report.html

Report generated on 28-Sep-2018 at 21:42:39 by pytest-html v1.19.0

Environment

389-ds-base 1.4.0.16-20180928gitc73cd26.fc28
Packages {'pytest': '3.8.1', 'py': '1.6.0', 'pluggy': '0.7.1'}
Platform Linux-4.17.19-200.fc28.x86_64-x86_64-with-fedora-28-Twenty_Eight
Plugins {'metadata': '1.7.0', 'html': '1.19.0'}
Python 3.6.6
cyrus-sasl 2.1.27-0.2rc7.fc28
nspr 4.20.0-1.fc28
nss 3.39.0-1.0.fc28
openldap 2.4.46-3.fc28

Summary

807 tests ran in 8579.85 seconds.

739 passed, 2 skipped, 48 failed, 0 errors, 14 expected failures, 6 unexpected passes

Results

Result Test Duration Links
Failed suites/paged_results/paged_results_test.py::test_search_dns_ip_aci[ip = "10.8.242.188"] 3.48
topology_st = <lib389.topologies.TopologyMain object at 0x7fea819ca7b8>
create_user = <lib389.idm.user.UserAccount object at 0x7fea819cac88>
aci_subject = 'ip = "10.8.242.188"'

@pytest.mark.parametrize('aci_subject',
('dns = "{}"'.format(HOSTNAME),
'ip = "{}"'.format(IP_ADDRESS)))
def test_search_dns_ip_aci(topology_st, create_user, aci_subject):
"""Verify that after performing multiple simple paged searches
to completion on the suffix with DNS or IP based ACI

:id: bbfddc46-a8c8-49ae-8c90-7265d05b22a9
:setup: Standalone instance, test user for binding,
varying number of users for the search base
:steps:
1. Back up and remove all previous ACI from suffix
2. Add an anonymous ACI for DNS check
3. Bind as test user
4. Search through added users with a simple paged control
5. Perform steps 4 three times in a row
6. Return ACI to the initial state
7. Go through all steps once again, but use IP subject dn
instead of DNS
:expectedresults:
1. Operation should be successful
2. Anonymous ACI should be successfully added
3. Bind should be successful
4. No error happens, all users should be found and sorted
5. Results should remain the same
6. ACI should be successfully returned
7. Results should be the same with ACI with IP subject dn
"""

users_num = 100
page_size = 5
users_list = add_users(topology_st, users_num, DEFAULT_SUFFIX)
search_flt = r'(uid=test*)'
searchreq_attrlist = ['dn', 'sn']

try:
log.info('Back up current suffix ACI')
acis_bck = topology_st.standalone.aci.list(DEFAULT_SUFFIX, ldap.SCOPE_BASE)

log.info('Add test ACI')
ACI_TARGET = '(targetattr != "userPassword")'
ACI_ALLOW = '(version 3.0;acl "Anonymous access within domain"; allow (read,compare,search)'
ACI_SUBJECT = '(userdn = "ldap:///anyone") and (%s);)' % aci_subject
ACI_BODY = ensure_bytes(ACI_TARGET + ACI_ALLOW + ACI_SUBJECT)
topology_st.standalone.modify_s(DEFAULT_SUFFIX, [(ldap.MOD_REPLACE, 'aci', ACI_BODY)])
log.info('Set user bind')
conn = create_user.bind(TEST_USER_PWD)

log.info('Create simple paged results control instance')
req_ctrl = SimplePagedResultsControl(True, size=page_size, cookie='')
controls = [req_ctrl]

log.info('Initiate three searches with a paged results control')
for ii in range(3):
log.info('%d search' % (ii + 1))
all_results = paged_search(conn, DEFAULT_SUFFIX, controls,
search_flt, searchreq_attrlist)
log.info('%d results' % len(all_results))
> assert len(all_results) == len(users_list)
E assert 0 == 100
E + where 0 = len([])
E + and 100 = len([<lib389.idm.user.UserAccount object at 0x7fea81c08d30>, <lib389.idm.user.UserAccount object at 0x7fea81c292b0>, <lib3...>, <lib389.idm.user.UserAccount object at 0x7fea81c32fd0>, <lib389.idm.user.UserAccount object at 0x7fea899ac438>, ...])

suites/paged_results/paged_results_test.py:564: AssertionError
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 542 INFO Back up current suffix ACI paged_results_test.py 545 INFO Add test ACI paged_results_test.py 551 INFO Set user bind paged_results_test.py 554 INFO Create simple paged results control instance paged_results_test.py 558 INFO Initiate three searches with a paged results control paged_results_test.py 560 INFO 1 search paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81c09e10>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 563 INFO 0 results paged_results_test.py 568 INFO Restore ACI paged_results_test.py 153 INFO Deleting 100 users
Failed suites/plugins/rootdn_plugin_test.py::test_rootdn_access_day_of_week 0.04
topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_day_of_week(topology_st, rootdn_setup):
"""Test the days of week feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e1
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set the deny days
2. Bind as Root DN
3. Set the allow days
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_day_of_week...')

days = ('Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat')
day = int(time.strftime("%w", time.gmtime()))

if day == 6:
# Handle the roll over from Saturday into Sunday
deny_days = days[1] + ', ' + days[2]
allow_days = days[6] + ',' + days[0]
elif day > 3:
deny_days = days[0] + ', ' + days[1]
allow_days = days[day] + ',' + days[day - 1]
else:
deny_days = days[4] + ',' + days[5]
allow_days = days[day] + ',' + days[day + 1]

log.info('Today: ' + days[day])
log.info('Allowed days: ' + allow_days)
log.info('Deny days: ' + deny_days)

#
# Set the deny days
#
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-days-allowed',
ensure_bytes(deny_days))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: Failed to set the deny days: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_day_of_week: Root DN was incorrectly able to bind')
assert False

#
# Set the allow days
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: : failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-days-allowed',
ensure_bytes(allow_days))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: Failed to set the deny days: error {}'
.format(e))
assert False

try:
> topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

suites/plugins/rootdn_plugin_test.py:263:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=Directory Manager', 'password'), kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, who = 'cn=Directory Manager'
cred = 'password', serverctrls = None, clientctrls = None

def simple_bind_s(self,who=None,cred=None,serverctrls=None,clientctrls=None):
"""
simple_bind_s([who='' [,cred='']]) -> 4-tuple
"""
msgid = self.simple_bind(who,cred,serverctrls,clientctrls)
> resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (18,), kwargs = {'all': 1, 'timeout': -1}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 18, all = 1
timeout = -1, resp_ctrl_classes = None

def result3(self,msgid=ldap.RES_ANY,all=1,timeout=None,resp_ctrl_classes=None):
resp_type, resp_data, resp_msgid, decoded_resp_ctrls, retoid, retval = self.result4(
msgid,all,timeout,
add_ctrls=0,add_intermediates=0,add_extop=0,
> resp_ctrl_classes=resp_ctrl_classes
)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (18, 1, -1)
kwargs = {'add_ctrls': 0, 'add_extop': 0, 'add_intermediates': 0, 'resp_ctrl_classes': None}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 18, all = 1
timeout = -1, add_ctrls = 0, add_intermediates = 0, add_extop = 0
resp_ctrl_classes = None

def result4(self,msgid=ldap.RES_ANY,all=1,timeout=None,add_ctrls=0,add_intermediates=0,add_extop=0,resp_ctrl_classes=None):
if timeout is None:
timeout = self.timeout
> ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method result4 of LDAP object at 0x7fea8190b5f8>, 18, 1, -1, 0, 0, ...)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b5f8>
args = (18, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
result = func(*args,**kwargs)
if __debug__ and self._trace_level>=2:
if func.__name__!="unbind_ext":
diagnostic_message_success = self._l.get_option(ldap.OPT_DIAGNOSTIC_MESSAGE)
finally:
self._ldap_object_lock.release()
except LDAPError as e:
exc_type,exc_value,exc_traceback = sys.exc_info()
try:
if 'info' not in e.args[0] and 'errno' in e.args[0]:
e.args[0]['info'] = strerror(e.args[0]['errno'])
except IndexError:
pass
if __debug__ and self._trace_level>=2:
self._trace_file.write('=> LDAPError - %s: %s\n' % (e.__class__.__name__,str(e)))
try:
> reraise(exc_type, exc_value, exc_traceback)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

exc_type = <class 'ldap.UNWILLING_TO_PERFORM'>
exc_value = UNWILLING_TO_PERFORM({'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'},)
exc_traceback = <traceback object at 0x7fea81c010c8>

def reraise(exc_type, exc_value, exc_traceback):
"""Re-raise an exception given information from sys.exc_info()

Note that unlike six.reraise, this does not support replacing the
traceback. All arguments must come from a single sys.exc_info() call.
"""
# In Python 3, all exception info is contained in one object.
> raise exc_value

/usr/lib64/python3.6/site-packages/ldap/compat.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b5f8>
args = (18, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.UNWILLING_TO_PERFORM: {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: UNWILLING_TO_PERFORM

During handling of the above exception, another exception occurred:

topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_day_of_week(topology_st, rootdn_setup):
"""Test the days of week feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e1
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set the deny days
2. Bind as Root DN
3. Set the allow days
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_day_of_week...')

days = ('Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat')
day = int(time.strftime("%w", time.gmtime()))

if day == 6:
# Handle the roll over from Saturday into Sunday
deny_days = days[1] + ', ' + days[2]
allow_days = days[6] + ',' + days[0]
elif day > 3:
deny_days = days[0] + ', ' + days[1]
allow_days = days[day] + ',' + days[day - 1]
else:
deny_days = days[4] + ',' + days[5]
allow_days = days[day] + ',' + days[day + 1]

log.info('Today: ' + days[day])
log.info('Allowed days: ' + allow_days)
log.info('Deny days: ' + deny_days)

#
# Set the deny days
#
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-days-allowed',
ensure_bytes(deny_days))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: Failed to set the deny days: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_day_of_week: Root DN was incorrectly able to bind')
assert False

#
# Set the allow days
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: : failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-days-allowed',
ensure_bytes(allow_days))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: Failed to set the deny days: error {}'
.format(e))
assert False

try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_day_of_week: Root DN bind failed unexpectedly failed: error {}'
.format(e))
> assert False
E assert False

suites/plugins/rootdn_plugin_test.py:267: AssertionError
------------------------------ Captured log call -------------------------------
rootdn_plugin_test.py 201 INFO Running test_rootdn_access_day_of_week... rootdn_plugin_test.py 217 INFO Today: Sat rootdn_plugin_test.py 218 INFO Allowed days: Sat,Sun rootdn_plugin_test.py 219 INFO Deny days: Mon, Tue rootdn_plugin_test.py 266 CRITICAL test_rootdn_access_day_of_week: Root DN bind failed unexpectedly failed: error {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}
Failed suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_ip 4.02
topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_denied_ip(topology_st, rootdn_setup):
"""Test denied IP feature - we can just test denying 127.0.0.1

:id: a0ef30e5-538b-46fa-9762-01a4435a15e2
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set rootdn-deny-ip to '127.0.0.1' and '::1'
2. Bind as Root DN
3. Change the denied IP so root DN succeeds
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_denied_ip...')
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE,
'rootdn-deny-ip',
b'127.0.0.1'),
(ldap.MOD_ADD,
'rootdn-deny-ip',
b'::1')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
conn = ldap.initialize('ldap://{}:{}'.format(LOCALHOST_IP, topology_st.standalone.port))
topology_st.standalone.restart()
conn.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False
if succeeded:
log.fatal('test_rootdn_access_denied_ip: Root DN was incorrectly able to bind')
assert False

#
# Change the denied IP so root DN succeeds
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-deny-ip', b'255.255.255.255')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

try:
> topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

suites/plugins/rootdn_plugin_test.py:352:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=Directory Manager', 'password'), kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, who = 'cn=Directory Manager'
cred = 'password', serverctrls = None, clientctrls = None

def simple_bind_s(self,who=None,cred=None,serverctrls=None,clientctrls=None):
"""
simple_bind_s([who='' [,cred='']]) -> 4-tuple
"""
msgid = self.simple_bind(who,cred,serverctrls,clientctrls)
> resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (4,), kwargs = {'all': 1, 'timeout': -1}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 4, all = 1
timeout = -1, resp_ctrl_classes = None

def result3(self,msgid=ldap.RES_ANY,all=1,timeout=None,resp_ctrl_classes=None):
resp_type, resp_data, resp_msgid, decoded_resp_ctrls, retoid, retval = self.result4(
msgid,all,timeout,
add_ctrls=0,add_intermediates=0,add_extop=0,
> resp_ctrl_classes=resp_ctrl_classes
)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (4, 1, -1)
kwargs = {'add_ctrls': 0, 'add_extop': 0, 'add_intermediates': 0, 'resp_ctrl_classes': None}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 4, all = 1
timeout = -1, add_ctrls = 0, add_intermediates = 0, add_extop = 0
resp_ctrl_classes = None

def result4(self,msgid=ldap.RES_ANY,all=1,timeout=None,add_ctrls=0,add_intermediates=0,add_extop=0,resp_ctrl_classes=None):
if timeout is None:
timeout = self.timeout
> ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method result4 of LDAP object at 0x7fea8190b710>, 4, 1, -1, 0, 0, ...)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b710>
args = (4, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
result = func(*args,**kwargs)
if __debug__ and self._trace_level>=2:
if func.__name__!="unbind_ext":
diagnostic_message_success = self._l.get_option(ldap.OPT_DIAGNOSTIC_MESSAGE)
finally:
self._ldap_object_lock.release()
except LDAPError as e:
exc_type,exc_value,exc_traceback = sys.exc_info()
try:
if 'info' not in e.args[0] and 'errno' in e.args[0]:
e.args[0]['info'] = strerror(e.args[0]['errno'])
except IndexError:
pass
if __debug__ and self._trace_level>=2:
self._trace_file.write('=> LDAPError - %s: %s\n' % (e.__class__.__name__,str(e)))
try:
> reraise(exc_type, exc_value, exc_traceback)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

exc_type = <class 'ldap.UNWILLING_TO_PERFORM'>
exc_value = UNWILLING_TO_PERFORM({'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'},)
exc_traceback = <traceback object at 0x7fea819c5108>

def reraise(exc_type, exc_value, exc_traceback):
"""Re-raise an exception given information from sys.exc_info()

Note that unlike six.reraise, this does not support replacing the
traceback. All arguments must come from a single sys.exc_info() call.
"""
# In Python 3, all exception info is contained in one object.
> raise exc_value

/usr/lib64/python3.6/site-packages/ldap/compat.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b710>
args = (4, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.UNWILLING_TO_PERFORM: {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: UNWILLING_TO_PERFORM

During handling of the above exception, another exception occurred:

topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_denied_ip(topology_st, rootdn_setup):
"""Test denied IP feature - we can just test denying 127.0.0.1

:id: a0ef30e5-538b-46fa-9762-01a4435a15e2
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set rootdn-deny-ip to '127.0.0.1' and '::1'
2. Bind as Root DN
3. Change the denied IP so root DN succeeds
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_denied_ip...')
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE,
'rootdn-deny-ip',
b'127.0.0.1'),
(ldap.MOD_ADD,
'rootdn-deny-ip',
b'::1')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
conn = ldap.initialize('ldap://{}:{}'.format(LOCALHOST_IP, topology_st.standalone.port))
topology_st.standalone.restart()
conn.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False
if succeeded:
log.fatal('test_rootdn_access_denied_ip: Root DN was incorrectly able to bind')
assert False

#
# Change the denied IP so root DN succeeds
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-deny-ip', b'255.255.255.255')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_ip: Root DN bind failed unexpectedly failed: error {}'
.format(e))
> assert False
E assert False

suites/plugins/rootdn_plugin_test.py:356: AssertionError
------------------------------ Captured log call -------------------------------
rootdn_plugin_test.py 308 INFO Running test_rootdn_access_denied_ip... rootdn_plugin_test.py 355 CRITICAL test_rootdn_access_denied_ip: Root DN bind failed unexpectedly failed: error {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}
Failed suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_host 0.52
topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_denied_host(topology_st, rootdn_setup):
"""Test denied Host feature - we can just test denying localhost

:id: a0ef30e5-538b-46fa-9762-01a4435a15e3
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set rootdn-deny-host to hostname (localhost if not accessable)
2. Bind as Root DN
3. Change the denied host so root DN succeeds
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_denied_host...')
hostname = socket.gethostname()
localhost = DirSrvTools.getLocalhost()
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-deny-host',
ensure_bytes(hostname))])
if localhost != hostname:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-deny-host',
ensure_bytes(localhost))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: Failed to set deny host: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_denied_host: Root DN was incorrectly able to bind')
assert False

#
# Change the denied host so root DN succeeds
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: : failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-deny-host', b'i.dont.exist.com')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

try:
> topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

suites/plugins/rootdn_plugin_test.py:443:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=Directory Manager', 'password'), kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, who = 'cn=Directory Manager'
cred = 'password', serverctrls = None, clientctrls = None

def simple_bind_s(self,who=None,cred=None,serverctrls=None,clientctrls=None):
"""
simple_bind_s([who='' [,cred='']]) -> 4-tuple
"""
msgid = self.simple_bind(who,cred,serverctrls,clientctrls)
> resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (10,), kwargs = {'all': 1, 'timeout': -1}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 10, all = 1
timeout = -1, resp_ctrl_classes = None

def result3(self,msgid=ldap.RES_ANY,all=1,timeout=None,resp_ctrl_classes=None):
resp_type, resp_data, resp_msgid, decoded_resp_ctrls, retoid, retval = self.result4(
msgid,all,timeout,
add_ctrls=0,add_intermediates=0,add_extop=0,
> resp_ctrl_classes=resp_ctrl_classes
)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (10, 1, -1)
kwargs = {'add_ctrls': 0, 'add_extop': 0, 'add_intermediates': 0, 'resp_ctrl_classes': None}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 10, all = 1
timeout = -1, add_ctrls = 0, add_intermediates = 0, add_extop = 0
resp_ctrl_classes = None

def result4(self,msgid=ldap.RES_ANY,all=1,timeout=None,add_ctrls=0,add_intermediates=0,add_extop=0,resp_ctrl_classes=None):
if timeout is None:
timeout = self.timeout
> ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method result4 of LDAP object at 0x7fea8190b710>, 10, 1, -1, 0, 0, ...)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b710>
args = (10, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
result = func(*args,**kwargs)
if __debug__ and self._trace_level>=2:
if func.__name__!="unbind_ext":
diagnostic_message_success = self._l.get_option(ldap.OPT_DIAGNOSTIC_MESSAGE)
finally:
self._ldap_object_lock.release()
except LDAPError as e:
exc_type,exc_value,exc_traceback = sys.exc_info()
try:
if 'info' not in e.args[0] and 'errno' in e.args[0]:
e.args[0]['info'] = strerror(e.args[0]['errno'])
except IndexError:
pass
if __debug__ and self._trace_level>=2:
self._trace_file.write('=> LDAPError - %s: %s\n' % (e.__class__.__name__,str(e)))
try:
> reraise(exc_type, exc_value, exc_traceback)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

exc_type = <class 'ldap.UNWILLING_TO_PERFORM'>
exc_value = UNWILLING_TO_PERFORM({'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'},)
exc_traceback = <traceback object at 0x7fea81a6c888>

def reraise(exc_type, exc_value, exc_traceback):
"""Re-raise an exception given information from sys.exc_info()

Note that unlike six.reraise, this does not support replacing the
traceback. All arguments must come from a single sys.exc_info() call.
"""
# In Python 3, all exception info is contained in one object.
> raise exc_value

/usr/lib64/python3.6/site-packages/ldap/compat.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea8190b710>
args = (10, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.UNWILLING_TO_PERFORM: {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: UNWILLING_TO_PERFORM

During handling of the above exception, another exception occurred:

topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_denied_host(topology_st, rootdn_setup):
"""Test denied Host feature - we can just test denying localhost

:id: a0ef30e5-538b-46fa-9762-01a4435a15e3
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set rootdn-deny-host to hostname (localhost if not accessable)
2. Bind as Root DN
3. Change the denied host so root DN succeeds
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_denied_host...')
hostname = socket.gethostname()
localhost = DirSrvTools.getLocalhost()
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-deny-host',
ensure_bytes(hostname))])
if localhost != hostname:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-deny-host',
ensure_bytes(localhost))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: Failed to set deny host: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_denied_host: Root DN was incorrectly able to bind')
assert False

#
# Change the denied host so root DN succeeds
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: : failed to bind as user1')
assert False

try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-deny-host', b'i.dont.exist.com')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: Failed to set rootDN plugin config: error {}'
.format(e))
assert False

try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_denied_host: Root DN bind failed unexpectedly failed: error {}'
.format(e))
> assert False
E assert False

suites/plugins/rootdn_plugin_test.py:447: AssertionError
------------------------------ Captured log call -------------------------------
rootdn_plugin_test.py 397 INFO Running test_rootdn_access_denied_host... rootdn_plugin_test.py 446 CRITICAL test_rootdn_access_denied_host: Root DN bind failed unexpectedly failed: error {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}
Failed suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_ip 2.86
topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_allowed_ip(topology_st, rootdn_setup):
"""Test allowed ip feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e4
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set allowed ip to 255.255.255.255 - blocks the Root DN
2. Bind as Root DN
3. Allow localhost
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_allowed_ip...')

#
# Set allowed ip to 255.255.255.255 - blocks the Root DN
#
try:
conn = ldap.initialize('ldap://{}:{}'.format(LOCALHOST_IP, topology_st.standalone.port))
> topology_st.standalone.restart()

suites/plugins/rootdn_plugin_test.py:495:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, timeout = 120, post_open = True

def restart(self, timeout=120, post_open=True):
'''
It restarts an instance and rebind it. Its final state after rebind
(open) is DIRSRV_STATE_ONLINE.

@param self
@param timeout (in sec) to wait for successful stop

@return None

@raise None
'''
self.stop(timeout)
time.sleep(1)
> self.start(timeout, post_open)

/usr/lib/python3.6/site-packages/lib389/__init__.py:1334:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, timeout = 120, post_open = True

def start(self, timeout=120, post_open=True):
'''
It starts an instance and rebind it. Its final state after rebind
(open) is DIRSRV_STATE_ONLINE

@param self
@param timeout (in sec) to wait for successful start

@return None

@raise None
'''

if self.status() is True:
return

if self.with_systemd() and not self.containerised:
# Do systemd things here ...
subprocess.check_call(["/usr/bin/systemctl",
"start",
"dirsrv@%s" % self.serverid])
else:
# Start the process.
# Wait for it to terminate
# This means the server is probably ready to go ....
env = {}
if self.has_asan():
self.log.warning("WARNING: Starting instance with ASAN options. This is probably not what you want. Please contact support.")
self.log.info("INFO: ASAN options will be copied from your environment")
env['ASAN_SYMBOLIZER_PATH'] = "/usr/bin/llvm-symbolizer"
env['ASAN_OPTIONS'] = "symbolize=1 detect_deadlocks=1 log_path=%s/ns-slapd-%s.asan" % (self.ds_paths.run_dir, self.serverid)
env.update(os.environ)
output = None
try:
output = subprocess.check_output(["%s/ns-slapd" % self.get_sbin_dir(),
"-D",
self.ds_paths.config_dir,
"-i",
self.ds_paths.pid_file], env=env, stderr=subprocess.STDOUT)
except subprocess.CalledProcessError:
self.log.error(output)
count = timeout
pid = pid_from_file(self.ds_paths.pid_file)
while (pid is None) and count > 0:
count -= 1
time.sleep(1)
pid = pid_from_file(self.ds_paths.pid_file)
if pid == 0 or pid is None:
raise ValueError
# Wait
while not pid_exists(pid) and count > 0:
# It looks like DS changes the value in here at some point ...
# It's probably a DS bug, but if we "keep checking" the file, eventually
# we get the main server pid, and it's ready to go.
pid = pid_from_file(self.ds_paths.pid_file)
time.sleep(1)
count -= 1
if not pid_exists(pid):
raise Exception("Failed to start DS")
if post_open:
> self.open()

/usr/lib/python3.6/site-packages/lib389/__init__.py:1244:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
uri = 'ldap://server.example.com:38901', saslmethod = None, sasltoken = None
certdir = '/etc/dirsrv/slapd-standalone1', starttls = False, connOnly = False
reqcert = 1, usercert = None, userkey = None

def open(self, uri=None, saslmethod=None, sasltoken=None, certdir=None, starttls=False, connOnly=False, reqcert=ldap.OPT_X_TLS_HARD,
usercert=None, userkey=None):
'''
It opens a ldap bound connection to dirsrv so that online
administrative tasks are possible. It binds with the binddn
property, then it initializes various fields from DirSrv
(via __initPart2)

The state changes -> DIRSRV_STATE_ONLINE

@param self
@param saslmethod - None, or GSSAPI
@param sasltoken - The ldap.sasl token type to bind with.
@param certdir - Certificate directory for TLS
@return None

@raise LDAPError
'''

# Force our state offline to prevent paths from trying to search
# cn=config while we startup.
self.state = DIRSRV_STATE_OFFLINE

if not uri:
uri = self.toLDAPURL()

self.log.debug('open(): Connecting to uri %s', uri)
if hasattr(ldap, 'PYLDAP_VERSION') and MAJOR >= 3:
super(DirSrv, self).__init__(uri, bytes_mode=False, trace_level=TRACE_LEVEL)
else:
super(DirSrv, self).__init__(uri, trace_level=TRACE_LEVEL)

if certdir is None and self.isLocal:
certdir = self.get_cert_dir()
self.log.debug("Using dirsrv ca certificate %s", certdir)

if certdir is not None:
"""
We have a certificate directory, so lets start up TLS negotiations
"""
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts AT ALL.
self.set_option(ldap.OPT_X_TLS_CACERTDIR, ensure_str(certdir))
self.log.debug("Using external ca certificate %s", certdir)

if userkey is not None:
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts AT ALL.
self.log.debug("Using user private key %s", userkey)
self.set_option(ldap.OPT_X_TLS_KEYFILE, ensure_str(userkey))

if usercert is not None:
self.log.debug("Using user certificate %s", usercert)
self.set_option(ldap.OPT_X_TLS_CERTFILE, ensure_str(usercert))

if certdir is not None:
self.log.debug("Using external ca certificate %s", certdir)
self.set_option(ldap.OPT_X_TLS_CACERTDIR, ensure_str(certdir))

if certdir or starttls:
try:
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts on reused (ie restart)
self.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, reqcert)
self.log.debug("Using certificate policy %s", reqcert)
self.log.debug("ldap.OPT_X_TLS_REQUIRE_CERT = %s", reqcert)
except ldap.LDAPError as e:
self.log.fatal('TLS negotiation failed: %s', e)
raise e

# Tell python ldap to make a new TLS context with this information.
self.set_option(ldap.OPT_X_TLS_NEWCTX, 0)

if starttls and not uri.startswith('ldaps'):
self.start_tls_s()

if saslmethod and sasltoken is not None:
# Just pass the sasltoken in!
self.sasl_interactive_bind_s("", sasltoken)
elif saslmethod and saslmethod.lower() == 'gssapi':
"""
Perform kerberos/gssapi authentication
"""
sasl_auth = ldap.sasl.gssapi("")
self.sasl_interactive_bind_s("", sasl_auth)

elif saslmethod == 'EXTERNAL':
# Do nothing.
sasl_auth = ldap.sasl.external()
self.sasl_interactive_bind_s("", sasl_auth)
elif saslmethod:
# Unknown or unsupported method
self.log.debug('Unsupported SASL method: %s', saslmethod)
raise ldap.UNWILLING_TO_PERFORM

elif self.can_autobind():
# Connect via ldapi, and autobind.
# do nothing: the bind is complete.
if self.verbose:
self.log.info("open(): Using root autobind ...")
sasl_auth = ldap.sasl.external()
self.sasl_interactive_bind_s("", sasl_auth)

else:
"""
Do a simple bind
"""
try:
self.simple_bind_s(ensure_str(self.binddn), self.bindpw)
except ldap.SERVER_DOWN as e:
# TODO add server info in exception
self.log.debug("Cannot connect to %r", uri)
raise e
except ldap.LDAPError as e:
self.log.debug("Error: Failed to authenticate: %s", e)
> raise e

/usr/lib/python3.6/site-packages/lib389/__init__.py:1154:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
uri = 'ldap://server.example.com:38901', saslmethod = None, sasltoken = None
certdir = '/etc/dirsrv/slapd-standalone1', starttls = False, connOnly = False
reqcert = 1, usercert = None, userkey = None

def open(self, uri=None, saslmethod=None, sasltoken=None, certdir=None, starttls=False, connOnly=False, reqcert=ldap.OPT_X_TLS_HARD,
usercert=None, userkey=None):
'''
It opens a ldap bound connection to dirsrv so that online
administrative tasks are possible. It binds with the binddn
property, then it initializes various fields from DirSrv
(via __initPart2)

The state changes -> DIRSRV_STATE_ONLINE

@param self
@param saslmethod - None, or GSSAPI
@param sasltoken - The ldap.sasl token type to bind with.
@param certdir - Certificate directory for TLS
@return None

@raise LDAPError
'''

# Force our state offline to prevent paths from trying to search
# cn=config while we startup.
self.state = DIRSRV_STATE_OFFLINE

if not uri:
uri = self.toLDAPURL()

self.log.debug('open(): Connecting to uri %s', uri)
if hasattr(ldap, 'PYLDAP_VERSION') and MAJOR >= 3:
super(DirSrv, self).__init__(uri, bytes_mode=False, trace_level=TRACE_LEVEL)
else:
super(DirSrv, self).__init__(uri, trace_level=TRACE_LEVEL)

if certdir is None and self.isLocal:
certdir = self.get_cert_dir()
self.log.debug("Using dirsrv ca certificate %s", certdir)

if certdir is not None:
"""
We have a certificate directory, so lets start up TLS negotiations
"""
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts AT ALL.
self.set_option(ldap.OPT_X_TLS_CACERTDIR, ensure_str(certdir))
self.log.debug("Using external ca certificate %s", certdir)

if userkey is not None:
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts AT ALL.
self.log.debug("Using user private key %s", userkey)
self.set_option(ldap.OPT_X_TLS_KEYFILE, ensure_str(userkey))

if usercert is not None:
self.log.debug("Using user certificate %s", usercert)
self.set_option(ldap.OPT_X_TLS_CERTFILE, ensure_str(usercert))

if certdir is not None:
self.log.debug("Using external ca certificate %s", certdir)
self.set_option(ldap.OPT_X_TLS_CACERTDIR, ensure_str(certdir))

if certdir or starttls:
try:
# Note this sets LDAP.OPT not SELF. Because once self has opened
# it can NOT change opts on reused (ie restart)
self.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, reqcert)
self.log.debug("Using certificate policy %s", reqcert)
self.log.debug("ldap.OPT_X_TLS_REQUIRE_CERT = %s", reqcert)
except ldap.LDAPError as e:
self.log.fatal('TLS negotiation failed: %s', e)
raise e

# Tell python ldap to make a new TLS context with this information.
self.set_option(ldap.OPT_X_TLS_NEWCTX, 0)

if starttls and not uri.startswith('ldaps'):
self.start_tls_s()

if saslmethod and sasltoken is not None:
# Just pass the sasltoken in!
self.sasl_interactive_bind_s("", sasltoken)
elif saslmethod and saslmethod.lower() == 'gssapi':
"""
Perform kerberos/gssapi authentication
"""
sasl_auth = ldap.sasl.gssapi("")
self.sasl_interactive_bind_s("", sasl_auth)

elif saslmethod == 'EXTERNAL':
# Do nothing.
sasl_auth = ldap.sasl.external()
self.sasl_interactive_bind_s("", sasl_auth)
elif saslmethod:
# Unknown or unsupported method
self.log.debug('Unsupported SASL method: %s', saslmethod)
raise ldap.UNWILLING_TO_PERFORM

elif self.can_autobind():
# Connect via ldapi, and autobind.
# do nothing: the bind is complete.
if self.verbose:
self.log.info("open(): Using root autobind ...")
sasl_auth = ldap.sasl.external()
self.sasl_interactive_bind_s("", sasl_auth)

else:
"""
Do a simple bind
"""
try:
> self.simple_bind_s(ensure_str(self.binddn), self.bindpw)

/usr/lib/python3.6/site-packages/lib389/__init__.py:1147:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=Directory Manager', 'password'), kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, who = 'cn=Directory Manager'
cred = 'password', serverctrls = None, clientctrls = None

def simple_bind_s(self,who=None,cred=None,serverctrls=None,clientctrls=None):
"""
simple_bind_s([who='' [,cred='']]) -> 4-tuple
"""
msgid = self.simple_bind(who,cred,serverctrls,clientctrls)
> resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (1,), kwargs = {'all': 1, 'timeout': -1}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 1, all = 1
timeout = -1, resp_ctrl_classes = None

def result3(self,msgid=ldap.RES_ANY,all=1,timeout=None,resp_ctrl_classes=None):
resp_type, resp_data, resp_msgid, decoded_resp_ctrls, retoid, retval = self.result4(
msgid,all,timeout,
add_ctrls=0,add_intermediates=0,add_extop=0,
> resp_ctrl_classes=resp_ctrl_classes
)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (1, 1, -1)
kwargs = {'add_ctrls': 0, 'add_extop': 0, 'add_intermediates': 0, 'resp_ctrl_classes': None}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 1, all = 1
timeout = -1, add_ctrls = 0, add_intermediates = 0, add_extop = 0
resp_ctrl_classes = None

def result4(self,msgid=ldap.RES_ANY,all=1,timeout=None,add_ctrls=0,add_intermediates=0,add_extop=0,resp_ctrl_classes=None):
if timeout is None:
timeout = self.timeout
> ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method result4 of LDAP object at 0x7fea81bdc530>, 1, 1, -1, 0, 0, ...)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea81bdc530>
args = (1, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
result = func(*args,**kwargs)
if __debug__ and self._trace_level>=2:
if func.__name__!="unbind_ext":
diagnostic_message_success = self._l.get_option(ldap.OPT_DIAGNOSTIC_MESSAGE)
finally:
self._ldap_object_lock.release()
except LDAPError as e:
exc_type,exc_value,exc_traceback = sys.exc_info()
try:
if 'info' not in e.args[0] and 'errno' in e.args[0]:
e.args[0]['info'] = strerror(e.args[0]['errno'])
except IndexError:
pass
if __debug__ and self._trace_level>=2:
self._trace_file.write('=> LDAPError - %s: %s\n' % (e.__class__.__name__,str(e)))
try:
> reraise(exc_type, exc_value, exc_traceback)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

exc_type = <class 'ldap.UNWILLING_TO_PERFORM'>
exc_value = UNWILLING_TO_PERFORM({'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'},)
exc_traceback = <traceback object at 0x7fea899bc948>

def reraise(exc_type, exc_value, exc_traceback):
"""Re-raise an exception given information from sys.exc_info()

Note that unlike six.reraise, this does not support replacing the
traceback. All arguments must come from a single sys.exc_info() call.
"""
# In Python 3, all exception info is contained in one object.
> raise exc_value

/usr/lib64/python3.6/site-packages/ldap/compat.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea81bdc530>
args = (1, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.UNWILLING_TO_PERFORM: {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: UNWILLING_TO_PERFORM

During handling of the above exception, another exception occurred:

topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_allowed_ip(topology_st, rootdn_setup):
"""Test allowed ip feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e4
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set allowed ip to 255.255.255.255 - blocks the Root DN
2. Bind as Root DN
3. Allow localhost
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_allowed_ip...')

#
# Set allowed ip to 255.255.255.255 - blocks the Root DN
#
try:
conn = ldap.initialize('ldap://{}:{}'.format(LOCALHOST_IP, topology_st.standalone.port))
topology_st.standalone.restart()
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-allow-ip', b'255.255.255.255')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_ip: Failed to set allowed host: error {}'
.format(e))
> assert False
E assert False

suites/plugins/rootdn_plugin_test.py:500: AssertionError
------------------------------ Captured log call -------------------------------
rootdn_plugin_test.py 488 INFO Running test_rootdn_access_allowed_ip... rootdn_plugin_test.py 499 CRITICAL test_rootdn_access_allowed_ip: Failed to set allowed host: error {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}
Failed suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_host 0.30
topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_allowed_host(topology_st, rootdn_setup):
"""Test allowed host feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e5
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set allowed host to an unknown host - blocks the Root DN
2. Bind as Root DN
3. Allow localhost
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_allowed_host...')

#
# Set allowed host to an unknown host - blocks the Root DN
#
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-allow-host', b'i.dont.exist.com')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: Failed to set allowed host: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_allowed_host: Root DN was incorrectly able to bind')
assert False

#
# Allow localhost
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: : failed to bind as user1')
assert False

hostname = socket.gethostname()
localhost = DirSrvTools.getLocalhost()
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_DELETE,
'rootdn-allow-host',
None)])
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-allow-host',
ensure_bytes(localhost))])
if hostname != localhost:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-allow-host',
ensure_bytes(hostname))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: Failed to set allowed host: error {}'
.format(e))
assert False

try:
> topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

suites/plugins/rootdn_plugin_test.py:633:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=Directory Manager', 'password'), kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, who = 'cn=Directory Manager'
cred = 'password', serverctrls = None, clientctrls = None

def simple_bind_s(self,who=None,cred=None,serverctrls=None,clientctrls=None):
"""
simple_bind_s([who='' [,cred='']]) -> 4-tuple
"""
msgid = self.simple_bind(who,cred,serverctrls,clientctrls)
> resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:444:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (8,), kwargs = {'all': 1, 'timeout': -1}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 8, all = 1
timeout = -1, resp_ctrl_classes = None

def result3(self,msgid=ldap.RES_ANY,all=1,timeout=None,resp_ctrl_classes=None):
resp_type, resp_data, resp_msgid, decoded_resp_ctrls, retoid, retval = self.result4(
msgid,all,timeout,
add_ctrls=0,add_intermediates=0,add_extop=0,
> resp_ctrl_classes=resp_ctrl_classes
)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (8, 1, -1)
kwargs = {'add_ctrls': 0, 'add_extop': 0, 'add_intermediates': 0, 'resp_ctrl_classes': None}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>, msgid = 8, all = 1
timeout = -1, add_ctrls = 0, add_intermediates = 0, add_extop = 0
resp_ctrl_classes = None

def result4(self,msgid=ldap.RES_ANY,all=1,timeout=None,add_ctrls=0,add_intermediates=0,add_extop=0,resp_ctrl_classes=None):
if timeout is None:
timeout = self.timeout
> ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method result4 of LDAP object at 0x7fea81bdc530>, 8, 1, -1, 0, 0, ...)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea81bdc530>
args = (8, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
result = func(*args,**kwargs)
if __debug__ and self._trace_level>=2:
if func.__name__!="unbind_ext":
diagnostic_message_success = self._l.get_option(ldap.OPT_DIAGNOSTIC_MESSAGE)
finally:
self._ldap_object_lock.release()
except LDAPError as e:
exc_type,exc_value,exc_traceback = sys.exc_info()
try:
if 'info' not in e.args[0] and 'errno' in e.args[0]:
e.args[0]['info'] = strerror(e.args[0]['errno'])
except IndexError:
pass
if __debug__ and self._trace_level>=2:
self._trace_file.write('=> LDAPError - %s: %s\n' % (e.__class__.__name__,str(e)))
try:
> reraise(exc_type, exc_value, exc_traceback)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

exc_type = <class 'ldap.UNWILLING_TO_PERFORM'>
exc_value = UNWILLING_TO_PERFORM({'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'},)
exc_traceback = <traceback object at 0x7fea81b65108>

def reraise(exc_type, exc_value, exc_traceback):
"""Re-raise an exception given information from sys.exc_info()

Note that unlike six.reraise, this does not support replacing the
traceback. All arguments must come from a single sys.exc_info() call.
"""
# In Python 3, all exception info is contained in one object.
> raise exc_value

/usr/lib64/python3.6/site-packages/ldap/compat.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea81af6d30>
func = <built-in method result4 of LDAP object at 0x7fea81bdc530>
args = (8, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.UNWILLING_TO_PERFORM: {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: UNWILLING_TO_PERFORM

During handling of the above exception, another exception occurred:

topology_st = <lib389.topologies.TopologyMain object at 0x7fea81c39dd8>
rootdn_setup = None

def test_rootdn_access_allowed_host(topology_st, rootdn_setup):
"""Test allowed host feature

:id: a0ef30e5-538b-46fa-9762-01a4435a15e5
:setup: Standalone instance, rootdn plugin set up
:steps:
1. Set allowed host to an unknown host - blocks the Root DN
2. Bind as Root DN
3. Allow localhost
4. Bind as Root DN
5. Cleanup - undo the changes we made so the next test has a clean slate
:expectedresults:
1. Success
2. Should fail
3. Success
4. Success
5. Success
"""

log.info('Running test_rootdn_access_allowed_host...')

#
# Set allowed host to an unknown host - blocks the Root DN
#
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_REPLACE, 'rootdn-allow-host', b'i.dont.exist.com')])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: Failed to set allowed host: error {}'
.format(e))
assert False

#
# Bind as Root DN - should fail
#
try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
succeeded = True
except ldap.LDAPError as e:
succeeded = False

if succeeded:
log.fatal('test_rootdn_access_allowed_host: Root DN was incorrectly able to bind')
assert False

#
# Allow localhost
#
try:
topology_st.standalone.simple_bind_s(USER1_DN, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: : failed to bind as user1')
assert False

hostname = socket.gethostname()
localhost = DirSrvTools.getLocalhost()
try:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_DELETE,
'rootdn-allow-host',
None)])
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-allow-host',
ensure_bytes(localhost))])
if hostname != localhost:
topology_st.standalone.modify_s(PLUGIN_DN, [(ldap.MOD_ADD,
'rootdn-allow-host',
ensure_bytes(hostname))])
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: Failed to set allowed host: error {}'
.format(e))
assert False

try:
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
except ldap.LDAPError as e:
log.fatal('test_rootdn_access_allowed_host: Root DN bind failed unexpectedly failed: error {}'
.format(e))
> assert False
E assert False

suites/plugins/rootdn_plugin_test.py:637: AssertionError
------------------------------ Captured log call -------------------------------
rootdn_plugin_test.py 580 INFO Running test_rootdn_access_allowed_host... rootdn_plugin_test.py 636 CRITICAL test_rootdn_access_allowed_host: Root DN bind failed unexpectedly failed: error {'desc': 'Server is unwilling to perform', 'info': 'RootDN access control violation'}
Failed suites/sasl/regression_test.py::test_openldap_no_nss_crypto 54.61
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea892462b0>

def test_openldap_no_nss_crypto(topology_m2):
"""Check that we allow usage of OpenLDAP libraries
that don't use NSS for crypto

:id: 0a622f3d-8ba5-4df2-a1de-1fb2237da40a
:setup: Replication with two masters:
master_1 ----- startTLS -----> master_2;
master_1 <-- TLS_clientAuth -- master_2;
nsslapd-extract-pemfiles set to 'on' on both masters
without specifying cert names
:steps:
1. Add 5 users to master 1 and 2
2. Check that the users were successfully replicated
3. Relocate PEM files on master 1
4. Check PEM files in master 1 config directory
5. Add 5 users more to master 1 and 2
6. Check that the users were successfully replicated
7. Export userRoot on master 1
:expectedresults:
1. Users should be successfully added
2. Users should be successfully replicated
3. Operation should be successful
4. PEM files should be found
5. Users should be successfully added
6. Users should be successfully replicated
7. Operation should be successful
"""

log.info("Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto")

create_keys_certs(topology_m2)
> config_tls_agreements(topology_m2)

suites/sasl/regression_test.py:400:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
suites/sasl/regression_test.py:316: in config_tls_agreements
rentry = m1.search_s(replmgr, ldap.SCOPE_BASE, 'objectclass=*')
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:846: in search_ext_s
return self.result(msgid,all=1,timeout=timeout)[1]
/usr/lib/python3.6/site-packages/lib389/__init__.py:133: in inner
objtype, data = f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:738: in result
resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:742: in result2
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea88e5ff28>
func = <built-in method result4 of LDAP object at 0x7fea898b0da0>
args = (5, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.NO_SUCH_OBJECT: {'desc': 'No such object'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: NO_SUCH_OBJECT
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stdout call -----------------------------
Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 IMPORT SUCCESSFUL ----------------------------- Captured stderr call -----------------------------
Generating key. This may take a few moments... ------------------------------ Captured log call -------------------------------
regression_test.py 397 INFO Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto regression_test.py 127 INFO ######################### Creating SSL Keys and Certs ###################### regression_test.py 130 INFO ##### Ensure that nsslapd-extract-pemfiles is 'off' on master1 regression_test.py 132 INFO ##### restart master1 regression_test.py 130 INFO ##### Ensure that nsslapd-extract-pemfiles is 'off' on master2 regression_test.py 132 INFO ##### restart master2 regression_test.py 140 INFO ##### shutdown master1 regression_test.py 143 INFO ##### Creating a password file regression_test.py 152 INFO ##### create the pin file regression_test.py 163 INFO ##### Creating a noise file regression_test.py 172 INFO ##### Create key3.db and cert8.db database (master1): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master1', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 176 INFO ##### Creating encryption key for CA (master1): ['certutil', '-G', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 182 INFO ##### Creating self-signed CA certificate (master1) -- nickname CAcertificate regression_test.py 190 INFO ##### Creating Server certificate -- nickname Server-Cert1: ['certutil', '-S', '-n', 'Server-Cert1', '-s', 'CN=server.example.com,OU=389 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1001', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 198 INFO ##### Creating Server certificate -- nickname Server-Cert2: ['certutil', '-S', '-n', 'Server-Cert2', '-s', 'CN=server.example.com,OU=390 Directory Server', '-c', 'CAcertificate', '-t', ',,', '-m', '1002', '-v', '120', '-d', '/etc/dirsrv/slapd-master1', '-z', '/etc/dirsrv/slapd-master1/noise.txt', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 203 INFO ##### start master1 regression_test.py 206 INFO ##### enable SSL in master1 with all ciphers regression_test.py 46 INFO ######################### Enabling SSL LDAPSPORT 41636 ###################### regression_test.py 210 INFO ##### Check the cert db: ['certutil', '-L', '-d', '/etc/dirsrv/slapd-master1'] regression_test.py 111 INFO OUT: regression_test.py 116 INFO regression_test.py 116 INFO Certificate Nickname Trust Attributes regression_test.py 116 INFO SSL,S/MIME,JAR/XPI regression_test.py 116 INFO regression_test.py 116 INFO CAcertificate CTu,u,u regression_test.py 116 INFO Server-Cert1 u,u,u regression_test.py 116 INFO Server-Cert2 u,u,u regression_test.py 117 INFO ERR: regression_test.py 213 INFO ##### restart master1 regression_test.py 216 INFO ##### Check PEM files of master1 (before setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) not in /etc/dirsrv/slapd-master1 ###################### regression_test.py 80 INFO /etc/dirsrv/slapd-master1/CAcertificate.pem is correctly not generated. regression_test.py 93 INFO /etc/dirsrv/slapd-master1/Server-Cert1.pem is correctly not generated. regression_test.py 106 INFO /etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is correctly not generated. regression_test.py 219 INFO ##### Set on to nsslapd-extract-pemfiles regression_test.py 222 INFO ##### restart master1 regression_test.py 225 INFO ##### Check PEM files of master1 (after setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert1, Server-Cert1-Key) in /etc/dirsrv/slapd-master1 ###################### regression_test.py 71 INFO /etc/dirsrv/slapd-master1/CAcertificate.pem is successfully generated. regression_test.py 84 INFO /etc/dirsrv/slapd-master1/Server-Cert1.pem is successfully generated. regression_test.py 97 INFO /etc/dirsrv/slapd-master1/Server-Cert1-Key.pem is successfully generated. regression_test.py 232 INFO ##### Extract PK12 file for master2: pk12util -o /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master1 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt regression_test.py 235 INFO ##### Check PK12 files regression_test.py 237 INFO /tmp/Server-Cert2.pk12 is successfully extracted. regression_test.py 242 INFO ##### stop master2 regression_test.py 245 INFO ##### Initialize Cert DB for master2 regression_test.py 247 INFO ##### Create key3.db and cert8.db database (master2): ['certutil', '-N', '-d', '/etc/dirsrv/slapd-master2', '-f', '/etc/dirsrv/slapd-master1/pwdfile.txt'] regression_test.py 111 INFO OUT: regression_test.py 117 INFO ERR: regression_test.py 250 INFO ##### Import certs to master2 regression_test.py 251 INFO Importing CAcertificate regression_test.py 255 INFO ##### Importing Server-Cert2 to master2: pk12util -i /tmp/Server-Cert2.pk12 -n "Server-Cert2" -d /etc/dirsrv/slapd-master2 -w /etc/dirsrv/slapd-master1/pwdfile.txt -k /etc/dirsrv/slapd-master1/pwdfile.txt regression_test.py 257 INFO copy /etc/dirsrv/slapd-master1/pin.txt to /etc/dirsrv/slapd-master2/pin.txt regression_test.py 261 INFO ##### start master2 regression_test.py 264 INFO ##### enable SSL in master2 with all ciphers regression_test.py 46 INFO ######################### Enabling SSL LDAPSPORT 42636 ###################### regression_test.py 267 INFO ##### restart master2 regression_test.py 270 INFO ##### Check PEM files of master2 (before setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) not in /etc/dirsrv/slapd-master2 ###################### regression_test.py 80 INFO /etc/dirsrv/slapd-master2/CAcertificate.pem is correctly not generated. regression_test.py 93 INFO /etc/dirsrv/slapd-master2/Server-Cert2.pem is correctly not generated. regression_test.py 106 INFO /etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is correctly not generated. regression_test.py 273 INFO ##### Set on to nsslapd-extract-pemfiles regression_test.py 276 INFO ##### restart master2 regression_test.py 279 INFO ##### Check PEM files of master2 (after setting nsslapd-extract-pemfiles regression_test.py 66 INFO ######################### Check PEM files (CAcertificate, Server-Cert2, Server-Cert2-Key) in /etc/dirsrv/slapd-master2 ###################### regression_test.py 71 INFO /etc/dirsrv/slapd-master2/CAcertificate.pem is successfully generated. regression_test.py 84 INFO /etc/dirsrv/slapd-master2/Server-Cert2.pem is successfully generated. regression_test.py 97 INFO /etc/dirsrv/slapd-master2/Server-Cert2-Key.pem is successfully generated. regression_test.py 282 INFO ##### restart master1 regression_test.py 285 INFO ######################### Creating SSL Keys and Certs Done ###################### regression_test.py 289 INFO ######################### Configure SSL/TLS agreements ###################### regression_test.py 290 INFO ######################## master1 -- startTLS -> master2 ##################### regression_test.py 291 INFO ##################### master1 <- tls_clientAuth -- master2 ################## regression_test.py 293 INFO ##### Update the agreement of master1 regression_test.py 299 INFO ##### Add the cert to the repl manager on master1 regression_test.py 313 INFO ##### master2 Server Cert in base64 format: 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
Failed tickets/ticket47462_test.py::test_ticket47462 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea88f2aef0>

def test_ticket47462(topology_m2):
"""
Test that AES properly replaces DES during an update/restart, and that
replication also works correctly.
"""

#
# First set config as if it's an older version. Set DES to use
# libdes-plugin, MMR to depend on DES, delete the existing AES plugin,
# and set a DES password for the replication agreement.
#
# Add an extra attribute to the DES plugin args
#
try:
topology_m2.ms["master1"].modify_s(DES_PLUGIN,
> [(ldap.MOD_REPLACE, 'nsslapd-pluginEnabled', 'on')])

tickets/ticket47462_test.py:47:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89719160>
func = <built-in method modify_ext of LDAP object at 0x7fea89899850>
args = ('cn=DES,cn=Password Storage Schemes,cn=plugins,cn=config', [(2, 'nsslapd-pluginEnabled', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket47838_test.py::test_47838_init 3.62
topology_st = <lib389.topologies.TopologyMain object at 0x7fea890bd710>

def test_47838_init(topology_st):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
"""
_header(topology_st, 'Testing Ticket 47838 - harden the list of ciphers available by default')
onss_version = os.popen("rpm -q nss | awk -F'-' '{print $2}'", "r")
global nss_version
nss_version = onss_version.readline()
nss_ssl = NssSsl(dbpath=topology_st.standalone.get_cert_dir())
nss_ssl.reinit()
nss_ssl.create_rsa_ca()
nss_ssl.create_rsa_key_and_cert()

log.info("\n######################### enable SSL in the directory server with all ciphers ######################\n")
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3', b'off'),
(ldap.MOD_REPLACE, 'nsTLS1', b'on'),
(ldap.MOD_REPLACE, 'nsSSLClientAuth', b'allowed'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on'),
(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'+all')])

topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-security', b'on'),
(ldap.MOD_REPLACE, 'nsslapd-ssl-check-hostname', b'off'),
(ldap.MOD_REPLACE, 'nsslapd-secureport', ensure_bytes(MY_SECURE_PORT))])

topology_st.standalone.add_s(Entry((RSA_DN, {'objectclass': "top nsEncryptionModule".split(),
'cn': RSA,
'nsSSLPersonalitySSL': SERVERCERT,
'nsSSLToken': 'internal (software)',
> 'nsSSLActivation': 'on'})))

tickets/ticket47838_test.py:85:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:161: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896282e8>
func = <built-in method result4 of LDAP object at 0x7fea89794af8>
args = (6, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.ALREADY_EXISTS: {'desc': 'Already exists'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: ALREADY_EXISTS
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Testing Ticket 47838 - harden the list of ciphers available by default ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 69 INFO ######################### enable SSL in the directory server with all ciphers ######################
Failed tickets/ticket47838_test.py::test_47838_run_4 4.75
topology_st = <lib389.topologies.TopologyMain object at 0x7fea890bd710>

def test_47838_run_4(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
default allowWeakCipher
"""
_header(topology_st, 'Test Case 5 - Check no nsSSL3Ciphers (default setting) with default allowWeakCipher')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_DELETE, 'nsSSL3Ciphers', b'-all')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_3' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)
enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:283: AssertionError
------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 5 - Check no nsSSL3Ciphers (default setting) with default allowWeakCipher ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 267 INFO ######################### Restarting the server ###################### ticket47838_test.py 278 INFO Enabled ciphers: 24 ticket47838_test.py 279 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_5 4.56
topology_st = <lib389.topologies.TopologyMain object at 0x7fea890bd710>

def test_47838_run_5(topology_st):
"""
Check nsSSL3Ciphers: default
Default ciphers are enabled.
default allowWeakCipher
"""
_header(topology_st, 'Test Case 6 - Check default nsSSL3Ciphers (default setting) with default allowWeakCipher')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'default')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_4' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:326: AssertionError
------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 6 - Check default nsSSL3Ciphers (default setting) with default allowWeakCipher ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 309 INFO ######################### Restarting the server ###################### ticket47838_test.py 321 INFO Enabled ciphers: 24 ticket47838_test.py 322 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_8 4.61
topology_st = <lib389.topologies.TopologyMain object at 0x7fea890bd710>

def test_47838_run_8(topology_st):
"""
Check nsSSL3Ciphers: default + allowWeakCipher: off
Strong Default ciphers are enabled.
"""
_header(topology_st, 'Test Case 9 - Check default nsSSL3Ciphers (default setting + allowWeakCipher: off)')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'default'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'off')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_7' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
global plus_all_ecount
global plus_all_dcount
if nss_version >= NSS330:
> assert ecount == 28
E assert 24 == 28

tickets/ticket47838_test.py:439: AssertionError
------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 9 - Check default nsSSL3Ciphers (default setting + allowWeakCipher: off) ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 422 INFO ######################### Restarting the server ###################### ticket47838_test.py 434 INFO Enabled ciphers: 24 ticket47838_test.py 435 INFO Disabled ciphers: 47
Failed tickets/ticket47838_test.py::test_47838_run_9 4.67
topology_st = <lib389.topologies.TopologyMain object at 0x7fea890bd710>

def test_47838_run_9(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
allowWeakCipher: on
nsslapd-errorlog-level: 0
"""
_header(topology_st,
'Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', None),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on')])
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', None)])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.47838_8' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(1)
topology_st.standalone.start(timeout=120)

enabled = os.popen('egrep "SSL info:" %s | egrep \": enabled\" | wc -l' % topology_st.standalone.errlog)
disabled = os.popen('egrep "SSL info:" %s | egrep \": disabled\" | wc -l' % topology_st.standalone.errlog)
ecount = int(enabled.readline().rstrip())
dcount = int(disabled.readline().rstrip())

log.info("Enabled ciphers: %d" % ecount)
log.info("Disabled ciphers: %d" % dcount)
if nss_version >= NSS330:
> assert ecount == 33
E assert 24 == 33

tickets/ticket47838_test.py:484: AssertionError
------------------------------ Captured log call -------------------------------
ticket47838_test.py 48 INFO ############################################### ticket47838_test.py 49 INFO ####### ticket47838_test.py 50 INFO ####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on ticket47838_test.py 51 INFO ####### ticket47838_test.py 52 INFO ############################################### ticket47838_test.py 469 INFO ######################### Restarting the server ###################### ticket47838_test.py 481 INFO Enabled ciphers: 24 ticket47838_test.py 482 INFO Disabled ciphers: 0
Failed tickets/ticket47950_test.py::test_ticket47950 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fea894db438>

def test_ticket47950(topology_st):
"""
Testing nsslapd-plugin-binddn-tracking does not cause issues around
access control and reconfiguring replication/repl agmt.
"""

log.info('Testing Ticket 47950 - Testing nsslapd-plugin-binddn-tracking')

#
# Turn on bind dn tracking
#
try:
> topology_st.standalone.modify_s("cn=config", [(ldap.MOD_REPLACE, 'nsslapd-plugin-binddn-tracking', 'on')])

tickets/ticket47950_test.py:39:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89609e48>
func = <built-in method modify_ext of LDAP object at 0x7fea7a257800>
args = ('cn=config', [(2, 'nsslapd-plugin-binddn-tracking', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Failed tickets/ticket47966_test.py::test_ticket47966 0.08
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea89614588>

def test_ticket47966(topology_m2):
'''
Testing bulk import when the backend with VLV was recreated.
If the test passes without the server crash, 47966 is verified.
'''
log.info('Testing Ticket 47966 - [VLV] slapd crashes during Dogtag clone reinstallation')
M1 = topology_m2.ms["master1"]
M2 = topology_m2.ms["master2"]
m1_m2_agmt = M1.agreement.list(suffix=DEFAULT_SUFFIX)[0].dn

log.info('0. Create a VLV index on Master 2.')
# get the backend entry
be = M2.replica.conn.backend.list(suffix=DEFAULT_SUFFIX)
if not be:
log.fatal("ticket47966: enable to retrieve the backend for %s" % DEFAULT_SUFFIX)
raise ValueError("no backend for suffix %s" % DEFAULT_SUFFIX)
bent = be[0]
beName = bent.getValue('cn')
beDn = "cn=%s,cn=ldbm database,cn=plugins,cn=config" % beName

# generate vlvSearch entry
vlvSrchDn = "cn=vlvSrch,%s" % beDn
log.info('0-1. vlvSearch dn: %s' % vlvSrchDn)
vlvSrchEntry = Entry(vlvSrchDn)
vlvSrchEntry.setValues('objectclass', 'top', 'vlvSearch')
vlvSrchEntry.setValues('cn', 'vlvSrch')
vlvSrchEntry.setValues('vlvBase', DEFAULT_SUFFIX)
vlvSrchEntry.setValues('vlvFilter', '(|(objectclass=*)(objectclass=ldapsubentry))')
vlvSrchEntry.setValues('vlvScope', '2')
> M2.add_s(vlvSrchEntry)

tickets/ticket47966_test.py:50:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:161: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89617630>
func = <built-in method result4 of LDAP object at 0x7fea8928d878>
args = (29, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.NO_SUCH_OBJECT: {'desc': 'No such object'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: NO_SUCH_OBJECT
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
ticket47966_test.py 26 INFO Testing Ticket 47966 - [VLV] slapd crashes during Dogtag clone reinstallation ticket47966_test.py 31 INFO 0. Create a VLV index on Master 2. backend.py 74 INFO List backend with suffix=dc=example,dc=com ticket47966_test.py 43 INFO 0-1. vlvSearch dn: cn=vlvSrch,cn=b'userRoot',cn=ldbm database,cn=plugins,cn=config
Failed tickets/ticket47988_test.py::test_ticket47988_init 4.21
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_init(topology_m2):
"""
It adds
- Objectclass with MAY 'member'
- an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
It deletes the anonymous aci

"""

_header(topology_m2, 'test_ticket47988_init')

# enable acl error logging
mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', ensure_bytes(str(8192)))] # REPL
topology_m2.ms["master1"].modify_s(DN_CONFIG, mod)
topology_m2.ms["master2"].modify_s(DN_CONFIG, mod)

mod = [(ldap.MOD_REPLACE, 'nsslapd-accesslog-level', ensure_bytes(str(260)))] # Internal op
topology_m2.ms["master1"].modify_s(DN_CONFIG, mod)
topology_m2.ms["master2"].modify_s(DN_CONFIG, mod)

# add dummy entries
for cpt in range(MAX_OTHERS):
name = "%s%d" % (OTHER_NAME, cpt)
topology_m2.ms["master1"].add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
'objectclass': "top person".split(),
'sn': name,
'cn': name})))

# check that entry 0 is replicated before
loop = 0
entryDN = "cn=%s0,%s" % (OTHER_NAME, SUFFIX)
while loop <= 10:
try:
ent = topology_m2.ms["master2"].getEntry(entryDN, ldap.SCOPE_BASE, "(objectclass=*)", ['telephonenumber'])
break
except ldap.NO_SUCH_OBJECT:
time.sleep(1)
loop += 1
assert (loop <= 10)

topology_m2.ms["master1"].stop(timeout=10)
topology_m2.ms["master2"].stop(timeout=10)

# install the specific schema M1: ipa3.3, M2: ipa4.1
schema_file = os.path.join(topology_m2.ms["master1"].getDir(__file__, DATA_DIR), "ticket47988/schema_ipa3.3.tar.gz")
_install_schema(topology_m2.ms["master1"], schema_file)
schema_file = os.path.join(topology_m2.ms["master1"].getDir(__file__, DATA_DIR), "ticket47988/schema_ipa4.1.tar.gz")
_install_schema(topology_m2.ms["master2"], schema_file)

> topology_m2.ms["master1"].start(timeout=10)

/export/tests/tickets/ticket47988_test.py:155:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:1204: in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

popenargs = (['/usr/bin/systemctl', 'start', 'dirsrv@master1'],), kwargs = {}
retcode = 1, cmd = ['/usr/bin/systemctl', 'start', 'dirsrv@master1']

def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.

The arguments are the same as for the call function. Example:

check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
> raise CalledProcessError(retcode, cmd)
E subprocess.CalledProcessError: Command '['/usr/bin/systemctl', 'start', 'dirsrv@master1']' returned non-zero exit status 1.

/usr/lib64/python3.6/subprocess.py:291: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stderr call -----------------------------
Job for dirsrv@master1.service failed because the control process exited with error code. See "systemctl status dirsrv@master1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_init ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ################################################### ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/02common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-admin.ldif ticket47988_test.py 96 INFO replace /etc/dirsrv/slapd-master1/schema/99user.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60nss-ldap.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60autofs.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-web.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60samba.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10dna-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc4523.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60basev2.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10automember-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc2927.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10mep-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60ipadns.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/10rfc2307.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-mail.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/05rfc4524.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60trust.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60ipaconfig.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-directory.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60eduperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60mozilla.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/65ipasudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60rfc3712.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60rfc2739.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-value.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60acctpolicy.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/01core389.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60sabayon.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60pam-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/00core.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/25java-object.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60sudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/70ipaotp.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60pureftpd.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/61kerberos-ipav3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60kerberos.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60basev3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/06inetorgperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/30ns-common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/28pilot.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/20subscriber.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/50ns-certificate.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master1/schema/60posix-winsync-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/02common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-admin.ldif ticket47988_test.py 96 INFO replace /etc/dirsrv/slapd-master2/schema/99user.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60nss-ldap.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60autofs.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-web.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60samba.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10dna-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc4523.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60basev2.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10automember-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc2927.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10mep-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60ipadns.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/10rfc2307.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-mail.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/05rfc4524.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60trust.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60ipaconfig.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-directory.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60eduperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60mozilla.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/65ipasudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60rfc3712.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60rfc2739.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-value.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60acctpolicy.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/01core389.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60sabayon.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60pam-plugin.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/00core.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/25java-object.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60sudo.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/70ipaotp.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60pureftpd.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/61kerberos-ipav3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60kerberos.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60basev3.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/06inetorgperson.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/30ns-common.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/28pilot.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/20subscriber.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/50ns-certificate.ldif ticket47988_test.py 100 INFO add /etc/dirsrv/slapd-master2/schema/60posix-winsync-plugin.ldif
Failed tickets/ticket47988_test.py::test_ticket47988_1 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_1(topology_m2):
'''
Check that replication is working and pause replication M2->M1
'''
_header(topology_m2, 'test_ticket47988_1')

topology_m2.ms["master1"].log.debug("\n\nCheck that replication is working and pause replication M2->M1\n")
> _do_update_entry(supplier=topology_m2.ms["master2"], consumer=topology_m2.ms["master1"], attempts=5)

/export/tests/tickets/ticket47988_test.py:232:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:182: in _do_update_entry
supplier.modify_s(entryDN, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea894faef0>
func = <built-in method result4 of LDAP object at 0x7fea89162d50>
args = (31, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_1 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_2 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_2(topology_m2):
'''
Update M1 schema and trigger update M1->M2
So M1 should learn new/extended definitions that are in M2 schema
'''
_header(topology_m2, 'test_ticket47988_2')

topology_m2.ms["master1"].log.debug("\n\nUpdate M1 schema and an entry on M1\n")
> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:244:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:539: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:846: in search_ext_s
return self.result(msgid,all=1,timeout=timeout)[1]
/usr/lib/python3.6/site-packages/lib389/__init__.py:133: in inner
objtype, data = f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:738: in result
resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:742: in result2
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89617668>
func = <built-in method result4 of LDAP object at 0x7fea89297cb0>
args = (67, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_2 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_3 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_3(topology_m2):
'''
Resume replication M2->M1 and check replication is still working
'''
_header(topology_m2, 'test_ticket47988_3')

> _resume_M2_to_M1(topology_m2)

/export/tests/tickets/ticket47988_test.py:281:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:220: in _resume_M2_to_M1
ents = topology_m2.ms["master2"].agreement.list(suffix=SUFFIX)
/usr/lib/python3.6/site-packages/lib389/agreement.py:851: in list
replica_entries = self.conn.replica.list(suffix)
/usr/lib/python3.6/site-packages/lib389/replica.py:168: in list
ents = self.conn.search_s(base, ldap.SCOPE_SUBTREE, filtr)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea894faef0>
func = <built-in method search_ext of LDAP object at 0x7fea89162d50>
args = ('cn=mapping tree,cn=config', 2, '(&(objectclass=nsds5Replica)(nsDS5ReplicaRoot=dc=example,dc=com))', None, 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_3 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ################################################### ticket47988_test.py 219 INFO ######################### resume RA M2->M1 ######################
Failed tickets/ticket47988_test.py::test_ticket47988_4 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_4(topology_m2):
'''
Check schemaCSN is identical on both server
And save the nsschemaCSN to later check they do not change unexpectedly
'''
_header(topology_m2, 'test_ticket47988_4')

> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:293:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:539: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89617668>
func = <built-in method search_ext of LDAP object at 0x7fea89297cb0>
args = ('cn=schema', 0, 'objectclass=*', ['nsSchemaCSN'], 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_4 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_5 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_5(topology_m2):
'''
Check schemaCSN do not change unexpectedly
'''
_header(topology_m2, 'test_ticket47988_5')

> _do_update_entry(supplier=topology_m2.ms["master1"], consumer=topology_m2.ms["master2"], attempts=5)

/export/tests/tickets/ticket47988_test.py:311:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket47988_test.py:182: in _do_update_entry
supplier.modify_s(entryDN, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89617668>
func = <built-in method modify_ext of LDAP object at 0x7fea89297cb0>
args = ('cn=other_entry0,dc=example,dc=com', [(2, 'telephonenumber', b'139')], None, None)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_5 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket47988_test.py::test_ticket47988_6 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea894f90b8>

def test_ticket47988_6(topology_m2):
'''
Update M1 schema and trigger update M2->M1
So M2 should learn new/extended definitions that are in M1 schema
'''

_header(topology_m2, 'test_ticket47988_6')

topology_m2.ms["master1"].log.debug("\n\nUpdate M1 schema and an entry on M1\n")
> master1_schema_csn = topology_m2.ms["master1"].schema.get_schema_csn()

/export/tests/tickets/ticket47988_test.py:334:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/schema.py:539: in get_schema_csn
"objectclass=*", ['nsSchemaCSN'])
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:852: in search_s
return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:845: in search_ext_s
msgid = self.search_ext(base,scope,filterstr,attrlist,attrsonly,serverctrls,clientctrls,timeout,sizelimit)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:841: in search_ext
timeout,sizelimit,
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89617668>
func = <built-in method search_ext of LDAP object at 0x7fea89297cb0>
args = ('cn=schema', 0, 'objectclass=*', ['nsSchemaCSN'], 0, None, ...)
kwargs = {}, diagnostic_message_success = None, exc_type = None
exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.SERVER_DOWN: {'desc': "Can't contact LDAP server"}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: SERVER_DOWN
------------------------------ Captured log call -------------------------------
ticket47988_test.py 62 INFO ############################################### ticket47988_test.py 63 INFO ####### ticket47988_test.py 64 INFO ####### test_ticket47988_6 ticket47988_test.py 65 INFO ####### ticket47988_test.py 66 INFO ###################################################
Failed tickets/ticket48194_test.py::test_init 4.57
topology_st = <lib389.topologies.TopologyMain object at 0x7fea89617668>

def test_init(topology_st):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
"""
_header(topology_st, 'Testing Ticket 48194 - harden the list of ciphers available by default')

nss_ssl = NssSsl(dbpath=topology_st.standalone.get_cert_dir())
nss_ssl.reinit()
nss_ssl.create_rsa_ca()
nss_ssl.create_rsa_key_and_cert()

log.info("\n######################### enable SSL in the directory server with all ciphers ######################\n")
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3', b'off'),
(ldap.MOD_REPLACE, 'nsTLS1', b'on'),
(ldap.MOD_REPLACE, 'nsSSLClientAuth', b'allowed'),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on'),
(ldap.MOD_REPLACE, 'nsSSL3Ciphers', b'+all')])

topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-security', b'on'),
(ldap.MOD_REPLACE, 'nsslapd-ssl-check-hostname', b'off'),
(ldap.MOD_REPLACE, 'nsslapd-secureport', ensure_bytes(LDAPSPORT))])

topology_st.standalone.add_s(Entry((RSA_DN, {'objectclass': "top nsEncryptionModule".split(),
'cn': RSA,
'nsSSLPersonalitySSL': SERVERCERT,
'nsSSLToken': 'internal (software)',
> 'nsSSLActivation': 'on'})))

/export/tests/tickets/ticket48194_test.py:72:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:161: in inner
return f(ent.dn, ent.toTupleList(), *args[2:])
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:428: in add_s
return self.add_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:163: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:414: in add_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea880b8b70>
func = <built-in method result4 of LDAP object at 0x7fea89278a58>
args = (6, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.ALREADY_EXISTS: {'desc': 'Already exists'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: ALREADY_EXISTS
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Testing Ticket 48194 - harden the list of ciphers available by default ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 56 INFO ######################### enable SSL in the directory server with all ciphers ######################
Failed tickets/ticket48194_test.py::test_run_0 4.57
topology_st = <lib389.topologies.TopologyMain object at 0x7fea89617668>

def test_run_0(topology_st):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
Note: allowWeakCipher: on
"""
_header(topology_st, 'Test Case 1 - Check the ciphers availability for "+all"; allowWeakCipher: on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', b'64')])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.restart(timeout=120)

> connectWithOpenssl(topology_st, 'DES-CBC3-SHA', True)

/export/tests/tickets/ticket48194_test.py:132:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea89617668>
cipher = 'DES-CBC3-SHA', expect = True

def connectWithOpenssl(topology_st, cipher, expect):
"""
Connect with the given cipher
Condition:
If expect is True, the handshake should be successful.
If expect is False, the handshake should be refused with
access log: "Cannot communicate securely with peer:
no common encryption algorithm(s)."
"""
log.info("Testing %s -- expect to handshake %s", cipher, "successfully" if expect else "failed")

myurl = 'localhost:%s' % LDAPSPORT
cmdline = ['/usr/bin/openssl', 's_client', '-connect', myurl, '-cipher', cipher]

strcmdline = '/usr/bin/openssl s_client -connect localhost:%s -cipher %s' % (LDAPSPORT, cipher)
log.info("Running cmdline: %s", strcmdline)

try:
proc = subprocess.Popen(cmdline, stdout=subprocess.PIPE, stdin=subprocess.PIPE, stderr=subprocess.STDOUT)
except ValueError:
log.info("%s failed: %s", cmdline, ValueError)
proc.kill()

while True:
l = proc.stdout.readline()
if l == b"":
break
if b'Cipher is' in l:
log.info("Found: %s", l)
if expect:
if b'(NONE)' in l:
> assert False
E assert False

/export/tests/tickets/ticket48194_test.py:106: AssertionError
------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Test Case 1 - Check the ciphers availability for "+all"; allowWeakCipher: on ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 129 INFO ######################### Restarting the server ###################### ticket48194_test.py 84 INFO Testing DES-CBC3-SHA -- expect to handshake successfully ticket48194_test.py 90 INFO Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA ticket48194_test.py 103 INFO Found: b'New, (NONE), Cipher is (NONE)\n'
Failed tickets/ticket48194_test.py::test_run_9 5.92
topology_st = <lib389.topologies.TopologyMain object at 0x7fea89617668>

def test_run_9(topology_st):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
allowWeakCipher: on
nsslapd-errorlog-level: 0
"""
_header(topology_st,
'Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on')

topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
topology_st.standalone.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3Ciphers', None),
(ldap.MOD_REPLACE, 'allowWeakCipher', b'on')])
topology_st.standalone.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', None)])

log.info("\n######################### Restarting the server ######################\n")
topology_st.standalone.stop(timeout=10)
os.system('mv %s %s.48194_8' % (topology_st.standalone.errlog, topology_st.standalone.errlog))
os.system('touch %s' % (topology_st.standalone.errlog))
time.sleep(2)
topology_st.standalone.start(timeout=120)

> connectWithOpenssl(topology_st, 'DES-CBC3-SHA', True)

/export/tests/tickets/ticket48194_test.py:321:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea89617668>
cipher = 'DES-CBC3-SHA', expect = True

def connectWithOpenssl(topology_st, cipher, expect):
"""
Connect with the given cipher
Condition:
If expect is True, the handshake should be successful.
If expect is False, the handshake should be refused with
access log: "Cannot communicate securely with peer:
no common encryption algorithm(s)."
"""
log.info("Testing %s -- expect to handshake %s", cipher, "successfully" if expect else "failed")

myurl = 'localhost:%s' % LDAPSPORT
cmdline = ['/usr/bin/openssl', 's_client', '-connect', myurl, '-cipher', cipher]

strcmdline = '/usr/bin/openssl s_client -connect localhost:%s -cipher %s' % (LDAPSPORT, cipher)
log.info("Running cmdline: %s", strcmdline)

try:
proc = subprocess.Popen(cmdline, stdout=subprocess.PIPE, stdin=subprocess.PIPE, stderr=subprocess.STDOUT)
except ValueError:
log.info("%s failed: %s", cmdline, ValueError)
proc.kill()

while True:
l = proc.stdout.readline()
if l == b"":
break
if b'Cipher is' in l:
log.info("Found: %s", l)
if expect:
if b'(NONE)' in l:
> assert False
E assert False

/export/tests/tickets/ticket48194_test.py:106: AssertionError
------------------------------ Captured log call -------------------------------
ticket48194_test.py 39 INFO ############################################### ticket48194_test.py 40 INFO ####### Test Case 10 - Check no nsSSL3Ciphers (default setting) with no errorlog-level & allowWeakCipher on ticket48194_test.py 41 INFO ############################################### ticket48194_test.py 314 INFO ######################### Restarting the server ###################### ticket48194_test.py 84 INFO Testing DES-CBC3-SHA -- expect to handshake successfully ticket48194_test.py 90 INFO Running cmdline: /usr/bin/openssl s_client -connect localhost:63601 -cipher DES-CBC3-SHA ticket48194_test.py 103 INFO Found: b'New, (NONE), Cipher is (NONE)\n'
Failed tickets/ticket48226_test.py::test_ticket48226_set_purgedelay 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7a1e1710>

def test_ticket48226_set_purgedelay(topology_m2):
args = {REPLICA_PURGE_DELAY: '5',
REPLICA_PURGE_INTERVAL: '5'}
try:
> topology_m2.ms["master1"].replica.setProperties(DEFAULT_SUFFIX, None, None, args)

/export/tests/tickets/ticket48226_test.py:25:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.replica.ReplicaLegacy object at 0x7fea896cb588>
suffix = 'dc=example,dc=com', replica_dn = None, replica_entry = None
properties = {'ReplicaPurgeDelay': '5', 'ReplicaTombstonePurgeInterval': '5'}

def setProperties(self, suffix=None, replica_dn=None, replica_entry=None,
properties=None):
'''
Set the properties of the replica. If an 'replica_entry' (Entry) is
provided, it updates the entry, else it updates the entry on the
server. If the 'replica_dn' is provided it retrieves the entry
using it, else it retrieve the replica using the 'suffix'.

@param suffix : suffix stored in that replica (online update)
@param replica_dn: DN of the replica (online update)
@param replica_entry: Entry of a replica (offline update)
@param properties: dictionary of properties
Supported properties are:
REPLICA_SUFFIX
REPLICA_ID
REPLICA_TYPE
REPLICA_BINDDN
REPLICA_PURGE_DELAY
REPLICA_PRECISE_PURGING
REPLICA_REFERRAL
REPLICA_FLAGS

@return None

@raise ValueError: if unknown properties
ValueError: if invalid replica_entry
ValueError: if replica_dn or suffix are not associated to
a replica

'''

# No properties provided
if len(properties) == 0:
return

# check that the given properties are valid
for prop in properties:
# skip the prefix to add/del value
if not inProperties(prop, REPLICA_PROPNAME_TO_ATTRNAME):
raise ValueError("unknown property: %s" % prop)
else:
self.log.debug("setProperties: %s:%s",
prop, properties[prop])

# At least we need to have suffix/replica_dn/replica_entry
if not suffix and not replica_dn and not replica_entry:
raise InvalidArgumentError("suffix and replica_dn and replica_" +
"entry are missing")

# the caller provides a set of properties to set into a replica entry
if replica_entry:
if not isinstance(replica_entry, Entry):
raise ValueError("invalid instance of the replica_entry")

# that is fine, now set the values
for prop in properties:
val = rawProperty(prop)

# for Entry update it is a replace
replica_entry.update({REPLICA_PROPNAME_TO_ATTRNAME[val]:
properties[prop]})

return

# If it provides the suffix or the replicaDN, replica.list will
# return the appropriate entry
ents = self.conn.replica.list(suffix=suffix, replica_dn=replica_dn)
if len(ents) != 1:
if replica_dn:
raise ValueError("invalid replica DN: %s" % replica_dn)
else:
raise ValueError("invalid suffix: %s" % suffix)

# build the MODS
mods = []
for prop in properties:
# take the operation type from the property name
val = rawProperty(prop)
if str(prop).startswith('+'):
op = ldap.MOD_ADD
elif str(prop).startswith('-'):
op = ldap.MOD_DELETE
else:
op = ldap.MOD_REPLACE

mods.append((op, REPLICA_PROPNAME_TO_ATTRNAME[val],
properties[prop]))

# that is fine now to apply the MOD
> self.conn.modify_s(ents[0].dn, mods)

/usr/lib/python3.6/site-packages/lib389/replica.py:260:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')])
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896fed68>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]

def modify_s(self,dn,modlist):
> return self.modify_ext_s(dn,modlist,None,None)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896fed68>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]
serverctrls = None, clientctrls = None

def modify_ext_s(self,dn,modlist,serverctrls=None,clientctrls=None):
> msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896fed68>
dn = 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config'
modlist = [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')]
serverctrls = None, clientctrls = None

def modify_ext(self,dn,modlist,serverctrls=None,clientctrls=None):
"""
modify_ext(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> int
"""
if PY2:
dn = self._bytesify_input('dn', dn)
modlist = self._bytesify_modlist('modlist', modlist, with_opcode=True)
> return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

args = (<built-in method modify_ext of LDAP object at 0x7fea891565d0>, 'cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}

def inner(*args, **kwargs):
if name == 'result':
objtype, data = f(*args, **kwargs)
# data is either a 2-tuple or a list of 2-tuples
# print data
if data:
if isinstance(data, tuple):
return objtype, Entry(data)
elif isinstance(data, list):
# AD sends back these search references
# if objtype == ldap.RES_SEARCH_RESULT and \
# isinstance(data[-1],tuple) and \
# not data[-1][0]:
# print "Received search reference: "
# pprint.pprint(data[-1][1])
# data.pop() # remove the last non-entry element

return objtype, [Entry(x) for x in data]
else:
raise TypeError("unknown data type %s returned by result" %
type(data))
else:
return objtype, data
elif name.startswith('add'):
# the first arg is self
# the second and third arg are the dn and the data to send
# We need to convert the Entry into the format used by
# python-ldap
ent = args[0]
if isinstance(ent, Entry):
return f(ent.dn, ent.toTupleList(), *args[2:])
else:
return f(*args, **kwargs)
else:
> return f(*args, **kwargs)

/usr/lib/python3.6/site-packages/lib389/__init__.py:165:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896fed68>
func = <built-in method modify_ext of LDAP object at 0x7fea891565d0>
args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsds5ReplicaPurgeDelay', '5'), (2, 'nsds5ReplicaTombstonePurgeInterval', '5')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '5')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError

During handling of the above exception, another exception occurred:

topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7a1e1710>

def test_ticket48226_set_purgedelay(topology_m2):
args = {REPLICA_PURGE_DELAY: '5',
REPLICA_PURGE_INTERVAL: '5'}
try:
topology_m2.ms["master1"].replica.setProperties(DEFAULT_SUFFIX, None, None, args)
except:
log.fatal('Failed to configure replica')
> assert False
E assert False

/export/tests/tickets/ticket48226_test.py:28: AssertionError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
ticket48226_test.py 27 CRITICAL Failed to configure replica
Failed tickets/ticket48226_test.py::test_ticket48226_1 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7a1e1710>

def test_ticket48226_1(topology_m2):
name = 'test_entry'
dn = "cn=%s,%s" % (name, SUFFIX)

topology_m2.ms["master1"].add_s(Entry((dn, {'objectclass': "top person".split(),
'sn': name,
'cn': name})))

# First do an update that is replicated
mods = [(ldap.MOD_ADD, 'description', '5')]
> topology_m2.ms["master1"].modify_s(dn, mods)

/export/tests/tickets/ticket48226_test.py:50:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea896fed68>
func = <built-in method modify_ext of LDAP object at 0x7fea891565d0>
args = ('cn=test_entry,dc=example,dc=com', [(0, 'description', '5')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '5')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48252_test.py::test_ticket48252_run_0 8.10
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7ad785f8>

def test_ticket48252_run_0(topology_st):
"""
Delete an entry cn=test_entry0
Check it is not in the 'cn' index file
"""
log.info("Case 1 - Check deleted entry is not in the 'cn' index file")
uas = UserAccounts(topology_st.standalone, DEFAULT_SUFFIX)
del_rdn = "uid=%s0" % TEST_USER
del_entry = uas.get('%s0' % TEST_USER)
log.info(" Deleting a test entry %s..." % del_entry)
del_entry.delete()

> assert in_index_file(topology_st, 0, 'cn') is False

/export/tests/tickets/ticket48252_test.py:78:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea7ad785f8>, id = 0
index = 'cn'

def in_index_file(topology_st, id, index):
key = "%s%s" % (TEST_USER, id)
log.info(" dbscan - checking %s is in index file %s..." % (key, index))
dbscanOut = topology_st.standalone.dbscan(DEFAULT_BENAME, index)

> if key in dbscanOut:
E TypeError: a bytes-like object is required, not 'str'

/export/tests/tickets/ticket48252_test.py:56: TypeError
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log call -------------------------------
__init__.py 3082 INFO Running script: ['/usr/bin/dbscan', '-f', '/var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db']
Failed tickets/ticket48252_test.py::test_ticket48252_run_1 0.02
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7ad785f8>

def test_ticket48252_run_1(topology_st):
"""
Delete an entry cn=test_entry1
Check it is in the 'objectclass' index file as a tombstone entry
"""
log.info("Case 2 - Check deleted entry is in the 'objectclass' index file as a tombstone entry")
uas = UserAccounts(topology_st.standalone, DEFAULT_SUFFIX)
del_rdn = "uid=%s1" % TEST_USER
del_entry = uas.get('%s1' % TEST_USER)
log.info(" Deleting a test entry %s..." % del_rdn)
del_entry.delete()

entry = topology_st.standalone.search_s(SUFFIX, ldap.SCOPE_SUBTREE, '(&(objectclass=nstombstone)(%s))' % del_rdn)
assert len(entry) == 1
log.info(" entry %s is in the objectclass index file." % del_rdn)

log.info(" db2index - reindexing %s ..." % 'objectclass')
> assert topology_st.standalone.db2index(DEFAULT_BENAME, 'objectclass')
E AssertionError: assert False
E + where False = <bound method DirSrv.db2index of <lib389.DirSrv object at 0x7fea7a1d73c8>>('userRoot', 'objectclass')
E + where <bound method DirSrv.db2index of <lib389.DirSrv object at 0x7fea7a1d73c8>> = <lib389.DirSrv object at 0x7fea7a1d73c8>.db2index
E + where <lib389.DirSrv object at 0x7fea7a1d73c8> = <lib389.topologies.TopologyMain object at 0x7fea7ad785f8>.standalone

/export/tests/tickets/ticket48252_test.py:105: AssertionError
------------------------------ Captured log call -------------------------------
__init__.py 2956 ERROR db2index: Can not operate while directory server is running
Failed tickets/ticket48266_test.py::test_ticket48266_fractional 0.02
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7ab8af60>
entries = None

def test_ticket48266_fractional(topology_m2, entries):
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1

mod = [(ldap.MOD_REPLACE, 'nsDS5ReplicatedAttributeList', ['(objectclass=*) $ EXCLUDE telephonenumber']),
(ldap.MOD_REPLACE, 'nsds5ReplicaStripAttrs', ['modifiersname modifytimestamp'])]
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
m1_m2_agmt = ents[0].dn
> topology_m2.ms["master1"].modify_s(ents[0].dn, mod)

/export/tests/tickets/ticket48266_test.py:44:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7a1cacf8>
func = <built-in method modify_ext of LDAP object at 0x7fea7a1efaf8>
args = ('cn=002,cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsDS5ReplicatedAttributeList', ['(...ctclass=*) $ EXCLUDE telephonenumber']), (2, 'nsds5ReplicaStripAttrs', ['modifiersname modifytimestamp'])], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '(objectclass=*) $ EXCLUDE telephonenumber')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket48266_test.py::test_ticket48266_check_repl_desc 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7ab8af60>
entries = None

def test_ticket48266_check_repl_desc(topology_m2, entries):
name = "cn=%s1,%s" % (NEW_ACCOUNT, SUFFIX)
value = 'check repl. description'
mod = [(ldap.MOD_REPLACE, 'description', value)]
> topology_m2.ms["master1"].modify_s(name, mod)

/export/tests/tickets/ticket48266_test.py:61:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7a1cacf8>
func = <built-in method modify_ext of LDAP object at 0x7fea7a1efaf8>
args = ('cn=new_account1,dc=example,dc=com', [(2, 'description', 'check repl. description')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'c')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48266_test.py::test_ticket48266_count_csn_evaluation 0.01
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7ab8af60>
entries = None

def test_ticket48266_count_csn_evaluation(topology_m2, entries):
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
> first_csn = _get_first_not_replicated_csn(topology_m2)

/export/tests/tickets/ticket48266_test.py:172:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket48266_test.py:116: in _get_first_not_replicated_csn
topology_m2.ms["master1"].modify_s(name, mod)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7a1cacf8>
func = <built-in method modify_ext of LDAP object at 0x7fea7a1efaf8>
args = ('cn=new_account2,dc=example,dc=com', [(2, 'telephonenumber', '123456')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '1')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
Failed tickets/ticket48325_test.py::test_ticket48325 0.00
topology_m1h1c1 = <lib389.topologies.TopologyMain object at 0x7fea7aa8ec18>

def test_ticket48325(topology_m1h1c1):
"""
Test that the RUV element order is correctly maintained when promoting
a hub or consumer.
"""

#
# Promote consumer to master
#
try:
> topology_m1h1c1.cs["consumer1"].changelog.create()

/export/tests/tickets/ticket48325_test.py:46:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7a1ec4e0>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 471 INFO Creating replication topology. replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39101 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working replica.py 1627 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39201 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created replica.py 1684 INFO SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working
Failed tickets/ticket48759_test.py::test_ticket48759 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7ad10710>

def test_ticket48759(topology_st):
"""
The fix for ticket 48759 has to prevent plugin calls for tombstone purging

The test uses the memberof and retrocl plugins to verify this.
In tombstone purging without the fix the mmeberof plugin is called,
if the tombstone entry is a group,
it modifies the user entries for the group
and if retrocl is enabled this mod is written to the retrocl

The test sequence is:
- enable replication
- enable memberof and retro cl plugin
- add user entries
- add a group and add the users as members
- verify memberof is set to users
- delete the group
- verify memberof is removed from users
- add group again
- verify memberof is set to users
- get number of changes in retro cl for one user
- configure tombstone purging
- wait for purge interval to pass
- add a dummy entry to increase maxcsn
- wait for purge interval to pass two times
- get number of changes in retro cl for user again
- assert there was no additional change
"""

log.info('Testing Ticket 48759 - no plugin calls for tombstone purging')

#
# Setup Replication
#
log.info('Setting up replication...')
topology_st.standalone.replica.enableReplication(suffix=DEFAULT_SUFFIX, role=ReplicaRole.MASTER,
> replicaId=REPLICAID_MASTER_1)

/export/tests/tickets/ticket48759_test.py:109:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/replica.py:556: in enableReplication
self.conn.changelog.create()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7abbcdd8>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
backend.py 74 INFO List backend with suffix=dc=example,dc=com
Failed tickets/ticket48906_test.py::test_ticket48906_setup 0.11
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>

def test_ticket48906_setup(topology_st):
"""
Check there is no core
Create a second backend
stop DS (that should trigger the core)
check there is no core
"""
log.info('Testing Ticket 48906 - ns-slapd crashes during the shutdown after adding attribute with a matching rule')

# bind as directory manager
topology_st.standalone.log.info("Bind as %s" % DN_DM)
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)

# check there is no core
entry = topology_st.standalone.search_s(CONFIG_DN, ldap.SCOPE_BASE, "(cn=config)", ['nsslapd-workingdir'])
assert entry
assert entry[0]
assert entry[0].hasAttr('nsslapd-workingdir')
path = entry[0].getValue('nsslapd-workingdir')
> cores = fnmatch.filter(os.listdir(path), 'core.*')

/export/tests/tickets/ticket48906_test.py:70:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

names = [b'access', b'errors.rotationinfo', b'errors', b'access.rotationinfo', b'audit.rotationinfo', b'audit']
pat = 'core.*'

def filter(names, pat):
"""Return the subset of the list NAMES that match PAT."""
result = []
pat = os.path.normcase(pat)
match = _compile_pattern(pat)
if os.path is posixpath:
# normcase on posix is NOP. Optimize it away from the loop.
for name in names:
> if match(name):
E TypeError: cannot use a string pattern on a bytes-like object

/usr/lib64/python3.6/fnmatch.py:56: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
ticket48906_test.py 61 INFO Bind as cn=Directory Manager
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_default 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>

def test_ticket48906_dblock_default(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that before any change config/monitor')
topology_st.standalone.log.info('### contains the default value')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')
> _check_monitored_value(topology_st, DBLOCK_DEFAULT)

/export/tests/tickets/ticket48906_test.py:153:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>
expected_value = '10000'

def _check_monitored_value(topology_st, expected_value):
entries = topology_st.standalone.search_s(ldbm_monitor, ldap.SCOPE_BASE, '(objectclass=*)')
> assert (entries[0].hasValue(DBLOCK_ATTR_MONITOR) and entries[0].getValue(DBLOCK_ATTR_MONITOR) == expected_value)
E AssertionError: assert (True and b'10000' == '10000')
E + where True = <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.hasValue
E + and b'10000' = <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.getValue

/export/tests/tickets/ticket48906_test.py:103: AssertionError
------------------------------ Captured log call -------------------------------
ticket48906_test.py 147 INFO ################################### ticket48906_test.py 148 INFO ### ticket48906_test.py 149 INFO ### Check that before any change config/monitor ticket48906_test.py 150 INFO ### contains the default value ticket48906_test.py 151 INFO ### ticket48906_test.py 152 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_ldap_update 0.00
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>

def test_ticket48906_dblock_ldap_update(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that after ldap update')
topology_st.standalone.log.info('### - monitor contains DEFAULT')
topology_st.standalone.log.info('### - configured contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - After stop dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - After stop guardian contains DEFAULT')
topology_st.standalone.log.info('### In fact guardian should differ from config to recreate the env')
topology_st.standalone.log.info('### Check that after restart (DBenv recreated)')
topology_st.standalone.log.info('### - monitor contains DBLOCK_LDAP_UPDATE ')
topology_st.standalone.log.info('### - configured contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

> topology_st.standalone.modify_s(ldbm_config, [(ldap.MOD_REPLACE, DBLOCK_ATTR_CONFIG, DBLOCK_LDAP_UPDATE)])

/export/tests/tickets/ticket48906_test.py:173:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7ad13898>
func = <built-in method modify_ext of LDAP object at 0x7fea8934e2d8>
args = ('cn=config,cn=ldbm database,cn=plugins,cn=config', [(2, 'nsslapd-db-locks', '20000')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '2')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
------------------------------ Captured log call -------------------------------
ticket48906_test.py 158 INFO ################################### ticket48906_test.py 159 INFO ### ticket48906_test.py 160 INFO ### Check that after ldap update ticket48906_test.py 161 INFO ### - monitor contains DEFAULT ticket48906_test.py 162 INFO ### - configured contains DBLOCK_LDAP_UPDATE ticket48906_test.py 163 INFO ### - After stop dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 164 INFO ### - After stop guardian contains DEFAULT ticket48906_test.py 165 INFO ### In fact guardian should differ from config to recreate the env ticket48906_test.py 166 INFO ### Check that after restart (DBenv recreated) ticket48906_test.py 167 INFO ### - monitor contains DBLOCK_LDAP_UPDATE ticket48906_test.py 168 INFO ### - configured contains DBLOCK_LDAP_UPDATE ticket48906_test.py 169 INFO ### - dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 170 INFO ### ticket48906_test.py 171 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_edit_update 1.56
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>

def test_ticket48906_dblock_edit_update(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that after stop')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### - guardian contains DBLOCK_LDAP_UPDATE')
topology_st.standalone.log.info('### Check that edit dse+restart')
topology_st.standalone.log.info('### - monitor contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### - configured contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### Check that after stop')
topology_st.standalone.log.info('### - dse.ldif contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('### - guardian contains DBLOCK_EDIT_UPDATE')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

topology_st.standalone.stop(timeout=10)
> _check_dse_ldif_value(topology_st, attr=DBLOCK_ATTR_CONFIG, expected_value=DBLOCK_LDAP_UPDATE)

/export/tests/tickets/ticket48906_test.py:204:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>
attr = 'nsslapd-db-locks', expected_value = '20000'

def _check_dse_ldif_value(topology_st, attr=DBLOCK_ATTR_CONFIG, expected_value=DBLOCK_LDAP_UPDATE):
dse_ref_ldif = topology_st.standalone.confdir + '/dse.ldif'
dse_ref = open(dse_ref_ldif, "r")

# Check the DBLOCK in dse.ldif
value = None
while True:
line = dse_ref.readline()
if (line == ''):
break
elif attr in line.lower():
value = line.split()[1]
> assert (value == expected_value)
E AssertionError: assert '10000' == '20000'
E - 10000
E ? ^
E + 20000
E ? ^

/export/tests/tickets/ticket48906_test.py:118: AssertionError
------------------------------ Captured log call -------------------------------
ticket48906_test.py 189 INFO ################################### ticket48906_test.py 190 INFO ### ticket48906_test.py 191 INFO ### Check that after stop ticket48906_test.py 192 INFO ### - dse.ldif contains DBLOCK_LDAP_UPDATE ticket48906_test.py 193 INFO ### - guardian contains DBLOCK_LDAP_UPDATE ticket48906_test.py 194 INFO ### Check that edit dse+restart ticket48906_test.py 195 INFO ### - monitor contains DBLOCK_EDIT_UPDATE ticket48906_test.py 196 INFO ### - configured contains DBLOCK_EDIT_UPDATE ticket48906_test.py 197 INFO ### Check that after stop ticket48906_test.py 198 INFO ### - dse.ldif contains DBLOCK_EDIT_UPDATE ticket48906_test.py 199 INFO ### - guardian contains DBLOCK_EDIT_UPDATE ticket48906_test.py 200 INFO ### ticket48906_test.py 201 INFO ###################################
Failed tickets/ticket48906_test.py::test_ticket48906_dblock_robust 1.19
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>

def test_ticket48906_dblock_robust(topology_st):
topology_st.standalone.log.info('###################################')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('### Check that the following values are rejected')
topology_st.standalone.log.info('### - negative value')
topology_st.standalone.log.info('### - insuffisant value')
topology_st.standalone.log.info('### - invalid value')
topology_st.standalone.log.info('### Check that minimum value is accepted')
topology_st.standalone.log.info('###')
topology_st.standalone.log.info('###################################')

topology_st.standalone.start(timeout=10)
> _check_monitored_value(topology_st, DBLOCK_EDIT_UPDATE)

/export/tests/tickets/ticket48906_test.py:254:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topology_st = <lib389.topologies.TopologyMain object at 0x7fea7a91b6d8>
expected_value = '40000'

def _check_monitored_value(topology_st, expected_value):
entries = topology_st.standalone.search_s(ldbm_monitor, ldap.SCOPE_BASE, '(objectclass=*)')
> assert (entries[0].hasValue(DBLOCK_ATTR_MONITOR) and entries[0].getValue(DBLOCK_ATTR_MONITOR) == expected_value)
E AssertionError: assert (True and b'10000' == '40000')
E + where True = <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.hasValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.hasValue
E + and b'10000' = <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n>('nsslapd-db-configured-locks')
E + where <bound method Entry.getValue of dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-...rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n> = dn: cn=database,cn=monitor,cn=ldbm database,cn=plugins,cn=config\ncn: database\nnsslapd-db-abort-rate: 0\nnsslapd-db-acti...-rate: 0\nnsslapd-db-pages-in-use: 8\nnsslapd-db-txn-region-wait-rate: 0\nobjectClass: top\nobjectClass: extensibleObject\n\n.getValue

/export/tests/tickets/ticket48906_test.py:103: AssertionError
------------------------------ Captured log call -------------------------------
ticket48906_test.py 243 INFO ################################### ticket48906_test.py 244 INFO ### ticket48906_test.py 245 INFO ### Check that the following values are rejected ticket48906_test.py 246 INFO ### - negative value ticket48906_test.py 247 INFO ### - insuffisant value ticket48906_test.py 248 INFO ### - invalid value ticket48906_test.py 249 INFO ### Check that minimum value is accepted ticket48906_test.py 250 INFO ### ticket48906_test.py 251 INFO ###################################
Failed tickets/ticket48961_test.py::test_ticket48961_storagescheme 0.01
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7abbf390>

def test_ticket48961_storagescheme(topology_st):
"""
Test deleting of the storage scheme.
"""

default = topology_st.standalone.config.get_attr_val('passwordStorageScheme')
# Change it
topology_st.standalone.config.set('passwordStorageScheme', 'CLEAR')
# Now delete it
> topology_st.standalone.config.remove('passwordStorageScheme', None)

/export/tests/tickets/ticket48961_test.py:27:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:286: in remove
self.set(key, value, action=ldap.MOD_DELETE)
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:356: in set
serverctrls=self._server_controls, clientctrls=self._client_controls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7ad68358>
func = <built-in method result4 of LDAP object at 0x7fea7ad4b8a0>
args = (4, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.OPERATIONS_ERROR: {'desc': 'Operations error', 'info': 'passwordStorageScheme: deleting the value is not allowed.'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: OPERATIONS_ERROR
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Failed tickets/ticket48961_test.py::test_ticket48961_deleteall 3.11
topology_st = <lib389.topologies.TopologyMain object at 0x7fea7abbf390>

def test_ticket48961_deleteall(topology_st):
"""
Test that we can delete all valid attrs, and that a few are rejected.
"""
attr_to_test = {
'nsslapd-listenhost': 'localhost',
'nsslapd-securelistenhost': 'localhost',
'nsslapd-allowed-sasl-mechanisms': 'GSSAPI',
'nsslapd-svrtab': 'Some bogus data', # This one could reset?
}
attr_to_fail = {
# These are the values that should always be dn dse.ldif too
'nsslapd-localuser': 'dirsrv',
'nsslapd-defaultnamingcontext': 'dc=example,dc=com', # Can't delete
'nsslapd-accesslog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/access',
'nsslapd-auditlog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/audit',
'nsslapd-errorlog': '/opt/dirsrv/var/log/dirsrv/slapd-standalone/errors',
'nsslapd-tmpdir': '/tmp',
'nsslapd-rundir': '/opt/dirsrv/var/run/dirsrv',
'nsslapd-bakdir': '/opt/dirsrv/var/lib/dirsrv/slapd-standalone/bak',
'nsslapd-certdir': '/opt/dirsrv/etc/dirsrv/slapd-standalone',
'nsslapd-instancedir': '/opt/dirsrv/lib/dirsrv/slapd-standalone',
'nsslapd-ldifdir': '/opt/dirsrv/var/lib/dirsrv/slapd-standalone/ldif',
'nsslapd-lockdir': '/opt/dirsrv/var/lock/dirsrv/slapd-standalone',
'nsslapd-schemadir': '/opt/dirsrv/etc/dirsrv/slapd-standalone/schema',
'nsslapd-workingdir': '/opt/dirsrv/var/log/dirsrv/slapd-standalone',
'nsslapd-localhost': 'localhost.localdomain',
# These can't be reset, but might be in dse.ldif. Probably in libglobs.
'nsslapd-certmap-basedn': 'cn=certmap,cn=config',
'nsslapd-port': '38931', # Can't delete
'nsslapd-secureport': '636', # Can't delete
'nsslapd-conntablesize': '1048576',
'nsslapd-rootpw': '{SSHA512}...',
# These are hardcoded server magic.
'nsslapd-hash-filters': 'off', # Can't delete
'nsslapd-requiresrestart': 'cn=config:nsslapd-port', # Can't change
'nsslapd-plugin': 'cn=case ignore string syntax,cn=plugins,cn=config', # Can't change
'nsslapd-privatenamespaces': 'cn=schema', # Can't change
'nsslapd-allowed-to-delete-attrs': 'None', # Can't delete
'nsslapd-accesslog-list': 'List!', # Can't delete
'nsslapd-auditfaillog-list': 'List!',
'nsslapd-auditlog-list': 'List!',
'nsslapd-errorlog-list': 'List!',
'nsslapd-config': 'cn=config',
'nsslapd-versionstring': '389-Directory/1.3.6.0',
'objectclass': '',
'cn': '',
# These are the odd values
'nsslapd-backendconfig': 'cn=config,cn=userRoot,cn=ldbm database,cn=plugins,cn=config', # Doesn't exist?
'nsslapd-betype': 'ldbm database', # Doesn't exist?
'nsslapd-connection-buffer': 1, # Has an ldap problem
'nsslapd-malloc-mmap-threshold': '-10', # Defunct anyway
'nsslapd-malloc-mxfast': '-10',
'nsslapd-malloc-trim-threshold': '-10',
'nsslapd-referralmode': '',
'nsslapd-saslpath': '',
'passwordadmindn': '',
}

config_entry = topology_st.standalone.config.raw_entry()

for attr in config_entry.getAttrs():
if attr.lower() in attr_to_fail:
# We know this will fail, so skip
pass
else:
log.info("Reseting %s" % (attr))
# Check if we have to do some override of this attr.
# Some attributes need specific syntax, so we override just these.
newval = topology_st.standalone.config.get_attr_vals(attr)
log.info(" --> %s" % newval)
if attr.lower() in attr_to_test:
newval = attr_to_test[attr]
log.info("override --> %s" % newval)
# We need to set the attr to its own value
# so that it's "written".
> topology_st.standalone.config.set(attr, newval)

/export/tests/tickets/ticket48961_test.py:117:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/_mapped_object.py:356: in set
serverctrls=self._server_controls, clientctrls=self._client_controls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:602: in modify_ext_s
resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all=1,timeout=self.timeout)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:749: in result3
resp_ctrl_classes=resp_ctrl_classes
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:756: in result4
ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:329: in _ldap_call
reraise(exc_type, exc_value, exc_traceback)
/usr/lib64/python3.6/site-packages/ldap/compat.py:44: in reraise
raise exc_value
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7ad68358>
func = <built-in method result4 of LDAP object at 0x7fea7ad4b8a0>
args = (215, 1, -1, 0, 0, 0), kwargs = {}, diagnostic_message_success = None
exc_type = None, exc_value = None, exc_traceback = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E ldap.OPERATIONS_ERROR: {'desc': 'Operations error', 'info': 'password dictionary path "" is invalid.'}

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: OPERATIONS_ERROR
------------------------------ Captured log call -------------------------------
ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-maxlogsperdir ticket48961_test.py 111 INFO --> [b'10'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-maxlogsperdir to b'10' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-level ticket48961_test.py 111 INFO --> [b'16384'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-level to b'16384' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logging-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logging-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-mode ticket48961_test.py 111 INFO --> [b'600'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-mode to b'600' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logging-enabled ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logging-enabled to b'on' ticket48961_test.py 107 INFO Reseting nsslapd-maxthreadsperconn ticket48961_test.py 111 INFO --> [b'5'] ticket48961_test.py 38 INFO Reset nsslapd-maxthreadsperconn to b'5' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logexpirationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logexpirationtime to b'1' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting passwordInHistory ticket48961_test.py 111 INFO --> [b'6'] ticket48961_test.py 38 INFO Reset passwordInHistory to b'6' ticket48961_test.py 107 INFO Reseting passwordUnlock ticket48961_test.py 111 INFO --> [b'on'] ticket48961_test.py 38 INFO Reset passwordUnlock to b'on' ticket48961_test.py 107 INFO Reseting passwordGraceLimit ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordGraceLimit to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsync-enabled ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsync-enabled to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsynchour ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsynchour to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationsyncmin ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationsyncmin to b'0' ticket48961_test.py 107 INFO Reseting nsslapd-accesslog-logrotationtime ticket48961_test.py 111 INFO --> [b'1'] ticket48961_test.py 38 INFO Reset nsslapd-accesslog-logrotationtime to b'1' ticket48961_test.py 107 INFO Reseting passwordMustChange ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordMustChange to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-pwpolicy-local ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-pwpolicy-local to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-pwpolicy-inherit-global ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-pwpolicy-inherit-global to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-logmaxdiskspace to b'100' ticket48961_test.py 107 INFO Reseting nsslapd-sizelimit ticket48961_test.py 111 INFO --> [b'2000'] ticket48961_test.py 38 INFO Reset nsslapd-sizelimit to b'2000' ticket48961_test.py 107 INFO Reseting nsslapd-auditlog-maxlogsize ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-auditlog-maxlogsize to b'100' ticket48961_test.py 107 INFO Reseting passwordWarning ticket48961_test.py 111 INFO --> [b'86400'] ticket48961_test.py 38 INFO Reset passwordWarning to b'86400' ticket48961_test.py 107 INFO Reseting nsslapd-readonly ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-readonly to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-sasl-mapping-fallback ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-sasl-mapping-fallback to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-threadnumber ticket48961_test.py 111 INFO --> [b'24'] ticket48961_test.py 38 INFO Reset nsslapd-threadnumber to b'24' ticket48961_test.py 107 INFO Reseting passwordLockout ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordLockout to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-enquote-sup-oc ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset nsslapd-enquote-sup-oc to b'off' ticket48961_test.py 107 INFO Reseting nsslapd-ioblocktimeout ticket48961_test.py 111 INFO --> [b'300000'] ticket48961_test.py 38 INFO Reset nsslapd-ioblocktimeout to b'300000' ticket48961_test.py 107 INFO Reseting nsslapd-max-filter-nest-level ticket48961_test.py 111 INFO --> [b'40'] ticket48961_test.py 38 INFO Reset nsslapd-max-filter-nest-level to b'40' ticket48961_test.py 107 INFO Reseting nsslapd-errorlog-logmaxdiskspace ticket48961_test.py 111 INFO --> [b'100'] ticket48961_test.py 38 INFO Reset nsslapd-errorlog-logmaxdiskspace to b'100' ticket48961_test.py 107 INFO Reseting passwordMinLength ticket48961_test.py 111 INFO --> [b'8'] ticket48961_test.py 38 INFO Reset passwordMinLength to b'8' ticket48961_test.py 107 INFO Reseting passwordMinDigits ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinDigits to b'0' ticket48961_test.py 107 INFO Reseting passwordMinAlphas ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinAlphas to b'0' ticket48961_test.py 107 INFO Reseting passwordMinUppers ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinUppers to b'0' ticket48961_test.py 107 INFO Reseting passwordMinLowers ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinLowers to b'0' ticket48961_test.py 107 INFO Reseting passwordMinSpecials ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMinSpecials to b'0' ticket48961_test.py 107 INFO Reseting passwordMin8bit ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMin8bit to b'0' ticket48961_test.py 107 INFO Reseting passwordMaxRepeats ticket48961_test.py 111 INFO --> [b'0'] ticket48961_test.py 38 INFO Reset passwordMaxRepeats to b'0' ticket48961_test.py 107 INFO Reseting passwordMinCategories ticket48961_test.py 111 INFO --> [b'3'] ticket48961_test.py 38 INFO Reset passwordMinCategories to b'3' ticket48961_test.py 107 INFO Reseting passwordMinTokenLength ticket48961_test.py 111 INFO --> [b'3'] ticket48961_test.py 38 INFO Reset passwordMinTokenLength to b'3' ticket48961_test.py 107 INFO Reseting passwordPalindrome ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordPalindrome to b'off' ticket48961_test.py 107 INFO Reseting passwordDictCheck ticket48961_test.py 111 INFO --> [b'off'] ticket48961_test.py 38 INFO Reset passwordDictCheck to b'off' ticket48961_test.py 107 INFO Reseting passwordDictPath ticket48961_test.py 111 INFO --> [b'']
Failed tickets/ticket49020_test.py::test_ticket49020 15.30
T = <lib389.topologies.TopologyMain object at 0x7fea7abbf390>

def test_ticket49020(T):
A = T.ms['master1']
B = T.ms['master2']
C = T.ms['master3']

A.enableReplLogging()
B.enableReplLogging()
C.enableReplLogging()

AtoB = A.agreement.list(suffix=DEFAULT_SUFFIX)[0].dn
AtoC = A.agreement.list(suffix=DEFAULT_SUFFIX)[1].dn
CtoB = C.agreement.list(suffix=DEFAULT_SUFFIX)[1].dn

A.agreement.pause(AtoB)
C.agreement.pause(CtoB)
time.sleep(5)
name = "userX"
dn = "cn={},{}".format(name, DEFAULT_SUFFIX)
A.add_s(Entry((dn, {'objectclass': "top person".split(),
'sn': name,'cn': name})))

> A.agreement.init(DEFAULT_SUFFIX, HOST_MASTER_3, PORT_MASTER_3)

/export/tests/tickets/ticket49020_test.py:45:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/agreement.py:1103: in init
filt)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7abf8cc0>
args = ('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', 1, '(&(objectclass=nsds5replicationagreement)(nsds5replicahost=localhost)(nsds5replicaport=39003)(nsds5replicaroot=dc=example,dc=com))')
kwargs = {}, res = 100, restype = 101, obj = []

def getEntry(self, *args, **kwargs):
"""Wrapper around SimpleLDAPObject.search. It is common to just get
one entry.
@param - entry dn
@param - search scope, in ldap.SCOPE_BASE (default),
ldap.SCOPE_SUB, ldap.SCOPE_ONE
@param filterstr - filterstr, default '(objectClass=*)' from
SimpleLDAPObject
@param attrlist - list of attributes to retrieve. eg ['cn', 'uid']
@oaram attrsonly - default None from SimpleLDAPObject
eg. getEntry(dn, scope, filter, attributes)

XXX This cannot return None
"""
if self.verbose:
self.log.debug("Retrieving entry with %r", [args])
if len(args) == 1 and 'scope' not in kwargs:
args += (ldap.SCOPE_BASE, )

res = self.search(*args, **kwargs)
restype, obj = self.result(res)
# TODO: why not test restype?
if not obj:
> raise NoSuchEntryError("no such entry for %r", [args])
E lib389.exceptions.NoSuchEntryError: ('no such entry for %r', [('cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', 1, '(&(objectclass=nsds5replicationagreement)(nsds5replicahost=localhost)(nsds5replicaport=39003)(nsds5replicaroot=dc=example,dc=com))')])

/usr/lib/python3.6/site-packages/lib389/__init__.py:1813: NoSuchEntryError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created------------------------------ Captured log call -------------------------------
agreement.py 1139 INFO Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config agreement.py 1139 INFO Pausing replication cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config agreement.py 1108 CRITICAL initAgreement: No replica agreement to localhost:39003 for suffix dc=example,dc=com
Failed tickets/ticket49039_test.py::test_ticket49039 2.23
topo = <lib389.topologies.TopologyMain object at 0x7fea7aaffb38>

def test_ticket49039(topo):
"""Test "password must change" verses "password min age". Min age should not
block password update if the password was reset.
"""

# Setup SSL (for ldappasswd test)
> ssl_init(topo)

/export/tests/tickets/ticket49039_test.py:70:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49039_test.py:35: in ssl_init
topo.standalone.nss_ssl.reinit()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7ad7f908>, name = 'nss_ssl'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'nss_ssl'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
Instance slapd-standalone1 removed. OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Failed tickets/ticket49073_test.py::test_ticket49073 8.75
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea7ad401d0>

def test_ticket49073(topology_m2):
"""Write your replication test here.

To access each DirSrv instance use: topology_m2.ms["master1"], topology_m2.ms["master2"],
..., topology_m2.hub1, ..., topology_m2.consumer1,...

Also, if you need any testcase initialization,
please, write additional fixture for that(include finalizer).
"""
topology_m2.ms["master1"].plugins.enable(name=PLUGIN_MEMBER_OF)
topology_m2.ms["master1"].restart(timeout=10)
topology_m2.ms["master2"].plugins.enable(name=PLUGIN_MEMBER_OF)
topology_m2.ms["master2"].restart(timeout=10)

# Configure fractional to prevent total init to send memberof
ents = topology_m2.ms["master1"].agreement.list(suffix=SUFFIX)
assert len(ents) == 1
log.info('update %s to add nsDS5ReplicatedAttributeListTotal' % ents[0].dn)
topology_m2.ms["master1"].modify_s(ents[0].dn,
[(ldap.MOD_REPLACE,
'nsDS5ReplicatedAttributeListTotal',
'(objectclass=*) $ EXCLUDE '),
(ldap.MOD_REPLACE,
'nsDS5ReplicatedAttributeList',
> '(objectclass=*) $ EXCLUDE memberOf')])

/export/tests/tickets/ticket49073_test.py:102:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7abbca90>
func = <built-in method modify_ext of LDAP object at 0x7fea7aaf24b8>
args = ('cn=002,cn=replica,cn=dc\\3Dexample\\2Cdc\\3Dcom,cn=mapping tree,cn=config', [(2, 'nsDS5ReplicatedAttributeListTotal', '(objectclass=*) $ EXCLUDE '), (2, 'nsDS5ReplicatedAttributeList', '(objectclass=*) $ EXCLUDE memberOf')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', '(')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
ticket49073_test.py 95 INFO update cn=002,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal
Failed tickets/ticket49121_test.py::test_ticket49121 0.00
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea89367390>

def test_ticket49121(topology_m2):
"""
Creating some users.
Deleting quite a number of attributes which may or may not be in the entry.
The attribute type names are to be long.
Under the conditions, it did not estimate the size of string format entry
shorter than the real size and caused the Invalid write / server crash.
"""
> reload(sys)
E NameError: name 'reload' is not defined

/export/tests/tickets/ticket49121_test.py:38: NameError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket49180_test.py::test_ticket49180 24.73
topology_m4 = <lib389.topologies.TopologyMain object at 0x7fea89367e48>

def test_ticket49180(topology_m4):

log.info('Running test_ticket49180...')

log.info('Check that replication works properly on all masters')
agmt_nums = {"master1": ("2", "3", "4"),
"master2": ("1", "3", "4"),
"master3": ("1", "2", "4"),
"master4": ("1", "2", "3")}

for inst_name, agmts in agmt_nums.items():
for num in agmts:
if not topology_m4.ms[inst_name].testReplication(DEFAULT_SUFFIX, topology_m4.ms["master{}".format(num)]):
log.fatal(
'test_replication: Replication is not working between {} and master {}.'.format(inst_name,
num))
assert False

# Disable master 4
log.info('test_clean: disable master 4...')
topology_m4.ms["master4"].replica.disableReplication(DEFAULT_SUFFIX)

# Remove the agreements from the other masters that point to master 4
remove_master4_agmts("test_clean", topology_m4)

# Cleanup - restore master 4
> restore_master4(topology_m4, 4444)

/export/tests/tickets/ticket49180_test.py:148:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49180_test.py:52: in restore_master4
replicaId=newReplicaId)
/usr/lib/python3.6/site-packages/lib389/replica.py:556: in enableReplication
self.conn.changelog.create()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea895730f0>, name = 'changelog'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'changelog'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39004, 'ldap-secureport': 63704, 'server-id': 'master4', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 153 INFO Joining master master4 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39004 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39004 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39004 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39004 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master1 to master4 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39004 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master2 to master4 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39004 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created topologies.py 161 INFO Ensuring master master3 to master4 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39004 is was created topologies.py 161 INFO Ensuring master master4 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master4 to master2 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39002 is was created topologies.py 161 INFO Ensuring master master4 to master3 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39004 to ldap://server.example.com:39003 is was created------------------------------ Captured log call -------------------------------
ticket49180_test.py 124 INFO Running test_ticket49180... ticket49180_test.py 126 INFO Check that replication works properly on all masters ticket49180_test.py 141 INFO test_clean: disable master 4... ticket49180_test.py 32 INFO test_clean: remove all the agreements to master 4... agreement.py 1040 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed agreement.py 1040 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed agreement.py 1040 INFO Agreement (cn=004,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config) was successfully removed ticket49180_test.py 48 INFO Restoring master 4... backend.py 74 INFO List backend with suffix=dc=example,dc=com
Failed tickets/ticket49287_test.py::test_ticket49287 0.01
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea880d9dd8>

def test_ticket49287(topology_m2):
"""
test case for memberof and conflict entries

"""

# return

M1 = topology_m2.ms["master1"]
M2 = topology_m2.ms["master2"]

> config_memberof(M1)

/export/tests/tickets/ticket49287_test.py:285:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49287_test.py:71: in config_memberof
'on')])
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:629: in modify_s
return self.modify_ext_s(dn,modlist,None,None)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:601: in modify_ext_s
msgid = self.modify_ext(dn,modlist,serverctrls,clientctrls)
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:598: in modify_ext
return self._ldap_call(self._l.modify_ext,dn,modlist,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls))
/usr/lib/python3.6/site-packages/lib389/__init__.py:165: in inner
return f(*args, **kwargs)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea89369630>
func = <built-in method modify_ext of LDAP object at 0x7fea81992508>
args = ('cn=MemberOf Plugin,cn=plugins,cn=config', [(2, 'memberOfAllBackends', 'on')], None, None)
kwargs = {}, diagnostic_message_success = None

def _ldap_call(self,func,*args,**kwargs):
"""
Wrapper method mainly for serializing calls into OpenLDAP libs
and trace logs
"""
self._ldap_object_lock.acquire()
if __debug__:
if self._trace_level>=1:
self._trace_file.write('*** %s %s - %s\n%s\n' % (
repr(self),
self._uri,
'.'.join((self.__class__.__name__,func.__name__)),
pprint.pformat((args,kwargs))
))
if self._trace_level>=9:
traceback.print_stack(limit=self._trace_stack_limit,file=self._trace_file)
diagnostic_message_success = None
try:
try:
> result = func(*args,**kwargs)
E TypeError: ('Tuple_to_LDAPMod(): expected a byte string in the list', 'o')

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: TypeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Failed tickets/ticket49303_test.py::test_ticket49303 2.23
topo = <lib389.topologies.TopologyMain object at 0x7fea7ad56470>

def test_ticket49303(topo):
"""
Test the nsTLSAllowClientRenegotiation setting.
"""
sslport = SECUREPORT_STANDALONE1

log.info("Ticket 49303 - Allow disabling of SSL renegotiation")

# No value set, defaults to reneg allowed
> enable_ssl(topo.standalone, sslport)

/export/tests/tickets/ticket49303_test.py:84:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/export/tests/tickets/ticket49303_test.py:58: in enable_ssl
server.nss_ssl.reinit()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <lib389.DirSrv object at 0x7fea7a2106d8>, name = 'nss_ssl'

def __getattr__(self,name):
if name in self.CLASSATTR_OPTION_MAPPING:
return self.get_option(self.CLASSATTR_OPTION_MAPPING[name])
elif name in self.__dict__:
return self.__dict__[name]
else:
raise AttributeError('%s has no attribute %s' % (
> self.__class__.__name__,repr(name)
))
E AttributeError: DirSrv has no attribute 'nss_ssl'

/usr/lib64/python3.6/site-packages/ldap/ldapobject.py:352: AttributeError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
ticket49303_test.py 81 INFO Ticket 49303 - Allow disabling of SSL renegotiation
XFailed suites/config/config_test.py::test_defaultnamingcontext_1 0.15
topo = <lib389.topologies.TopologyMain object at 0x7fea890f5b00>

@pytest.mark.xfail(reason="This may fail due to bug 1610234")
def test_defaultnamingcontext_1(topo):
"""This test case should be part of function test_defaultnamingcontext
Please move it back after we have a fix for bug 1610234
"""
log.info("Remove the original suffix which is currently nsslapd-defaultnamingcontext"
"and check nsslapd-defaultnamingcontext become empty.")

""" Please remove these declarations after moving the test
to function test_defaultnamingcontext
"""
backends = Backends(topo.standalone)
test_db2 = 'test2_db'
test_suffix2 = 'dc=test2,dc=com'
b2 = backends.create(properties={'cn': test_db2,
'nsslapd-suffix': test_suffix2})
b2.delete()
> assert topo.standalone.config.get_attr_val_utf8('nsslapd-defaultnamingcontext') == ' '
E AssertionError: assert 'dc=test2,dc=com' == ' '
E Strings contain only whitespace, escaping them using repr()
E - 'dc=test2,dc=com'
E + ' '

suites/config/config_test.py:265: AssertionError
------------------------------ Captured log call -------------------------------
config_test.py 253 INFO Remove the original suffix which is currently nsslapd-defaultnamingcontextand check nsslapd-defaultnamingcontext become empty.
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_memberof_groups 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fea89768358>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea8977ed30>
base_m2 = <lib389.idm.nscontainer.nsContainer object at 0x7fea89768780>

def test_memberof_groups(self, topology_m2, base_m2):
"""Check that conflict properly resolved for operations
with memberOf and groups

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb3
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Enable memberOf plugin
2. Add 30 users to m1 and wait for replication to happen
3. Pause replication
4. Create a group on m1 and m2
5. Create a group on m1 and m2, delete from m1
6. Create a group on m1, delete from m1, and create on m2,
7. Create a group on m2 and m1, delete from m1
8. Create two different groups on m2
9. Resume replication
10. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
9. It should pass
10. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:399: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_managed_entries 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fea7bce7438>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea8977ed30>

def test_managed_entries(self, topology_m2):
"""Check that conflict properly resolved for operations
with managed entries

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb4
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Create ou=managed_users and ou=managed_groups under test container
2. Configure managed entries plugin and add a template to test container
3. Add a user to m1 and wait for replication to happen
4. Pause replication
5. Create a user on m1 and m2 with a same group ID on both master
6. Create a user on m1 and m2 with a different group ID on both master
7. Resume replication
8. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:490: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestTwoMasters::()::test_nested_entries_with_children 0.00
self = <tests.suites.replication.conflict_resolve_test.TestTwoMasters object at 0x7fea8970b2e8>
topology_m2 = <lib389.topologies.TopologyMain object at 0x7fea8977ed30>
base_m2 = <lib389.idm.nscontainer.nsContainer object at 0x7fea8970b550>

def test_nested_entries_with_children(self, topology_m2, base_m2):
"""Check that conflict properly resolved for operations
with nested entries with children

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb5
:setup: Two master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Add 15 containers to m1 and wait for replication to happen
2. Pause replication
3. Create parent-child on master2 and master1
4. Create parent-child on master1 and master2
5. Create parent-child on master1 and master2 different child rdn
6. Create parent-child on master1 and delete parent on master2
7. Create parent on master1, delete it and parent-child on master2, delete them
8. Create parent on master1, delete it and parent-two children on master2
9. Create parent-two children on master1 and parent-child on master2, delete them
10. Create three subsets inside existing container entry, applying only part of changes on m2
11. Create more combinations of the subset with parent-child on m1 and parent on m2
12. Delete container on m1, modify user1 on m1, create parent on m2 and modify user2 on m2
13. Resume replication
14. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
9. It should pass
10. It should pass
11. It should pass
12. It should pass
13. It should pass
14. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:581: XFailed
XFailed suites/replication/conflict_resolve_test.py::TestThreeMasters::()::test_nested_entries 0.00
self = <tests.suites.replication.conflict_resolve_test.TestThreeMasters object at 0x7fea898245f8>
topology_m3 = <lib389.topologies.TopologyMain object at 0x7fea897241d0>
base_m3 = <lib389.idm.nscontainer.nsContainer object at 0x7fea8977efd0>

def test_nested_entries(self, topology_m3, base_m3):
"""Check that conflict properly resolved for operations
with nested entries with children

:id: 77f09b18-03d1-45da-940b-1ad2c2908eb6
:setup: Three master replication, test container for entries, enable plugin logging,
audit log, error log for replica and access log for internal
:steps:
1. Add 15 containers to m1 and wait for replication to happen
2. Pause replication
3. Create two child entries under each of two entries
4. Create three child entries under each of three entries
5. Create two parents on m1 and m2, then on m1 - create a child and delete one parent,
on m2 - delete one parent and create a child
6. Test a few more parent-child combinations with three instances
7. Resume replication
8. Check that the entries on both masters are the same and replication is working
:expectedresults:
1. It should pass
2. It should pass
3. It should pass
4. It should pass
5. It should pass
6. It should pass
7. It should pass
8. It should pass
"""

> pytest.xfail("Issue 49591 - work in progress")
E _pytest.outcomes.XFailed: Issue 49591 - work in progress

suites/replication/conflict_resolve_test.py:794: XFailed
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39003, 'ldap-secureport': 63703, 'server-id': 'master3', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 153 INFO Joining master master3 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39003 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39003 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39003 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39003 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master1 to master3 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39003 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master2 to master3 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39003 is was created topologies.py 161 INFO Ensuring master master3 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39001 already exists topologies.py 161 INFO Ensuring master master3 to master2 ... replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39003 to ldap://server.example.com:39002 is was created
XFailed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaPort-0-65535-9999999999999999999999999999999999999999999999999999999999999999999-invalid-389] 0.02
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaPort', too_small = '0', too_big = '65535'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '389'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_add(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf94
:setup: standalone instance
:steps:
1. Use a value that is too small
2. Use a value that is too big
3. Use a value that overflows the int
4. Use a value with character value (not a number)
5. Use a valid value
:expectedresults:
1. Add is rejected
2. Add is rejected
3. Add is rejected
4. Add is rejected
5. Add is allowed
"""

agmt_reset(topo)
replica = replica_setup(topo)

agmts = Agreements(topo.standalone, basedn=replica.dn)

# Test too small
perform_invalid_create(agmts, agmt_dict, attr, too_small)
# Test too big
> perform_invalid_create(agmts, agmt_dict, attr, too_big)

suites/replication/replica_config_test.py:210:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

many = <lib389.agreement.Agreements object at 0x7fea89652710>
properties = {'cn': 'test_agreement', 'nsDS5ReplicaBindDN': 'uid=tester', 'nsDS5ReplicaBindMethod': 'SIMPLE', 'nsDS5ReplicaHost': 'localhost.localdomain', ...}
attr = 'nsds5ReplicaPort', value = '65535'

def perform_invalid_create(many, properties, attr, value):
my_properties = copy.deepcopy(properties)
my_properties[attr] = value
with pytest.raises(ldap.LDAPError):
> many.create(properties=my_properties)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:106: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaPort-0-65535-9999999999999999999999999999999999999999999999999999999999999999999-invalid-389] 0.13
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaPort', too_small = '0', too_big = '65535'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '389'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
> perform_invalid_modify(agmt, attr, too_small)

suites/replication/replica_config_test.py:245:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea8974a630>
attr = 'nsds5ReplicaPort', value = '0'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaTimeout', too_small = '-1', too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea898b1e10>
attr = 'nsds5ReplicaTimeout', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaBusyWaitTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaBusyWaitTime', too_small = '-1'
too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea89846c50>
attr = 'nsds5ReplicaBusyWaitTime', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaSessionPauseTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaSessionPauseTime', too_small = '-1'
too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea898b3588>
attr = 'nsds5ReplicaSessionPauseTime', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaFlowControlWindow--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.14
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaFlowControlWindow', too_small = '-1'
too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea898b1ac8>
attr = 'nsds5ReplicaFlowControlWindow', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaFlowControlPause--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaFlowControlPause', too_small = '-1'
too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea897391d0>
attr = 'nsds5ReplicaFlowControlPause', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/replica_config_test.py::test_agmt_num_modify[nsds5ReplicaProtocolTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.14
topo = <lib389.topologies.TopologyMain object at 0x7fea8977c6a0>
attr = 'nsds5ReplicaProtocolTimeout', too_small = '-1'
too_big = '9223372036854775807'
overflow = '9999999999999999999999999999999999999999999999999999999999999999999'
notnum = 'invalid', valid = '6'

@pytest.mark.xfail(reason="Agreement validation current does not work.")
@pytest.mark.parametrize("attr, too_small, too_big, overflow, notnum, valid", agmt_attrs)
def test_agmt_num_modify(topo, attr, too_small, too_big, overflow, notnum, valid):
"""Test all the number values you can set for a replica config entry

:id: a8b47d4a-a089-4d70-8070-e6181209bf95
:setup: standalone instance
:steps:
1. Replace a value that is too small
2. Replace a value that is too big
3. Replace a value that overflows the int
4. Replace a value with character value (not a number)
5. Replace a vlue with a valid value
:expectedresults:
1. Value is rejected
2. Value is rejected
3. Value is rejected
4. Value is rejected
5. Value is allowed
"""

agmt = agmt_setup(topo)

# Value too small
perform_invalid_modify(agmt, attr, too_small)
# Value too big
> perform_invalid_modify(agmt, attr, too_big)

suites/replication/replica_config_test.py:247:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

o = <lib389.agreement.Agreement object at 0x7fea892182b0>
attr = 'nsds5ReplicaProtocolTimeout', value = '9223372036854775807'

def perform_invalid_modify(o, attr, value):
with pytest.raises(ldap.LDAPError):
> o.replace(attr, value)
E Failed: DID NOT RAISE <class 'ldap.LDAPError'>

suites/replication/replica_config_test.py:110: Failed
XFailed suites/replication/ruvstore_test.py::test_memoryruv_sync_with_databaseruv 0.04
topo = <lib389.topologies.TopologyMain object at 0x7fea89783978>

@pytest.mark.xfail(reason="No method to safety access DB ruv currently exists online.")
def test_memoryruv_sync_with_databaseruv(topo):
"""Check if memory ruv and database ruv are synced

:id: 5f38ac5f-6353-460d-bf60-49cafffda5b3
:setup: Replication with two masters.
:steps: 1. Add user to server and compare memory ruv and database ruv.
2. Modify description of user and compare memory ruv and database ruv.
3. Modrdn of user and compare memory ruv and database ruv.
4. Delete user and compare memory ruv and database ruv.
:expectedresults:
1. For add user, the memory ruv and database ruv should be the same.
2. For modify operation, the memory ruv and database ruv should be the same.
3. For modrdn operation, the memory ruv and database ruv should be the same.
4. For delete operation, the memory ruv and database ruv should be the same.
"""

log.info('Adding user: {} to master1'.format(TEST_ENTRY_NAME))
users = UserAccounts(topo.ms['master1'], DEFAULT_SUFFIX)
tuser = users.create(properties=USER_PROPERTIES)
> _compare_memoryruv_and_databaseruv(topo, 'add')

suites/replication/ruvstore_test.py:137:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

topo = <lib389.topologies.TopologyMain object at 0x7fea89783978>
operation_type = 'add'

def _compare_memoryruv_and_databaseruv(topo, operation_type):
"""Compare the memoryruv and databaseruv for ldap operations"""

log.info('Checking memory ruv for ldap: {} operation'.format(operation_type))
replicas = Replicas(topo.ms['master1'])
replica = replicas.list()[0]
memory_ruv = replica.get_attr_val_utf8('nsds50ruv')

log.info('Checking database ruv for ldap: {} operation'.format(operation_type))
> entry = replicas.get_ruv_entry(DEFAULT_SUFFIX)
E AttributeError: 'Replicas' object has no attribute 'get_ruv_entry'

suites/replication/ruvstore_test.py:79: AttributeError
------------------------------ Captured log call -------------------------------
ruvstore_test.py 134 INFO Adding user: rep2lusr to master1 ruvstore_test.py 73 INFO Checking memory ruv for ldap: add operation ruvstore_test.py 78 INFO Checking database ruv for ldap: add operation
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
No log output captured.
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaBusyWaitTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
No log output captured.
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaSessionPauseTime--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
No log output captured.
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaFlowControlWindow--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.13
No log output captured.
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaFlowControlPause--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.14
No log output captured.
XPassed suites/replication/replica_config_test.py::test_agmt_num_add[nsds5ReplicaProtocolTimeout--1-9223372036854775807-9999999999999999999999999999999999999999999999999999999999999999999-invalid-6] 0.15
No log output captured.
Skipped suites/memory_leaks/range_search_test.py::test_range_search::setup 0.00
('suites/memory_leaks/range_search_test.py', 21, "Skipped: Don't run if ASAN is not enabled")
Skipped tickets/ticket47815_test.py::test_ticket47815::setup 0.00
('tickets/ticket47815_test.py', 23, 'Skipped: Not implemented, or invalid by nsMemberOf')
Passed suites/acl/acl_deny_test.py::test_multi_deny_aci 11.13
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. acl_deny_test.py 37 INFO Add uid=tuser1,ou=People,dc=example,dc=com acl_deny_test.py 48 INFO Add uid=tuser,ou=People,dc=example,dc=com------------------------------ Captured log call -------------------------------
acl_deny_test.py 80 INFO Pass 1 acl_deny_test.py 83 INFO Testing two searches behave the same... acl_deny_test.py 126 INFO Testing search does not return any entries... acl_deny_test.py 80 INFO Pass 2 acl_deny_test.py 83 INFO Testing two searches behave the same... acl_deny_test.py 126 INFO Testing search does not return any entries... acl_deny_test.py 190 INFO Test PASSED
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[lang-ja] 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists acl_test.py 75 INFO ========Executing test with 'lang-ja' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[binary] 0.00
------------------------------ Captured log setup ------------------------------
acl_test.py 75 INFO ========Executing test with 'binary' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_aci_attr_subtype_targetattr[phonetic] 0.00
------------------------------ Captured log setup ------------------------------
acl_test.py 75 INFO ========Executing test with 'phonetic' subtype======== acl_test.py 76 INFO Add a target attribute acl_test.py 79 INFO Add a user attribute acl_test.py 87 INFO Add an ACI with attribute subtype------------------------------ Captured log call -------------------------------
acl_test.py 116 INFO Search for the added attribute acl_test.py 123 INFO The added attribute was found
Passed suites/acl/acl_test.py::test_mode_default_add_deny 0.03
------------------------------ Captured log setup ------------------------------
acl_test.py 231 INFO ######## INITIALIZATION ######## acl_test.py 234 INFO Add uid=bind_entry,dc=example,dc=com acl_test.py 244 INFO Add cn=staged user,dc=example,dc=com acl_test.py 248 INFO Add cn=accounts,dc=example,dc=com acl_test.py 252 INFO Add cn=excepts,cn=accounts,dc=example,dc=com------------------------------ Captured log call -------------------------------
acl_test.py 284 INFO ######## mode moddn_aci : ADD (should fail) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 292 INFO Try to add cn=accounts,dc=example,dc=com acl_test.py 301 INFO Exception (expected): INSUFFICIENT_ACCESS
Passed suites/acl/acl_test.py::test_mode_default_delete_deny 0.20
------------------------------ Captured log call -------------------------------
acl_test.py 319 INFO ######## DELETE (should fail) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 326 INFO Try to delete cn=staged user,dc=example,dc=com acl_test.py 331 INFO Exception (expected): INSUFFICIENT_ACCESS
Passed suites/acl/acl_test.py::test_moddn_staging_prod[0-cn=staged user,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (0) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account0,cn=staged user,dc=example,dc=com -> uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[1-cn=staged user,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (1) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account1,cn=staged user,dc=example,dc=com -> uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[2-cn=staged user,dc=example,dc=com-cn=bad*,dc=example,dc=com-True] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (2) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account2,cn=staged user,dc=example,dc=com -> uid=new_account2,cn=accounts,dc=example,dc=com acl_test.py 398 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[3-cn=st*,dc=example,dc=com-cn=accounts,dc=example,dc=com-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (3) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account3,cn=staged user,dc=example,dc=com -> uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[4-cn=bad*,dc=example,dc=com-cn=accounts,dc=example,dc=com-True] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (4) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account4,cn=staged user,dc=example,dc=com -> uid=new_account4,cn=accounts,dc=example,dc=com acl_test.py 398 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[5-cn=st*,dc=example,dc=com-cn=ac*,dc=example,dc=com-False] 0.33
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (5) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account5,cn=staged user,dc=example,dc=com -> uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[6-None-cn=ac*,dc=example,dc=com-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (6) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account6,cn=staged user,dc=example,dc=com -> uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[7-cn=st*,dc=example,dc=com-None-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (7) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account7,cn=staged user,dc=example,dc=com -> uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod[8-None-None-False] 0.30
------------------------------ Captured log call -------------------------------
acl_test.py 365 INFO ######## MOVE staging -> Prod (8) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 377 INFO Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 384 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 388 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 395 INFO Try to MODDN uid=new_account8,cn=staged user,dc=example,dc=com -> uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_staging_prod_9 1.35
------------------------------ Captured log call -------------------------------
acl_test.py 441 INFO ######## MOVE staging -> Prod (9) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 454 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 461 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 467 INFO Disable the moddn right acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 472 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 480 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 487 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 509 INFO Try to MODDN uid=new_account9,cn=staged user,dc=example,dc=com -> uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 520 INFO Enable the moddn right acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 524 INFO ######## MOVE staging -> Prod (10) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 536 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 543 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 560 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 567 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 576 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 582 INFO Try to MODDN uid=new_account10,cn=staged user,dc=example,dc=com -> uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_moddn_prod_staging 0.57
------------------------------ Captured log call -------------------------------
acl_test.py 611 INFO ######## MOVE staging -> Prod (11) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 624 INFO Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 631 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 635 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 641 INFO Try to MODDN uid=new_account11,cn=staged user,dc=example,dc=com -> uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 656 INFO Try to move back MODDN uid=new_account11,cn=accounts,dc=example,dc=com -> uid=new_account11,cn=staged user,dc=example,dc=com acl_test.py 663 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_check_repl_M2_to_M1 1.11
------------------------------ Captured log call -------------------------------
acl_test.py 693 INFO Bind as cn=Directory Manager (M2) acl_test.py 713 INFO Update (M2) uid=new_account12,cn=staged user,dc=example,dc=com (description) acl_test.py 726 INFO Update uid=new_account12,cn=staged user,dc=example,dc=com (description) replicated on M1
Passed suites/acl/acl_test.py::test_moddn_staging_prod_except 0.31
------------------------------ Captured log call -------------------------------
acl_test.py 751 INFO ######## MOVE staging -> Prod (13) ######## acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 763 INFO Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 770 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 774 INFO ######## MOVE to and from equality filter ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 158 INFO Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 781 INFO Try to MODDN uid=new_account13,cn=staged user,dc=example,dc=com -> uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 787 INFO ######## MOVE staging -> Prod/Except (14) ######## acl_test.py 793 INFO Try to MODDN uid=new_account14,cn=staged user,dc=example,dc=com -> uid=new_account14,cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 800 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 158 INFO Add a DENY aci under cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_default_ger_no_moddn 0.00
------------------------------ Captured log call -------------------------------
acl_test.py 827 INFO ######## mode moddn_aci : GER no moddn ######## acl_test.py 838 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 838 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 841 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_mode_default_ger_with_moddn 0.28
------------------------------ Captured log call -------------------------------
acl_test.py 865 INFO ######## mode moddn_aci: GER with moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 883 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 883 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 886 INFO ######## entryLevelRights: b'vn' acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_legacy_ger_no_moddn1 0.12
------------------------------ Captured log call -------------------------------
acl_test.py 916 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 920 INFO ######## mode legacy 1: GER no moddn ######## acl_test.py 930 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 930 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 933 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_mode_legacy_ger_no_moddn2 0.39
------------------------------ Captured log call -------------------------------
acl_test.py 959 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 963 INFO ######## mode legacy 2: GER no moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 980 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 980 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 983 INFO ######## entryLevelRights: b'v' acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com
Passed suites/acl/acl_test.py::test_mode_legacy_ger_with_moddn 0.38
------------------------------ Captured log call -------------------------------
acl_test.py 1019 INFO ######## Disable the moddn aci mod ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 1023 INFO ######## mode legacy : GER with moddn ######## acl_test.py 131 INFO Bind as cn=Directory Manager acl_test.py 137 INFO Bind as uid=bind_entry,dc=example,dc=com acl_test.py 1045 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 1045 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 1048 INFO ######## entryLevelRights: b'vn' acl_test.py 131 INFO Bind as cn=Directory Manager
Passed suites/acl/acl_test.py::test_rdn_write_get_ger 0.01
------------------------------ Captured log setup ------------------------------
acl_test.py 1059 INFO ######## Add entry tuser ########------------------------------ Captured log call -------------------------------
acl_test.py 1083 INFO ######## GER rights for anonymous ######## acl_test.py 1093 INFO dn: dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=Directory Administrators,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=People,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Special Users,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=Accounting Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=HR Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=QA Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=PD Managers,ou=Groups,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=replication_managers,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=server.example.com:63701,ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=server.example.com:63702,ou=Services,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=bind_entry,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=excepts,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account0,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account1,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account2,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account3,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account4,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account5,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account6,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account7,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account8,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account9,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account10,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account11,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account12,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account13,cn=accounts,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account14,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account15,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account16,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account17,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account18,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: uid=new_account19,cn=staged user,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v' acl_test.py 1093 INFO dn: cn=tuser,dc=example,dc=com acl_test.py 1095 INFO ######## entryLevelRights: b'v'
Passed suites/acl/acl_test.py::test_rdn_write_modrdn_anonymous 0.26
------------------------------ Captured log call -------------------------------
acl_test.py 1122 INFO dn: acl_test.py 1124 INFO ######## 'objectClass': [b'top'] acl_test.py 1124 INFO ######## 'defaultnamingcontext': [b'dc=example,dc=com'] acl_test.py 1124 INFO ######## 'dataversion': [b'020180928232018'] acl_test.py 1124 INFO ######## 'netscapemdsuffix': [b'cn=ldap://dc=server,dc=example,dc=com:39001'] acl_test.py 1129 INFO Exception (expected): INSUFFICIENT_ACCESS acl_test.py 1136 INFO The entry was not renamed (expected) acl_test.py 131 INFO Bind as cn=Directory Manager
Passed suites/acl/enhanced_aci_modrnd_test.py::test_enhanced_aci_modrnd 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. enhanced_aci_modrnd_test.py 30 INFO Add a container: ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 37 INFO Add a container: ou=test_ou_2,dc=example,dc=com enhanced_aci_modrnd_test.py 44 INFO Add a user: cn=test_user,ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 59 INFO Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 63 INFO Add an ACI 'allow (all)' by cn=test_user,ou=test_ou_1,dc=example,dc=com to the ou=test_ou_2,dc=example,dc=com------------------------------ Captured log call -------------------------------
enhanced_aci_modrnd_test.py 93 INFO Bind as cn=test_user,ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 98 INFO User MODRDN operation from ou=test_ou_1,dc=example,dc=com to ou=test_ou_2,dc=example,dc=com enhanced_aci_modrnd_test.py 103 INFO Check there is no user in ou=test_ou_1,dc=example,dc=com enhanced_aci_modrnd_test.py 109 INFO Check there is our user in ou=test_ou_2,dc=example,dc=com
Passed suites/acl/repeated_ldap_add_test.py::test_repeated_ldap_add 34.11
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stdout call -----------------------------
uid=buser123,ou=BOU,dc=example,dc=com inactivated. ------------------------------ Captured log call -------------------------------
repeated_ldap_add_test.py 182 INFO Testing Bug 1347760 - Information disclosure via repeated use of LDAP ADD operation, etc. repeated_ldap_add_test.py 184 INFO Disabling accesslog logbuffering repeated_ldap_add_test.py 187 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 190 INFO Adding ou=BOU a bind user belongs to. repeated_ldap_add_test.py 195 INFO Adding a bind user. repeated_ldap_add_test.py 202 INFO Adding a test user. repeated_ldap_add_test.py 209 INFO Deleting aci in dc=example,dc=com. repeated_ldap_add_test.py 212 INFO While binding as DM, acquire an access log path and instance dir repeated_ldap_add_test.py 218 INFO Bind case 1. the bind user has no rights to read the entry itself, bind should be successful. repeated_ldap_add_test.py 219 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} who has no access rights. repeated_ldap_add_test.py 227 INFO Access log path: /var/log/dirsrv/slapd-standalone1/access repeated_ldap_add_test.py 230 INFO Bind case 2-1. the bind user does not exist, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 231 INFO Bind as {uid=bogus,dc=example,dc=com,bogus} who does not exist. repeated_ldap_add_test.py 235 INFO Exception (expected): INVALID_CREDENTIALS repeated_ldap_add_test.py 236 INFO Desc Invalid credentials repeated_ldap_add_test.py 244 INFO Cause found - [28/Sep/2018:19:20:59.258707168 -0400] conn=1 op=10 RESULT err=49 tag=97 nentries=0 etime=0.0001518394 - No such entry repeated_ldap_add_test.py 248 INFO Bind case 2-2. the bind user's suffix does not exist, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 249 INFO Bind as {uid=bogus,ou=people,dc=bogus,bogus} who does not exist. repeated_ldap_add_test.py 258 INFO Cause found - [28/Sep/2018:19:21:00.262647363 -0400] conn=1 op=11 RESULT err=49 tag=97 nentries=0 etime=0.0001391810 - No suffix for bind dn found repeated_ldap_add_test.py 262 INFO Bind case 2-3. the bind user's password is wrong, bind should fail with error INVALID_CREDENTIALS repeated_ldap_add_test.py 263 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} who does not exist. repeated_ldap_add_test.py 267 INFO Exception (expected): INVALID_CREDENTIALS repeated_ldap_add_test.py 268 INFO Desc Invalid credentials repeated_ldap_add_test.py 276 INFO Cause found - 28/Sep/2018:19:21:01.292906190 -0400] conn=1 op=12 RESULT err=49 tag=97 nentries=0 etime=0.0028387543 - Invalid credentials repeated_ldap_add_test.py 279 INFO Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to ou=BOU,dc=example,dc=com. repeated_ldap_add_test.py 281 INFO aci: (targetattr="*")(version 3.0; acl "buser123"; allow(all) userdn = "ldap:///uid=buser123,ou=BOU,dc=example,dc=com";) repeated_ldap_add_test.py 282 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 287 INFO Bind case 3. the bind user has the right to read the entry itself, bind should be successful. repeated_ldap_add_test.py 288 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should be ok. repeated_ldap_add_test.py 291 INFO The following operations are against the subtree the bind user uid=buser123,ou=BOU,dc=example,dc=com has no rights. repeated_ldap_add_test.py 296 INFO Search case 1. the bind user has no rights to read the search entry, it should return no search results with <class 'ldap.SUCCESS'> repeated_ldap_add_test.py 106 INFO Searching existing entry uid=tuser0,ou=people,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 302 INFO Search case 2-1. the search entry does not exist, the search should return no search results with SUCCESS repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 308 INFO Search case 2-2. the search entry does not exist, the search should return no search results with SUCCESS repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should be ok. repeated_ldap_add_test.py 139 INFO Search should return none repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 315 INFO Add case 1. the bind user has no rights AND the adding entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 321 INFO Add case 2-1. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 327 INFO Add case 2-2. the bind user has no rights AND the adding entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Adding non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 334 INFO Modify case 1. the bind user has no rights AND the modifying entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 340 INFO Modify case 2-1. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 346 INFO Modify case 2-2. the bind user has no rights AND the modifying entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 353 INFO Modrdn case 1. the bind user has no rights AND the renaming entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 359 INFO Modrdn case 2-1. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 365 INFO Modrdn case 2-2. the bind user has no rights AND the renaming entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 371 INFO Modrdn case 3. the bind user has no rights AND the node moving an entry to exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to existing superior ou=groups,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 377 INFO Modrdn case 4-1. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 383 INFO Modrdn case 4-2. the bind user has no rights AND the node moving an entry to does not, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 390 INFO Delete case 1. the bind user has no rights AND the deleting entry exists, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 396 INFO Delete case 2-1. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 402 INFO Delete case 2-2. the bind user has no rights AND the deleting entry does not exist, it should fail with INSUFFICIENT_ACCESS repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with INSUFFICIENT_ACCESS. repeated_ldap_add_test.py 129 INFO Exception (expected): INSUFFICIENT_ACCESS repeated_ldap_add_test.py 130 INFO Desc Insufficient access repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 405 INFO EXTRA: Check no regressions repeated_ldap_add_test.py 406 INFO Adding aci for uid=buser123,ou=BOU,dc=example,dc=com to dc=example,dc=com. repeated_ldap_add_test.py 408 INFO Bind as {cn=Directory Manager,password} repeated_ldap_add_test.py 413 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123}. repeated_ldap_add_test.py 423 INFO Search case. the search entry does not exist, the search should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Searching non-existing entry uid=bogus,ou=people,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 429 INFO Add case. the adding entry already exists, it should fail with ALREADY_EXISTS repeated_ldap_add_test.py 106 INFO Adding existing entry uid=tuser0,ou=people,dc=example,dc=com, which should fail with ALREADY_EXISTS. repeated_ldap_add_test.py 129 INFO Exception (expected): ALREADY_EXISTS repeated_ldap_add_test.py 130 INFO Desc Already exists repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 434 INFO Modify case. the modifying entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Modifying non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 439 INFO Modrdn case 1. the renaming entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Renaming non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 444 INFO Modrdn case 2. the node moving an entry to does not, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Moving to non-existing superior ou=OU,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 449 INFO Delete case. the deleting entry does not exist, it should fail with NO_SUCH_OBJECT repeated_ldap_add_test.py 106 INFO Deleting non-existing entry uid=bogus,dc=example,dc=com, which should fail with NO_SUCH_OBJECT. repeated_ldap_add_test.py 129 INFO Exception (expected): NO_SUCH_OBJECT repeated_ldap_add_test.py 130 INFO Desc No such object repeated_ldap_add_test.py 146 INFO PASSED repeated_ldap_add_test.py 452 INFO Inactivate uid=buser123,ou=BOU,dc=example,dc=com repeated_ldap_add_test.py 459 INFO ['/usr/sbin/ns-inactivate.pl', '-Z', 'standalone1', '-D', 'cn=Directory Manager', '-w', 'password', '-I', 'uid=buser123,ou=BOU,dc=example,dc=com'] repeated_ldap_add_test.py 463 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,buser123} which should fail with UNWILLING_TO_PERFORM. repeated_ldap_add_test.py 467 INFO Exception (expected): UNWILLING_TO_PERFORM repeated_ldap_add_test.py 468 INFO Desc Server is unwilling to perform repeated_ldap_add_test.py 471 INFO Bind as {uid=buser123,ou=BOU,dc=example,dc=com,bogus} which should fail with UNWILLING_TO_PERFORM. repeated_ldap_add_test.py 475 INFO Exception (expected): UNWILLING_TO_PERFORM repeated_ldap_add_test.py 476 INFO Desc Server is unwilling to perform repeated_ldap_add_test.py 479 INFO SUCCESS
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_add 0.23
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. selfdn_permissions_test.py 57 INFO Add OCticket47653 that allows 'member' attribute selfdn_permissions_test.py 62 INFO Add cn=bind_entry, dc=example,dc=com------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 105 INFO ######################### ADD ###################### selfdn_permissions_test.py 108 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 138 INFO Try to add Add cn=test_entry, dc=example,dc=com (aci is missing): dn: cn=test_entry, dc=example,dc=com cn: test_entry member: cn=bind_entry, dc=example,dc=com objectclass: top objectclass: person objectclass: OCticket47653 postalAddress: here postalCode: 1234 sn: test_entry selfdn_permissions_test.py 142 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 146 INFO Bind as cn=Directory Manager and add the ADD SELFDN aci selfdn_permissions_test.py 158 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 163 INFO Try to add Add cn=test_entry, dc=example,dc=com (member is missing) selfdn_permissions_test.py 171 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 177 INFO Try to add Add cn=test_entry, dc=example,dc=com (with several member values) selfdn_permissions_test.py 180 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 183 INFO Try to add Add cn=test_entry, dc=example,dc=com should be successful
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_search 0.39
------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 204 INFO ######################### SEARCH ###################### selfdn_permissions_test.py 206 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 210 INFO Try to search cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 215 INFO Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci selfdn_permissions_test.py 228 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 232 INFO Try to search cn=test_entry, dc=example,dc=com should be successful
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_modify 0.22
------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 255 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 258 INFO ######################### MODIFY ###################### selfdn_permissions_test.py 262 INFO Try to modify cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 266 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 270 INFO Bind as cn=Directory Manager and add the WRITE SELFDN aci selfdn_permissions_test.py 283 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 287 INFO Try to modify cn=test_entry, dc=example,dc=com. It should succeeds
Passed suites/acl/selfdn_permissions_test.py::test_selfdn_permission_delete 0.19
------------------------------ Captured log call -------------------------------
selfdn_permissions_test.py 312 INFO ######################### DELETE ###################### selfdn_permissions_test.py 315 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 320 INFO Try to delete cn=test_entry, dc=example,dc=com (aci is missing) selfdn_permissions_test.py 323 INFO Exception (expected): INSUFFICIENT_ACCESS selfdn_permissions_test.py 327 INFO Bind as cn=Directory Manager and add the READ/SEARCH SELFDN aci selfdn_permissions_test.py 339 INFO Bind as cn=bind_entry, dc=example,dc=com selfdn_permissions_test.py 343 INFO Try to delete cn=test_entry, dc=example,dc=com should be successful
Passed suites/attr_encryption/attr_encryption_test.py::test_basic 5.30
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. attr_encryption_test.py 32 INFO Enable TLS for attribute encryption attr_encryption_test.py 35 INFO Enables attribute encryption attr_encryption_test.py 40 INFO Enables attribute encryption for employeeNumber and telephoneNumber attr_encryption_test.py 44 INFO Add a test user with encrypted attributes------------------------------ Captured log call -------------------------------
attr_encryption_test.py 78 INFO Restart the server attr_encryption_test.py 84 INFO Extracting values of cn from the list of objects in encrypt_attrs attr_encryption_test.py 85 INFO And appending the cn values in a list attr_encryption_test.py 90 INFO Check employeenumber encryption is enabled attr_encryption_test.py 93 INFO Check telephoneNumber encryption is enabled attr_encryption_test.py 96 INFO Check that encrypted attribute is present for user i.e. telephonenumber
Passed suites/attr_encryption/attr_encryption_test.py::test_export_import_ciphertext 10.35
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_ciphertext.ldif [28/Sep/2018:19:22:02.790871150 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:02.796630485 -0400] - WARN - attrcrypt_init - Encryption is configured in backend userRoot, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:02.798342042 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 10 entries (100%). [28/Sep/2018:19:22:02.799220921 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:22:07.779369071 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:07.784952757 -0400] - WARN - attrcrypt_init - Encryption is configured in backend userRoot, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:07.786115436 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:22:07.787050584 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7834595328, process usage 21032960 [28/Sep/2018:19:22:07.787898085 -0400] - INFO - check_and_set_import_cache - Import allocates 3060388KB import cache. [28/Sep/2018:19:22:07.919299818 -0400] - INFO - import_main_offline - import userRoot: Beginning import job... [28/Sep/2018:19:22:07.920195468 -0400] - INFO - import_main_offline - import userRoot: Index buffering enabled with bucket size 100 [28/Sep/2018:19:22:08.121007917 -0400] - INFO - import_producer - import userRoot: Processing file "/var/lib/dirsrv/slapd-standalone1/ldif/export_ciphertext.ldif" [28/Sep/2018:19:22:08.122362311 -0400] - INFO - import_producer - import userRoot: Finished scanning file "/var/lib/dirsrv/slapd-standalone1/ldif/export_ciphertext.ldif" (10 entries) [28/Sep/2018:19:22:08.623202928 -0400] - INFO - import_monitor_threads - import userRoot: Workers finished; cleaning up... [28/Sep/2018:19:22:08.824726939 -0400] - INFO - import_monitor_threads - import userRoot: Workers cleaned up. [28/Sep/2018:19:22:08.825977191 -0400] - INFO - import_main_offline - import userRoot: Cleaning up producer thread... [28/Sep/2018:19:22:08.826775255 -0400] - INFO - import_main_offline - import userRoot: Indexing complete. Post-processing... [28/Sep/2018:19:22:08.827370075 -0400] - INFO - import_main_offline - import userRoot: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:22:08.829306881 -0400] - INFO - import_main_offline - import userRoot: Generating numSubordinates complete. [28/Sep/2018:19:22:08.830103558 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:22:08.830723449 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:22:08.832658451 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Creating ancestorid index (new idl)... [28/Sep/2018:19:22:08.833527797 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Created ancestorid index (new idl). [28/Sep/2018:19:22:08.834204120 -0400] - INFO - import_main_offline - import userRoot: Flushing caches... [28/Sep/2018:19:22:08.834732730 -0400] - INFO - import_main_offline - import userRoot: Closing files... [28/Sep/2018:19:22:08.875239927 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:22:08.876489112 -0400] - INFO - import_main_offline - import userRoot: Import complete. Processed 10 entries in 1 seconds. (10.00 entries/sec) ------------------------------ Captured log call -------------------------------
attr_encryption_test.py 123 INFO Export data as ciphertext attr_encryption_test.py 134 INFO Check that the attribute is present in the exported file attr_encryption_test.py 135 INFO Check that the encrypted value of attribute is not present in the exported file attr_encryption_test.py 141 INFO Delete the test user entry with encrypted data attr_encryption_test.py 144 INFO Import data as ciphertext, which was exported previously attr_encryption_test.py 155 INFO Check that the data with encrypted attribute is imported properly
Passed suites/attr_encryption/attr_encryption_test.py::test_export_import_plaintext 10.83
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:22:13.723852190 -0400] - INFO - slapd_extract_cert - CA CERT NAME: Self-Signed-CA [28/Sep/2018:19:22:13.725261335 -0400] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. [28/Sep/2018:19:22:13.727532653 -0400] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_plaintext.ldif [28/Sep/2018:19:22:13.734457527 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:13.768879835 -0400] - DEBUG - _back_crypt_crypto_op - Decrypt (16) [28/Sep/2018:19:22:13.769532298 -0400] - DEBUG - _back_crypt_crypto_op - Decrypt (16) [28/Sep/2018:19:22:13.770038174 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 10 entries (100%). [28/Sep/2018:19:22:13.770500808 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:22:18.489739469 -0400] - INFO - slapd_extract_cert - CA CERT NAME: Self-Signed-CA [28/Sep/2018:19:22:18.491269441 -0400] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. [28/Sep/2018:19:22:18.493958907 -0400] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert [28/Sep/2018:19:22:18.501982441 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:18.565085876 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:22:18.566629598 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7833796608, process usage 21184512 [28/Sep/2018:19:22:18.568108539 -0400] - INFO - check_and_set_import_cache - Import allocates 3060076KB import cache. [28/Sep/2018:19:22:19.018023232 -0400] - INFO - import_main_offline - import userRoot: Beginning import job... [28/Sep/2018:19:22:19.019127679 -0400] - INFO - import_main_offline - import userRoot: Index buffering enabled with bucket size 100 [28/Sep/2018:19:22:19.220441462 -0400] - INFO - import_producer - import userRoot: Processing file "/var/lib/dirsrv/slapd-standalone1/ldif/export_plaintext.ldif" [28/Sep/2018:19:22:19.222247376 -0400] - INFO - import_producer - import userRoot: Finished scanning file "/var/lib/dirsrv/slapd-standalone1/ldif/export_plaintext.ldif" (10 entries) [28/Sep/2018:19:22:19.424713973 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '1000' (4) [28/Sep/2018:19:22:19.425740087 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '1234567890' (10) [28/Sep/2018:19:22:19.623301435 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '1234567890' (10) [28/Sep/2018:19:22:19.624063025 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '^12' (3) [28/Sep/2018:19:22:19.624703405 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '123' (3) [28/Sep/2018:19:22:19.625543858 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '234' (3) [28/Sep/2018:19:22:19.626389837 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '345' (3) [28/Sep/2018:19:22:19.626954037 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '456' (3) [28/Sep/2018:19:22:19.627669666 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '567' (3) [28/Sep/2018:19:22:19.628797313 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '678' (3) [28/Sep/2018:19:22:19.629559106 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '789' (3) [28/Sep/2018:19:22:19.630359223 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '890' (3) [28/Sep/2018:19:22:19.631132530 -0400] - DEBUG - _back_crypt_crypto_op - Encrypt '90$' (3) [28/Sep/2018:19:22:19.723582983 -0400] - INFO - import_monitor_threads - import userRoot: Workers finished; cleaning up... [28/Sep/2018:19:22:19.924977879 -0400] - INFO - import_monitor_threads - import userRoot: Workers cleaned up. [28/Sep/2018:19:22:19.925879062 -0400] - INFO - import_main_offline - import userRoot: Cleaning up producer thread... [28/Sep/2018:19:22:19.926568496 -0400] - INFO - import_main_offline - import userRoot: Indexing complete. Post-processing... [28/Sep/2018:19:22:19.927022901 -0400] - INFO - import_main_offline - import userRoot: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:22:19.929674230 -0400] - INFO - import_main_offline - import userRoot: Generating numSubordinates complete. [28/Sep/2018:19:22:19.930326686 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:22:19.930819084 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:22:19.932144340 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Creating ancestorid index (new idl)... [28/Sep/2018:19:22:19.932894686 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Created ancestorid index (new idl). [28/Sep/2018:19:22:19.933424419 -0400] - INFO - import_main_offline - import userRoot: Flushing caches... [28/Sep/2018:19:22:19.933937535 -0400] - INFO - import_main_offline - import userRoot: Closing files... [28/Sep/2018:19:22:19.966925595 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:22:19.967888481 -0400] - INFO - import_main_offline - import userRoot: Import complete. Processed 10 entries in 0 seconds. (0.00 entries/sec) ------------------------------ Captured log call -------------------------------
attr_encryption_test.py 185 INFO Export data as plain text attr_encryption_test.py 196 INFO Check that the attribute is present in the exported file attr_encryption_test.py 197 INFO Check that the plain text value of the encrypted attribute is present in the exported file attr_encryption_test.py 201 INFO Delete the test user entry with encrypted data attr_encryption_test.py 204 INFO Import data as plain text, which was exported previously attr_encryption_test.py 215 INFO Check that the attribute is imported properly
Passed suites/attr_encryption/attr_encryption_test.py::test_attr_encryption_unindexed 4.84
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/emp_num_ciphertext.ldif [28/Sep/2018:19:22:24.729868156 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:24.734804409 -0400] - WARN - attrcrypt_init - Encryption is configured in backend userRoot, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:24.736389482 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 10 entries (100%). [28/Sep/2018:19:22:24.737114250 -0400] - INFO - dblayer_pre_close - All database threads now stopped ------------------------------ Captured log call -------------------------------
attr_encryption_test.py 237 INFO Export data as cipher text attr_encryption_test.py 248 INFO Check that the attribute is present in the exported file attr_encryption_test.py 249 INFO Check that the encrypted value of attribute is not present in the exported file
Passed suites/attr_encryption/attr_encryption_test.py::test_attr_encryption_multiple_backends 6.68
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_db1.ldif [28/Sep/2018:19:22:29.632671403 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:29.637001527 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:29.640847182 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:29.645324509 -0400] - WARN - attrcrypt_init - Encryption is configured in backend test_db1, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:29.646408796 -0400] - INFO - ldbm_back_ldbm2ldif - export test_db1: Processed 2 entries (100%). [28/Sep/2018:19:22:29.647007848 -0400] - INFO - dblayer_pre_close - All database threads now stopped ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_db2.ldif [28/Sep/2018:19:22:30.793820990 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:30.798022810 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:30.801796563 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:30.806096387 -0400] - WARN - attrcrypt_init - Encryption is configured in backend test_db2, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:30.807294164 -0400] - INFO - ldbm_back_ldbm2ldif - export test_db2: Processed 2 entries (100%). [28/Sep/2018:19:22:30.807896741 -0400] - INFO - dblayer_pre_close - All database threads now stopped ------------------------------ Captured log call -------------------------------
attr_encryption_test.py 281 INFO Add two test backends attr_encryption_test.py 300 INFO Enables attribute encryption for telephoneNumber in test_backend1 attr_encryption_test.py 305 INFO Enables attribute encryption for employeeNumber in test_backend2 attr_encryption_test.py 310 INFO Add a test user with encrypted attributes in both backends attr_encryption_test.py 319 INFO Export data as ciphertext from both backends attr_encryption_test.py 336 INFO Check that the attribute is present in the exported file in db1 attr_encryption_test.py 337 INFO Check that the encrypted value of attribute is not present in the exported file in db1 attr_encryption_test.py 343 INFO Check that the attribute is present in the exported file in db2 attr_encryption_test.py 344 INFO Check that the encrypted value of attribute is not present in the exported file in db2 attr_encryption_test.py 350 INFO Delete test backends
Passed suites/attr_encryption/attr_encryption_test.py::test_attr_encryption_backends 10.61
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_db1.ldif [28/Sep/2018:19:22:35.547469179 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:35.551778820 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:35.555608951 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:35.559991733 -0400] - WARN - attrcrypt_init - Encryption is configured in backend test_db1, but because SSL is not enabled, database encryption is not available and the configuration will be overridden. [28/Sep/2018:19:22:35.561281154 -0400] - INFO - ldbm_back_ldbm2ldif - export test_db1: Processed 2 entries (100%). [28/Sep/2018:19:22:35.562082244 -0400] - INFO - dblayer_pre_close - All database threads now stopped ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export_db2.ldif [28/Sep/2018:19:22:36.702339209 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:36.706829358 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:36.710923712 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:22:36.716005889 -0400] - INFO - ldbm_back_ldbm2ldif - export test_db2: Processed 2 entries (100%). [28/Sep/2018:19:22:36.716992333 -0400] - INFO - dblayer_pre_close - All database threads now stopped ------------------------------ Captured log call -------------------------------
attr_encryption_test.py 378 INFO Add two test backends attr_encryption_test.py 397 INFO Enables attribute encryption for telephoneNumber in test_backend1 attr_encryption_test.py 402 INFO Add a test user with telephoneNumber in both backends attr_encryption_test.py 411 INFO Export data as ciphertext from both backends attr_encryption_test.py 428 INFO Check that the attribute is present in the exported file in db1 attr_encryption_test.py 429 INFO Check that the encrypted value of attribute is not present in the exported file in db1 attr_encryption_test.py 435 INFO Check that the attribute is present in the exported file in db2 attr_encryption_test.py 436 INFO Check that the value of attribute is also present in the exported file in db2 attr_encryption_test.py 442 INFO Delete test backends
Passed suites/automember_plugin/automember_test.py::test_automemberscope 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/automember_plugin/automember_test.py::test_automemberfilter 0.01
No log output captured.
Passed suites/automember_plugin/automember_test.py::test_adduser 0.26
No log output captured.
Passed suites/basic/basic_test.py::test_basic_ops 0.35
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. tasks.py 398 INFO Import task import_09282018_192300 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully
Passed suites/basic/basic_test.py::test_basic_import_export 45.91
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:23:19.124257460 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:23:19.154217664 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:23:19.155564473 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7834058752, process usage 21004288 [28/Sep/2018:19:23:19.156137287 -0400] - INFO - check_and_set_import_cache - Import allocates 3060179KB import cache. [28/Sep/2018:19:23:19.307665771 -0400] - INFO - import_main_offline - import userRoot: Beginning import job... [28/Sep/2018:19:23:19.308483306 -0400] - INFO - import_main_offline - import userRoot: Index buffering enabled with bucket size 100 [28/Sep/2018:19:23:19.509292112 -0400] - INFO - import_producer - import userRoot: Processing file "/var/lib/dirsrv/slapd-standalone1/ldif/basic_import.ldif" [28/Sep/2018:19:23:27.530709777 -0400] - INFO - import_producer - import userRoot: Finished scanning file "/var/lib/dirsrv/slapd-standalone1/ldif/basic_import.ldif" (50008 entries) [28/Sep/2018:19:23:29.640159430 -0400] - INFO - import_monitor_threads - import userRoot: Workers finished; cleaning up... [28/Sep/2018:19:23:29.841472043 -0400] - INFO - import_monitor_threads - import userRoot: Workers cleaned up. [28/Sep/2018:19:23:29.842227046 -0400] - INFO - import_main_offline - import userRoot: Cleaning up producer thread... [28/Sep/2018:19:23:29.843129258 -0400] - INFO - import_main_offline - import userRoot: Indexing complete. Post-processing... [28/Sep/2018:19:23:29.843807318 -0400] - INFO - import_main_offline - import userRoot: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:23:29.850830098 -0400] - INFO - import_main_offline - import userRoot: Generating numSubordinates complete. [28/Sep/2018:19:23:29.852033309 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:23:29.852763483 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:23:29.854205627 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Creating ancestorid index (new idl)... [28/Sep/2018:19:23:30.012044920 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Created ancestorid index (new idl). [28/Sep/2018:19:23:30.013025031 -0400] - INFO - import_main_offline - import userRoot: Flushing caches... [28/Sep/2018:19:23:30.013712712 -0400] - INFO - import_main_offline - import userRoot: Closing files... [28/Sep/2018:19:23:30.775181326 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:23:30.776353495 -0400] - INFO - import_main_offline - import userRoot: Import complete. Processed 50008 entries in 11 seconds. (4546.18 entries/sec) ldiffile: /var/lib/dirsrv/slapd-standalone1/ldif/export.ldif [28/Sep/2018:19:23:40.919991600 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:23:41.020330944 -0400] - INFO - export_one_entry - export userRoot: Processed 1000 entries (1%). [28/Sep/2018:19:23:41.102291910 -0400] - INFO - export_one_entry - export userRoot: Processed 2000 entries (3%). [28/Sep/2018:19:23:41.185770554 -0400] - INFO - export_one_entry - export userRoot: Processed 3000 entries (5%). [28/Sep/2018:19:23:41.269678597 -0400] - INFO - export_one_entry - export userRoot: Processed 4000 entries (7%). [28/Sep/2018:19:23:41.354316831 -0400] - INFO - export_one_entry - export userRoot: Processed 5000 entries (9%). [28/Sep/2018:19:23:41.438770630 -0400] - INFO - export_one_entry - export userRoot: Processed 6000 entries (11%). [28/Sep/2018:19:23:41.523121351 -0400] - INFO - export_one_entry - export userRoot: Processed 7000 entries (13%). [28/Sep/2018:19:23:41.608449661 -0400] - INFO - export_one_entry - export userRoot: Processed 8000 entries (15%). [28/Sep/2018:19:23:41.694041629 -0400] - INFO - export_one_entry - export userRoot: Processed 9000 entries (17%). [28/Sep/2018:19:23:41.781249145 -0400] - INFO - export_one_entry - export userRoot: Processed 10000 entries (19%). [28/Sep/2018:19:23:41.867418005 -0400] - INFO - export_one_entry - export userRoot: Processed 11000 entries (21%). [28/Sep/2018:19:23:41.953833118 -0400] - INFO - export_one_entry - export userRoot: Processed 12000 entries (23%). [28/Sep/2018:19:23:42.039890030 -0400] - INFO - export_one_entry - export userRoot: Processed 13000 entries (25%). [28/Sep/2018:19:23:42.126841916 -0400] - INFO - export_one_entry - export userRoot: Processed 14000 entries (27%). [28/Sep/2018:19:23:42.213348239 -0400] - INFO - export_one_entry - export userRoot: Processed 15000 entries (29%). [28/Sep/2018:19:23:42.301363444 -0400] - INFO - export_one_entry - export userRoot: Processed 16000 entries (31%). [28/Sep/2018:19:23:42.388947608 -0400] - INFO - export_one_entry - export userRoot: Processed 17000 entries (33%). [28/Sep/2018:19:23:42.476702579 -0400] - INFO - export_one_entry - export userRoot: Processed 18000 entries (35%). [28/Sep/2018:19:23:42.566017733 -0400] - INFO - export_one_entry - export userRoot: Processed 19000 entries (37%). [28/Sep/2018:19:23:42.655490031 -0400] - INFO - export_one_entry - export userRoot: Processed 20000 entries (39%). [28/Sep/2018:19:23:42.743251669 -0400] - INFO - export_one_entry - export userRoot: Processed 21000 entries (41%). [28/Sep/2018:19:23:42.830850333 -0400] - INFO - export_one_entry - export userRoot: Processed 22000 entries (43%). [28/Sep/2018:19:23:42.917994052 -0400] - INFO - export_one_entry - export userRoot: Processed 23000 entries (45%). [28/Sep/2018:19:23:43.005740250 -0400] - INFO - export_one_entry - export userRoot: Processed 24000 entries (47%). [28/Sep/2018:19:23:43.094354935 -0400] - INFO - export_one_entry - export userRoot: Processed 25000 entries (49%). [28/Sep/2018:19:23:43.181954790 -0400] - INFO - export_one_entry - export userRoot: Processed 26000 entries (51%). [28/Sep/2018:19:23:43.269692602 -0400] - INFO - export_one_entry - export userRoot: Processed 27000 entries (53%). [28/Sep/2018:19:23:43.357909241 -0400] - INFO - export_one_entry - export userRoot: Processed 28000 entries (55%). [28/Sep/2018:19:23:43.445743715 -0400] - INFO - export_one_entry - export userRoot: Processed 29000 entries (57%). [28/Sep/2018:19:23:43.536860597 -0400] - INFO - export_one_entry - export userRoot: Processed 30000 entries (59%). [28/Sep/2018:19:23:43.623656723 -0400] - INFO - export_one_entry - export userRoot: Processed 31000 entries (61%). [28/Sep/2018:19:23:43.711511819 -0400] - INFO - export_one_entry - export userRoot: Processed 32000 entries (63%). [28/Sep/2018:19:23:43.799795269 -0400] - INFO - export_one_entry - export userRoot: Processed 33000 entries (65%). [28/Sep/2018:19:23:44.093573295 -0400] - INFO - export_one_entry - export userRoot: Processed 34000 entries (67%). [28/Sep/2018:19:23:44.185770033 -0400] - INFO - export_one_entry - export userRoot: Processed 35000 entries (69%). [28/Sep/2018:19:23:44.274884219 -0400] - INFO - export_one_entry - export userRoot: Processed 36000 entries (71%). [28/Sep/2018:19:23:44.363795884 -0400] - INFO - export_one_entry - export userRoot: Processed 37000 entries (73%). [28/Sep/2018:19:23:44.455573415 -0400] - INFO - export_one_entry - export userRoot: Processed 38000 entries (75%). [28/Sep/2018:19:23:44.546186426 -0400] - INFO - export_one_entry - export userRoot: Processed 39000 entries (77%). [28/Sep/2018:19:23:44.639260108 -0400] - INFO - export_one_entry - export userRoot: Processed 40000 entries (79%). [28/Sep/2018:19:23:44.732180075 -0400] - INFO - export_one_entry - export userRoot: Processed 41000 entries (81%). [28/Sep/2018:19:23:44.822304164 -0400] - INFO - export_one_entry - export userRoot: Processed 42000 entries (83%). [28/Sep/2018:19:23:44.916671090 -0400] - INFO - export_one_entry - export userRoot: Processed 43000 entries (85%). [28/Sep/2018:19:23:45.019418676 -0400] - INFO - export_one_entry - export userRoot: Processed 44000 entries (87%). [28/Sep/2018:19:23:45.106917130 -0400] - INFO - export_one_entry - export userRoot: Processed 45000 entries (89%). [28/Sep/2018:19:23:45.197171272 -0400] - INFO - export_one_entry - export userRoot: Processed 46000 entries (91%). [28/Sep/2018:19:23:45.285785131 -0400] - INFO - export_one_entry - export userRoot: Processed 47000 entries (93%). [28/Sep/2018:19:23:45.373969276 -0400] - INFO - export_one_entry - export userRoot: Processed 48000 entries (95%). [28/Sep/2018:19:23:45.463907807 -0400] - INFO - export_one_entry - export userRoot: Processed 49000 entries (97%). [28/Sep/2018:19:23:45.555582676 -0400] - INFO - export_one_entry - export userRoot: Processed 50000 entries (99%). [28/Sep/2018:19:23:45.557057330 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 50008 entries (100%). [28/Sep/2018:19:23:45.569310293 -0400] - INFO - dblayer_pre_close - All database threads now stopped ------------------------------ Captured log call -------------------------------
tasks.py 398 INFO Import task import_09282018_192303 for file /var/lib/dirsrv/slapd-standalone1/ldif/basic_import.ldif completed successfully tasks.py 467 INFO Export task export_09282018_192332 for file /var/lib/dirsrv/slapd-standalone1/ldif/export.ldif completed successfully tasks.py 398 INFO Import task import_09282018_192346 for file /var/lib/dirsrv/slapd-standalone1/ldif/Example.ldif completed successfully
Passed suites/basic/basic_test.py::test_basic_backup 8.95
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:23:55.540572924 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:23:55.545820150 -0400] - INFO - ldbm_back_ldbm2archive - /var/lib/dirsrv/slapd-standalone1/bak/backup_test exists. Renaming to /var/lib/dirsrv/slapd-standalone1/bak/backup_test.bak [28/Sep/2018:19:23:55.546780382 -0400] - INFO - dblayer_copy_directory - Backing up file 1 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/ancestorid.db) [28/Sep/2018:19:23:55.547381641 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/ancestorid.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/ancestorid.db [28/Sep/2018:19:23:55.548024405 -0400] - INFO - dblayer_copy_directory - Backing up file 2 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/objectclass.db) [28/Sep/2018:19:23:55.548534384 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/objectclass.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/objectclass.db [28/Sep/2018:19:23:55.549104977 -0400] - INFO - dblayer_copy_directory - Backing up file 3 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/id2entry.db) [28/Sep/2018:19:23:55.549681816 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/id2entry.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/id2entry.db [28/Sep/2018:19:23:55.550379035 -0400] - INFO - dblayer_copy_directory - Backing up file 4 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/givenName.db) [28/Sep/2018:19:23:55.550998730 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/givenName.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/givenName.db [28/Sep/2018:19:23:55.551548229 -0400] - INFO - dblayer_copy_directory - Backing up file 5 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/parentid.db) [28/Sep/2018:19:23:55.552082478 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/parentid.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/parentid.db [28/Sep/2018:19:23:55.552506050 -0400] - INFO - dblayer_copy_directory - Backing up file 6 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/DBVERSION) [28/Sep/2018:19:23:55.553007640 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/DBVERSION to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/DBVERSION [28/Sep/2018:19:23:55.553512877 -0400] - INFO - dblayer_copy_directory - Backing up file 7 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/sn.db) [28/Sep/2018:19:23:55.553981691 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/sn.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/sn.db [28/Sep/2018:19:23:55.554543763 -0400] - INFO - dblayer_copy_directory - Backing up file 8 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/cn.db) [28/Sep/2018:19:23:55.555065535 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/cn.db [28/Sep/2018:19:23:55.555588890 -0400] - INFO - dblayer_copy_directory - Backing up file 9 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/telephoneNumber.db) [28/Sep/2018:19:23:55.556179466 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/telephoneNumber.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/telephoneNumber.db [28/Sep/2018:19:23:55.556684875 -0400] - INFO - dblayer_copy_directory - Backing up file 10 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/mail.db) [28/Sep/2018:19:23:55.557128834 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/mail.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/mail.db [28/Sep/2018:19:23:55.557681735 -0400] - INFO - dblayer_copy_directory - Backing up file 11 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/nsuniqueid.db) [28/Sep/2018:19:23:55.558222917 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/nsuniqueid.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/nsuniqueid.db [28/Sep/2018:19:23:55.558809147 -0400] - INFO - dblayer_copy_directory - Backing up file 12 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryrdn.db) [28/Sep/2018:19:23:55.559332492 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/entryrdn.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryrdn.db [28/Sep/2018:19:23:55.559908698 -0400] - INFO - dblayer_copy_directory - Backing up file 13 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uid.db) [28/Sep/2018:19:23:55.560406579 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/uid.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uid.db [28/Sep/2018:19:23:55.560856182 -0400] - INFO - dblayer_copy_directory - Backing up file 14 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/aci.db) [28/Sep/2018:19:23:55.561270495 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/aci.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/aci.db [28/Sep/2018:19:23:55.561777167 -0400] - INFO - dblayer_copy_directory - Backing up file 15 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryusn.db) [28/Sep/2018:19:23:55.562259189 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/entryusn.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryusn.db [28/Sep/2018:19:23:55.562712843 -0400] - INFO - dblayer_copy_directory - Backing up file 16 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uniquemember.db) [28/Sep/2018:19:23:55.563142382 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/uniquemember.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uniquemember.db [28/Sep/2018:19:23:55.563627413 -0400] - INFO - dblayer_copy_directory - Backing up file 17 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/numsubordinates.db) [28/Sep/2018:19:23:55.564067239 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/userRoot/numsubordinates.db to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/numsubordinates.db [28/Sep/2018:19:23:55.564668346 -0400] - INFO - dblayer_backup - Backing up file 18 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/log.0000000001) [28/Sep/2018:19:23:55.565208893 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/log.0000000001 to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/log.0000000001 [28/Sep/2018:19:23:55.577380890 -0400] - INFO - dblayer_backup - Backing up file 19 (/var/lib/dirsrv/slapd-standalone1/bak/backup_test/DBVERSION) [28/Sep/2018:19:23:55.578088426 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/db/DBVERSION to /var/lib/dirsrv/slapd-standalone1/bak/backup_test/DBVERSION [28/Sep/2018:19:23:55.580234136 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:23:56.721886607 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:23:56.729360378 -0400] - INFO - dblayer_delete_transaction_logs - Deleting log file: (/var/lib/dirsrv/slapd-standalone1/db/log.0000000001) [28/Sep/2018:19:23:56.731734683 -0400] - INFO - dblayer_copy_directory - Restoring file 1 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/ancestorid.db) [28/Sep/2018:19:23:56.732563920 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/ancestorid.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/ancestorid.db [28/Sep/2018:19:23:56.733195151 -0400] - INFO - dblayer_copy_directory - Restoring file 2 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/objectclass.db) [28/Sep/2018:19:23:56.733730292 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/objectclass.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/objectclass.db [28/Sep/2018:19:23:56.734391373 -0400] - INFO - dblayer_copy_directory - Restoring file 3 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/id2entry.db) [28/Sep/2018:19:23:56.734973203 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/id2entry.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/id2entry.db [28/Sep/2018:19:23:56.735537306 -0400] - INFO - dblayer_copy_directory - Restoring file 4 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/givenName.db) [28/Sep/2018:19:23:56.736105879 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/givenName.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/givenName.db [28/Sep/2018:19:23:56.736671098 -0400] - INFO - dblayer_copy_directory - Restoring file 5 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/parentid.db) [28/Sep/2018:19:23:56.737204459 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/parentid.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/parentid.db [28/Sep/2018:19:23:56.737691958 -0400] - INFO - dblayer_copy_directory - Restoring file 6 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/DBVERSION) [28/Sep/2018:19:23:56.738239646 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/DBVERSION to /var/lib/dirsrv/slapd-standalone1/db/userRoot/DBVERSION [28/Sep/2018:19:23:56.738715258 -0400] - INFO - dblayer_copy_directory - Restoring file 7 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/sn.db) [28/Sep/2018:19:23:56.739201681 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/sn.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/sn.db [28/Sep/2018:19:23:56.739789799 -0400] - INFO - dblayer_copy_directory - Restoring file 8 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db) [28/Sep/2018:19:23:56.740256669 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/cn.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/cn.db [28/Sep/2018:19:23:56.740790158 -0400] - INFO - dblayer_copy_directory - Restoring file 9 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/telephoneNumber.db) [28/Sep/2018:19:23:56.741389732 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/telephoneNumber.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/telephoneNumber.db [28/Sep/2018:19:23:56.741973854 -0400] - INFO - dblayer_copy_directory - Restoring file 10 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/mail.db) [28/Sep/2018:19:23:56.742470722 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/mail.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/mail.db [28/Sep/2018:19:23:56.743036899 -0400] - INFO - dblayer_copy_directory - Restoring file 11 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/nsuniqueid.db) [28/Sep/2018:19:23:56.743548614 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/nsuniqueid.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/nsuniqueid.db [28/Sep/2018:19:23:56.744099425 -0400] - INFO - dblayer_copy_directory - Restoring file 12 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/entryrdn.db) [28/Sep/2018:19:23:56.744545157 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryrdn.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/entryrdn.db [28/Sep/2018:19:23:56.745116626 -0400] - INFO - dblayer_copy_directory - Restoring file 13 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/uid.db) [28/Sep/2018:19:23:56.745651817 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uid.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/uid.db [28/Sep/2018:19:23:56.746239999 -0400] - INFO - dblayer_copy_directory - Restoring file 14 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/aci.db) [28/Sep/2018:19:23:56.746740302 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/aci.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/aci.db [28/Sep/2018:19:23:56.747264511 -0400] - INFO - dblayer_copy_directory - Restoring file 15 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/entryusn.db) [28/Sep/2018:19:23:56.747748420 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/entryusn.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/entryusn.db [28/Sep/2018:19:23:56.748265630 -0400] - INFO - dblayer_copy_directory - Restoring file 16 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/uniquemember.db) [28/Sep/2018:19:23:56.748775104 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/uniquemember.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/uniquemember.db [28/Sep/2018:19:23:56.749264417 -0400] - INFO - dblayer_copy_directory - Restoring file 17 (/var/lib/dirsrv/slapd-standalone1/db/userRoot/numsubordinates.db) [28/Sep/2018:19:23:56.749736618 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/userRoot/numsubordinates.db to /var/lib/dirsrv/slapd-standalone1/db/userRoot/numsubordinates.db [28/Sep/2018:19:23:56.750553837 -0400] - INFO - dblayer_restore - Restoring file 18 (/var/lib/dirsrv/slapd-standalone1/db/DBVERSION) [28/Sep/2018:19:23:56.751133380 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/DBVERSION to /var/lib/dirsrv/slapd-standalone1/db/DBVERSION [28/Sep/2018:19:23:56.751671571 -0400] - INFO - dblayer_restore - Restoring file 19 (/var/lib/dirsrv/slapd-standalone1/db/log.0000000001) [28/Sep/2018:19:23:56.752200256 -0400] - INFO - dblayer_copyfile - Copying /var/lib/dirsrv/slapd-standalone1/bak/backup_test/log.0000000001 to /var/lib/dirsrv/slapd-standalone1/db/log.0000000001 [28/Sep/2018:19:23:56.800458587 -0400] - INFO - dblayer_pre_close - All database threads now stopped ------------------------------ Captured log call -------------------------------
tasks.py 518 INFO Backup task backup_09282018_192349 completed successfully tasks.py 580 INFO Restore task restore_09282018_192351 completed successfully
Passed suites/basic/basic_test.py::test_basic_db2index 3.94
----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:24:00.502060250 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:24:00.506573615 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7834402816, process usage 20996096 [28/Sep/2018:19:24:00.507742610 -0400] - INFO - check_and_set_import_cache - Import allocates 3060313KB import cache. [28/Sep/2018:19:24:00.508632727 -0400] - INFO - ldbm_back_upgradedb - Index version is up-to-date [28/Sep/2018:19:24:00.640855946 -0400] - INFO - slapd_exemode_db2index - Backend Instance: userRoot [28/Sep/2018:19:24:00.643052098 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:24:00.647920794 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:24:00.648931181 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7834841088, process usage 20934656 [28/Sep/2018:19:24:00.649778508 -0400] - INFO - check_and_set_import_cache - Import allocates 3060484KB import cache. [28/Sep/2018:19:24:00.779305286 -0400] - INFO - ldbm_back_ldbm2index - userRoot: Indexing attribute: uid [28/Sep/2018:19:24:00.787842626 -0400] - INFO - ldbm_back_ldbm2index - userRoot: Finished indexing. [28/Sep/2018:19:24:00.800845658 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/basic/basic_test.py::test_basic_acl 0.24
No log output captured.
Passed suites/basic/basic_test.py::test_basic_searches 0.04
No log output captured.
Passed suites/basic/basic_test.py::test_basic_referrals 4.12
No log output captured.
Passed suites/basic/basic_test.py::test_basic_systemctl 12.07
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/basic/basic_test.py::test_basic_ldapagent 5.02
No log output captured.
Passed suites/basic/basic_test.py::test_basic_dse 11.38
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[namingContexts] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedLDAPVersion] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedControl] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedExtension] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[supportedSASLMechanisms] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[vendorName] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_def_rootdse_attr[vendorVersion] 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[namingContexts] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedLDAPVersion] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedControl] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedExtension] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[supportedSASLMechanisms] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[vendorName] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_mod_def_rootdse_attr[vendorVersion] 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_basic_anonymous_search 0.02
No log output captured.
Passed suites/basic/basic_test.py::test_search_original_type 0.01
No log output captured.
Passed suites/basic/basic_test.py::test_search_ou 0.00
No log output captured.
Passed suites/basic/basic_test.py::test_connection_buffer_size 0.03
No log output captured.
Passed suites/betxns/betxn_test.py::test_betxt_7bit 4.85
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
betxn_test.py 46 INFO Running test_betxt_7bit... betxn_test.py 65 INFO Modrdn failed as expected: error {'desc': 'Constraint violation', 'info': 'The value is not 7-bit clean: FuÄè'} betxn_test.py 77 INFO test_betxt_7bit: PASSED
Passed suites/betxns/betxn_test.py::test_betxn_attr_uniqueness 4.46
------------------------------ Captured log call -------------------------------
betxn_test.py 131 ERROR test_betxn_attr_uniqueness: Failed to add test user as expected: betxn_test.py 135 INFO test_betxn_attr_uniqueness: PASSED
Passed suites/betxns/betxn_test.py::test_betxn_memberof 5.06
------------------------------ Captured log call -------------------------------
betxn_test.py 190 INFO test_betxn_memberof: Group2 was correctly rejected (mod add): error betxn_test.py 195 INFO test_betxn_memberof: PASSED
Passed suites/clu/clu_test.py::test_clu_pwdhash 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
clu_test.py 38 INFO Running test_clu_pwdhash... clu_test.py 52 INFO pwdhash generated: {SSHA}g2oT9lFMt7kMKDCWrIVoDp3fURrGFONF66WZeA== clu_test.py 53 INFO test_clu_pwdhash: PASSED
Passed suites/clu/clu_test.py::test_clu_pwdhash_mod 0.05
------------------------------ Captured log call -------------------------------
clu_test.py 76 INFO Running test_clu_pwdhash_mod... clu_test.py 85 INFO pwdhash generated: {SSHA256}oeL066P3vo6VqiBDVgGS7E5Z/gARfnrNvwlc6QacntdbFAbUhEvyLQ== clu_test.py 86 INFO returned the hashed string using the algorithm set in nsslapd-rootpwstoragescheme
Passed suites/config/autotuning_test.py::test_threads_basic 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
autotuning_test.py 37 INFO Set nsslapd-threadnumber: -1 to enable autotuning autotuning_test.py 40 INFO Assert nsslapd-threadnumber is equal to the documented expected value
Passed suites/config/autotuning_test.py::test_threads_invalid_value[-2] 0.00
------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: -2. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_invalid_value[0] 0.00
------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: 0. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_invalid_value[invalid] 0.00
------------------------------ Captured log call -------------------------------
autotuning_test.py 56 INFO Set nsslapd-threadnumber: invalid. Operation should fail
Passed suites/config/autotuning_test.py::test_threads_back_from_manual_value 0.30
------------------------------ Captured log call -------------------------------
autotuning_test.py 78 INFO Set nsslapd-threadnumber: -1 to enable autotuning and save the new value autotuning_test.py 82 INFO Set nsslapd-threadnumber to the autotuned value decreased by 2 autotuning_test.py 87 INFO Set nsslapd-threadnumber: -1 to enable autotuning autotuning_test.py 90 INFO Assert nsslapd-threadnumber is back to the autotuned value
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-] 3.92
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 151 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-0] 4.49
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-400] 4.16
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[-40] 4.49
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 141 INFO Delete nsslapd-cache-autosize autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-] 4.61
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 151 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-401] 5.06
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 132 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 173 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_non_zero[10-0] 4.57
------------------------------ Captured log call -------------------------------
autotuning_test.py 130 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 131 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 132 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 133 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 134 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 135 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 138 INFO Set nsslapd-cache-autosize to 10 autotuning_test.py 148 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 157 INFO Trying to set nsslapd-cachememsize to 33333333 autotuning_test.py 160 INFO Trying to set nsslapd-dbcachesize to 33333333 autotuning_test.py 171 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 172 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 173 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 174 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 175 INFO nsslapd-cache-autosize == b'10' autotuning_test.py 176 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[0] 9.14
------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 250 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 0 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'0'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[] 9.11
------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 222 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'0' autotuning_test.py 230 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 250 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'167257538' autotuning_test.py 222 INFO nsslapd-cachememsize == b'603979776' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 230 INFO Delete nsslapd-cache-autosize-split autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'25'
Passed suites/config/autotuning_test.py::test_cache_autosize_basic_sane[40] 9.09
------------------------------ Captured log call -------------------------------
autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 222 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'25' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 0 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 0 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 250 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 220 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize before the test autotuning_test.py 221 INFO nsslapd-dbcachesize == b'267612060' autotuning_test.py 222 INFO nsslapd-cachememsize == b'469762048' autotuning_test.py 223 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 224 INFO nsslapd-cache-autosize-split == b'40' autotuning_test.py 227 INFO Set nsslapd-cache-autosize-split to 40 autotuning_test.py 236 INFO Set nsslapd-dbcachesize to 33333333 autotuning_test.py 238 INFO Set nsslapd-cachememsize to 33333333 autotuning_test.py 248 INFO Check nsslapd-dbcachesize and nsslapd-cachememsize in the appropriate range. autotuning_test.py 249 INFO nsslapd-dbcachesize == b'33333333' autotuning_test.py 250 INFO nsslapd-cachememsize == b'33333333' autotuning_test.py 251 INFO nsslapd-dncachememsize == b'67108864' autotuning_test.py 252 INFO nsslapd-cache-autosize == b'0' autotuning_test.py 253 INFO nsslapd-cache-autosize-split == b'40'
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[-2] 0.26
------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to -2 autotuning_test.py 287 INFO Set nsslapd-cache-autosize to -2
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[102] 0.26
------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to 102 autotuning_test.py 287 INFO Set nsslapd-cache-autosize to 102
Passed suites/config/autotuning_test.py::test_cache_autosize_invalid_values[invalid] 0.01
------------------------------ Captured log call -------------------------------
autotuning_test.py 281 INFO Set nsslapd-cache-autosize-split to invalid autotuning_test.py 287 INFO Set nsslapd-cache-autosize to invalid
Passed suites/config/config_test.py::test_maxbersize_repl 15.70
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
config_test.py 65 INFO Set nsslapd-maxbersize: 20K to master2 config_test.py 70 INFO Try to add attribute with a big value to master2 - expect to FAIL config_test.py 77 INFO Try to add attribute with a big value to master1 - expect to PASS config_test.py 82 INFO Check if a big value was successfully added to master1 config_test.py 86 INFO Check if a big value was successfully replicated to master2
Passed suites/config/config_test.py::test_config_listen_backport_size 0.02
No log output captured.
Passed suites/config/config_test.py::test_config_deadlock_policy 0.27
No log output captured.
Passed suites/config/config_test.py::test_defaultnamingcontext 1.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
config_test.py 205 INFO Check the attribute nsslapd-defaultnamingcontext is present in cn=config config_test.py 208 INFO Delete nsslapd-defaultnamingcontext attribute config_test.py 215 INFO modify nsslapd-defaultnamingcontext with new suffix config_test.py 218 INFO Add new invalid value at runtime to nsslapd-defaultnamingcontext config_test.py 222 INFO Modify nsslapd-defaultnamingcontext with blank value config_test.py 225 INFO Add new suffix when nsslapd-defaultnamingcontext is empty config_test.py 229 INFO Check the value of the nsslapd-defaultnamingcontext automatically have the new suffix config_test.py 232 INFO Adding new suffix when nsslapd-defaultnamingcontext is not empty config_test.py 236 INFO Check the value of the nsslapd-defaultnamingcontext has not changed config_test.py 239 INFO Remove the newly added suffix and check the values of the attribute is not changed config_test.py 243 INFO Remove all the suffix at the end
Passed suites/config/config_test.py::test_allow_add_delete_config_attributes 3.11
------------------------------ Captured log call -------------------------------
config_test.py 293 INFO Add a new valid attribute at runtime to cn=config config_test.py 297 INFO Delete nsslapd-listenhost to restore the default value config_test.py 302 INFO Add new invalid attribute at runtime to cn=config config_test.py 306 INFO Make sure the invalid attribute is not added
Passed suites/config/config_test.py::test_ignore_virtual_attrs 0.32
------------------------------ Captured log call -------------------------------
config_test.py 339 INFO Check the attribute nsslapd-ignore-virtual-attrs is present in cn=config config_test.py 342 INFO Check the default value of attribute nsslapd-ignore-virtual-attrs should be OFF config_test.py 345 INFO Set the valid values i.e. on/ON and off/OFF for nsslapd-ignore-virtual-attrs config_test.py 350 INFO Set invalid value for attribute nsslapd-ignore-virtual-attrs config_test.py 361 INFO Add cosPointer, cosTemplate and test entry to default suffix, where virtual attribute is postal code config_test.py 374 INFO Test if virtual attribute i.e. postal code shown in test entry while nsslapd-ignore-virtual-attrs: off config_test.py 377 INFO Set nsslapd-ignore-virtual-attrs=on config_test.py 380 INFO Test if virtual attribute i.e. postal code not shown while nsslapd-ignore-virtual-attrs: on
Passed suites/config/config_test.py::test_ndn_cache_enabled 8.66
------------------------------ Captured log call -------------------------------
config_test.py 408 INFO Check the attribute nsslapd-ndn-cache-enabled is present in cn=config config_test.py 411 INFO Check the attribute nsslapd-ndn-cache-enabled has the default value set as ON config_test.py 414 INFO Check the attribute nsslapd-ndn-cache-max-size is present in cn=config config_test.py 420 INFO Ticket#49593 : NDN cache stats should be under the global stats - Implemented in 1.4 config_test.py 421 INFO Fetch the monitor value according to the ds version config_test.py 427 INFO Check the backend monitor output for Normalized DN cache statistics, while nsslapd-ndn-cache-enabled is off config_test.py 433 INFO Check the backend monitor output for Normalized DN cache statistics, while nsslapd-ndn-cache-enabled is on config_test.py 439 INFO Set invalid value for nsslapd-ndn-cache-enabled config_test.py 443 INFO Set invalid value for nsslapd-ndn-cache-max-size
Passed suites/config/regression_test.py::test_maxbersize_repl 6.95
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
regression_test.py 41 INFO Set nsslapd-errorlog-maxlogsize before nsslapd-errorlog-logmaxdiskspace regression_test.py 45 INFO Assert no init_dse_file errors in the error log regression_test.py 49 INFO Set nsslapd-errorlog-maxlogsize after nsslapd-errorlog-logmaxdiskspace regression_test.py 53 INFO Assert no init_dse_file errors in the error log
Passed suites/config/removed_config_49298_test.py::test_restore_config 3.43
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
removed_config_49298_test.py 41 INFO /etc/dirsrv/slapd-standalone1
Passed suites/config/removed_config_49298_test.py::test_removed_config 2.32
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details. ------------------------------ Captured log call -------------------------------
removed_config_49298_test.py 70 INFO /etc/dirsrv/slapd-standalone1
Passed suites/cos/indirect_cos_test.py::test_indirect_cos 2.37
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. indirect_cos_test.py 106 INFO Add custom schema... indirect_cos_test.py 119 INFO Add test user... indirect_cos_test.py 136 INFO Setup indirect COS...------------------------------ Captured log call -------------------------------
indirect_cos_test.py 156 INFO Checking user... indirect_cos_test.py 55 INFO Create password policy for subtree ou=people,dc=example,dc=com indirect_cos_test.py 163 INFO Checking user...
Passed suites/ds_logs/ds_logs_test.py::test_check_default 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
ds_logs_test.py 68 DEBUG on
Passed suites/ds_logs/ds_logs_test.py::test_plugin_set_invalid 0.00
------------------------------ Captured log call -------------------------------
ds_logs_test.py 86 INFO test_plugin_set_invalid - Expect to fail with junk value
Passed suites/ds_logs/ds_logs_test.py::test_log_plugin_on 4.26
------------------------------ Captured log call -------------------------------
ds_logs_test.py 112 INFO Bug 1273549 - Check access logs for millisecond, when attribute is ON ds_logs_test.py 113 INFO perform any ldap operation, which will trigger the logs ds_logs_test.py 27 INFO Adding 10 users ds_logs_test.py 117 INFO Restart the server to flush the logs ds_logs_test.py 120 INFO parse the access logs
Passed suites/ds_logs/ds_logs_test.py::test_log_plugin_off 12.52
------------------------------ Captured log call -------------------------------
ds_logs_test.py 151 INFO Bug 1273549 - Check access logs for missing millisecond, when attribute is OFF ds_logs_test.py 153 INFO test_log_plugin_off - set the configuration attribute to OFF ds_logs_test.py 156 INFO Restart the server to flush the logs ds_logs_test.py 159 INFO test_log_plugin_off - delete the previous access logs ds_logs_test.py 165 INFO Restart the server to flush the logs ds_logs_test.py 168 INFO check access log that microseconds are not present
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[24576] 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[16512] 0.01
No log output captured.
Passed suites/ds_logs/regression_test.py::test_default_loglevel_stripped[16385] 0.12
No log output captured.
Passed suites/ds_logs/regression_test.py::test_dse_config_loglevel_error 5.94
No log output captured.
Passed suites/ds_tools/logpipe_test.py::test_user_permissions 0.04
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. logpipe_test.py 30 INFO Add system test user - dirsrv_testuser------------------------------ Captured log call -------------------------------
logpipe_test.py 66 INFO Try to create a logpipe in the log directory with "-u" option specifying the user
Passed suites/ds_tools/replcheck_test.py::test_check_ruv 17.66
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists replica.py 1912 INFO SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working replcheck_test.py 99 INFO Export LDAPTLS_CACERTDIR env variable for ds-replcheck replica.py 1912 INFO SUCCESS: Replication from ldaps://server.example.com:63701 to ldaps://server.example.com:63702 is working replica.py 1912 INFO SUCCESS: Replication from ldaps://server.example.com:63702 to ldaps://server.example.com:63701 is working----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:29:22.135081494 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:29:22.149496409 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:29:22.150246962 -0400] - NOTICE - ldbm_back_start - found 7630024k available [28/Sep/2018:19:29:22.150813854 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:29:22.151340216 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:29:22.152509456 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:29:22.153414307 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master1.ldif [28/Sep/2018:19:29:22.178003196 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 15 entries (100%). [28/Sep/2018:19:29:22.284325539 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:29:24.659538731 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:29:30.478922407 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:29:30.493283119 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:29:30.494107577 -0400] - NOTICE - ldbm_back_start - found 7632924k available [28/Sep/2018:19:29:30.494984451 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:29:30.495726681 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:29:30.496872434 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:29:30.497935079 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master2.ldif [28/Sep/2018:19:29:30.512802471 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 15 entries (100%). [28/Sep/2018:19:29:30.617460928 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:29:33.001700200 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/ds_tools/replcheck_test.py::test_missing_entries 15.14
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:29:39.668427690 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:29:39.672821771 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:29:39.673717211 -0400] - NOTICE - ldbm_back_start - found 7629108k available [28/Sep/2018:19:29:39.674403390 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:29:39.674970032 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:29:39.676006727 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:29:39.676942048 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master1.ldif [28/Sep/2018:19:29:39.689553989 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 17 entries (100%). [28/Sep/2018:19:29:39.795525769 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:29:42.183589936 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:29:45.606068327 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:29:45.620474264 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:29:45.621352145 -0400] - NOTICE - ldbm_back_start - found 7632988k available [28/Sep/2018:19:29:45.621990335 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:29:45.622630340 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:29:45.623578929 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:29:45.624458057 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master2.ldif [28/Sep/2018:19:29:45.650130278 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 17 entries (100%). [28/Sep/2018:19:29:45.756108190 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:29:48.131342991 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/ds_tools/replcheck_test.py::test_tombstones 19.60
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:29:57.423780492 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:29:57.427659634 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:29:57.428369796 -0400] - NOTICE - ldbm_back_start - found 7627076k available [28/Sep/2018:19:29:57.428952497 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:29:57.429495529 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:29:57.430338089 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:29:57.431157909 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master1.ldif [28/Sep/2018:19:29:57.440162202 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 20 entries (100%). [28/Sep/2018:19:29:57.543682813 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:29:59.937789653 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:30:05.380375283 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:30:05.384766428 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:30:05.385387540 -0400] - NOTICE - ldbm_back_start - found 7632388k available [28/Sep/2018:19:30:05.385937328 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:30:05.386385665 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:30:05.387177130 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:30:05.387992001 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master2.ldif [28/Sep/2018:19:30:05.397827626 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 20 entries (100%). [28/Sep/2018:19:30:05.501045159 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:30:07.894999610 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/ds_tools/replcheck_test.py::test_conflict_entries 27.70
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:30:25.025765250 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:30:25.029945856 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:30:25.030727486 -0400] - NOTICE - ldbm_back_start - found 7626268k available [28/Sep/2018:19:30:25.031281543 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:30:25.031810009 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:30:25.032721947 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:30:25.033643171 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master1.ldif [28/Sep/2018:19:30:25.042720204 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 25 entries (100%). [28/Sep/2018:19:30:25.147497191 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:30:27.540863485 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:30:32.699928491 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:30:32.704131654 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:30:32.705024395 -0400] - NOTICE - ldbm_back_start - found 7632580k available [28/Sep/2018:19:30:32.705663050 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:30:32.706235233 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:30:32.707110610 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:30:32.707944484 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master2.ldif [28/Sep/2018:19:30:32.717717448 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 25 entries (100%). [28/Sep/2018:19:30:32.823795922 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:30:35.215874753 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/ds_tools/replcheck_test.py::test_inconsistencies 20.95
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:30:44.814511572 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:30:44.818733043 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:30:44.819547245 -0400] - NOTICE - ldbm_back_start - found 7628028k available [28/Sep/2018:19:30:44.820297591 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:30:44.820877675 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:30:44.821911912 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:30:44.822978349 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master1.ldif [28/Sep/2018:19:30:44.832478837 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 26 entries (100%). [28/Sep/2018:19:30:44.936471755 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:30:47.331362335 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:30:52.456819941 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:30:52.461161644 -0400] - NOTICE - ldbm_back_start - found 8166872k physical memory [28/Sep/2018:19:30:52.461955535 -0400] - NOTICE - ldbm_back_start - found 7632324k available [28/Sep/2018:19:30:52.462491915 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 204171k [28/Sep/2018:19:30:52.463065742 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (1 total): 589824k [28/Sep/2018:19:30:52.463978258 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (1 total): 65536k [28/Sep/2018:19:30:52.464744584 -0400] - NOTICE - ldbm_back_start - total cache size: 838346178 B; ldiffile: /tmp/export_master2.ldif [28/Sep/2018:19:30:52.473915819 -0400] - INFO - ldbm_back_ldbm2ldif - export userRoot: Processed 26 entries (100%). [28/Sep/2018:19:30:52.578162441 -0400] - INFO - dblayer_pre_close - Waiting for 4 database threads to stop [28/Sep/2018:19:30:54.971393646 -0400] - INFO - dblayer_pre_close - All database threads now stopped
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_acceptance 41.41
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_memory_corruption 40.41
------------------------------ Captured log call -------------------------------
replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working
Passed suites/dynamic_plugins/dynamic_plugins_test.py::test_stress 316.18
------------------------------ Captured log call -------------------------------
replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(sn=last1)(givenname=first1))-1] 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(sn=last1)(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(sn=last1)(givenname=first1)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=first1))))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(sn=last3)(givenname=*))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(sn=last3)(givenname=*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(&(sn=last3)(givenname=*)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(&(sn=last3)(givenname=*)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid5)(&(&(sn=*))(&(givenname=*))))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid5)(&(&(sn=*))(&(givenname=*))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(objectclass=*)(uid=*)(sn=last*))-5] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(objectclass=*)(uid=*)(sn=last*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(objectclass=*)(uid=*)(sn=last1))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(objectclass=*)(uid=*)(sn=last1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(sn=last1)(givenname=first1))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(sn=last1)(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(|(sn=last1)(givenname=first1)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(|(sn=last1)(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=uid1)(|(|(sn=last1))(|(givenname=first1))))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=uid1)(|(|(sn=last1))(|(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(objectclass=*)(sn=last1)(|(givenname=first1)))-14] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(objectclass=*)(sn=last1)(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last1))(|(givenname=first1)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last1))(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last))(|(givenname=first1)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last))(|(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(!(cn=NULL)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(!(cn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(!(cn=NULL))(uid=uid1))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(!(cn=NULL))(uid=uid1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(&(!(uid=1))(!(givenname=first1))))-4] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(&(!(uid=1))(!(givenname=first1))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(uid=NULL))(sn=last1))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(uid=NULL))(sn=last1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(uid=NULL))(!(sn=NULL)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(uid=NULL))(!(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(|(uid=uid1)(sn=last2))(givenname=first1))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(|(uid=uid1)(sn=last2))(givenname=first1))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid=uid1)(!(uid=NULL)))(sn=last2))-2] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid=uid1)(!(uid=NULL)))(sn=last2))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid=uid1)(uid=NULL))(sn=last2))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid=uid1)(uid=NULL))(sn=last2))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid5)(sn=*)(cn=*)(givenname=*)(uid=u*)(sn=la*)(cn=full*)(givenname=f*)(uid>=u)(!(givenname=NULL)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid5)(sn=*)(cn=*)(givenname=*)(uid=u*)(sn=la*)(cn=full*)(givenname=f*)(uid>=u)(!(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(objectclass=*)(sn=last))(&(givenname=first1)))-1] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(objectclass=*)(sn=last))(&(givenname=first1)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(sn=last1)(givenname=NULL))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(sn=last1)(givenname=NULL))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(sn=last1)(givenname=NULL)))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(sn=last1)(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL))))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL)(sn=*)))(|(sn=NULL)))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last1))(&(givenname=NULL)(sn=*)))(|(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=uid1)(&(&(sn=last*))(&(givenname=first*)))(&(sn=NULL)))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=uid1)(&(&(sn=last*))(&(givenname=first*)))(&(sn=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(sn=NULL)(givenname=NULL))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(sn=NULL)(givenname=NULL))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(|(sn=NULL)(givenname=NULL)))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(|(sn=NULL)(givenname=NULL)))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=NULL)(|(|(sn=NULL))(|(givenname=NULL))))-0] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=NULL)(|(|(sn=NULL))(|(givenname=NULL))))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*))-5] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*)(uid=*))"...
Passed suites/filter/complex_filters_test.py::test_filters[(uid>=uid3)-3] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(uid>=uid3)"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid=*)(uid>=uid3))-3] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid=*)(uid>=uid3))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(uid>=uid3)(uid<=uid5))-5] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(uid>=uid3)(uid<=uid5))"...
Passed suites/filter/complex_filters_test.py::test_filters[(&(uid>=uid3)(uid<=uid5))-3] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(&(uid>=uid3)(uid<=uid5))"...
Passed suites/filter/complex_filters_test.py::test_filters[(|(&(uid>=uid3)(uid<=uid5))(uid=*))-5] 0.00
------------------------------ Captured log call -------------------------------
complex_filters_test.py 119 INFO Testing filter "(|(&(uid>=uid3)(uid<=uid5))(uid=*))"...
Passed suites/filter/filter_logic_test.py::test_eq 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/filter/filter_logic_test.py::test_sub 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_ranges 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_range 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_allid_shortcut 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_not_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_range 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_range 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_and_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_or_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_and_or_eq 0.00
No log output captured.
Passed suites/filter/filter_logic_test.py::test_or_and_eq 0.00
No log output captured.
Passed suites/filter/filter_test.py::test_filter_escaped 0.07
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
filter_test.py 40 INFO Running test_filter_escaped... filter_test.py 76 INFO test_filter_escaped: PASSED
Passed suites/filter/filter_test.py::test_filter_search_original_attrs 0.00
------------------------------ Captured log call -------------------------------
filter_test.py 93 INFO Running test_filter_search_original_attrs... filter_test.py 106 INFO test_filter_search_original_attrs: PASSED
Passed suites/filter/filter_test.py::test_filter_scope_one 0.00
------------------------------ Captured log call -------------------------------
filter_test.py 126 INFO Search user using ldapsearch with scope one filter_test.py 128 INFO [dn: cn=Directory Administrators,dc=example,dc=com cn: Directory Administrators ] filter_test.py 130 INFO Search should only have one entry
Passed suites/filter/filter_test.py::test_filter_with_attribute_subtype 0.12
------------------------------ Captured log call -------------------------------
filter_test.py 155 INFO Bind as cn=Directory Manager filter_test.py 162 INFO ######################### ADD ###################### filter_test.py 185 INFO Try to add Add cn=test_entry both, dc=example,dc=com: dn: cn=test_entry both, dc=example,dc=com cn: test_entry both cn;en: test_entry en cn;fr: test_entry fr objectclass: top objectclass: person sn: test_entry both filter_test.py 188 INFO Try to add Add cn=test_entry en only, dc=example,dc=com: dn: cn=test_entry en only, dc=example,dc=com cn: test_entry en only cn;en: test_entry en objectclass: top objectclass: person sn: test_entry en only filter_test.py 191 INFO ######################### SEARCH ###################### filter_test.py 195 INFO Try to search with filter (&(sn=test_entry en only)(!(cn=test_entry fr))) filter_test.py 199 INFO Found cn=test_entry en only,dc=example,dc=com filter_test.py 203 INFO Try to search with filter (&(sn=test_entry en only)(!(cn;fr=test_entry fr))) filter_test.py 207 INFO Found cn=test_entry en only,dc=example,dc=com filter_test.py 211 INFO Try to search with filter (&(sn=test_entry en only)(!(cn;en=test_entry en))) filter_test.py 214 INFO Found none filter_test.py 216 INFO ######################### DELETE ###################### filter_test.py 218 INFO Try to delete cn=test_entry both, dc=example,dc=com filter_test.py 221 INFO Try to delete cn=test_entry en only, dc=example,dc=com filter_test.py 224 INFO Testcase PASSED
Passed suites/filter/filter_test.py::test_extended_search 0.01
------------------------------ Captured log call -------------------------------
filter_test.py 252 INFO Running test_filter_escaped... filter_test.py 269 INFO Try to search with filter (cn:de:=ext-test-entry) filter_test.py 275 INFO Try to search with filter (cn:caseIgnoreIA5Match:=EXT-TEST-ENTRY) filter_test.py 281 INFO Try to search with filter (cn:caseIgnoreMatch:=EXT-TEST-ENTRY) filter_test.py 287 INFO Try to search with filter (cn:caseExactMatch:=EXT-TEST-ENTRY) filter_test.py 293 INFO Try to search with filter (cn:caseExactMatch:=ext-test-entry) filter_test.py 299 INFO Try to search with filter (cn:caseExactIA5Match:=EXT-TEST-ENTRY) filter_test.py 305 INFO Try to search with filter (cn:caseExactIA5Match:=ext-test-entry)
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_supported_features 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0-*] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-False-oper_attr_list0-objectClass] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1] 0.04
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1-*] 0.22
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[-True-oper_attr_list1-objectClass] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2] 0.27
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2-*] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-False-oper_attr_list2-objectClass] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3-*] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[ou=people,dc=example,dc=com-True-oper_attr_list3-objectClass] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4-*] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-False-oper_attr_list4-objectClass] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5-*] 0.03
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[uid=all_attrs_test,ou=people,dc=example,dc=com-True-oper_attr_list5-objectClass] 0.25
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 138 INFO bound as: uid=all_attrs_test,ou=people,dc=example,dc=com
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6] 0.14
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6-*] 0.12
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/filter/rfc3673_all_oper_attrs_test.py::test_search_basic[cn=config-False-oper_attr_list6-objectClass] 0.11
------------------------------ Captured log call -------------------------------
rfc3673_all_oper_attrs_test.py 141 INFO bound as: cn=Directory Manager
Passed suites/get_effective_rights/acceptance_test.py::test_group_aci_entry_exists 0.01
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. acceptance_test.py 28 INFO Adding user testuser------------------------------ Captured log call -------------------------------
acceptance_test.py 55 INFO Adding group group1 acceptance_test.py 68 INFO Add an ACI granting add access to a user matching the groupdn acceptance_test.py 77 INFO dn: uid=testuser,dc=example,dc=com acceptance_test.py 79 INFO ######## entryLevelRights: b'vadn'
Passed suites/get_effective_rights/acceptance_test.py::test_group_aci_template_entry 0.00
------------------------------ Captured log call -------------------------------
acceptance_test.py 103 INFO Add an ACI granting add access to a user matching the userdn acceptance_test.py 113 INFO dn: cn=template_person_objectclass,dc=example,dc=com acceptance_test.py 115 INFO ######## entryLevelRights: b'vadn' acceptance_test.py 118 INFO dn: cn=template_groupofnames_objectclass,dc=example,dc=com acceptance_test.py 120 INFO ######## entryLevelRights: b'v'
Passed suites/gssapi/simple_gssapi_test.py::test_gssapi_bind 0.23
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists Kerberos master password: D7AnvUeSId0amF9WVuEOJeHSE!zkbT&G8F6OUHyLCKqIQb&jHCiuX3EeWfxEnm8aS Loading random data Initializing database '/var/kerberos/krb5kdc/principal' for realm 'EXAMPLE.COM', master key name 'K/M@EXAMPLE.COM' Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "ldap/server.example.com@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal ldap/server.example.com@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab. Entry for principal ldap/server.example.com@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab. Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "testuser@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM testuser@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal testuser@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/testuser.keytab. Entry for principal testuser@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/testuser.keytab. ---------------------------- Captured stderr setup -----------------------------
WARNING: no policy specified for ldap/server.example.com@EXAMPLE.COM; defaulting to no policy WARNING: no policy specified for testuser@EXAMPLE.COM; defaulting to no policy ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/gssapi/simple_gssapi_test.py::test_invalid_sasl_map 0.06
No log output captured.
Passed suites/gssapi/simple_gssapi_test.py::test_missing_user 0.69
----------------------------- Captured stdout call -----------------------------
Authenticating as principal root/admin@EXAMPLE.COM with password. Principal "doesnotexist@EXAMPLE.COM" created. Authenticating as principal root/admin@EXAMPLE.COM with password. K/M@EXAMPLE.COM doesnotexist@EXAMPLE.COM kadmin/admin@EXAMPLE.COM kadmin/changepw@EXAMPLE.COM kadmin/server.example.com@EXAMPLE.COM kiprop/server.example.com@EXAMPLE.COM krbtgt/EXAMPLE.COM@EXAMPLE.COM ldap/server.example.com@EXAMPLE.COM testuser@EXAMPLE.COM Authenticating as principal root/admin@EXAMPLE.COM with password. Entry for principal doesnotexist@EXAMPLE.COM with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/doesnotexist.keytab. Entry for principal doesnotexist@EXAMPLE.COM with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/doesnotexist.keytab. ----------------------------- Captured stderr call -----------------------------
WARNING: no policy specified for doesnotexist@EXAMPLE.COM; defaulting to no policy
Passed suites/gssapi/simple_gssapi_test.py::test_support_mech 0.06
No log output captured.
Passed suites/gssapi/simple_gssapi_test.py::test_rejected_mech 0.06
No log output captured.
Passed suites/gssapi_repl/gssapi_repl_test.py::test_gssapi_repl 0.00
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists
Passed suites/import/regression_test.py::test_import_be_default 6.79
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:39:42.591316172 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:39:42.605754325 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:39:42.621445122 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:39:42.622376570 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7811637248, process usage 21504000 [28/Sep/2018:19:39:42.623182068 -0400] - INFO - check_and_set_import_cache - Import allocates 3051420KB import cache. [28/Sep/2018:19:39:42.790251357 -0400] - INFO - import_main_offline - import default: Beginning import job... [28/Sep/2018:19:39:42.791206658 -0400] - INFO - import_main_offline - import default: Index buffering enabled with bucket size 100 [28/Sep/2018:19:39:42.992055571 -0400] - INFO - import_producer - import default: Processing file "/var/lib/dirsrv/slapd-standalone1/ldif/default.ldif" [28/Sep/2018:19:39:42.993863398 -0400] - INFO - import_producer - import default: Finished scanning file "/var/lib/dirsrv/slapd-standalone1/ldif/default.ldif" (13 entries) [28/Sep/2018:19:39:43.493969018 -0400] - INFO - import_monitor_threads - import default: Workers finished; cleaning up... [28/Sep/2018:19:39:43.695319795 -0400] - INFO - import_monitor_threads - import default: Workers cleaned up. [28/Sep/2018:19:39:43.696298764 -0400] - INFO - import_main_offline - import default: Cleaning up producer thread... [28/Sep/2018:19:39:43.696990936 -0400] - INFO - import_main_offline - import default: Indexing complete. Post-processing... [28/Sep/2018:19:39:43.697593496 -0400] - INFO - import_main_offline - import default: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:39:43.699475846 -0400] - INFO - import_main_offline - import default: Generating numSubordinates complete. [28/Sep/2018:19:39:43.700354184 -0400] - INFO - ldbm_get_nonleaf_ids - import default: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:39:43.700989698 -0400] - INFO - ldbm_get_nonleaf_ids - import default: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:39:43.702309392 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import default: Creating ancestorid index (new idl)... [28/Sep/2018:19:39:43.702969546 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import default: Created ancestorid index (new idl). [28/Sep/2018:19:39:43.703649807 -0400] - INFO - import_main_offline - import default: Flushing caches... [28/Sep/2018:19:39:43.704182152 -0400] - INFO - import_main_offline - import default: Closing files... [28/Sep/2018:19:39:43.737933172 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:39:43.738936894 -0400] - INFO - import_main_offline - import default: Import complete. Processed 13 entries in 1 seconds. (13.00 entries/sec) ------------------------------ Captured log call -------------------------------
regression_test.py 51 INFO Adding suffix:dc=default,dc=com and backend: default... regression_test.py 56 INFO Create LDIF file and import it... regression_test.py 61 INFO Stopping the server and running offline import... regression_test.py 67 INFO Verifying entry count after import... regression_test.py 73 INFO Test PASSED
Passed suites/import/regression_test.py::test_del_suffix_import 6.39
----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:39:49.143001144 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:39:49.147543928 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:39:49.151393168 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:39:49.156037382 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:39:49.157354111 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7810793472, process usage 22679552 [28/Sep/2018:19:39:49.158050176 -0400] - INFO - check_and_set_import_cache - Import allocates 3051091KB import cache. [28/Sep/2018:19:39:49.279223602 -0400] - INFO - import_main_offline - import importest1: Beginning import job... [28/Sep/2018:19:39:49.279992440 -0400] - INFO - import_main_offline - import importest1: Index buffering enabled with bucket size 100 [28/Sep/2018:19:39:49.480888003 -0400] - INFO - import_producer - import importest1: Processing file "/var/lib/dirsrv/slapd-standalone1/ldif/suffix_del1.ldif" [28/Sep/2018:19:39:49.483084430 -0400] - INFO - import_producer - import importest1: Finished scanning file "/var/lib/dirsrv/slapd-standalone1/ldif/suffix_del1.ldif" (0 entries) [28/Sep/2018:19:39:49.581702978 -0400] - INFO - import_monitor_threads - import importest1: Workers finished; cleaning up... [28/Sep/2018:19:39:49.682649986 -0400] - INFO - import_monitor_threads - import importest1: Workers cleaned up. [28/Sep/2018:19:39:49.683455724 -0400] - INFO - import_main_offline - import importest1: Cleaning up producer thread... [28/Sep/2018:19:39:49.684012472 -0400] - INFO - import_main_offline - import importest1: Indexing complete. Post-processing... [28/Sep/2018:19:39:49.684436386 -0400] - INFO - import_main_offline - import importest1: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:39:49.686275033 -0400] - INFO - import_main_offline - import importest1: Generating numSubordinates complete. [28/Sep/2018:19:39:49.686926606 -0400] - INFO - ldbm_get_nonleaf_ids - import importest1: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:39:49.687364026 -0400] - INFO - ldbm_get_nonleaf_ids - import importest1: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:39:49.688543909 -0400] - ERR - ldbm_ancestorid_new_idl_create_index - Nothing to do to build ancestorid index [28/Sep/2018:19:39:49.689049151 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import importest1: Created ancestorid index (new idl). [28/Sep/2018:19:39:49.689508745 -0400] - INFO - import_main_offline - import importest1: Flushing caches... [28/Sep/2018:19:39:49.689977666 -0400] - INFO - import_main_offline - import importest1: Closing files... [28/Sep/2018:19:39:49.701409270 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:39:49.702278910 -0400] - INFO - import_main_offline - import importest1: Import complete. Processed 0 entries in 0 seconds. (0.00 entries/sec) ------------------------------ Captured log call -------------------------------
regression_test.py 90 INFO Adding suffix:dc=importest1,dc=com and backend: importest1 regression_test.py 94 INFO Create LDIF file and import it regression_test.py 100 INFO Stopping the server and running offline import regression_test.py 105 INFO Deleting suffix-dc=importest2,dc=com regression_test.py 108 INFO Adding the same database-importest1 after deleting it
Passed suites/import/regression_test.py::test_del_suffix_backend 7.21
------------------------------ Captured log call -------------------------------
regression_test.py 126 INFO Adding suffix:dc=importest2,dc=com and backend: importest2 regression_test.py 130 INFO Create LDIF file and import it tasks.py 398 INFO Import task import_09282018_193952 for file /var/lib/dirsrv/slapd-standalone1/ldif/suffix_del2.ldif completed successfully regression_test.py 138 INFO Deleting suffix-dc=importest2,dc=com regression_test.py 141 INFO Adding the same database-importest2 after deleting it regression_test.py 143 INFO Checking if server can be restarted after re-adding the same database
Passed suites/mapping_tree/referral_during_tot_init_test.py::test_referral_during_tot 10.56
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists----------------------------- Captured stdout call -----------------------------
OK group dirsrv exists OK user dirsrv exists ----------------------------- Captured stderr call -----------------------------
[28/Sep/2018:19:40:23.957575919 -0400] - INFO - slapd_exemode_ldif2db - Backend Instance: userRoot [28/Sep/2018:19:40:23.961963934 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 [28/Sep/2018:19:40:23.979215975 -0400] - INFO - dblayer_instance_start - Import is running with nsslapd-db-private-import-mem on; No other process is allowed to access the database [28/Sep/2018:19:40:23.980246259 -0400] - INFO - check_and_set_import_cache - pagesize: 4096, available bytes 7793315840, process usage 21037056 [28/Sep/2018:19:40:23.980748468 -0400] - INFO - check_and_set_import_cache - Import allocates 3044264KB import cache. [28/Sep/2018:19:40:24.463235974 -0400] - INFO - import_main_offline - import userRoot: Beginning import job... [28/Sep/2018:19:40:24.464156325 -0400] - INFO - import_main_offline - import userRoot: Index buffering enabled with bucket size 100 [28/Sep/2018:19:40:24.665648731 -0400] - INFO - import_producer - import userRoot: Processing file "/var/lib/dirsrv/slapd-master1/ldif/ref_during_tot_import.ldif" [28/Sep/2018:19:40:27.240038853 -0400] - INFO - import_producer - import userRoot: Finished scanning file "/var/lib/dirsrv/slapd-master1/ldif/ref_during_tot_import.ldif" (10008 entries) [28/Sep/2018:19:40:27.574648673 -0400] - INFO - import_monitor_threads - import userRoot: Workers finished; cleaning up... [28/Sep/2018:19:40:27.775917027 -0400] - INFO - import_monitor_threads - import userRoot: Workers cleaned up. [28/Sep/2018:19:40:27.776965036 -0400] - INFO - import_main_offline - import userRoot: Cleaning up producer thread... [28/Sep/2018:19:40:27.777813046 -0400] - INFO - import_main_offline - import userRoot: Indexing complete. Post-processing... [28/Sep/2018:19:40:27.778568877 -0400] - INFO - import_main_offline - import userRoot: Generating numsubordinates (this may take several minutes to complete)... [28/Sep/2018:19:40:27.781125670 -0400] - INFO - import_main_offline - import userRoot: Generating numSubordinates complete. [28/Sep/2018:19:40:27.781943940 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Gathering ancestorid non-leaf IDs... [28/Sep/2018:19:40:27.782642842 -0400] - INFO - ldbm_get_nonleaf_ids - import userRoot: Finished gathering ancestorid non-leaf IDs. [28/Sep/2018:19:40:27.784355822 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Creating ancestorid index (new idl)... [28/Sep/2018:19:40:27.942425167 -0400] - INFO - ldbm_ancestorid_new_idl_create_index - import userRoot: Created ancestorid index (new idl). [28/Sep/2018:19:40:27.943455055 -0400] - INFO - import_main_offline - import userRoot: Flushing caches... [28/Sep/2018:19:40:27.944177148 -0400] - INFO - import_main_offline - import userRoot: Closing files... [28/Sep/2018:19:40:28.166855545 -0400] - INFO - dblayer_pre_close - All database threads now stopped [28/Sep/2018:19:40:28.167985083 -0400] - INFO - import_main_offline - import userRoot: Import complete. Processed 10008 entries in 4 seconds. (2502.00 entries/sec)
Passed suites/memberof_plugin/regression_test.py::test_memberof_with_repl 98.59
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39101, 'ldap-secureport': 63801, 'server-id': 'hub1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39201, 'ldap-secureport': 63901, 'server-id': 'consumer1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 471 INFO Creating replication topology. replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39101 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39101 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39101 is working replica.py 1627 INFO SUCCESS: joined consumer from ldap://server.example.com:39001 to ldap://server.example.com:39101 replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39201 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39101 to ldap://server.example.com:39201 is was created replica.py 1684 INFO SUCCESS: joined consumer from ldap://server.example.com:39101 to ldap://server.example.com:39201 replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39201 is working------------------------------ Captured log call -------------------------------
regression_test.py 77 INFO update cn=101,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal regression_test.py 77 INFO update cn=201,cn=replica,cn=dc\3Dexample\2Cdc\3Dcom,cn=mapping tree,cn=config to add nsDS5ReplicatedAttributeListTotal regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! cn=group10,ou=Groups,dc=example,dc=com: memberof->b'cn=group11,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=user_0,ou=People,dc=example,dc=com: memberof->b'cn=group10,ou=Groups,dc=example,dc=com'
Passed suites/memberof_plugin/regression_test.py::test_scheme_violation_errors_logged 3.70
---------------------------- Captured stdout setup -----------------------------
Instance slapd-master1 removed. OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 39001, 'ldap-secureport': 63701, 'server-id': 'master1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 39002, 'ldap-secureport': 63702, 'server-id': 'master2', 'suffix': 'dc=example,dc=com'} was created. topologies.py 139 INFO Creating replication topology. topologies.py 153 INFO Joining master master2 to master1 ... replica.py 1500 INFO SUCCESS: bootstrap to ldap://server.example.com:39002 completed replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 is was created replica.py 1781 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 is was created replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working replica.py 1569 INFO SUCCESS: joined master from ldap://server.example.com:39001 to ldap://server.example.com:39002 topologies.py 161 INFO Ensuring master master1 to master2 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39001 to ldap://server.example.com:39002 already exists topologies.py 161 INFO Ensuring master master2 to master1 ... replica.py 1754 INFO SUCCESS: Agreement from ldap://server.example.com:39002 to ldap://server.example.com:39001 already exists------------------------------ Captured log call -------------------------------
regression_test.py 318 INFO memberOf attr value - cn=group1,ou=Groups,dc=example,dc=com regression_test.py 321 INFO pattern = .*oc_check_allowed_sv.*uid=user_,ou=People,dc=example,dc=com.*memberOf.*not allowed.*
Passed suites/memberof_plugin/regression_test.py::test_memberof_with_changelog_reset 51.21
------------------------------ Captured log call -------------------------------
regression_test.py 353 INFO Configure memberof on M1 and M2 regression_test.py 364 INFO On M1, add 999 test entries allowing memberof regression_test.py 51 INFO Adding 999 users regression_test.py 367 INFO On M1, add a group with these 999 entries as members regression_test.py 375 INFO Adding the test group using async function regression_test.py 385 INFO Check the log messages for error regression_test.py 389 INFO Check that the replication is working fine both ways, M1 <-> M2 replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39001 to ldap://server.example.com:39002 is working replica.py 1912 INFO SUCCESS: Replication from ldap://server.example.com:39002 to ldap://server.example.com:39001 is working
Passed suites/memberof_plugin/regression_test.py::test_memberof_group 5.48
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
regression_test.py 480 INFO Enable memberof plugin and set the scope as cn=sub1,dc=example,dc=com regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 426 CRITICAL Renaming user (cn=g2,cn=sub2,dc=example,dc=com): new cn=g2-new regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m1,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g1,cn=sub1,dc=example,dc=com' regression_test.py 439 INFO !!!!!!! uid=test_m2,cn=sub1,dc=example,dc=com: memberof->b'cn=g2-new,cn=sub1,dc=example,dc=com'
Passed suites/monitor/monitor_test.py::test_monitor 0.26
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
monitor_test.py 42 INFO connection: ['64:20180928234428Z:2:1:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fea0:ecb3%eth0'], currentconnections: ['1'], totalconnections: ['1'] monitor_test.py 46 INFO version :: ['64:20180928234428Z:5:4:-:cn=directory manager:0:0:0:1:ip=fe80::f816:3eff:fea0:ecb3%eth0'] monitor_test.py 50 INFO threads: ['24'],currentconnectionsatmaxthreads: ['0'],maxthreadsperconnhits: ['0'] monitor_test.py 54 INFO nbackends: ['1'], backendmonitordn: ['cn=monitor,cn=userRoot,cn=ldbm database,cn=plugins,cn=config'] monitor_test.py 58 INFO opsinitiated: ['11'], opscompleted: ['12'] monitor_test.py 62 INFO dtablesize: ['1024'],readwaiters: ['0'],entriessent: ['13'],bytessent: ['1061'],currenttime: ['20180928234429Z'],starttime: ['20180928234428Z']
Passed suites/paged_results/paged_results_test.py::test_search_success[6-5] 0.72
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. paged_results_test.py 54 INFO Adding user simplepaged_test------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 5 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 6; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea899b24a8>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 250 INFO 5 results paged_results_test.py 153 INFO Deleting 5 users
Passed suites/paged_results/paged_results_test.py::test_search_success[5-5] 0.24
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 5 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81b49400>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 250 INFO 5 results paged_results_test.py 153 INFO Deleting 5 users
Passed suites/paged_results/paged_results_test.py::test_search_success[5-25] 0.89
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 25 users paged_results_test.py 244 INFO Set user bind simplepaged_test paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89a42978>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 250 INFO 25 results paged_results_test.py 153 INFO Deleting 25 users
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[50-200-cn=config,cn=ldbm database,cn=plugins,cn=config-nsslapd-idlistscanlimit-100-UNWILLING_TO_PERFORM] 7.26
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 200 users paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 100. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 200 users paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'100'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[5-15-cn=config-nsslapd-timelimit-20-UNAVAILABLE_CRITICAL_EXTENSION] 30.67
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 15 users paged_results_test.py 168 INFO Set nsslapd-timelimit to 20. Previous value - b'3600'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 15 users paged_results_test.py 168 INFO Set nsslapd-timelimit to b'3600'. Previous value - b'20'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[21-50-cn=config-nsslapd-sizelimit-20-SIZELIMIT_EXCEEDED] 2.07
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to 20. Previous value - b'2000'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to b'2000'. Previous value - b'20'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[21-50-cn=config-nsslapd-pagedsizelimit-5-SIZELIMIT_EXCEEDED] 1.70
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 5. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_limits_fail[5-50-cn=config,cn=ldbm database,cn=plugins,cn=config-nsslapd-lookthroughlimit-20-ADMINLIMIT_EXCEEDED] 1.86
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 20. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 295 INFO Set user bind paged_results_test.py 298 INFO Create simple paged results control instance paged_results_test.py 304 INFO Initiate ldapsearch with created control instance paged_results_test.py 316 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 50 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'20'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_sort_success 1.66
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 50 users paged_results_test.py 375 INFO Initiate ldapsearch with created control instance paged_results_test.py 376 INFO Collect data with sorting paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89994fd0>, <lib389._controls.SSSRequestControl object at 0x7fea89994ac8>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 381 INFO Substring numbers from user DNs paged_results_test.py 385 INFO Assert that list is sorted paged_results_test.py 153 INFO Deleting 50 users
Passed suites/paged_results/paged_results_test.py::test_search_abandon 5.39
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 416 INFO Set user bind paged_results_test.py 419 INFO Create simple paged results control instance paged_results_test.py 423 INFO Initiate a search with a paged results control paged_results_test.py 426 INFO Abandon the search paged_results_test.py 429 INFO Expect an ldap.TIMEOUT exception, while trying to get the search results paged_results_test.py 153 INFO Deleting 10 users
Passed suites/paged_results/paged_results_test.py::test_search_with_timelimit 33.27
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 465 INFO Set user bind paged_results_test.py 468 INFO Create simple paged results control instance paged_results_test.py 473 INFO Iteration 0 paged_results_test.py 480 INFO Getting page 0 paged_results_test.py 480 INFO Getting page 1 paged_results_test.py 497 INFO Done with this search - sleeping 10 seconds paged_results_test.py 473 INFO Iteration 1 paged_results_test.py 480 INFO Getting page 0 paged_results_test.py 480 INFO Getting page 1 paged_results_test.py 497 INFO Done with this search - sleeping 10 seconds paged_results_test.py 473 INFO Iteration 2 paged_results_test.py 480 INFO Getting page 0 paged_results_test.py 480 INFO Getting page 1 paged_results_test.py 497 INFO Done with this search - sleeping 10 seconds paged_results_test.py 153 INFO Deleting 100 users
Passed suites/paged_results/paged_results_test.py::test_search_dns_ip_aci[dns = "server.example.com"] 4.04
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 542 INFO Back up current suffix ACI paged_results_test.py 545 INFO Add test ACI paged_results_test.py 551 INFO Set user bind paged_results_test.py 554 INFO Create simple paged results control instance paged_results_test.py 558 INFO Initiate three searches with a paged results control paged_results_test.py 560 INFO 1 search paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89a31b70>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 197 INFO Getting page 10 paged_results_test.py 197 INFO Getting page 11 paged_results_test.py 197 INFO Getting page 12 paged_results_test.py 197 INFO Getting page 13 paged_results_test.py 197 INFO Getting page 14 paged_results_test.py 197 INFO Getting page 15 paged_results_test.py 197 INFO Getting page 16 paged_results_test.py 197 INFO Getting page 17 paged_results_test.py 197 INFO Getting page 18 paged_results_test.py 197 INFO Getting page 19 paged_results_test.py 563 INFO 100 results paged_results_test.py 560 INFO 2 search paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89a31b70>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 197 INFO Getting page 10 paged_results_test.py 197 INFO Getting page 11 paged_results_test.py 197 INFO Getting page 12 paged_results_test.py 197 INFO Getting page 13 paged_results_test.py 197 INFO Getting page 14 paged_results_test.py 197 INFO Getting page 15 paged_results_test.py 197 INFO Getting page 16 paged_results_test.py 197 INFO Getting page 17 paged_results_test.py 197 INFO Getting page 18 paged_results_test.py 197 INFO Getting page 19 paged_results_test.py 563 INFO 100 results paged_results_test.py 560 INFO 3 search paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 5; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89a31b70>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 197 INFO Getting page 10 paged_results_test.py 197 INFO Getting page 11 paged_results_test.py 197 INFO Getting page 12 paged_results_test.py 197 INFO Getting page 13 paged_results_test.py 197 INFO Getting page 14 paged_results_test.py 197 INFO Getting page 15 paged_results_test.py 197 INFO Getting page 16 paged_results_test.py 197 INFO Getting page 17 paged_results_test.py 197 INFO Getting page 18 paged_results_test.py 197 INFO Getting page 19 paged_results_test.py 563 INFO 100 results paged_results_test.py 565 INFO If we are here, then no error has happened. We are good. paged_results_test.py 568 INFO Restore ACI paged_results_test.py 153 INFO Deleting 100 users
Passed suites/paged_results/paged_results_test.py::test_search_multiple_paging 3.72
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 601 INFO Set user bind paged_results_test.py 604 INFO Create simple paged results control instance paged_results_test.py 609 INFO Iteration 0 paged_results_test.py 609 INFO Iteration 1 paged_results_test.py 609 INFO Iteration 2 paged_results_test.py 153 INFO Deleting 100 users
Passed suites/paged_results/paged_results_test.py::test_search_invalid_cookie[1000] 3.56
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 655 INFO Set user bind paged_results_test.py 658 INFO Create simple paged results control instance paged_results_test.py 667 INFO Put an invalid cookie (1000) to the control. TypeError is expected paged_results_test.py 153 INFO Deleting 100 users
Passed suites/paged_results/paged_results_test.py::test_search_invalid_cookie[-1] 3.53
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 100 users paged_results_test.py 655 INFO Set user bind paged_results_test.py 658 INFO Create simple paged results control instance paged_results_test.py 667 INFO Put an invalid cookie (-1) to the control. TypeError is expected paged_results_test.py 153 INFO Deleting 100 users
Passed suites/paged_results/paged_results_test.py::test_search_abandon_with_zero_size 0.40
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 699 INFO Set user bind paged_results_test.py 702 INFO Create simple paged results control instance paged_results_test.py 153 INFO Deleting 10 users
Passed suites/paged_results/paged_results_test.py::test_search_pagedsizelimit_success 0.42
------------------------------ Captured log call -------------------------------
paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 20. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 748 INFO Set user bind paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81a4f5f8>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 756 INFO 10 results paged_results_test.py 153 INFO Deleting 10 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'20'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_nspagedsizelimit[5-15-PASS] 0.39
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 5. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsPagedSizeLimit to 15. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 810 INFO Set user bind paged_results_test.py 821 INFO Expect to pass paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea899ac8d0>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 823 INFO 10 results paged_results_test.py 153 INFO Deleting 10 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsPagedSizeLimit to None. Previous value - b'15'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com.
Passed suites/paged_results/paged_results_test.py::test_search_nspagedsizelimit[15-5-SIZELIMIT_EXCEEDED] 0.39
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 15. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsPagedSizeLimit to 5. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 810 INFO Set user bind paged_results_test.py 817 INFO Expect to fail with SIZELIMIT_EXCEEDED paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89b30518>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 153 INFO Deleting 10 users paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'15'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsPagedSizeLimit to None. Previous value - b'5'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com.
Passed suites/paged_results/paged_results_test.py::test_search_paged_limits[conf_attr_values0-ADMINLIMIT_EXCEEDED] 3.33
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 101 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to 5000. Previous value - b'2000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 5000. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 100. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 100. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 881 INFO Set user bind paged_results_test.py 888 INFO Expect to fail with ADMINLIMIT_EXCEEDED paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89b27400>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 153 INFO Deleting 101 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to b'2000'. Previous value - b'5000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'100'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'100'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_paged_limits[conf_attr_values1-PASS] 3.31
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 101 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to 5000. Previous value - b'2000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to 5000. Previous value - b'0'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 120. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 122. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 881 INFO Set user bind paged_results_test.py 892 INFO Expect to pass paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea893985c0>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 197 INFO Getting page 10 paged_results_test.py 894 INFO 101 results paged_results_test.py 153 INFO Deleting 101 users paged_results_test.py 168 INFO Set nsslapd-sizelimit to b'2000'. Previous value - b'5000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-pagedsizelimit to b'0'. Previous value - b'5000'. Modified suffix - cn=config. paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'122'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'120'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config.
Passed suites/paged_results/paged_results_test.py::test_search_paged_user_limits[conf_attr_values0-ADMINLIMIT_EXCEEDED] 3.29
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 101 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 1000. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 1000. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsPagedIDListScanLimit to 100. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 168 INFO Set nsPagedLookthroughLimit to 100. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 954 INFO Set user bind paged_results_test.py 961 INFO Expect to fail with ADMINLIMIT_EXCEEDED paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89994f28>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 153 INFO Deleting 101 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'1000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'1000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsPagedIDListScanLimit to None. Previous value - b'100'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 168 INFO Set nsPagedLookthroughLimit to None. Previous value - b'100'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com.
Passed suites/paged_results/paged_results_test.py::test_search_paged_user_limits[conf_attr_values1-PASS] 3.23
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 101 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to 1000. Previous value - b'5000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to 1000. Previous value - b'4000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsPagedIDListScanLimit to 120. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 168 INFO Set nsPagedLookthroughLimit to 122. Previous value - None. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 954 INFO Set user bind paged_results_test.py 965 INFO Expect to pass paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 10; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89398a90>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 197 INFO Getting page 6 paged_results_test.py 197 INFO Getting page 7 paged_results_test.py 197 INFO Getting page 8 paged_results_test.py 197 INFO Getting page 9 paged_results_test.py 197 INFO Getting page 10 paged_results_test.py 967 INFO 101 results paged_results_test.py 153 INFO Deleting 101 users paged_results_test.py 168 INFO Set nsslapd-lookthroughlimit to b'5000'. Previous value - b'1000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsslapd-idlistscanlimit to b'4000'. Previous value - b'1000'. Modified suffix - cn=config,cn=ldbm database,cn=plugins,cn=config. paged_results_test.py 168 INFO Set nsPagedIDListScanLimit to None. Previous value - b'120'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com. paged_results_test.py 168 INFO Set nsPagedLookthroughLimit to None. Previous value - b'122'. Modified suffix - uid=simplepaged_test,ou=People,dc=example,dc=com.
Passed suites/paged_results/paged_results_test.py::test_ger_basic 0.63
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 4; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81a4f198>, <ldap.controls.simple.GetEffectiveRightsControl object at 0x7fea89994048>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 1005 INFO 20 results paged_results_test.py 1007 INFO Check for attributeLevelRights paged_results_test.py 1010 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users
Passed suites/paged_results/paged_results_test.py::test_multi_suffix_search 9.83
------------------------------ Captured log setup ------------------------------
paged_results_test.py 85 INFO Adding suffix:o=test_parent and backend: parent_base paged_results_test.py 94 INFO Adding ACI to allow our test user to search paged_results_test.py 106 INFO Adding suffix:ou=child,o=test_parent and backend: child_base------------------------------ Captured log call -------------------------------
paged_results_test.py 1041 INFO Clear the access log paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 131 INFO Adding 10 users paged_results_test.py 194 INFO Running simple paged result search with - search suffix: o=test_parent; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 4; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81ac6128>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 197 INFO Getting page 5 paged_results_test.py 1052 INFO 20 results paged_results_test.py 1055 INFO Restart the server to flush the logs paged_results_test.py 1061 INFO Assert that last pr_cookie == -1 and others pr_cookie == 0 paged_results_test.py 1066 INFO Remove added users paged_results_test.py 153 INFO Deleting 10 users paged_results_test.py 153 INFO Deleting 10 users
Passed suites/paged_results/paged_results_test.py::test_maxsimplepaged_per_conn_success[None] 0.98
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 1098 INFO Set user bind paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 4; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea89b274a8>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 1105 INFO 20 results paged_results_test.py 1108 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users
Passed suites/paged_results/paged_results_test.py::test_maxsimplepaged_per_conn_success[-1] 0.97
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to -1. Previous value - b'-1'. Modified suffix - cn=config. paged_results_test.py 1098 INFO Set user bind paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 4; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81a4f0f0>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 1105 INFO 20 results paged_results_test.py 1108 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to b'-1'. Previous value - b'-1'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_maxsimplepaged_per_conn_success[1000] 0.99
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to 1000. Previous value - b'-1'. Modified suffix - cn=config. paged_results_test.py 1098 INFO Set user bind paged_results_test.py 194 INFO Running simple paged result search with - search suffix: dc=example,dc=com; filter: (uid=test*); attr list ['dn', 'sn']; page_size = 4; controls: [<ldap.controls.libldap.SimplePagedResultsControl object at 0x7fea81c390b8>]. paged_results_test.py 197 INFO Getting page 0 paged_results_test.py 197 INFO Getting page 1 paged_results_test.py 197 INFO Getting page 2 paged_results_test.py 197 INFO Getting page 3 paged_results_test.py 197 INFO Getting page 4 paged_results_test.py 1105 INFO 20 results paged_results_test.py 1108 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to b'-1'. Previous value - b'1000'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_maxsimplepaged_per_conn_failure[0] 0.78
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to 0. Previous value - b'-1'. Modified suffix - cn=config. paged_results_test.py 1142 INFO Set user bind paged_results_test.py 1145 INFO Create simple paged results control instance paged_results_test.py 1160 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to b'-1'. Previous value - b'0'. Modified suffix - cn=config.
Passed suites/paged_results/paged_results_test.py::test_maxsimplepaged_per_conn_failure[1] 0.72
------------------------------ Captured log call -------------------------------
paged_results_test.py 131 INFO Adding 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to 1. Previous value - b'-1'. Modified suffix - cn=config. paged_results_test.py 1142 INFO Set user bind paged_results_test.py 1145 INFO Create simple paged results control instance paged_results_test.py 1160 INFO Remove added users paged_results_test.py 153 INFO Deleting 20 users paged_results_test.py 168 INFO Set nsslapd-maxsimplepaged-per-conn to b'-1'. Previous value - b'1'. Modified suffix - cn=config.
Passed suites/password/password_test.py::test_password_delete_specific_password 0.07
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
password_test.py 42 INFO Running test_password_delete_specific_password... password_test.py 63 INFO test_password_delete_specific_password: PASSED
Passed suites/password/pbkdf2_upgrade_plugin_test.py::test_pbkdf2_upgrade 9.21
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/password/pwdAdmin_test.py::test_pwdAdmin_bypass 0.17
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. pwdAdmin_test.py 44 INFO test_pwdAdmin_init: Creating Password Administrator entries... pwdAdmin_test.py 83 INFO test_pwdAdmin_init: Configuring password policy... pwdAdmin_test.py 98 INFO Add aci to allow password admin to add/update entries... pwdAdmin_test.py 113 INFO test_pwdAdmin_init: Bind as the Password Administrator (before activating)... pwdAdmin_test.py 126 INFO test_pwdAdmin_init: Attempt to add entries with invalid passwords, these adds should fail...------------------------------ Captured log call -------------------------------
pwdAdmin_test.py 165 INFO test_pwdAdmin: Activate the Password Administator...
Passed suites/password/pwdAdmin_test.py::test_pwdAdmin_no_admin 0.10
No log output captured.
Passed suites/password/pwdAdmin_test.py::test_pwdAdmin_modify 0.15
No log output captured.
Passed suites/password/pwdAdmin_test.py::test_pwdAdmin_group 0.15
No log output captured.
Passed suites/password/pwdAdmin_test.py::test_pwdAdmin_config_validation 0.02
No log output captured.
Passed suites/password/pwdPolicy_attribute_test.py::test_change_pwd[on-off-UNWILLING_TO_PERFORM] 1.17
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ---------------------------- Captured stderr setup -----------------------------
ldap_add: Already exists (68) Container entries added. ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. pwdPolicy_attribute_test.py 38 INFO Adding user uid=simplepaged_test,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 66 INFO Enable fine-grained policy pwdPolicy_attribute_test.py 76 INFO Create password policy for subtree ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 87 INFO Add pwdpolicysubentry attribute to ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 98 INFO Create password policy for subtree uid=simplepaged_test,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 109 INFO Add pwdpolicysubentry attribute to uid=simplepaged_test,ou=people,dc=example,dc=com------------------------------ Captured log call -------------------------------
pwdPolicy_attribute_test.py 149 INFO Set passwordChange to "on" - cn="cn=nsPwPolicyEntry,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 161 INFO Set passwordChange to "off" - cn="cn=nsPwPolicyEntry,uid=simplepaged_test,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 174 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 190 INFO Bind as DM
Passed suites/password/pwdPolicy_attribute_test.py::test_change_pwd[off-off-UNWILLING_TO_PERFORM] 1.17
------------------------------ Captured log call -------------------------------
pwdPolicy_attribute_test.py 149 INFO Set passwordChange to "off" - cn="cn=nsPwPolicyEntry,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 161 INFO Set passwordChange to "off" - cn="cn=nsPwPolicyEntry,uid=simplepaged_test,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 174 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 190 INFO Bind as DM
Passed suites/password/pwdPolicy_attribute_test.py::test_change_pwd[off-on-None] 1.19
------------------------------ Captured log call -------------------------------
pwdPolicy_attribute_test.py 149 INFO Set passwordChange to "off" - cn="cn=nsPwPolicyEntry,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 161 INFO Set passwordChange to "on" - cn="cn=nsPwPolicyEntry,uid=simplepaged_test,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 174 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 190 INFO Bind as DM
Passed suites/password/pwdPolicy_attribute_test.py::test_change_pwd[on-on-None] 1.20
------------------------------ Captured log call -------------------------------
pwdPolicy_attribute_test.py 149 INFO Set passwordChange to "on" - cn="cn=nsPwPolicyEntry,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 161 INFO Set passwordChange to "on" - cn="cn=nsPwPolicyEntry,uid=simplepaged_test,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 174 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 190 INFO Bind as DM
Passed suites/password/pwdPolicy_attribute_test.py::test_pwd_min_age 14.54
------------------------------ Captured log call -------------------------------
pwdPolicy_attribute_test.py 227 INFO Set passwordminage to "10" - cn="cn=nsPwPolicyEntry,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 238 INFO Set passwordminage to "10" - cn="cn=nsPwPolicyEntry,uid=simplepaged_test,ou=people,dc=example,dc=com",cn=nsPwPolicyContainer,ou=people,dc=example,dc=com pwdPolicy_attribute_test.py 249 INFO Set passwordminage to "10" - cn=config pwdPolicy_attribute_test.py 262 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 273 INFO Bind as user and modify userPassword straight away after previous change pwdPolicy_attribute_test.py 280 INFO Wait 12 second pwdPolicy_attribute_test.py 284 INFO Bind as user and modify userPassword pwdPolicy_attribute_test.py 294 INFO Bind as DM
Passed suites/password/pwdPolicy_controls_test.py::test_pwd_must_change 2.48
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwdPolicy_controls_test.py 109 INFO Configure password policy with paswordMustChange set to "on" pwdPolicy_controls_test.py 116 INFO Reset userpassword as Directory Manager pwdPolicy_controls_test.py 125 INFO Bind should return ctrl with error code 2 (changeAfterReset)
Passed suites/password/pwdPolicy_controls_test.py::test_pwd_expired_grace_limit 6.84
------------------------------ Captured log call -------------------------------
pwdPolicy_controls_test.py 159 INFO Configure password policy with grace limit set tot 2 pwdPolicy_controls_test.py 164 INFO Change password and wait for it to expire pwdPolicy_controls_test.py 168 INFO Bind and use up one grace login (only one left) pwdPolicy_controls_test.py 178 INFO Use up last grace login, should get control pwdPolicy_controls_test.py 184 INFO No grace login available, bind should fail, and no control should be returned
Passed suites/password/pwdPolicy_controls_test.py::test_pwd_expiring_with_warning 5.49
------------------------------ Captured log call -------------------------------
pwdPolicy_controls_test.py 206 INFO Configure password policy pwdPolicy_controls_test.py 211 INFO Change password and get controls pwdPolicy_controls_test.py 222 INFO Warning has been sent, try the bind again, and recheck the expiring time
Passed suites/password/pwdPolicy_controls_test.py::test_pwd_expiring_with_no_warning 6.59
------------------------------ Captured log call -------------------------------
pwdPolicy_controls_test.py 250 INFO Configure password policy pwdPolicy_controls_test.py 255 INFO When the warning is less than the max age, we never send expiring control response pwdPolicy_controls_test.py 262 INFO Turn on sending expiring control regardless of warning pwdPolicy_controls_test.py 274 INFO Check expiring time again pwdPolicy_controls_test.py 285 INFO Turn off sending expiring control (restore the default setting)
Passed suites/password/pwdPolicy_inherit_global_test.py::test_entry_has_no_restrictions[off-off] 1.17
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. pwdPolicy_inherit_global_test.py 43 INFO Adding user uid=buser,dc=example,dc=com pwdPolicy_inherit_global_test.py 53 INFO Adding an aci for the bind user pwdPolicy_inherit_global_test.py 82 INFO Enable fine-grained policy pwdPolicy_inherit_global_test.py 90 INFO Create password policy for subtree ou=People,dc=example,dc=com pwdPolicy_inherit_global_test.py 101 INFO Add pwdpolicysubentry attribute to ou=People,dc=example,dc=com pwdPolicy_inherit_global_test.py 112 INFO Set the default settings for the policy container. pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is off pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is off------------------------------ Captured log call -------------------------------
pwdPolicy_inherit_global_test.py 164 INFO Set nsslapd-pwpolicy-inherit-global to off pwdPolicy_inherit_global_test.py 165 INFO Set passwordCheckSyntax to off pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is off pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is off pwdPolicy_inherit_global_test.py 174 INFO Bind as test user pwdPolicy_inherit_global_test.py 177 INFO Make sure an entry added to ou=people has no password syntax restrictions. pwdPolicy_inherit_global_test.py 193 INFO Bind as DM user pwdPolicy_inherit_global_test.py 195 INFO Remove cn=test0,ou=People,dc=example,dc=com
Passed suites/password/pwdPolicy_inherit_global_test.py::test_entry_has_no_restrictions[on-off] 1.16
------------------------------ Captured log call -------------------------------
pwdPolicy_inherit_global_test.py 164 INFO Set nsslapd-pwpolicy-inherit-global to on pwdPolicy_inherit_global_test.py 165 INFO Set passwordCheckSyntax to off pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is on pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is off pwdPolicy_inherit_global_test.py 174 INFO Bind as test user pwdPolicy_inherit_global_test.py 177 INFO Make sure an entry added to ou=people has no password syntax restrictions. pwdPolicy_inherit_global_test.py 193 INFO Bind as DM user pwdPolicy_inherit_global_test.py 195 INFO Remove cn=test0,ou=People,dc=example,dc=com
Passed suites/password/pwdPolicy_inherit_global_test.py::test_entry_has_no_restrictions[off-on] 1.17
------------------------------ Captured log call -------------------------------
pwdPolicy_inherit_global_test.py 164 INFO Set nsslapd-pwpolicy-inherit-global to off pwdPolicy_inherit_global_test.py 165 INFO Set passwordCheckSyntax to on pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is off pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is on pwdPolicy_inherit_global_test.py 174 INFO Bind as test user pwdPolicy_inherit_global_test.py 177 INFO Make sure an entry added to ou=people has no password syntax restrictions. pwdPolicy_inherit_global_test.py 193 INFO Bind as DM user pwdPolicy_inherit_global_test.py 195 INFO Remove cn=test0,ou=People,dc=example,dc=com
Passed suites/password/pwdPolicy_inherit_global_test.py::test_entry_has_restrictions[cn=config] 1.17
------------------------------ Captured log call -------------------------------
pwdPolicy_inherit_global_test.py 231 INFO Set nsslapd-pwpolicy-inherit-global to on pwdPolicy_inherit_global_test.py 232 INFO Set passwordCheckSyntax to on pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is on pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is on pwdPolicy_inherit_global_test.py 243 INFO Bind as test user pwdPolicy_inherit_global_test.py 246 INFO Try to add user with a short password (<9) pwdPolicy_inherit_global_test.py 257 INFO Try to add user with a long password (>9) pwdPolicy_inherit_global_test.py 272 INFO Bind as DM user pwdPolicy_inherit_global_test.py 274 INFO Remove cn=test0,ou=People,dc=example,dc=com pwdPolicy_inherit_global_test.py 278 INFO There is no cn=test0,ou=People,dc=example,dc=com, it is okay
Passed suites/password/pwdPolicy_inherit_global_test.py::test_entry_has_restrictions[cn="cn=nsPwPolicyEntry,ou=People,dc=example,dc=com",cn=nsPwPolicyContainer,ou=People,dc=example,dc=com] 1.17
------------------------------ Captured log call -------------------------------
pwdPolicy_inherit_global_test.py 231 INFO Set nsslapd-pwpolicy-inherit-global to on pwdPolicy_inherit_global_test.py 232 INFO Set passwordCheckSyntax to on pwdPolicy_inherit_global_test.py 135 INFO Default value of nsslapd-pwpolicy-inherit-global is on pwdPolicy_inherit_global_test.py 135 INFO Default value of passwordCheckSyntax is on pwdPolicy_inherit_global_test.py 243 INFO Bind as test user pwdPolicy_inherit_global_test.py 246 INFO Try to add user with a short password (<9) pwdPolicy_inherit_global_test.py 257 INFO Try to add user with a long password (>9) pwdPolicy_inherit_global_test.py 272 INFO Bind as DM user pwdPolicy_inherit_global_test.py 274 INFO Remove cn=test0,ou=People,dc=example,dc=com pwdPolicy_inherit_global_test.py 278 INFO There is no cn=test0,ou=People,dc=example,dc=com, it is okay
Passed suites/password/pwdPolicy_syntax_test.py::test_basic 11.14
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. pwdPolicy_syntax_test.py 30 INFO Enable global password policy. Check for syntax.------------------------------ Captured log call -------------------------------
pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinLength: length too short pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinDigits: does not contain minimum number of digits pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinAlphas: does not contain minimum number of alphas pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxRepeats: too many repeating characters pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinSpecials: does not contain minimum number of special characters pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinLowers: does not contain minimum number of lowercase characters pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMinUppers: does not contain minimum number of lowercase characters pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordDictCheck: Password found in dictionary pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordPalindrome: Password is palindrome pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxSequence: Max montonic sequence is not allowed pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxSequence: Max montonic sequence is not allowed pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxSequence: Max montonic sequence is not allowed pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxSequence: Max montonic sequence is not allowed pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxSeqSets: Max montonic sequence is not allowed pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxClassChars: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxClassChars: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxClassChars: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordMaxClassChars: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordBadWords: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordBadWords: Too may consecutive characters from the same class pwdPolicy_syntax_test.py 116 INFO Invalid password correctly rejected by passwordUserAttributes: Password found in user entry pwdPolicy_syntax_test.py 307 INFO pwdPolicy tests PASSED
Passed suites/password/pwdPolicy_token_test.py::test_token_lengths 3.72
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwdPolicy_token_test.py 59 INFO Testing password len 4 token (test) pwdPolicy_token_test.py 64 INFO Password correctly rejected: {'desc': 'Constraint violation', 'info': 'invalid password syntax - password based off of user entry'} pwdPolicy_token_test.py 59 INFO Testing password len 6 token (test_u) pwdPolicy_token_test.py 64 INFO Password correctly rejected: {'desc': 'Constraint violation', 'info': 'invalid password syntax - password based off of user entry'} pwdPolicy_token_test.py 59 INFO Testing password len 10 token (test_user1) pwdPolicy_token_test.py 64 INFO Password correctly rejected: {'desc': 'Constraint violation', 'info': 'invalid password syntax - password based off of user entry'}
Passed suites/password/pwdPolicy_warning_test.py::test_different_values[ ] 0.02
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 247 INFO Get the default value pwdPolicy_warning_test.py 251 INFO An invalid value is being tested pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to pwdPolicy_warning_test.py 255 INFO Now check the value is unchanged pwdPolicy_warning_test.py 258 INFO Invalid value was rejected correctly
Passed suites/password/pwdPolicy_warning_test.py::test_different_values[junk123] 0.03
------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 247 INFO Get the default value pwdPolicy_warning_test.py 251 INFO An invalid value is being tested pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to junk123 pwdPolicy_warning_test.py 255 INFO Now check the value is unchanged pwdPolicy_warning_test.py 258 INFO Invalid value junk123 was rejected correctly
Passed suites/password/pwdPolicy_warning_test.py::test_different_values[on] 1.04
------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 247 INFO Get the default value pwdPolicy_warning_test.py 260 INFO A valid value is being tested pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to on pwdPolicy_warning_test.py 263 INFO Now check that the value has been changed pwdPolicy_warning_test.py 266 INFO passwordSendExpiringTime is now set to on pwdPolicy_warning_test.py 268 INFO Set passwordSendExpiringTime back to the default value pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to b'off'
Passed suites/password/pwdPolicy_warning_test.py::test_different_values[off] 1.27
------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 247 INFO Get the default value pwdPolicy_warning_test.py 260 INFO A valid value is being tested pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to off pwdPolicy_warning_test.py 263 INFO Now check that the value has been changed pwdPolicy_warning_test.py 266 INFO passwordSendExpiringTime is now set to off pwdPolicy_warning_test.py 268 INFO Set passwordSendExpiringTime back to the default value pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to b'off'
Passed suites/password/pwdPolicy_warning_test.py::test_expiry_time 0.13
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 41 INFO Get the default values pwdPolicy_warning_test.py 48 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 295 INFO Get the password expiry warning time pwdPolicy_warning_test.py 297 INFO Binding with (uid=tuser,dc=example,dc=com) and requesting the password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 300 INFO Check whether the time is returned pwdPolicy_warning_test.py 304 INFO user's password will expire in 172800 seconds pwdPolicy_warning_test.py 306 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_password_warning[passwordSendExpiringTime-off] 0.68
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 41 INFO Get the default values pwdPolicy_warning_test.py 48 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 337 INFO Set configuration parameter pwdPolicy_warning_test.py 162 INFO Setting passwordSendExpiringTime to off pwdPolicy_warning_test.py 341 INFO Binding with (uid=tuser,dc=example,dc=com) and requesting password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 344 INFO Check the state of the control pwdPolicy_warning_test.py 347 INFO Password Expiry warning time is not returned as passwordSendExpiringTime is set to off pwdPolicy_warning_test.py 352 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_password_warning[passwordWarning-3600] 0.64
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 41 INFO Get the default values pwdPolicy_warning_test.py 48 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 337 INFO Set configuration parameter pwdPolicy_warning_test.py 162 INFO Setting passwordWarning to 3600 pwdPolicy_warning_test.py 341 INFO Binding with (uid=tuser,dc=example,dc=com) and requesting password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 344 INFO Check the state of the control pwdPolicy_warning_test.py 350 INFO (uid=tuser,dc=example,dc=com) password will expire in 172799 seconds pwdPolicy_warning_test.py 352 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_with_different_password_states 0.27
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 41 INFO Get the default values pwdPolicy_warning_test.py 48 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 385 INFO Expire user's password by changingpasswordExpirationTime timestamp pwdPolicy_warning_test.py 390 INFO Old passwordExpirationTime: b'20180930234911Z' pwdPolicy_warning_test.py 392 INFO New passwordExpirationTime: 20180830234911Z pwdPolicy_warning_test.py 396 INFO Attempting to bind with user uid=tuser,dc=example,dc=com and retrive the password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 400 INFO Bind Failed, error: /usr/lib64/python3.6/site-packages/ldap/ldapobject.py:313: ldap.INVALID_CREDENTIALS: {'desc': 'Invalid credentials', 'info': 'password expired!'} pwdPolicy_warning_test.py 402 INFO Rebinding as DM pwdPolicy_warning_test.py 405 INFO Reverting back user's passwordExpirationTime pwdPolicy_warning_test.py 409 INFO Rebinding with uid=tuser,dc=example,dc=com and retrieving the password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 412 INFO Check that the control is returned pwdPolicy_warning_test.py 416 INFO user's password will expire in 172800 seconds pwdPolicy_warning_test.py 418 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_default_behavior 0.14
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 78 INFO Get the default values pwdPolicy_warning_test.py 84 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 445 INFO Binding with uid=tuser,dc=example,dc=com and requesting the password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 448 INFO Check that no control is returned pwdPolicy_warning_test.py 451 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_when_maxage_and_warning_are_the_same 0.20
------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 78 INFO Get the default values pwdPolicy_warning_test.py 84 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 480 INFO Set the new values pwdPolicy_warning_test.py 484 INFO First change user's password to reset its password expiration time pwdPolicy_warning_test.py 490 INFO Binding with uid=tuser,dc=example,dc=com and requesting the password expiry warning time pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 493 INFO Check that control is returned evenif passwordSendExpiringTime is set to off pwdPolicy_warning_test.py 498 INFO user's password will expire in 86400 seconds pwdPolicy_warning_test.py 500 INFO Rebinding as DM
Passed suites/password/pwdPolicy_warning_test.py::test_with_local_policy 0.14
---------------------------- Captured stderr setup -----------------------------
Container entries added. ------------------------------ Captured log setup ------------------------------
pwdPolicy_warning_test.py 41 INFO Get the default values pwdPolicy_warning_test.py 48 INFO Set the new values pwdPolicy_warning_test.py 115 INFO Add the user pwdPolicy_warning_test.py 132 INFO Setting fine grained policy for user (uid=tuser,dc=example,dc=com)------------------------------ Captured log call -------------------------------
pwdPolicy_warning_test.py 528 INFO Attempting to get password expiry warning time for user uid=tuser,dc=example,dc=com pwdPolicy_warning_test.py 149 INFO Bind with the user and request the password expiry warning time pwdPolicy_warning_test.py 531 INFO Check that the control is not returned pwdPolicy_warning_test.py 534 INFO Password expiry warning time is not returned pwdPolicy_warning_test.py 536 INFO Rebinding as DM
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[CLEAR] 0.21
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test CLEAR PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[CRYPT] 0.16
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test CRYPT PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[CRYPT-MD5] 0.33
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test CRYPT-MD5 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[CRYPT-SHA256] 0.17
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test CRYPT-SHA256 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[CRYPT-SHA512] 0.17
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test CRYPT-SHA512 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[MD5] 0.27
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test MD5 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SHA] 0.20
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SHA PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SHA256] 0.20
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SHA256 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SHA384] 0.20
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SHA384 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SHA512] 0.32
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SHA512 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SMD5] 0.21
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SMD5 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SSHA] 0.21
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SSHA PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SSHA256] 0.21
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SSHA256 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SSHA384] 0.21
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SSHA384 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[SSHA512] 0.21
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test SSHA512 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[PBKDF2_SHA256] 0.51
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test PBKDF2_SHA256 PASSED
Passed suites/password/pwd_algo_test.py::test_pwd_algo_test[DEFAULT] 0.46
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 139 INFO Test DEFAULT PASSED
Passed suites/password/pwd_algo_test.py::test_pbkdf2_algo 2.60
------------------------------ Captured log call -------------------------------
pwd_algo_test.py 170 INFO Test PASSED
Passed suites/password/pwd_lockout_bypass_test.py::test_lockout_bypass 0.22
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/password/pwd_log_test.py::test_hide_unhashed_pwd 4.36
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwd_log_test.py 97 INFO Test complete pwd_log_test.py 112 INFO Test complete
Passed suites/password/pwp_history_test.py::test_basic 8.40
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.------------------------------ Captured log call -------------------------------
pwp_history_test.py 62 INFO Configured password policy. pwp_history_test.py 95 INFO Password change correctly rejected pwp_history_test.py 173 INFO Correct number of passwords found in history. pwp_history_test.py 187 INFO Password change correctly rejected pwp_history_test.py 199 INFO Password change correctly rejected pwp_history_test.py 209 INFO Password change correctly rejected pwp_history_test.py 246 INFO Password change correctly rejected pwp_history_test.py 251 INFO Test suite PASSED.
Passed suites/password/regression_test.py::test_pwp_local_unlock 4.47
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ou=people,dc=example,dc=com ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. regression_test.py 44 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to on regression_test.py 52 INFO Configure subtree password policy for ou=people,dc=example,dc=com regression_test.py 74 INFO Adding user-uid=UIDpwtest1,ou=people,dc=example,dc=com------------------------------ Captured log call -------------------------------
regression_test.py 107 INFO Verify user can bind... regression_test.py 110 INFO Test passwordUnlock default - user should be able to reset password after lockout regression_test.py 121 INFO Verify account is locked regression_test.py 125 INFO Wait for lockout duration... regression_test.py 128 INFO Check if user can now bind with correct password
Passed suites/password/regression_test.py::test_trivial_passw_check[CNpwtest1] 0.13
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with CNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[SNpwtest1] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with SNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[UIDpwtest1] 0.08
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with UIDpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[MAILpwtest1@redhat.com] 0.10
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with MAILpwtest1@redhat.com
Passed suites/password/regression_test.py::test_trivial_passw_check[GNpwtest1] 0.15
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with GNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[CNpwtest1ZZZZ] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with CNpwtest1ZZZZ
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZZZZCNpwtest1] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZZZZCNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[ZCNpwtest1] 0.08
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZCNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[CNpwtest1Z] 0.10
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with CNpwtest1Z
Passed suites/password/regression_test.py::test_trivial_passw_check[ZCNpwtest1Z] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZCNpwtest1Z
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZCNpwtest1] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZCNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[CNpwtest1ZZ] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with CNpwtest1ZZ
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZCNpwtest1ZZ] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZCNpwtest1ZZ
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZZCNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZZCNpwtest1
Passed suites/password/regression_test.py::test_trivial_passw_check[CNpwtest1ZZZ] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with CNpwtest1ZZZ
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZZCNpwtest1ZZZ] 0.13
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZZCNpwtest1ZZZ
Passed suites/password/regression_test.py::test_trivial_passw_check[ZZZZZZCNpwtest1ZZZZZZZZ] 0.09
------------------------------ Captured log call -------------------------------
regression_test.py 153 INFO Replace userPassword attribute with ZZZZZZCNpwtest1ZZZZZZZZ
Passed suites/password/regression_test.py::test_global_vs_local[CNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with CNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[SNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with SNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[UIDpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with UIDpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[MAILpwtest1@redhat.com] 0.18
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with MAILpwtest1@redhat.com
Passed suites/password/regression_test.py::test_global_vs_local[GNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with GNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[CNpwtest1ZZZZ] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with CNpwtest1ZZZZ
Passed suites/password/regression_test.py::test_global_vs_local[ZZZZZCNpwtest1] 0.14
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZZZZCNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[ZCNpwtest1] 1.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZCNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[CNpwtest1Z] 0.18
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with CNpwtest1Z
Passed suites/password/regression_test.py::test_global_vs_local[ZCNpwtest1Z] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZCNpwtest1Z
Passed suites/password/regression_test.py::test_global_vs_local[ZZCNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZCNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[CNpwtest1ZZ] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with CNpwtest1ZZ
Passed suites/password/regression_test.py::test_global_vs_local[ZZCNpwtest1ZZ] 0.17
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZCNpwtest1ZZ
Passed suites/password/regression_test.py::test_global_vs_local[ZZZCNpwtest1] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZZCNpwtest1
Passed suites/password/regression_test.py::test_global_vs_local[CNpwtest1ZZZ] 0.17
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with CNpwtest1ZZZ
Passed suites/password/regression_test.py::test_global_vs_local[ZZZCNpwtest1ZZZ] 0.12
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZZCNpwtest1ZZZ
Passed suites/password/regression_test.py::test_global_vs_local[ZZZZZZCNpwtest1ZZZZZZZZ] 0.15
------------------------------ Captured log call -------------------------------
regression_test.py 179 INFO Configure Pwpolicy with PasswordCheckSyntax and nsslapd-pwpolicy-local set to off regression_test.py 183 INFO Replace userPassword attribute with ZZZZZZCNpwtest1ZZZZZZZZ
Passed suites/plugins/acceptance_test.py::test_acctpolicy 13.34
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. topologies.py 106 INFO Instance with parameters {'ldap-port': 38902, 'ldap-secureport': 63602, 'server-id': 'standalone2', 'suffix': 'dc=example,dc=com'} was created.----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_attruniq 16.16
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_automember 21.87
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_dna 14.74
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_linkedattrs 20.12
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_memberof 37.19
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_mep 14.86
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_passthru 19.06
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_referint 10.26
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_retrocl 19.30
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/acceptance_test.py::test_rootdn 40.68
----------------------------- Captured stderr call -----------------------------
Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details. Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details. Job for dirsrv@standalone1.service failed because the control process exited with error code. See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for details.
Passed suites/plugins/accpol_test.py::test_glact_inact 27.27
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. accpol_test.py 32 INFO Configuring Global account policy plugin, pwpolicy attributes and restarting the server------------------------------ Captured log call -------------------------------
accpol_test.py 343 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 345 INFO Sleep for 10 secs to check if account is not inactivated, expected value 0 accpol_test.py 347 INFO Account should not be inactivated since AccountInactivityLimit not exceeded accpol_test.py 349 INFO Sleep for 3 more secs to check if account is inactivated accpol_test.py 352 INFO Sleep +10 secs to check if account glinactusr3 is inactivated accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glremv_lastlogin 19.47
------------------------------ Captured log call -------------------------------
accpol_test.py 386 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 388 INFO Sleep for 6 secs to check if account is not inactivated, expected value 0 accpol_test.py 390 INFO Account should not be inactivated since AccountInactivityLimit not exceeded accpol_test.py 249 INFO Delete lastLoginTime/createTimeStamp/ModifyTimeStamp attribute from user account accpol_test.py 393 INFO Sleep for 7 more secs to check if account is inactivated accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 397 INFO Check if account is activated, expected 0 accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glact_login 23.44
------------------------------ Captured log call -------------------------------
accpol_test.py 426 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 428 INFO Sleep for 13 secs to check if account is inactivated, expected error 19 accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 432 INFO Check if account is activated, expected 0 accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glinact_limit 123.18
------------------------------ Captured log call -------------------------------
accpol_test.py 484 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 486 INFO Sleep for 9 secs to check if account is not inactivated, expected 0 accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 508 INFO Check if account is activated, expected 0 accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glnologin_attr 85.45
------------------------------ Captured log call -------------------------------
accpol_test.py 567 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 568 INFO Set attribute StateAttrName to createTimestamp, loginTime attr wont be considered accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 572 INFO Sleep for 9 secs to check if account is not inactivated, expected 0 accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 597 INFO Set attribute StateAttrName to lastLoginTime, the default accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 601 INFO Check if account is activated, expected 0 accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glnoalt_stattr 56.90
------------------------------ Captured log call -------------------------------
accpol_test.py 632 INFO Set attribute altStateAttrName to 1.1 accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 636 INFO Sleep for 13 secs to check if account is not inactivated, expected 0 accpol_test.py 639 INFO lastLoginTime attribute is added from the above ldap bind by userdn accpol_test.py 249 INFO Delete lastLoginTime/createTimeStamp/ModifyTimeStamp attribute from user account accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glattr_modtime 45.11
------------------------------ Captured log call -------------------------------
accpol_test.py 679 INFO Set attribute altStateAttrName to modifyTimestamp accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 683 INFO Sleep for 13 secs to check if account is inactivated, expected 0 accpol_test.py 197 INFO Check ModifyTimeStamp attribute present for user accpol_test.py 232 INFO Enable account by replacing cn attribute value, value of modifyTimeStamp changed accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 249 INFO Delete lastLoginTime/createTimeStamp/ModifyTimeStamp attribute from user account accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glnoalt_nologin 50.72
------------------------------ Captured log call -------------------------------
accpol_test.py 734 INFO Set attribute altStateAttrName to 1.1 accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 736 INFO Set attribute alwaysrecordlogin to No accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 740 INFO Sleep for 13 secs to check if account is not inactivated, expected 0 accpol_test.py 745 INFO Set attribute altStateAttrName to createTimestamp accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 750 INFO Reset the default attribute values accpol_test.py 184 INFO Modify attribute value for a given DN accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glinact_nsact 33.16
------------------------------ Captured log call -------------------------------
accpol_test.py 790 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 792 INFO Sleep for 3 secs to check if account is not inactivated, expected value 0 accpol_test.py 157 INFO Account activate/in-activate/status using ns-activate/inactivate/accountstatus.pl accpol_test.py 161 INFO Running ns-activate.pl for user uid=nsactusr1,ou=groups,dc=example,dc=com accpol_test.py 175 INFO output: b'uid=nsactusr1,ou=groups,dc=example,dc=com already activated.\n' accpol_test.py 795 INFO Sleep for 10 secs to check if account is inactivated, expected value 19 accpol_test.py 157 INFO Account activate/in-activate/status using ns-activate/inactivate/accountstatus.pl accpol_test.py 161 INFO Running ns-activate.pl for user uid=nsactusr1,ou=groups,dc=example,dc=com accpol_test.py 175 INFO output: b'uid=nsactusr1,ou=groups,dc=example,dc=com already activated.\n' accpol_test.py 157 INFO Account activate/in-activate/status using ns-activate/inactivate/accountstatus.pl accpol_test.py 161 INFO Running ns-accountstatus.pl for user uid=nsactusr1,ou=groups,dc=example,dc=com accpol_test.py 175 INFO output: b'uid=nsactusr1,ou=groups,dc=example,dc=com - inactivated (inactivity limit exceeded).\n' accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 157 INFO Account activate/in-activate/status using ns-activate/inactivate/accountstatus.pl accpol_test.py 161 INFO Running ns-accountstatus.pl for user uid=nsactusr1,ou=groups,dc=example,dc=com accpol_test.py 175 INFO output: b'uid=nsactusr1,ou=groups,dc=example,dc=com - activated.\n' accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glinact_acclock 40.55
------------------------------ Captured log call -------------------------------
accpol_test.py 835 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 837 INFO Sleep for 3 secs and try invalid binds to lockout the user accpol_test.py 114 INFO Lockout user account by attempting invalid password binds accpol_test.py 841 INFO Sleep for 10 secs to check if account is inactivated, expected value 19 accpol_test.py 845 INFO Add lastLoginTime to activate the user account accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 849 INFO Checking if account is unlocked after passwordlockoutduration, but inactivated after accountInactivityLimit accpol_test.py 114 INFO Lockout user account by attempting invalid password binds accpol_test.py 853 INFO Account is expected to be unlocked after 5 secs of passwordlockoutduration accpol_test.py 857 INFO Sleep 13s and check if account inactivated based on accountInactivityLimit, expected 19 accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_glnact_pwexp 50.45
------------------------------ Captured log call -------------------------------
accpol_test.py 901 INFO AccountInactivityLimit set to 12. Account will be inactivated if not accessed in 12 secs accpol_test.py 902 INFO Passwordmaxage is set to 9. Password will expire in 9 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 905 INFO Sleep for 9 secs and check if password expired accpol_test.py 911 INFO Add lastLoginTime to activate the user account accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 135 INFO Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com accpol_test.py 135 INFO Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com accpol_test.py 922 INFO Sleep for 4 secs and check if account is now inactivated, expected error 19 accpol_test.py 135 INFO Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 135 INFO Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_locact_inact 31.47
------------------------------ Captured log setup ------------------------------
accpol_test.py 74 INFO Adding Local account policy plugin configuration entries------------------------------ Captured log call -------------------------------
accpol_test.py 974 INFO AccountInactivityLimit set to 10. Account will be inactivated if not accessed in 10 secs accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 976 INFO Sleep for 9 secs to check if account is not inactivated, expected value 0 accpol_test.py 978 INFO Account should not be inactivated since AccountInactivityLimit not exceeded accpol_test.py 980 INFO Sleep for 2 more secs to check if account is inactivated accpol_test.py 983 INFO Sleep +9 secs to check if account inactusr3 is inactivated accpol_test.py 986 INFO Add lastLoginTime attribute to all users and check if its activated accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_locinact_modrdn 27.43
------------------------------ Captured log call -------------------------------
accpol_test.py 1020 INFO Account should not be inactivated since the subtree is not configured accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 1022 INFO Sleep for 11 secs to check if account is not inactivated, expected value 0 accpol_test.py 1025 INFO Moving users from ou=groups to ou=people subtree accpol_test.py 1034 INFO Then wait for 11 secs and check if entries are inactivated accpol_test.py 214 INFO Enable account by replacing lastLoginTime/createTimeStamp/ModifyTimeStamp attribute accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/accpol_test.py::test_locact_modrdn 15.29
------------------------------ Captured log call -------------------------------
accpol_test.py 1066 INFO Account should be inactivated since the subtree is configured accpol_test.py 266 INFO add_users: Pass all of these as parameters suffix, subtree, userid and nousrs accpol_test.py 1068 INFO Sleep for 11 secs to check if account is inactivated, expected value 19 accpol_test.py 1071 INFO Moving users from ou=people to ou=groups subtree accpol_test.py 1079 INFO Sleep for +2 secs and check users from both ou=people and ou=groups subtree accpol_test.py 285 INFO del_users: Pass all of these as parameters suffix, subtree, userid and nousrs
Passed suites/plugins/attr_nsslapd-pluginarg_test.py::test_duplicate_values 3.41
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created. attr_nsslapd-pluginarg_test.py 30 INFO Ticket 47431 - 0: Enable 7bit plugin...------------------------------ Captured log call -------------------------------
attr_nsslapd-pluginarg_test.py 55 INFO Ticket 47431 - 1: Check 26 duplicate values are treated as one... attr_nsslapd-pluginarg_test.py 58 DEBUG modify_s cn=7-bit check,cn=plugins,cn=config attr_nsslapd-pluginarg_test.py 82 DEBUG line: [28/Sep/2018:20:05:27.951204860 -0400] - WARN - str2entry_dupcheck - 26 duplicate values for attribute type nsslapd-pluginarg2 detected in entry cn=7-bit check,cn=plugins,cn=config. Extra values ignored. attr_nsslapd-pluginarg_test.py 83 INFO Expected error "str2entry_dupcheck.* duplicate values for attribute type nsslapd-pluginarg2 detected in entry cn=7-bit check,cn=plugins,cn=config." logged in /var/log/dirsrv/slapd-standalone1/errors attr_nsslapd-pluginarg_test.py 85 INFO Ticket 47431 - 1: done
Passed suites/plugins/attr_nsslapd-pluginarg_test.py::test_multiple_value 4.77
------------------------------ Captured log call -------------------------------
attr_nsslapd-pluginarg_test.py 110 INFO Ticket 47431 - 2: Check two values belonging to one arg is fixed... attr_nsslapd-pluginarg_test.py 130 DEBUG line - [28/Sep/2018:20:05:32.477811337 -0400] - DEBUG - NS7bitAttr - NS7bitAttr_Init - 0: uid attr_nsslapd-pluginarg_test.py 131 DEBUG ATTRS[0] uid attr_nsslapd-pluginarg_test.py 135 DEBUG uid was logged attr_nsslapd-pluginarg_test.py 130 DEBUG line - [28/Sep/2018:20:05:32.478689338 -0400] - DEBUG - NS7bitAttr - NS7bitAttr_Init - 1: mail attr_nsslapd-pluginarg_test.py 131 DEBUG ATTRS[1] mail attr_nsslapd-pluginarg_test.py 135 DEBUG mail was logged attr_nsslapd-pluginarg_test.py 130 DEBUG line - [28/Sep/2018:20:05:32.479247344 -0400] - DEBUG - NS7bitAttr - NS7bitAttr_Init - 2: userpassword attr_nsslapd-pluginarg_test.py 131 DEBUG ATTRS[2] userpassword attr_nsslapd-pluginarg_test.py 135 DEBUG userpassword was logged attr_nsslapd-pluginarg_test.py 130 DEBUG line - [28/Sep/2018:20:05:32.479778942 -0400] - DEBUG - NS7bitAttr - NS7bitAttr_Init - 3: , attr_nsslapd-pluginarg_test.py 131 DEBUG ATTRS[3] , attr_nsslapd-pluginarg_test.py 135 DEBUG , was logged attr_nsslapd-pluginarg_test.py 130 DEBUG line - [28/Sep/2018:20:05:32.480300679 -0400] - DEBUG - NS7bitAttr - NS7bitAttr_Init - 4: dc=example,dc=com attr_nsslapd-pluginarg_test.py 131 DEBUG ATTRS[4] dc=example,dc=com attr_nsslapd-pluginarg_test.py 135 DEBUG dc=example,dc=com was logged attr_nsslapd-pluginarg_test.py 141 INFO Ticket 47431 - 2: done
Passed suites/plugins/attr_nsslapd-pluginarg_test.py::test_missing_args 3.63
------------------------------ Captured log call -------------------------------
attr_nsslapd-pluginarg_test.py 169 INFO Ticket 47431 - 3: Check missing args are fixed... attr_nsslapd-pluginarg_test.py 196 DEBUG uid was logged attr_nsslapd-pluginarg_test.py 196 DEBUG mail was logged attr_nsslapd-pluginarg_test.py 196 DEBUG userpassword was logged attr_nsslapd-pluginarg_test.py 196 DEBUG , was logged attr_nsslapd-pluginarg_test.py 196 DEBUG dc=example,dc=com was logged attr_nsslapd-pluginarg_test.py 202 INFO Ticket 47431 - 3: done attr_nsslapd-pluginarg_test.py 203 INFO Test complete
Passed suites/plugins/memberof_test.py::test_betxnpostoperation_replace 4.43
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists OK user dirsrv exists ------------------------------ Captured log setup ------------------------------
topologies.py 106 INFO Instance with parameters {'ldap-port': 38901, 'ldap-secureport': 63601, 'server-id': 'standalone1', 'suffix': 'dc=example,dc=com'} was created.
Passed suites/plugins/memberof_test.py::test_memberofgroupattr_add 0.00
No log output captured.
Passed suites/plugins/memberof_test.py::test_enable 4.43
------------------------------ Captured log call -------------------------------
memberof_test.py 179 INFO Enable MemberOf plugin
Passed suites/plugins/memberof_test.py::test_member_add 0.02
------------------------------ Captured log call -------------------------------
memberof_test.py 65 INFO Create user uid=user_memofenh1,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofenh2,ou=people,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp1,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp2,ou=groups,dc=example,dc=com memberof_test.py 209 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (member) memberof_test.py 210 INFO Update b'uid=user_memofenh2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 213 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' (member) memberof_test.py 214 INFO Update b'uid=user_memofenh2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_member_delete_gr1 0.01
------------------------------ Captured log call -------------------------------
memberof_test.py 244 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (member) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_member_delete_gr2 0.01
------------------------------ Captured log call -------------------------------
memberof_test.py 276 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_member_delete_all 0.01
------------------------------ Captured log call -------------------------------
memberof_test.py 308 INFO Update b'uid=user_memofenh2,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 312 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' (member) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com'
Passed suites/plugins/memberof_test.py::test_member_after_restart 8.79
------------------------------ Captured log call -------------------------------
memberof_test.py 347 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (member) memberof_test.py 351 INFO Update b'uid=user_memofenh2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 362 INFO Remove uniqueMember as a memberofgrpattr memberof_test.py 369 INFO Assert that this change of configuration did change the already set values memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_memberofgroupattr_uid 0.00
------------------------------ Captured log call -------------------------------
memberof_test.py 398 ERROR Setting 'memberUid' as memberofgroupattr is rejected (expected)
Passed suites/plugins/memberof_test.py::test_member_add_duplicate_usr1 0.00
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 420 INFO Try b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' (member) memberof_test.py 427 ERROR b'uid=user_memofenh1,ou=people,dc=example,dc=com' already member of b'cn=group_memofegrp1,ou=groups,dc=example,dc=com' --> fail (expected)
Passed suites/plugins/memberof_test.py::test_member_add_duplicate_usr2 0.26
------------------------------ Captured log call -------------------------------
memberof_test.py 448 INFO Check initial status memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 458 INFO Try b'uid=user_memofenh2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' (member) memberof_test.py 465 ERROR b'uid=user_memofenh2,ou=people,dc=example,dc=com' already member of b'cn=group_memofegrp2,ou=groups,dc=example,dc=com' --> fail (expected) memberof_test.py 468 INFO Check final status memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_member_uniquemember_same_user 0.29
------------------------------ Captured log call -------------------------------
memberof_test.py 555 INFO Check initial status memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 81 INFO Create group cn=group_memofegrp3,ou=groups,dc=example,dc=com memberof_test.py 567 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp3,ou=groups,dc=example,dc=com' (member) memberof_test.py 568 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp3,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 580 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is not memberof b'cn=group_memofegrp3,ou=groups,dc=example,dc=com' (member) memberof_test.py 584 INFO Update b'uid=user_memofenh2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp3,ou=groups,dc=example,dc=com' (member) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 611 INFO Checking final status memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_member_not_exists 0.01
------------------------------ Captured log call -------------------------------
memberof_test.py 669 INFO Checking Initial status memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 81 INFO Create group cn=group_memofegrp015,ou=groups,dc=example,dc=com memberof_test.py 689 INFO Update b'uid=user_dummy1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp015,ou=groups,dc=example,dc=com' (member) memberof_test.py 690 INFO Update b'uid=user_dummy2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp015,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_member_not_exists_complex 0.02
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp016,ou=groups,dc=example,dc=com memberof_test.py 804 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp016,ou=groups,dc=example,dc=com' (member) memberof_test.py 805 INFO Update b'uid=user_memofenh1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp016,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 833 INFO Update b'uid=user_dummy1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp016,ou=groups,dc=example,dc=com' (member) memberof_test.py 843 INFO Update b'uid=user_dummy1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp016,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_1 0.03
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser2,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser3,ou=people,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp017,ou=groups,dc=example,dc=com memberof_test.py 1009 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (member) memberof_test.py 1010 INFO Update b'uid=user_memofuser2,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 1011 INFO Update b'uid=user_memofuser3,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (memberuid) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com'
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_2 0.04
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 81 INFO Create group cn=group_memofegrp018,ou=groups,dc=example,dc=com memberof_test.py 1259 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (member) memberof_test.py 1260 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 1261 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is memberof b'cn=group_memofegrp017,ou=groups,dc=example,dc=com' (memberuid) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp018,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 1281 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp018,ou=groups,dc=example,dc=com' (member) memberof_test.py 1282 INFO Update b'uid=user_memofuser1,ou=people,dc=example,dc=com' is no longer memberof b'cn=group_memofegrp018,ou=groups,dc=example,dc=com' (uniqueMember) memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp017,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_3 0.06
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser2,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser3,ou=people,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp019_2,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp019_3,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp019_1,ou=groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_1,ou=groups,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'cn=group_memofegrp019_2,ou=groups,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp019_1,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp019_3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_4 0.06
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_5,ou=groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_4,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_5 0.06
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser2,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser3,ou=people,dc=example,dc=com memberof_test.py 65 INFO Create user uid=user_memofuser4,ou=people,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 81 INFO Create group cn=group_memofegrp020_5,ou=groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_4,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_4,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 92 INFO Check b'cn=group_memofegrp020_1,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 99 INFO uniqueMember: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_1,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_2,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 99 INFO uniqueMember: uid=user_memofuser2,ou=people,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_2,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_3,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 99 INFO uniqueMember: uid=user_memofuser3,ou=people,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_3,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_4,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 99 INFO uniqueMember: uid=user_memofuser4,ou=people,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_4,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'cn=group_memofegrp020_1,ou=groups,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'cn=group_memofegrp020_1,ou=groups,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'cn=group_memofegrp020_2,ou=groups,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'cn=group_memofegrp020_2,ou=groups,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'cn=group_memofegrp020_3,ou=groups,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'cn=group_memofegrp020_3,ou=groups,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'cn=group_memofegrp020_4,ou=groups,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'cn=group_memofegrp020_4,ou=groups,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.member = b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 99 INFO member: uid=user_memofuser1,ou=people,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_1,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_2,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_3,ou=groups,dc=example,dc=com memberof_test.py 99 INFO member: cn=group_memofegrp020_4,ou=groups,dc=example,dc=com memberof_test.py 92 INFO Check b'cn=group_memofegrp020_5,ou=groups,dc=example,dc=com'.uniqueMember = b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com
Passed suites/plugins/memberof_test.py::test_complex_group_scenario_6 5.11
------------------------------ Captured log call -------------------------------
memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_4,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp020_5,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser2,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_2,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser3,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofuser4,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp020_4,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp016,ou=Groups,dc=example,dc=com memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn=group_memofegrp3,ou=Groups,dc=example,dc=com memberof_test.py 117 INFO --> membership verified memberof_test.py 107 INFO Lookup memberof from b'uid=user_memofenh1,ou=people,dc=example,dc=com' memberof_test.py 114 INFO memberof: cn=group_memofegrp1,ou=Groups,dc=example,dc=com memberof_test.py 114 INFO memberof: cn