################################################################### dynamic_plugins_test.py 122 INFO Successfully Tested Dynamic Plugins Functionality (no replication). dynamic_plugins_test.py 123 INFO #################################################################### dynamic_plugins_test.py 129 INFO Resume replication and run everything one more time dynamic_plugins_test.py 115 INFO #################################################################### dynamic_plugins_test.py 116 INFO Testing Dynamic Plugins Functionality (replication enabled)... dynamic_plugins_test.py 117 INFO #################################################################### acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 121 INFO #################################################################### dynamic_plugins_test.py 122 INFO Successfully Tested Dynamic Plugins Functionality (replication enabled). dynamic_plugins_test.py 123 INFO #################################################################### dynamic_plugins_test.py 35 INFO Checking if replication is in sync... replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working dynamic_plugins_test.py 41 INFO Checking if the data is the same between the replicas... dynamic_plugins_test.py 67 INFO Data is consistent across the replicas.
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_memory_corruption 44.29
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Testing Dynamic Plugins for Memory Corruption (no replication)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Tested Dynamic Plugins for Memory Corruption (no replication). INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Resume replication and run everything one more time INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Testing Dynamic Plugins for Memory Corruption (replication enabled)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Tested Dynamic Plugins for Memory Corruption (replication enabled). INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if replication is in sync... INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if the data is the same between the replicas... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Data is consistent across the replicas. ------------------------------ Captured log call -------------------------------
dynamic_plugins_test.py 193 INFO #################################################################### dynamic_plugins_test.py 194 INFO Testing Dynamic Plugins for Memory Corruption (no replication)... dynamic_plugins_test.py 195 INFO #################################################################### acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 223 INFO #################################################################### dynamic_plugins_test.py 224 INFO Successfully Tested Dynamic Plugins for Memory Corruption (no replication). dynamic_plugins_test.py 225 INFO #################################################################### dynamic_plugins_test.py 231 INFO Resume replication and run everything one more time dynamic_plugins_test.py 193 INFO #################################################################### dynamic_plugins_test.py 194 INFO Testing Dynamic Plugins for Memory Corruption (replication enabled)... dynamic_plugins_test.py 195 INFO #################################################################### acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 223 INFO #################################################################### dynamic_plugins_test.py 224 INFO Successfully Tested Dynamic Plugins for Memory Corruption (replication enabled). dynamic_plugins_test.py 225 INFO #################################################################### dynamic_plugins_test.py 35 INFO Checking if replication is in sync... replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working dynamic_plugins_test.py 41 INFO Checking if the data is the same between the replicas... dynamic_plugins_test.py 67 INFO Data is consistent across the replicas.
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_stress 367.74
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Do one run through all tests (no replication)... INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Stressing Dynamic Plugins (no replication)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (no replication). Run (1/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (no replication). Completed (1/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (no replication). Run (2/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (no replication). Completed (2/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (no replication). Run (3/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (no replication). Completed (3/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (no replication). Run (4/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (no replication). Completed (4/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (no replication). Run (5/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (no replication). Completed (5/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Resume replication and run everything one more time INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Do one run through all tests (replication enabled)... INFO:tests.suites.plugins.acceptance_test:Testing Account Policy Plugin INFO:tests.suites.plugins.acceptance_test:test_acctpolicy: PASS INFO:tests.suites.plugins.acceptance_test:Testing attribute uniqueness INFO:tests.suites.plugins.acceptance_test:test_attruniq: PASS INFO:tests.suites.plugins.acceptance_test:Testing Auto Membership Plugin... INFO:tests.suites.plugins.acceptance_test:test_automember: PASS INFO:tests.suites.plugins.acceptance_test:Testing Distributed Numeric Assignment Plugin... INFO:tests.suites.plugins.acceptance_test:test_dna: PASS INFO:tests.suites.plugins.acceptance_test:Testing Linked Attributes... INFO:tests.suites.plugins.acceptance_test:test_linkedattrs: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.plugins.acceptance_test:Testing Managed Entries... INFO:tests.suites.plugins.acceptance_test:test_mep: PASS INFO:tests.suites.plugins.acceptance_test:Testing Pass Through Authentication... INFO:tests.suites.plugins.acceptance_test:test_passthru: PASS INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing Retro Changelog Plugin... INFO:tests.suites.plugins.acceptance_test:test_retrocl: PASS INFO:tests.suites.plugins.acceptance_test:Testing RootDN Access Control... INFO:tests.suites.plugins.acceptance_test:test_rootdn: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Stressing Dynamic Plugins (replication enabled)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (replication enabled). Run (1/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (replication enabled). Completed (1/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (replication enabled). Run (2/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (replication enabled). Completed (2/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (replication enabled). Run (3/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (replication enabled). Completed (3/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (replication enabled). Run (4/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (replication enabled). Completed (4/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Running stress test (replication enabled). Run (5/5)... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Adding 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (employee). INFO:tests.suites.dynamic_plugins.stress_tests:AddUsers - Finished adding 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (entry)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (employee)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Deleting 250 entries (person)... INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (entry). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (person). INFO:tests.suites.dynamic_plugins.stress_tests:DelUsers - Finished deleting 250 entries (employee). INFO:tests.suites.plugins.acceptance_test:Testing referential integrity postoperation... INFO:tests.suites.plugins.acceptance_test:test_referint: PASS INFO:tests.suites.plugins.acceptance_test:Testing MemberOf Plugin... INFO:tests.suites.plugins.acceptance_test:test_memberof: PASS INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Successfully Stressed Dynamic Plugins (replication enabled). Completed (5/5) INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:#################################################################### INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if replication is in sync... INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Checking if the data is the same between the replicas... INFO:tests.suites.dynamic_plugins.dynamic_plugins_test:Data is consistent across the replicas. ------------------------------ Captured log call -------------------------------
dynamic_plugins_test.py 307 INFO Do one run through all tests (no replication)... acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 310 INFO #################################################################### dynamic_plugins_test.py 311 INFO Stressing Dynamic Plugins (no replication)... dynamic_plugins_test.py 312 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (no replication). Run (1/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (no replication). Completed (1/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (no replication). Run (2/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (no replication). Completed (2/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (no replication). Run (3/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (no replication). Completed (3/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (no replication). Run (4/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (no replication). Completed (4/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (no replication). Run (5/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (no replication). Completed (5/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 422 INFO Resume replication and run everything one more time dynamic_plugins_test.py 307 INFO Do one run through all tests (replication enabled)... acceptance_test.py 118 INFO Testing Account Policy Plugin acceptance_test.py 180 INFO test_acctpolicy: PASS acceptance_test.py 230 INFO Testing attribute uniqueness acceptance_test.py 328 INFO test_attruniq: PASS acceptance_test.py 390 INFO Testing Auto Membership Plugin... acceptance_test.py 493 INFO test_automember: PASS acceptance_test.py 543 INFO Testing Distributed Numeric Assignment Plugin... acceptance_test.py 613 INFO test_dna: PASS acceptance_test.py 686 INFO Testing Linked Attributes... acceptance_test.py 797 INFO test_linkedattrs: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS acceptance_test.py 1126 INFO Testing Managed Entries... acceptance_test.py 1204 INFO test_mep: PASS acceptance_test.py 1263 INFO Testing Pass Through Authentication... acceptance_test.py 1339 INFO test_passthru: PASS acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 1587 INFO Testing Retro Changelog Plugin... acceptance_test.py 1642 INFO test_retrocl: PASS acceptance_test.py 1704 INFO Testing RootDN Access Control... acceptance_test.py 1785 INFO test_rootdn: PASS dynamic_plugins_test.py 310 INFO #################################################################### dynamic_plugins_test.py 311 INFO Stressing Dynamic Plugins (replication enabled)... dynamic_plugins_test.py 312 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (replication enabled). Run (1/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (replication enabled). Completed (1/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (replication enabled). Run (2/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (replication enabled). Completed (2/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (replication enabled). Run (3/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (replication enabled). Completed (3/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (replication enabled). Run (4/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (replication enabled). Completed (4/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 319 INFO #################################################################### dynamic_plugins_test.py 320 INFO Running stress test (replication enabled). Run (5/5)... dynamic_plugins_test.py 321 INFO #################################################################### stress_tests.py 104 INFO AddUsers - Adding 250 entries (person)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (employee)... stress_tests.py 104 INFO AddUsers - Adding 250 entries (entry)... stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (person). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (employee). stress_tests.py 128 INFO AddUsers - Finished adding 250 entries (entry). stress_tests.py 64 INFO DelUsers - Deleting 250 entries (entry)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (employee)... stress_tests.py 64 INFO DelUsers - Deleting 250 entries (person)... stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (entry). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (person). stress_tests.py 77 INFO DelUsers - Finished deleting 250 entries (employee). acceptance_test.py 1418 INFO Testing referential integrity postoperation... acceptance_test.py 1540 INFO test_referint: PASS acceptance_test.py 890 INFO Testing MemberOf Plugin... acceptance_test.py 1077 INFO test_memberof: PASS dynamic_plugins_test.py 413 INFO #################################################################### dynamic_plugins_test.py 415 INFO Successfully Stressed Dynamic Plugins (replication enabled). Completed (5/5) dynamic_plugins_test.py 416 INFO #################################################################### dynamic_plugins_test.py 35 INFO Checking if replication is in sync... replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working dynamic_plugins_test.py 41 INFO Checking if the data is the same between the replicas... dynamic_plugins_test.py 67 INFO Data is consistent across the replicas.
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(sn=last1)(givenname=first1))-1] 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(sn=last1)(givenname=first1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(sn=last1)(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(sn=last1)(givenname=first1)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=first1))))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=first1))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(sn=last3)(givenname=*))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=*)(sn=last3)(givenname=*))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(sn=last3)(givenname=*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(&(sn=last3)(givenname=*)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=*)(&(sn=last3)(givenname=*)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(&(sn=last3)(givenname=*)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid5)(&(&(sn=*))(&(givenname=*))))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid5)(&(&(sn=*))(&(givenname=*))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid5)(&(&(sn=*))(&(givenname=*))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(objectclass=*)(uid=*)(sn=last*))-5] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(objectclass=*)(uid=*)(sn=last*))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(objectclass=*)(uid=*)(sn=last*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(objectclass=*)(uid=*)(sn=last1))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(objectclass=*)(uid=*)(sn=last1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(objectclass=*)(uid=*)(sn=last1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(sn=last1)(givenname=first1))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=uid1)(sn=last1)(givenname=first1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(sn=last1)(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(|(sn=last1)(givenname=first1)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=uid1)(|(sn=last1)(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(|(sn=last1)(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(|(|(sn=last1))(|(givenname=first1))))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=uid1)(|(|(sn=last1))(|(givenname=first1))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(|(|(sn=last1))(|(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(objectclass=*)(sn=last1)(|(givenname=first1)))-14] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(objectclass=*)(sn=last1)(|(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(objectclass=*)(sn=last1)(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last1))(|(givenname=first1)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(objectclass=*)(sn=last1))(|(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last1))(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last))(|(givenname=first1)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(objectclass=*)(sn=last))(|(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last))(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(!(cn=NULL)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(!(cn=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(!(cn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(!(cn=NULL))(uid=uid1))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(!(cn=NULL))(uid=uid1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(!(cn=NULL))(uid=uid1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(&(!(uid=1))(!(givenname=first1))))-4] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=*)(&(!(uid=1))(!(givenname=first1))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(&(!(uid=1))(!(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(uid=NULL))(sn=last1))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(|(uid=uid1)(uid=NULL))(sn=last1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(uid=NULL))(sn=last1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(uid=NULL))(!(sn=NULL)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(|(uid=uid1)(uid=NULL))(!(sn=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(uid=NULL))(!(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(sn=last2))(givenname=first1))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(|(uid=uid1)(sn=last2))(givenname=first1))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(sn=last2))(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid=uid1)(!(uid=NULL)))(sn=last2))-2] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(uid=uid1)(!(uid=NULL)))(sn=last2))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid=uid1)(!(uid=NULL)))(sn=last2))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid=uid1)(uid=NULL))(sn=last2))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(uid=uid1)(uid=NULL))(sn=last2))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid=uid1)(uid=NULL))(sn=last2))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid5)(sn=*)(cn=*)(givenname=*)(uid=u*)(sn=la*)(cn=full*)(givenname=f*)(uid>=u)(!(givenname=NULL)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid5)(sn=*)(cn=*)(givenname=*)(uid=u*)(sn=la*)(cn=full*)(givenname=f*)(uid>=u)(!(givenname=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid5)(sn=*)(cn=*)(givenname=*)(uid=u*)(sn=la*)(cn=full*)(givenname=f*)(uid>=u)(!(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last))(&(givenname=first1)))-1] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(objectclass=*)(sn=last))(&(givenname=first1)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last))(&(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(sn=last1)(givenname=NULL))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(sn=last1)(givenname=NULL))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(sn=last1)(givenname=NULL))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(sn=last1)(givenname=NULL)))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL))))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL)(sn=*)))(|(sn=NULL)))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL)(sn=*)))(|(sn=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL)(sn=*)))(|(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last*))(&(givenname=first*)))(&(sn=NULL)))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=uid1)(&(&(sn=last*))(&(givenname=first*)))(&(sn=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last*))(&(givenname=first*)))(&(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(sn=NULL)(givenname=NULL))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=NULL)(sn=NULL)(givenname=NULL))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(sn=NULL)(givenname=NULL))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(|(sn=NULL)(givenname=NULL)))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=NULL)(|(sn=NULL)(givenname=NULL)))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(|(sn=NULL)(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(|(|(sn=NULL))(|(givenname=NULL))))-0] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=NULL)(|(|(sn=NULL))(|(givenname=NULL))))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(|(|(sn=NULL))(|(givenname=NULL))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*))-5] 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(uid>=uid3)-3] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(uid>=uid3)"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(uid>=uid3)"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(uid>=uid3))-3] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid=*)(uid>=uid3))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(uid>=uid3))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid>=uid3)(uid<=uid5))-5] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(uid>=uid3)(uid<=uid5))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid>=uid3)(uid<=uid5))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid>=uid3)(uid<=uid5))-3] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(&(uid>=uid3)(uid<=uid5))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid>=uid3)(uid<=uid5))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid>=uid3)(uid<=uid5))(uid=*))-5] 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.complex_filters_test:Testing filter "(|(&(uid>=uid3)(uid<=uid5))(uid=*))"... ------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid>=uid3)(uid<=uid5))(uid=*))"...
Passed suites/filter/filter_logic_test.py::test_eq 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/filter/filter_logic_test.py::test_sub 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_ranges 0.01
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_range 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_allid_shortcut 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_eq 0.01
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_range 0.01
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_range 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_and_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_or_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_or_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_and_eq 0.00
No log output captured.
Passed suites/filter/filter_test.py::test_filter_escaped 0.09
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.filter_test:Running test_filter_escaped... INFO:tests.suites.filter.filter_test:test_filter_escaped: PASSED ------------------------------ Captured log call -------------------------------
filter_test.py 38 INFO Running test_filter_escaped... filter_test.py 74 INFO test_filter_escaped: PASSED
Passed suites/filter/filter_test.py::test_filter_search_original_attrs 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.filter_test:Running test_filter_search_original_attrs... INFO:tests.suites.filter.filter_test:test_filter_search_original_attrs: PASSED ------------------------------ Captured log call -------------------------------
filter_test.py 91 INFO Running test_filter_search_original_attrs... filter_test.py 104 INFO test_filter_search_original_attrs: PASSED
Passed suites/filter/filter_test.py::test_filter_scope_one 0.00
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.filter.filter_test:Search user using ldapsearch with scope one INFO:tests.suites.filter.filter_test:[dn: cn=Directory Administrators,dc=example,dc=com cn: Directory Administrators ] INFO:tests.suites.filter.filter_test:Search should only have one entry ------------------------------ Captured log call -------------------------------
filter_test.py 124 INFO Search user using ldapsearch with scope one filter_test.py 126 INFO [dn: cn=Directory Administrators,dc=example,dc=com cn: Directory Administrators ] filter_test.py 128 INFO Search should only have one entry
Passed suites/filter/filter_test.py::test_filter_with_attribute_subtype 0.15
----------------------------- Captured stderr call -----------------------------
INFO:lib389:Bind as cn=Directory Manager INFO:lib389: ######################### ADD ###################### INFO:lib389:Try to add Add cn=test_entry both, dc=example,dc=com: dn: cn=test_entry both, dc=example,dc=com cn: test_entry both cn;en: test_entry en cn;fr: test_entry fr objectclass: top objectclass: person sn: test_entry both INFO:lib389:Try to add Add cn=test_entry en only, dc=example,dc=com: dn: cn=test_entry en only, dc=example,dc=com cn: test_entry en only cn;en: test_entry en objectclass: top objectclass: person sn: test_entry en only INFO:lib389: ######################### SEARCH ###################### INFO:lib389:Try to search with filter (&(sn=test_entry en only)(!(cn=test_entry fr))) INFO:lib389:Found cn=test_entry en only,dc=example,dc=com INFO:lib389:Try to search with filter (&(sn=test_entry en only)(!(cn;fr=test_entry fr))) INFO:lib389:Found cn=test_entry en only,dc=example,dc=com INFO:lib389:Try to search with filter (&(sn=test_entry en only)(!(cn;en=test_entry en))) INFO:lib389:Found none INFO:lib389: ######################### DELETE ###################### INFO:lib389:Try to delete cn=test_entry both, dc=example,dc=com INFO:lib389:Try to delete cn=test_entry en only, dc=example,dc=com INFO:tests.suites.filter.filter_test:Testcase PASSED ------------------------------ Captured log call -------------------------------
filter_test.py 153 INFO Bind as cn=Directory Manager filter_test.py 160 INFO ######################### ADD ###################### filter_test.py 183 INFO Try to add Add cn=test_entry both, dc=example,dc=com: dn: cn=test_entry both, dc=example,dc=com cn: test_entry both cn;en: test_entry en cn;fr: test_entry fr objectclass: top objectclass: person sn: test_entry both filter_test.py 186 INFO Try to add Add cn=test_entry en only, dc=example,dc=com: dn: cn=test_entry en only, dc=example,dc=com cn: test_entry en only cn;en: test_entry en objectclass: top objectclass: person sn: test_entry en only filter_test.py 189 INFO ######################### SEARCH ###################### filter_test.py 193 INFO Try to search with filter (&(sn=test_entry en only)(!(cn=test_entry fr))) filter_test.py 197 INFO Found cn=test_entry en only,dc=example,dc=com filter_test.py 201 INFO Try to search with filter (&(sn=test_entry en only)(!(cn;fr=test_entry fr))) filter_test.py 205 INFO Found cn=test_entry en only,dc=example,dc=com filter_test.py 209 INFO Try to search with filter (&(sn=test_entry en only)(!(cn;en=test_entry en))) filter_test.py 212 INFO Found none filter_test.py 214 INFO ######################### DELETE ###################### filter_test.py 216 INFO Try to delete cn=test_entry both, dc=example,dc=com filter_test.py 219 INFO Try to delete cn=test_entry en only, dc=example,dc=com filter_test.py 222 INFO Testcase PASSED
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_supported_features 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: filter: ['+'] INFO:lib389.utils:results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0-*] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: filter: ['+', '*'] INFO:lib389.utils:results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config dataversion: 020180726234208 defaultnamingcontext: dc=example,dc=com modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com netscapemdsuffix: cn=ldap://dc=server,dc=example,dc=com:38901 nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config dataversion: 020180726234208 defaultnamingcontext: dc=example,dc=com modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com netscapemdsuffix: cn=ldap://dc=server,dc=example,dc=com:38901 nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0-objectClass] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: aci: (targetattr != "aci")(version 3.0; aci "rootdse anon read access"; allow(read,search,compare) userdn="ldap:///anyone";) createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: filter: ['+'] INFO:lib389.utils:results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1-*] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: filter: ['+', '*'] INFO:lib389.utils:results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config dataversion: 020180726234208 defaultnamingcontext: dc=example,dc=com modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com netscapemdsuffix: cn=ldap://dc=server,dc=example,dc=com:38901 nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config dataversion: 020180726234208 defaultnamingcontext: dc=example,dc=com modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com netscapemdsuffix: cn=ldap://dc=server,dc=example,dc=com:38901 nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1-objectClass] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: createTimestamp: 20180726234206Z creatorsName: cn=server,cn=plugins,cn=config modifiersName: cn=server,cn=plugins,cn=config modifyTimestamp: 20180726234206Z namingContexts: dc=example,dc=com nsBackendSuffix: userRoot:dc=example,dc=com nsUniqueId: 81151b00-912d11e8-80000000-00000000 objectClass: top subschemaSubentry: cn=schema supportedControl: 2.16.840.1.113730.3.4.2 supportedControl: 2.16.840.1.113730.3.4.3 supportedControl: 2.16.840.1.113730.3.4.4 supportedControl: 2.16.840.1.113730.3.4.5 supportedControl: 1.2.840.113556.1.4.473 supportedControl: 2.16.840.1.113730.3.4.9 supportedControl: 2.16.840.1.113730.3.4.16 supportedControl: 2.16.840.1.113730.3.4.15 supportedControl: 2.16.840.1.113730.3.4.17 supportedControl: 2.16.840.1.113730.3.4.19 supportedControl: 1.3.6.1.1.13.1 supportedControl: 1.3.6.1.1.13.2 supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 supportedControl: 1.2.840.113556.1.4.319 supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 supportedControl: 1.3.6.1.4.1.4203.666.5.16 supportedControl: 2.16.840.1.113730.3.4.14 supportedControl: 2.16.840.1.113730.3.4.20 supportedControl: 1.3.6.1.4.1.1466.29539.12 supportedControl: 2.16.840.1.113730.3.4.12 supportedControl: 2.16.840.1.113730.3.4.18 supportedControl: 2.16.840.1.113730.3.4.13 supportedExtension: 2.16.840.1.113730.3.5.7 supportedExtension: 2.16.840.1.113730.3.5.8 supportedExtension: 2.16.840.1.113730.3.5.3 supportedExtension: 2.16.840.1.113730.3.5.12 supportedExtension: 2.16.840.1.113730.3.5.5 supportedExtension: 2.16.840.1.113730.3.5.6 supportedExtension: 2.16.840.1.113730.3.5.9 supportedExtension: 2.16.840.1.113730.3.5.4 supportedExtension: 2.16.840.1.113730.3.6.5 supportedExtension: 2.16.840.1.113730.3.6.6 supportedExtension: 2.16.840.1.113730.3.6.7 supportedExtension: 2.16.840.1.113730.3.6.8 supportedExtension: 1.3.6.1.4.1.4203.1.11.3 supportedExtension: 1.3.6.1.4.1.4203.1.11.1 supportedFeatures: 1.3.6.1.4.1.4203.1.5.1 supportedLDAPVersion: 2 supportedLDAPVersion: 3 supportedSASLMechanisms: EXTERNAL supportedSASLMechanisms: GSS-SPNEGO supportedSASLMechanisms: GSSAPI supportedSASLMechanisms: DIGEST-MD5 supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN supportedSASLMechanisms: ANONYMOUS vendorName: 389 Project vendorVersion: 389-Directory/1.4.0.11 B2018.173.1454 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2-*] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+', '*'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit ou: People parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit ou: People parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2-objectClass] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com aci: (targetattr ="userpassword || telephonenumber || facsimiletelephonenumber")(version 3.0;acl "Allow self entry modification";allow (write)(userdn = "ldap:///self");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Accounting)")(version 3.0;acl "Accounting Managers Group Permissions";allow (write)(groupdn = "ldap:///cn=Accounting Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Human Resources)")(version 3.0;acl "HR Group Permissions";allow (write)(groupdn = "ldap:///cn=HR Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn ||sn || uid")(targetfilter ="(ou=Product Testing)")(version 3.0;acl "QA Group Permissions";allow (write)(groupdn = "ldap:///cn=QA Managers,ou=groups,dc=example,dc=com");) aci: (targetattr !="cn || sn || uid")(targetfilter ="(ou=Product Development)")(version 3.0;acl "Engineering Group Permissions";allow (write)(groupdn = "ldap:///cn=PD Managers,ou=groups,dc=example,dc=com");) createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3] 0.05
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3-*] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+', '*'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit ou: People parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit ou: People parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3-objectClass] 0.06
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: ou=people,dc=example,dc=com filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit parentid: 1 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: ou=people,dc=example,dc=com filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: ou=People,dc=example,dc=com createTimestamp: 20180726234205Z creatorsName: entrydn: ou=people,dc=example,dc=com entryid: 4 modifiersName: modifyTimestamp: 20180726234205Z nsUniqueId: 807c8483-912d11e8-a12bd7fc-92a910b0 numSubordinates: 1 objectClass: top objectClass: organizationalunit parentid: 1 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4] 0.18
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 parentid: 4 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 parentid: 4 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4-*] 0.15
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', '*'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com cn: all_attrs_test createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 gidNumber: 1000 homeDirectory: /home/test mail: all_attrs_test@redhat.com modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 sn: all_attrs_test uid: all_attrs_test uidNumber: 1000 userPassword: {PBKDF2_SHA256}AAAIAIv8q+XeIdTLLsQHGsnP7ZvKOrY66YKPfJSb5xwsR5SWIpp9TWtp2f+RF7r1EU6HmH+OClu65e9zJGO/Bjwior+yFIF4oS27GBkELUxaGdWRlRx69VV19dHRqrhM3svbUl4JGOiRREsCGN/eROJfYKF+/skgdoSNuLv14QqZ+nHb1hF2LQ65kUQN27umbEpgF9ExJ2ErvhQxIMhrZIq9kTfnJYH0RnOZSkgVkJ4q304Sv3FrHqFPvRajaoLVw/0ZMQXyrQMQsFbBnChn5YQIVl37bShcDhaFkRTqFq3XPCcWVEBEbWxWFC2812XJNtZCGjGWndNS8bS9/N5M6tUZzlsxiQpsm+D1s26OBZ7E6U1f+gh3RgB/kH4EJPTH1jGFu+uk9omkdRyJXRTVv+2sQ/HgPjSb71WsGGDKIkSg+zGO ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com cn: all_attrs_test createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 gidNumber: 1000 homeDirectory: /home/test mail: all_attrs_test@redhat.com modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 sn: all_attrs_test uid: all_attrs_test uidNumber: 1000 userPassword: {PBKDF2_SHA256}AAAIAIv8q+XeIdTLLsQHGsnP7ZvKOrY66YKPfJSb5xwsR5SWIpp9TWtp2f+RF7r1EU6HmH+OClu65e9zJGO/Bjwior+yFIF4oS27GBkELUxaGdWRlRx69VV19dHRqrhM3svbUl4JGOiRREsCGN/eROJfYKF+/skgdoSNuLv14QqZ+nHb1hF2LQ65kUQN27umbEpgF9ExJ2ErvhQxIMhrZIq9kTfnJYH0RnOZSkgVkJ4q304Sv3FrHqFPvRajaoLVw/0ZMQXyrQMQsFbBnChn5YQIVl37bShcDhaFkRTqFq3XPCcWVEBEbWxWFC2812XJNtZCGjGWndNS8bS9/N5M6tUZzlsxiQpsm+D1s26OBZ7E6U1f+gh3RgB/kH4EJPTH1jGFu+uk9omkdRyJXRTVv+2sQ/HgPjSb71WsGGDKIkSg+zGO ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4-objectClass] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 parentid: 4 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 parentid: 4 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5-*] 0.04
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', '*'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com cn: all_attrs_test createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 gidNumber: 1000 homeDirectory: /home/test mail: all_attrs_test@redhat.com modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 sn: all_attrs_test uid: all_attrs_test uidNumber: 1000 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com cn: all_attrs_test createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 gidNumber: 1000 homeDirectory: /home/test mail: all_attrs_test@redhat.com modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 sn: all_attrs_test uid: all_attrs_test uidNumber: 1000 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5-objectClass] 0.05
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: uid=all_attrs_test,ou=people,dc=example,dc=com INFO:lib389.utils:suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com rfc3673_all_oper_attrs_test.py 151 INFO suffix: uid=all_attrs_test,ou=people,dc=example,dc=com filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: uid=all_attrs_test,ou=People,dc=example,dc=com createTimestamp: 20180726234209Z creatorsName: cn=directory manager entrydn: uid=all_attrs_test,ou=people,dc=example,dc=com entryid: 10 modifiersName: cn=directory manager modifyTimestamp: 20180726234209Z nsUniqueId: 81adb209-912d11e8-bedbf21a-dd6f1016 objectClass: top objectClass: account objectClass: posixaccount objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: nsMemberOf objectClass: nsAccount objectClass: person parentid: 4 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: cn=config filter: ['+'] INFO:lib389.utils:results: [dn: cn=config numSubordinates: 10 passwordHistory: off ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: cn=config filter: ['+'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: cn=config numSubordinates: 10 passwordHistory: off ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6-*] 0.17
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: cn=config filter: ['+', '*'] INFO:lib389.utils:results: [dn: cn=config cn: config nsslapd-SSLclientAuth: allowed nsslapd-accesscontrol: on nsslapd-accesslog: /var/log/dirsrv/slapd-standalone1/access nsslapd-accesslog-level: 256 nsslapd-accesslog-list: nsslapd-accesslog-logbuffering: on nsslapd-accesslog-logexpirationtime: 1 nsslapd-accesslog-logexpirationtimeunit: month nsslapd-accesslog-logging-enabled: on nsslapd-accesslog-logmaxdiskspace: 500 nsslapd-accesslog-logminfreediskspace: 5 nsslapd-accesslog-logrotationsync-enabled: off nsslapd-accesslog-logrotationsynchour: 0 nsslapd-accesslog-logrotationsyncmin: 0 nsslapd-accesslog-logrotationtime: 1 nsslapd-accesslog-logrotationtimeunit: day nsslapd-accesslog-maxlogsize: 100 nsslapd-accesslog-maxlogsperdir: 10 nsslapd-accesslog-mode: 600 nsslapd-allow-anonymous-access: on nsslapd-allow-hashed-passwords: off nsslapd-allow-unauthenticated-binds: off nsslapd-allowed-sasl-mechanisms: nsslapd-anonlimitsdn: nsslapd-attribute-name-exceptions: off nsslapd-auditfaillog: /var/log/dirsrv/slapd-standalone1/audit nsslapd-auditfaillog-list: nsslapd-auditfaillog-logexpirationtime: 1 nsslapd-auditfaillog-logexpirationtimeunit: month nsslapd-auditfaillog-logging-enabled: off nsslapd-auditfaillog-logging-hide-unhashed-pw: on nsslapd-auditfaillog-logmaxdiskspace: 100 nsslapd-auditfaillog-logminfreediskspace: 5 nsslapd-auditfaillog-logrotationsync-enabled: off nsslapd-auditfaillog-logrotationsynchour: 0 nsslapd-auditfaillog-logrotationsyncmin: 0 nsslapd-auditfaillog-logrotationtime: 1 nsslapd-auditfaillog-logrotationtimeunit: week nsslapd-auditfaillog-maxlogsize: 100 nsslapd-auditfaillog-maxlogsperdir: 1 nsslapd-auditfaillog-mode: 600 nsslapd-auditlog: /var/log/dirsrv/slapd-standalone1/audit nsslapd-auditlog-list: nsslapd-auditlog-logexpirationtime: 1 nsslapd-auditlog-logexpirationtimeunit: month nsslapd-auditlog-logging-enabled: off nsslapd-auditlog-logging-hide-unhashed-pw: on nsslapd-auditlog-logmaxdiskspace: 100 nsslapd-auditlog-logminfreediskspace: 5 nsslapd-auditlog-logrotationsync-enabled: off nsslapd-auditlog-logrotationsynchour: 0 nsslapd-auditlog-logrotationsyncmin: 0 nsslapd-auditlog-logrotationtime: 1 nsslapd-auditlog-logrotationtimeunit: week nsslapd-auditlog-maxlogsize: 100 nsslapd-auditlog-maxlogsperdir: 1 nsslapd-auditlog-mode: 600 nsslapd-backendconfig: cn=config,cn=userRoot,cn=ldbm database,cn=plugins,cn=config nsslapd-bakdir: /var/lib/dirsrv/slapd-standalone1/bak nsslapd-betype: ldbm database nsslapd-certdir: /etc/dirsrv/slapd-standalone1 nsslapd-certmap-basedn: nsslapd-cn-uses-dn-syntax-in-dns: off nsslapd-config: cn=config nsslapd-connection-buffer: 1 nsslapd-connection-nocanon: on nsslapd-conntablesize: 16384 nsslapd-counters: on nsslapd-csnlogging: on nsslapd-defaultnamingcontext: dc=example,dc=com nsslapd-disk-monitoring: off nsslapd-disk-monitoring-grace-period: 60 nsslapd-disk-monitoring-logging-critical: off nsslapd-disk-monitoring-threshold: 2097152 nsslapd-dn-validate-strict: off nsslapd-ds4-compatible-schema: off nsslapd-dynamic-plugins: off nsslapd-enable-nunc-stans: on nsslapd-enable-turbo-mode: on nsslapd-enquote-sup-oc: off nsslapd-entryusn-global: off nsslapd-entryusn-import-initval: 0 nsslapd-errorlog: /var/log/dirsrv/slapd-standalone1/errors nsslapd-errorlog-level: 16384 nsslapd-errorlog-list: nsslapd-errorlog-logexpirationtime: 1 nsslapd-errorlog-logexpirationtimeunit: month nsslapd-errorlog-logging-enabled: on nsslapd-errorlog-logmaxdiskspace: 100 nsslapd-errorlog-logminfreediskspace: 5 nsslapd-errorlog-logrotationsync-enabled: off nsslapd-errorlog-logrotationsynchour: 0 nsslapd-errorlog-logrotationsyncmin: 0 nsslapd-errorlog-logrotationtime: 1 nsslapd-errorlog-logrotationtimeunit: week nsslapd-errorlog-maxlogsize: 100 nsslapd-errorlog-maxlogsperdir: 1 nsslapd-errorlog-mode: 600 nsslapd-extract-pemfiles: on nsslapd-force-sasl-external: off nsslapd-global-backend-lock: off nsslapd-groupevalnestlevel: 0 nsslapd-hash-filters: off nsslapd-idletimeout: 0 nsslapd-ignore-time-skew: off nsslapd-ignore-virtual-attrs: off nsslapd-instancedir: /usr/lib64/dirsrv/slapd-standalone1 nsslapd-ioblocktimeout: 300000 nsslapd-lastmod: on nsslapd-ldapiautobind: off nsslapd-ldapientrysearchbase: dc=example,dc=com nsslapd-ldapifilepath: /var/run/slapd-standalone1.socket nsslapd-ldapigidnumbertype: gidNumber nsslapd-ldapilisten: off nsslapd-ldapimaprootdn: cn=Directory Manager nsslapd-ldapimaptoentries: off nsslapd-ldapiuidnumbertype: uidNumber nsslapd-ldifdir: /var/lib/dirsrv/slapd-standalone1/ldif nsslapd-listen-backlog-size: 128 nsslapd-listenhost: nsslapd-localhost: server.example.com nsslapd-localssf: 71 nsslapd-localuser: dirsrv nsslapd-lockdir: /var/lock/dirsrv/slapd-standalone1 nsslapd-logging-backend: dirsrv-log nsslapd-logging-hr-timestamps-enabled: on nsslapd-malloc-mmap-threshold: -10 nsslapd-malloc-mxfast: -10 nsslapd-malloc-trim-threshold: -10 nsslapd-max-filter-nest-level: 40 nsslapd-maxbersize: 2097152 nsslapd-maxdescriptors: 1024 nsslapd-maxsasliosize: 2097152 nsslapd-maxsimplepaged-per-conn: -1 nsslapd-maxthreadsperconn: 5 nsslapd-minssf: 0 nsslapd-minssf-exclude-rootdse: off nsslapd-moddn-aci: on nsslapd-nagle: on nsslapd-ndn-cache-enabled: on nsslapd-ndn-cache-max-size: 20971520 nsslapd-outbound-ldap-io-timeout: 300000 nsslapd-pagedsizelimit: 0 nsslapd-plugin: cn=case ignore string syntax,cn=plugins,cn=config nsslapd-plugin: cn=case exact string syntax,cn=plugins,cn=config nsslapd-plugin: cn=binary syntax,cn=plugins,cn=config nsslapd-plugin: cn=bit string syntax,cn=plugins,cn=config nsslapd-plugin: cn=octet string syntax,cn=plugins,cn=config nsslapd-plugin: cn=boolean syntax,cn=plugins,cn=config nsslapd-plugin: cn=generalized time syntax,cn=plugins,cn=config nsslapd-plugin: cn=telephone syntax,cn=plugins,cn=config nsslapd-plugin: cn=telex number syntax,cn=plugins,cn=config nsslapd-plugin: cn=teletex terminal identifier syntax,cn=plugins,cn=config nsslapd-plugin: cn=enhanced guide syntax,cn=plugins,cn=config nsslapd-plugin: cn=facsimile telephone number syntax,cn=plugins,cn=config nsslapd-plugin: cn=fax syntax,cn=plugins,cn=config nsslapd-plugin: cn=guide syntax,cn=plugins,cn=config nsslapd-plugin: cn=delivery method syntax,cn=plugins,cn=config nsslapd-plugin: cn=integer syntax,cn=plugins,cn=config nsslapd-plugin: cn=distinguished name syntax,cn=plugins,cn=config nsslapd-plugin: cn=name and optional uid syntax,cn=plugins,cn=config nsslapd-plugin: cn=oid syntax,cn=plugins,cn=config nsslapd-plugin: cn=jpeg syntax,cn=plugins,cn=config nsslapd-plugin: cn=country string syntax,cn=plugins,cn=config nsslapd-plugin: cn=postal address syntax,cn=plugins,cn=config nsslapd-plugin: cn=numeric string syntax,cn=plugins,cn=config nsslapd-plugin: cn=printable string syntax,cn=plugins,cn=config nsslapd-plugin: cn=generalizedtimematch,cn=plugins,cn=config nsslapd-plugin: cn=generalizedtimeorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=booleanmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreia5match,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreia5substringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorematch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoresubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorelistmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorelistsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=objectidentifiermatch,cn=plugins,cn=config nsslapd-plugin: cn=directorystringfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=objectidentifierfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactia5match,cn=plugins,cn=config nsslapd-plugin: cn=caseexactmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactia5substringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=octetstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=octetstringorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=bitstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=telephonenumbermatch,cn=plugins,cn=config nsslapd-plugin: cn=telephonenumbersubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=integermatch,cn=plugins,cn=config nsslapd-plugin: cn=integerorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=integerfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=distinguishednamematch,cn=plugins,cn=config nsslapd-plugin: cn=uniquemembermatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=bitwise plugin,cn=plugins,cn=config nsslapd-plugin: cn=internationalization plugin,cn=plugins,cn=config nsslapd-plugin-binddn-tracking: off nsslapd-plugin-logging: off nsslapd-port: 38901 nsslapd-privatenamespaces: cn=schema nsslapd-privatenamespaces: nsslapd-privatenamespaces: cn=monitor nsslapd-privatenamespaces: cn=config nsslapd-pwpolicy-inherit-global: off nsslapd-pwpolicy-local: off nsslapd-readonly: off nsslapd-referralmode: nsslapd-require-secure-binds: off nsslapd-requiresrestart: cn=config:nsslapd-port nsslapd-requiresrestart: cn=config:nsslapd-secureport nsslapd-requiresrestart: cn=config:nsslapd-ldapifilepath nsslapd-requiresrestart: cn=config:nsslapd-ldapilisten nsslapd-requiresrestart: cn=config:nsslapd-workingdir nsslapd-requiresrestart: cn=config:nsslapd-plugin nsslapd-requiresrestart: cn=config:nsslapd-sslclientauth nsslapd-requiresrestart: cn=config:nsslapd-changelogdir nsslapd-requiresrestart: cn=config:nsslapd-changelogsuffix nsslapd-requiresrestart: cn=config:nsslapd-changelogmaxentries nsslapd-requiresrestart: cn=config:nsslapd-changelogmaxage nsslapd-requiresrestart: cn=config:nsslapd-db-locks nsslapd-requiresrestart: cn=config:nsslapd-maxdescriptors nsslapd-requiresrestart: cn=config:nsslapd-return-exact-case nsslapd-requiresrestart: cn=config:nsslapd-schema-ignore-trailing-spaces nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-idlistscanlimit nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-parentcheck nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-dbcachesize nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-dbncache nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-cachesize nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-plugin nsslapd-requiresrestart: cn=encryption,cn=config:nssslsessiontimeout nsslapd-requiresrestart: cn=encryption,cn=config:nssslclientauth nsslapd-requiresrestart: cn=encryption,cn=config:nsssl2 nsslapd-requiresrestart: cn=encryption,cn=config:nsssl3 nsslapd-reservedescriptors: 64 nsslapd-result-tweak: off nsslapd-return-exact-case: on nsslapd-rewrite-rfc1274: off nsslapd-rootdn: cn=Directory Manager nsslapd-rootpw: {PBKDF2_SHA256}AAAgAB5e/IdGlPYw7ekw6GKrMtAFZITev7DaEDmfu4my/noJ/FtP+PJhjfqfUsgAvUP20Atle43AFomuIgMUHrfP7Ek/P2f8miRGrDoIqWMYNk6KN0rtwYtkFbXhgFjfRTCImgQu0oiPPwB38O2fnc3OQarGwn0jYtZVigTkfSOlcYFuzquqLOznYq5TJAKLSCwRhJThEadLiwTKaeqTaWoJyxBfTte1CjqG0rbZpH8pbruTGojwTu/vAtHUZAnTllbRqroTK50ea+X5ZiK0S1INODWewYbEhhM2GG55g0AhKcTBEPEFoOTpS+Z7apGepGRoKAp7xKS92Uv4H4bQ6MHLNfJXcPnvV2aHvZR3M8/RFA/w2xjEC7e5V4VIi+7jp6pFSoVnzolS+91YCfJNQHGZYm2wfAIs8Qvo9nGtI0TEy/Z0 nsslapd-rootpwstoragescheme: PBKDF2_SHA256 nsslapd-rundir: /var/run/dirsrv nsslapd-sasl-mapping-fallback: off nsslapd-sasl-max-buffer-size: 2097152 nsslapd-saslpath: nsslapd-schema-ignore-trailing-spaces: off nsslapd-schemacheck: on nsslapd-schemadir: /etc/dirsrv/slapd-standalone1/schema nsslapd-schemamod: on nsslapd-schemareplace: replication-only nsslapd-search-return-original-type-switch: off nsslapd-securePort: 636 nsslapd-securelistenhost: nsslapd-security: off nsslapd-sizelimit: 2000 nsslapd-snmp-index: 0 nsslapd-ssl-check-hostname: on nsslapd-svrtab: nsslapd-syntaxcheck: on nsslapd-syntaxlogging: off nsslapd-threadnumber: 24 nsslapd-timelimit: 3600 nsslapd-tls-check-crl: none nsslapd-tmpdir: /tmp nsslapd-unhashed-pw-switch: on nsslapd-validate-cert: warn nsslapd-versionstring: 389-Directory/1.4.0.11 nsslapd-workingdir: /var/log/dirsrv/slapd-standalone1 numSubordinates: 10 objectClass: top objectClass: extensibleObject objectClass: nsslapdConfig passwordAdminDN: passwordChange: on passwordCheckSyntax: off passwordExp: off passwordGraceLimit: 0 passwordHistory: off passwordInHistory: 6 passwordIsGlobalPolicy: off passwordLegacyPolicy: on passwordLockout: off passwordLockoutDuration: 3600 passwordMaxAge: 8640000 passwordMaxFailure: 3 passwordMaxRepeats: 0 passwordMin8bit: 0 passwordMinAge: 0 passwordMinAlphas: 0 passwordMinCategories: 3 passwordMinDigits: 0 passwordMinLength: 8 passwordMinLowers: 0 passwordMinSpecials: 0 passwordMinTokenLength: 3 passwordMinUppers: 0 passwordMustChange: off passwordResetFailureCount: 600 passwordSendExpiringTime: off passwordStorageScheme: PBKDF2_SHA256 passwordTrackUpdateTime: off passwordUnlock: on passwordWarning: 86400 ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: cn=config filter: ['+', '*'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: cn=config cn: config nsslapd-SSLclientAuth: allowed nsslapd-accesscontrol: on nsslapd-accesslog: /var/log/dirsrv/slapd-standalone1/access nsslapd-accesslog-level: 256 nsslapd-accesslog-list: nsslapd-accesslog-logbuffering: on nsslapd-accesslog-logexpirationtime: 1 nsslapd-accesslog-logexpirationtimeunit: month nsslapd-accesslog-logging-enabled: on nsslapd-accesslog-logmaxdiskspace: 500 nsslapd-accesslog-logminfreediskspace: 5 nsslapd-accesslog-logrotationsync-enabled: off nsslapd-accesslog-logrotationsynchour: 0 nsslapd-accesslog-logrotationsyncmin: 0 nsslapd-accesslog-logrotationtime: 1 nsslapd-accesslog-logrotationtimeunit: day nsslapd-accesslog-maxlogsize: 100 nsslapd-accesslog-maxlogsperdir: 10 nsslapd-accesslog-mode: 600 nsslapd-allow-anonymous-access: on nsslapd-allow-hashed-passwords: off nsslapd-allow-unauthenticated-binds: off nsslapd-allowed-sasl-mechanisms: nsslapd-anonlimitsdn: nsslapd-attribute-name-exceptions: off nsslapd-auditfaillog: /var/log/dirsrv/slapd-standalone1/audit nsslapd-auditfaillog-list: nsslapd-auditfaillog-logexpirationtime: 1 nsslapd-auditfaillog-logexpirationtimeunit: month nsslapd-auditfaillog-logging-enabled: off nsslapd-auditfaillog-logging-hide-unhashed-pw: on nsslapd-auditfaillog-logmaxdiskspace: 100 nsslapd-auditfaillog-logminfreediskspace: 5 nsslapd-auditfaillog-logrotationsync-enabled: off nsslapd-auditfaillog-logrotationsynchour: 0 nsslapd-auditfaillog-logrotationsyncmin: 0 nsslapd-auditfaillog-logrotationtime: 1 nsslapd-auditfaillog-logrotationtimeunit: week nsslapd-auditfaillog-maxlogsize: 100 nsslapd-auditfaillog-maxlogsperdir: 1 nsslapd-auditfaillog-mode: 600 nsslapd-auditlog: /var/log/dirsrv/slapd-standalone1/audit nsslapd-auditlog-list: nsslapd-auditlog-logexpirationtime: 1 nsslapd-auditlog-logexpirationtimeunit: month nsslapd-auditlog-logging-enabled: off nsslapd-auditlog-logging-hide-unhashed-pw: on nsslapd-auditlog-logmaxdiskspace: 100 nsslapd-auditlog-logminfreediskspace: 5 nsslapd-auditlog-logrotationsync-enabled: off nsslapd-auditlog-logrotationsynchour: 0 nsslapd-auditlog-logrotationsyncmin: 0 nsslapd-auditlog-logrotationtime: 1 nsslapd-auditlog-logrotationtimeunit: week nsslapd-auditlog-maxlogsize: 100 nsslapd-auditlog-maxlogsperdir: 1 nsslapd-auditlog-mode: 600 nsslapd-backendconfig: cn=config,cn=userRoot,cn=ldbm database,cn=plugins,cn=config nsslapd-bakdir: /var/lib/dirsrv/slapd-standalone1/bak nsslapd-betype: ldbm database nsslapd-certdir: /etc/dirsrv/slapd-standalone1 nsslapd-certmap-basedn: nsslapd-cn-uses-dn-syntax-in-dns: off nsslapd-config: cn=config nsslapd-connection-buffer: 1 nsslapd-connection-nocanon: on nsslapd-conntablesize: 16384 nsslapd-counters: on nsslapd-csnlogging: on nsslapd-defaultnamingcontext: dc=example,dc=com nsslapd-disk-monitoring: off nsslapd-disk-monitoring-grace-period: 60 nsslapd-disk-monitoring-logging-critical: off nsslapd-disk-monitoring-threshold: 2097152 nsslapd-dn-validate-strict: off nsslapd-ds4-compatible-schema: off nsslapd-dynamic-plugins: off nsslapd-enable-nunc-stans: on nsslapd-enable-turbo-mode: on nsslapd-enquote-sup-oc: off nsslapd-entryusn-global: off nsslapd-entryusn-import-initval: 0 nsslapd-errorlog: /var/log/dirsrv/slapd-standalone1/errors nsslapd-errorlog-level: 16384 nsslapd-errorlog-list: nsslapd-errorlog-logexpirationtime: 1 nsslapd-errorlog-logexpirationtimeunit: month nsslapd-errorlog-logging-enabled: on nsslapd-errorlog-logmaxdiskspace: 100 nsslapd-errorlog-logminfreediskspace: 5 nsslapd-errorlog-logrotationsync-enabled: off nsslapd-errorlog-logrotationsynchour: 0 nsslapd-errorlog-logrotationsyncmin: 0 nsslapd-errorlog-logrotationtime: 1 nsslapd-errorlog-logrotationtimeunit: week nsslapd-errorlog-maxlogsize: 100 nsslapd-errorlog-maxlogsperdir: 1 nsslapd-errorlog-mode: 600 nsslapd-extract-pemfiles: on nsslapd-force-sasl-external: off nsslapd-global-backend-lock: off nsslapd-groupevalnestlevel: 0 nsslapd-hash-filters: off nsslapd-idletimeout: 0 nsslapd-ignore-time-skew: off nsslapd-ignore-virtual-attrs: off nsslapd-instancedir: /usr/lib64/dirsrv/slapd-standalone1 nsslapd-ioblocktimeout: 300000 nsslapd-lastmod: on nsslapd-ldapiautobind: off nsslapd-ldapientrysearchbase: dc=example,dc=com nsslapd-ldapifilepath: /var/run/slapd-standalone1.socket nsslapd-ldapigidnumbertype: gidNumber nsslapd-ldapilisten: off nsslapd-ldapimaprootdn: cn=Directory Manager nsslapd-ldapimaptoentries: off nsslapd-ldapiuidnumbertype: uidNumber nsslapd-ldifdir: /var/lib/dirsrv/slapd-standalone1/ldif nsslapd-listen-backlog-size: 128 nsslapd-listenhost: nsslapd-localhost: server.example.com nsslapd-localssf: 71 nsslapd-localuser: dirsrv nsslapd-lockdir: /var/lock/dirsrv/slapd-standalone1 nsslapd-logging-backend: dirsrv-log nsslapd-logging-hr-timestamps-enabled: on nsslapd-malloc-mmap-threshold: -10 nsslapd-malloc-mxfast: -10 nsslapd-malloc-trim-threshold: -10 nsslapd-max-filter-nest-level: 40 nsslapd-maxbersize: 2097152 nsslapd-maxdescriptors: 1024 nsslapd-maxsasliosize: 2097152 nsslapd-maxsimplepaged-per-conn: -1 nsslapd-maxthreadsperconn: 5 nsslapd-minssf: 0 nsslapd-minssf-exclude-rootdse: off nsslapd-moddn-aci: on nsslapd-nagle: on nsslapd-ndn-cache-enabled: on nsslapd-ndn-cache-max-size: 20971520 nsslapd-outbound-ldap-io-timeout: 300000 nsslapd-pagedsizelimit: 0 nsslapd-plugin: cn=case ignore string syntax,cn=plugins,cn=config nsslapd-plugin: cn=case exact string syntax,cn=plugins,cn=config nsslapd-plugin: cn=binary syntax,cn=plugins,cn=config nsslapd-plugin: cn=bit string syntax,cn=plugins,cn=config nsslapd-plugin: cn=octet string syntax,cn=plugins,cn=config nsslapd-plugin: cn=boolean syntax,cn=plugins,cn=config nsslapd-plugin: cn=generalized time syntax,cn=plugins,cn=config nsslapd-plugin: cn=telephone syntax,cn=plugins,cn=config nsslapd-plugin: cn=telex number syntax,cn=plugins,cn=config nsslapd-plugin: cn=teletex terminal identifier syntax,cn=plugins,cn=config nsslapd-plugin: cn=enhanced guide syntax,cn=plugins,cn=config nsslapd-plugin: cn=facsimile telephone number syntax,cn=plugins,cn=config nsslapd-plugin: cn=fax syntax,cn=plugins,cn=config nsslapd-plugin: cn=guide syntax,cn=plugins,cn=config nsslapd-plugin: cn=delivery method syntax,cn=plugins,cn=config nsslapd-plugin: cn=integer syntax,cn=plugins,cn=config nsslapd-plugin: cn=distinguished name syntax,cn=plugins,cn=config nsslapd-plugin: cn=name and optional uid syntax,cn=plugins,cn=config nsslapd-plugin: cn=oid syntax,cn=plugins,cn=config nsslapd-plugin: cn=jpeg syntax,cn=plugins,cn=config nsslapd-plugin: cn=country string syntax,cn=plugins,cn=config nsslapd-plugin: cn=postal address syntax,cn=plugins,cn=config nsslapd-plugin: cn=numeric string syntax,cn=plugins,cn=config nsslapd-plugin: cn=printable string syntax,cn=plugins,cn=config nsslapd-plugin: cn=generalizedtimematch,cn=plugins,cn=config nsslapd-plugin: cn=generalizedtimeorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=booleanmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreia5match,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreia5substringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorematch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoreorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignoresubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorelistmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseignorelistsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=objectidentifiermatch,cn=plugins,cn=config nsslapd-plugin: cn=directorystringfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=objectidentifierfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactia5match,cn=plugins,cn=config nsslapd-plugin: cn=caseexactmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=caseexactia5substringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=octetstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=octetstringorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=bitstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=telephonenumbermatch,cn=plugins,cn=config nsslapd-plugin: cn=telephonenumbersubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=integermatch,cn=plugins,cn=config nsslapd-plugin: cn=integerorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=integerfirstcomponentmatch,cn=plugins,cn=config nsslapd-plugin: cn=distinguishednamematch,cn=plugins,cn=config nsslapd-plugin: cn=uniquemembermatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringmatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringorderingmatch,cn=plugins,cn=config nsslapd-plugin: cn=numericstringsubstringsmatch,cn=plugins,cn=config nsslapd-plugin: cn=bitwise plugin,cn=plugins,cn=config nsslapd-plugin: cn=internationalization plugin,cn=plugins,cn=config nsslapd-plugin-binddn-tracking: off nsslapd-plugin-logging: off nsslapd-port: 38901 nsslapd-privatenamespaces: cn=schema nsslapd-privatenamespaces: nsslapd-privatenamespaces: cn=monitor nsslapd-privatenamespaces: cn=config nsslapd-pwpolicy-inherit-global: off nsslapd-pwpolicy-local: off nsslapd-readonly: off nsslapd-referralmode: nsslapd-require-secure-binds: off nsslapd-requiresrestart: cn=config:nsslapd-port nsslapd-requiresrestart: cn=config:nsslapd-secureport nsslapd-requiresrestart: cn=config:nsslapd-ldapifilepath nsslapd-requiresrestart: cn=config:nsslapd-ldapilisten nsslapd-requiresrestart: cn=config:nsslapd-workingdir nsslapd-requiresrestart: cn=config:nsslapd-plugin nsslapd-requiresrestart: cn=config:nsslapd-sslclientauth nsslapd-requiresrestart: cn=config:nsslapd-changelogdir nsslapd-requiresrestart: cn=config:nsslapd-changelogsuffix nsslapd-requiresrestart: cn=config:nsslapd-changelogmaxentries nsslapd-requiresrestart: cn=config:nsslapd-changelogmaxage nsslapd-requiresrestart: cn=config:nsslapd-db-locks nsslapd-requiresrestart: cn=config:nsslapd-maxdescriptors nsslapd-requiresrestart: cn=config:nsslapd-return-exact-case nsslapd-requiresrestart: cn=config:nsslapd-schema-ignore-trailing-spaces nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-idlistscanlimit nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-parentcheck nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-dbcachesize nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-dbncache nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-cachesize nsslapd-requiresrestart: cn=config,cn=ldbm:nsslapd-plugin nsslapd-requiresrestart: cn=encryption,cn=config:nssslsessiontimeout nsslapd-requiresrestart: cn=encryption,cn=config:nssslclientauth nsslapd-requiresrestart: cn=encryption,cn=config:nsssl2 nsslapd-requiresrestart: cn=encryption,cn=config:nsssl3 nsslapd-reservedescriptors: 64 nsslapd-result-tweak: off nsslapd-return-exact-case: on nsslapd-rewrite-rfc1274: off nsslapd-rootdn: cn=Directory Manager nsslapd-rootpw: {PBKDF2_SHA256}AAAgAB5e/IdGlPYw7ekw6GKrMtAFZITev7DaEDmfu4my/noJ/FtP+PJhjfqfUsgAvUP20Atle43AFomuIgMUHrfP7Ek/P2f8miRGrDoIqWMYNk6KN0rtwYtkFbXhgFjfRTCImgQu0oiPPwB38O2fnc3OQarGwn0jYtZVigTkfSOlcYFuzquqLOznYq5TJAKLSCwRhJThEadLiwTKaeqTaWoJyxBfTte1CjqG0rbZpH8pbruTGojwTu/vAtHUZAnTllbRqroTK50ea+X5ZiK0S1INODWewYbEhhM2GG55g0AhKcTBEPEFoOTpS+Z7apGepGRoKAp7xKS92Uv4H4bQ6MHLNfJXcPnvV2aHvZR3M8/RFA/w2xjEC7e5V4VIi+7jp6pFSoVnzolS+91YCfJNQHGZYm2wfAIs8Qvo9nGtI0TEy/Z0 nsslapd-rootpwstoragescheme: PBKDF2_SHA256 nsslapd-rundir: /var/run/dirsrv nsslapd-sasl-mapping-fallback: off nsslapd-sasl-max-buffer-size: 2097152 nsslapd-saslpath: nsslapd-schema-ignore-trailing-spaces: off nsslapd-schemacheck: on nsslapd-schemadir: /etc/dirsrv/slapd-standalone1/schema nsslapd-schemamod: on nsslapd-schemareplace: replication-only nsslapd-search-return-original-type-switch: off nsslapd-securePort: 636 nsslapd-securelistenhost: nsslapd-security: off nsslapd-sizelimit: 2000 nsslapd-snmp-index: 0 nsslapd-ssl-check-hostname: on nsslapd-svrtab: nsslapd-syntaxcheck: on nsslapd-syntaxlogging: off nsslapd-threadnumber: 24 nsslapd-timelimit: 3600 nsslapd-tls-check-crl: none nsslapd-tmpdir: /tmp nsslapd-unhashed-pw-switch: on nsslapd-validate-cert: warn nsslapd-versionstring: 389-Directory/1.4.0.11 nsslapd-workingdir: /var/log/dirsrv/slapd-standalone1 numSubordinates: 10 objectClass: top objectClass: extensibleObject objectClass: nsslapdConfig passwordAdminDN: passwordChange: on passwordCheckSyntax: off passwordExp: off passwordGraceLimit: 0 passwordHistory: off passwordInHistory: 6 passwordIsGlobalPolicy: off passwordLegacyPolicy: on passwordLockout: off passwordLockoutDuration: 3600 passwordMaxAge: 8640000 passwordMaxFailure: 3 passwordMaxRepeats: 0 passwordMin8bit: 0 passwordMinAge: 0 passwordMinAlphas: 0 passwordMinCategories: 3 passwordMinDigits: 0 passwordMinLength: 8 passwordMinLowers: 0 passwordMinSpecials: 0 passwordMinTokenLength: 3 passwordMinUppers: 0 passwordMustChange: off passwordResetFailureCount: 600 passwordSendExpiringTime: off passwordStorageScheme: PBKDF2_SHA256 passwordTrackUpdateTime: off passwordUnlock: on passwordWarning: 86400 ]
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6-objectClass] 0.14
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:bound as: cn=Directory Manager INFO:lib389.utils:suffix: cn=config filter: ['+', 'objectClass'] INFO:lib389.utils:results: [dn: cn=config numSubordinates: 10 objectClass: top objectClass: extensibleObject objectClass: nsslapdConfig passwordHistory: off ] ------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager rfc3673_all_oper_attrs_test.py 151 INFO suffix: cn=config filter: ['+', 'objectClass'] rfc3673_all_oper_attrs_test.py 155 INFO results: [dn: cn=config numSubordinates: 10 objectClass: top objectClass: extensibleObject objectClass: nsslapdConfig passwordHistory: off ]
Passed suites/get_effective_rights/acceptance_test.py::test_group_aci_entry_exists 0.02
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:tests.suites.get_effective_rights.acceptance_test:Adding user testuser ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. acceptance_test.py 28 INFO Adding user testuser----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.get_effective_rights.acceptance_test:Adding group group1 INFO:tests.suites.get_effective_rights.acceptance_test:Add an ACI granting add access to a user matching the groupdn INFO:lib389:dn: uid=testuser,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'vadn' ------------------------------ Captured log call -------------------------------
acceptance_test.py 55 INFO Adding group group1 acceptance_test.py 68 INFO Add an ACI granting add access to a user matching the groupdn acceptance_test.py 77 INFO dn: uid=testuser,dc=example,dc=com acceptance_test.py 79 INFO ######## entryLevelRights: b'vadn'
Passed suites/get_effective_rights/acceptance_test.py::test_group_aci_template_entry 0.01
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.get_effective_rights.acceptance_test:Add an ACI granting add access to a user matching the userdn INFO:lib389:dn: cn=template_person_objectclass,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'vadn' INFO:lib389:dn: cn=template_groupofnames_objectclass,dc=example,dc=com INFO:lib389:######## entryLevelRights: b'v' ------------------------------ Captured log call -------------------------------
acceptance_test.py 103 INFO Add an ACI granting add access to a user matching the userdn acceptance_test.py 113 INFO dn: cn=template_person_objectclass,dc=example,dc=com acceptance_test.py 115 INFO ######## entryLevelRights: b'vadn' acceptance_test.py 118 INFO dn: cn=template_groupofnames_objectclass,dc=example,dc=com acceptance_test.py 120 INFO ######## entryLevelRights: b'v'
Passed suites/gssapi/simple_gssapi_test.py::test_gssapi_bind 0.38
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists Kerberos master password: eGvg82Mp!crz0tP4RdY2M*6J7xnHoIFd7JqLRQbg4c9eNkayYHeVEHIjro5RzehSF Loading random data Initializing database '/var/kerberos/krb5kdc/principal' for realm 'EXAMPLE.COM', master key name 'K/M@EXAMPLE.COM' Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "ldap/server.example.com@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal ldap/server.example.com@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab. Entry for principal ldap/server.example.com@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab. Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "testuser@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM testuser@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal testuser@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/testuser.keytab. Entry for principal testuser@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/testuser.keytab. ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. WARNING: no policy specified for ldap/server.example.com@EXAMPLE.COM; defaulting to no policy WARNING: no policy specified for testuser@EXAMPLE.COM; defaulting to no policy ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/gssapi/simple_gssapi_test.py::test_invalid_sasl_map 0.12
No log output captured.
Passed suites/gssapi/simple_gssapi_test.py::test_missing_user 2.06
----------------------------- Captured stdout call -----------------------------
Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "doesnotexist@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM doesnotexist@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM testuser@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal doesnotexist@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/doesnotexist.keytab. Entry for principal doesnotexist@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/doesnotexist.keytab. ----------------------------- Captured stderr call -----------------------------
WARNING: no policy specified for doesnotexist@EXAMPLE.COM; defaulting to no policy
Passed suites/gssapi/simple_gssapi_test.py::test_support_mech 0.13
No log output captured.
Passed suites/gssapi/simple_gssapi_test.py::test_rejected_mech 0.14
No log output captured.
Passed suites/gssapi_repl/gssapi_repl_test.py::test_gssapi_repl 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Passed suites/import/regression_test.py::test_del_suffix_import 7.84
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.import.regression_test:Adding suffix:dc=importest1,dc=com and backend: importest1 INFO:tests.suites.import.regression_test:Create LDIF file and import it INFO:tests.suites.import.regression_test:Stopping the server and running offline import INFO:tests.suites.import.regression_test:Deleting suffix-dc=importest2,dc=com INFO:tests.suites.import.regression_test:Adding the same database-importest1 after deleting it ------------------------------ Captured log call -------------------------------
regression_test.py 90 INFO Adding suffix:dc=importest1,dc=com and backend: importest1 regression_test.py 94 INFO Create LDIF file and import it regression_test.py 100 INFO Stopping the server and running offline import regression_test.py 105 INFO Deleting suffix-dc=importest2,dc=com regression_test.py 108 INFO Adding the same database-importest1 after deleting it
Passed suites/import/regression_test.py::test_del_suffix_backend 8.18
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.import.regression_test:Adding suffix:dc=importest2,dc=com and backend: importest2 INFO:tests.suites.import.regression_test:Create LDIF file and import it INFO:lib389:Import task import_07262018_194337 for file /var/lib/dirsrv/slapd-standalone1/ldif/suffix_del2.ldif completed successfully INFO:tests.suites.import.regression_test:Deleting suffix-dc=importest2,dc=com INFO:tests.suites.import.regression_test:Adding the same database-importest2 after deleting it INFO:tests.suites.import.regression_test:Checking if server can be restarted after re-adding the same database ------------------------------ Captured log call -------------------------------
regression_test.py 126 INFO Adding suffix:dc=importest2,dc=com and backend: importest2 regression_test.py 130 INFO Create LDIF file and import it tasks.py 338 INFO Import task import_07262018_194337 for file /var/lib/dirsrv/slapd-standalone1/ldif/suffix_del2.ldif completed successfully regression_test.py 138 INFO Deleting suffix-dc=importest2,dc=com regression_test.py 141 INFO Adding the same database-importest2 after deleting it regression_test.py 143 INFO Checking if server can be restarted after re-adding the same database
Passed suites/mapping_tree/referral_during_tot_init_test.py::test_referral_during_tot 12.34
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists
Passed suites/memberof_plugin/regression_test.py::test_memberof_with_repl 98.24
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39101 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39201 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created INFO:lib389.replica:SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 471 INFO Creating replication topology. replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39101 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working replica.py 1588 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39201 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created replica.py 1645 INFO SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.memberof_plugin.regression_test:update cn=101,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal INFO:tests.suites.memberof_plugin.regression_test:update cn=201,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' INFO:lib389:!!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' ------------------------------ Captured log call -------------------------------
regression_test.py 77 INFO update cn=101,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal regression_test.py 77 INFO update cn=201,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com'
Passed suites/memberof_plugin/regression_test.py::test_scheme_violation_errors_logged 5.02
---------------------------- Captured stdout setup -----------------------------
Instance slapd-master1 removed. OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. INFO:lib389.topologies:Creating replication topology. INFO:lib389.topologies:Joining master master2 to master1 ... INFO:lib389.replica:SUCCESS: bootstrap to ldap://server.example.com:39002 completed INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working INFO:lib389.replica:SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 INFO:lib389.topologies:Ensuring master master1 to master2 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists INFO:lib389.topologies:Ensuring master master2 to master1 ... INFO:lib389.replica:SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1461 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1742 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1530 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1715 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.memberof_plugin.regression_test:memberOf attr value - cn=group1,ou=Groups,dc=example,dc=com INFO:tests.suites.memberof_plugin.regression_test:pattern = .*oc_check_allowed_sv.*uid=user_,ou=People,dc=example,dc=com.*memberOf.*not allowed.* ------------------------------ Captured log call -------------------------------
regression_test.py 318 INFO memberOf attr value - cn=group1,ou=Groups,dc=example,dc=com regression_test.py 321 INFO pattern = .*oc_check_allowed_sv.*uid=user_,ou=People,dc=example,dc=com.*memberOf.*not allowed.*
Passed suites/memberof_plugin/regression_test.py::test_memberof_with_changelog_reset 62.68
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.memberof_plugin.regression_test:Configure memberof on M1 and M2 INFO:tests.suites.memberof_plugin.regression_test:On M1, add 999 test entries allowing memberof INFO:tests.suites.memberof_plugin.regression_test:Adding 999 users INFO:tests.suites.memberof_plugin.regression_test:On M1, add a group with these 999 entries as members INFO:tests.suites.memberof_plugin.regression_test:Adding the test group using async function INFO:tests.suites.memberof_plugin.regression_test:Check the log messages for error INFO:tests.suites.memberof_plugin.regression_test:Check that the replication is working fine both ways, M1 <-> M2 INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working INFO:lib389.replica:SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working ------------------------------ Captured log call -------------------------------
regression_test.py 353 INFO Configure memberof on M1 and M2 regression_test.py 364 INFO On M1, add 999 test entries allowing memberof regression_test.py 51 INFO Adding 999 users regression_test.py 367 INFO On M1, add a group with these 999 entries as members regression_test.py 375 INFO Adding the test group using async function regression_test.py 385 INFO Check the log messages for error regression_test.py 389 INFO Check that the replication is working fine both ways, M1 <-> M2 replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1873 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working
Passed suites/memberof_plugin/regression_test.py::test_memberof_group 5.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.memberof_plugin.regression_test:Enable memberof plugin and set the scope as cn=sub1,dc=example,dc=com INFO:lib389:!!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' CRITICAL:tests.suites.memberof_plugin.regression_test:Renaming user (cn=g2,cn=sub2,dc=example,dc=com): new cn=g2-new INFO:lib389:!!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' INFO:lib389:!!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com' ------------------------------ Captured log call -------------------------------
regression_test.py 480 INFO Enable memberof plugin and set the scope as cn=sub1,dc=example,dc=com regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 426 CRITICAL Renaming user (cn=g2,cn=sub2,dc=example,dc=com): new cn=g2-new regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com'
Passed suites/monitor/monitor_test.py::test_monitor 0.02
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.monitor.monitor_test:connection: ['64:20180726234846Z:2:1:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fe25:22d7%eth0'], currentconnections: ['1'], totalconnections: ['1'] INFO:tests.suites.monitor.monitor_test:version :: ['64:20180726234846Z:5:4:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fe25:22d7%eth0'] INFO:tests.suites.monitor.monitor_test:threads: ['24'],currentconnectionsatmaxthreads: ['0'],maxthreadsperconnhits: ['0'] INFO:tests.suites.monitor.monitor_test:nbackends: ['1'], backendmonitordn: ['cn=monitor,cn=userRoot,cn=ldbm database,cn=plugins,cn=config'] INFO:tests.suites.monitor.monitor_test:opsinitiated: ['11'], opscompleted: ['12'] INFO:tests.suites.monitor.monitor_test:dtablesize: ['1024'],readwaiters: ['0'],entriessent: ['13'],bytessent: ['1061'],currenttime: ['20180726234846Z'],starttime: ['20180726234846Z'] ------------------------------ Captured log call -------------------------------
monitor_test.py 42 INFO connection: ['64:20180726234846Z:2:1:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fe25:22d7%eth0'], currentconnections: ['1'], totalconnections: ['1'] monitor_test.py 46 INFO version :: ['64:20180726234846Z:5:4:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fe25:22d7%eth0'] monitor_test.py 50 INFO threads: ['24'],currentconnectionsatmaxthreads: ['0'],maxthreadsperconnhits: ['0'] monitor_test.py 54 INFO nbackends: ['1'], backendmonitordn: ['cn=monitor,cn=userRoot,cn=ldbm database,cn=plugins,cn=config'] monitor_test.py 58 INFO opsinitiated: ['11'], opscompleted: ['12'] monitor_test.py 62 INFO dtablesize: ['1024'],readwaiters: ['0'],entriessent: ['13'],bytessent: ['1061'],currenttime: ['20180726234846Z'],starttime: ['20180726234846Z']
Passed suites/paged_results/paged_results_test.py::test_search_success[6-5] 0.34
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. INFO:tests.suites.paged_results.paged_results_test:Adding user simplepaged_test ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. paged_results_test.py 54 INFO Adding user simplepaged_test----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 5 users INFO:tests.suites.paged_results.paged_results_test:Set user bind simplepaged_test INFO:tests.suites.paged_results.paged_results_test:Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 6; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba67aa278>]. INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:5 results INFO:tests.suites.paged_results.paged_results_test:Deleting 5 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 5 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 6; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba67aa278>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 250 INFO 5 results paged_results_test.py 153 INFO Deleting 5 users
Passed suites/paged_results/paged_results_test.py::test_search_success[5-5] 0.33
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 5 users INFO:tests.suites.paged_results.paged_results_test:Set user bind simplepaged_test INFO:tests.suites.paged_results.paged_results_test:Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba686b390>]. INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:5 results INFO:tests.suites.paged_results.paged_results_test:Deleting 5 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 5 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba686b390>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 250 INFO 5 results paged_results_test.py 153 INFO Deleting 5 users
Passed suites/paged_results/paged_results_test.py::test_search_success[5-25] 1.25
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 25 users INFO:tests.suites.paged_results.paged_results_test:Set user bind simplepaged_test INFO:tests.suites.paged_results.paged_results_test:Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba6556128>]. INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Getting page 1 INFO:tests.suites.paged_results.paged_results_test:Getting page 2 INFO:tests.suites.paged_results.paged_results_test:Getting page 3 INFO:tests.suites.paged_results.paged_results_test:Getting page 4 INFO:tests.suites.paged_results.paged_results_test:25 results INFO:tests.suites.paged_results.paged_results_test:Deleting 25 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 25 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba6556128>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 250 INFO 25 results paged_results_test.py 153 INFO Deleting 25 users
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[50-200-cn=config,cn=ldbm database,cn=plugins,cn=config-nsslapd-idlistscanlimit-100-UNWILLING_TO_PERFORM] 9.16
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 200 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-idlistscanlimit to 100. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Deleting 200 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'100'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 200 users paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 100. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 200 users paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'100'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[5-15-cn=config-nsslapd-timelimit-20-UNAVAILABLE_CRITICAL_EXTENSION] 30.86
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 15 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-timelimit to 20. Previous value - b'3600'. Modified suffix - cn=config. INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Deleting 15 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-timelimit to b'3600'. Previous value - b'20'. Modified suffix - cn=config. ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 15 users paged_results_test.py 168 INFO Set nsslapd-timelimit to 20. Previous value - b'3600'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 15 users paged_results_test.py 168 INFO Set nsslapd-timelimit to b'3600'. Previous value - b'20'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[21-50-cn=config-nsslapd-sizelimit-20-SIZELIMIT_EXCEEDED] 2.48
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-sizelimit to 20. Previous value - b'2000'. Modified suffix - cn=config. INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Deleting 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-sizelimit to b'2000'. Previous value - b'20'. Modified suffix - cn=config. ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to 20. Previous value - b'2000'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to b'2000'. Previous value - b'20'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[21-50-cn=config-nsslapd-pagedsizelimit-5-SIZELIMIT_EXCEEDED] 2.45
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-pagedsizelimit to 5. Previous value - b'0'. Modified suffix - cn=config. INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Deleting 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5'. Modified suffix - cn=config. ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 5. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[5-50-cn=config,cn=ldbm database,cn=plugins,cn=config-nsslapd-lookthroughlimit-20-ADMINLIMIT_EXCEEDED] 2.37
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-lookthroughlimit to 20. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Deleting 50 users INFO:tests.suites.paged_results.paged_results_test:Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'20'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 20. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'20'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_sort_success 2.39
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 50 users INFO:tests.suites.paged_results.paged_results_test:Initiate ldapsearch with created control instance INFO:tests.suites.paged_results.paged_results_test:Collect data with sorting INFO:tests.suites.paged_results.paged_results_test:Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba6857518>, <lib389._controls.SSSRequestControl object at 0x7fcba6857b70>]. INFO:tests.suites.paged_results.paged_results_test:Getting page 0 INFO:tests.suites.paged_results.paged_results_test:Getting page 1 INFO:tests.suites.paged_results.paged_results_test:Getting page 2 INFO:tests.suites.paged_results.paged_results_test:Getting page 3 INFO:tests.suites.paged_results.paged_results_test:Getting page 4 INFO:tests.suites.paged_results.paged_results_test:Getting page 5 INFO:tests.suites.paged_results.paged_results_test:Getting page 6 INFO:tests.suites.paged_results.paged_results_test:Getting page 7 INFO:tests.suites.paged_results.paged_results_test:Getting page 8 INFO:tests.suites.paged_results.paged_results_test:Getting page 9 INFO:tests.suites.paged_results.paged_results_test:Substring numbers from user DNs INFO:tests.suites.paged_results.paged_results_test:Assert that list is sorted INFO:tests.suites.paged_results.paged_results_test:Deleting 50 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 375 INFO Initiate ldapsearch with created control instance paged_results_test.py 376 INFO Collect data with sorting paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fcba6857518>, <lib389._controls.SSSRequestControl object at 0x7fcba6857b70>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 381 INFO Substring numbers from user DNs paged_results_test.py 385 INFO Assert that list is sorted paged_results_test.py 153 INFO Deleting 50 users
Passed suites/paged_results/paged_results_test.py::test_search_abandon 5.55
----------------------------- Captured stderr call -----------------------------
INFO:tests.suites.paged_results.paged_results_test:Adding 10 users INFO:tests.suites.paged_results.paged_results_test:Set user bind INFO:tests.suites.paged_results.paged_results_test:Create simple paged results control instance INFO:tests.suites.paged_results.paged_results_test:Initiate a search with a paged results control INFO:tests.suites.paged_results.paged_results_test:Abandon the search INFO:tests.suites.paged_results.paged_results_test:Expect an ldap.TIMEOUT exception, while trying to get the search results INFO:tests.suites.paged_results.paged_results_test:Deleting 10 users ------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 416 INFO Set user bind paged_results_test.py 419 INFO Create simple paged results control instance paged_results_test.py 423 INFO Initiate a search with a paged results control paged_results_test.py