Last active
August 29, 2015 14:07
-
-
Save fatmcgav/be7bc2e39abab08a094f to your computer and use it in GitHub Desktop.
Puppet openldap debug log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo puppet apply -vd --modulepath modules/ openldap-test.pp | |
Info: Loading facts in /vagrant/puppet/modules/stdlib/lib/facter/facter_dot_d.rb | |
Info: Loading facts in /vagrant/puppet/modules/stdlib/lib/facter/pe_version.rb | |
Info: Loading facts in /vagrant/puppet/modules/stdlib/lib/facter/puppet_vardir.rb | |
Info: Loading facts in /vagrant/puppet/modules/stdlib/lib/facter/root_home.rb | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server.pp' in environment production | |
Debug: Automatically imported openldap::server from openldap/server into production | |
Warning: Config file /etc/puppet/hiera.yaml not found, using Hiera defaults | |
Debug: hiera(): Hiera YAML backend starting | |
Debug: hiera(): Looking up openldap::server::package in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::confdir in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::conffile in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::service in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::service_hasstatus in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::owner in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::group in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::enable in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::start in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::provider in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ssl_key in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ssl_cert in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ssl_ca in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::databases in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ldap_ifs in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ldaps_ifs in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: hiera(): Looking up openldap::server::ldapi_ifs in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server/install.pp' in environment production | |
Debug: Automatically imported openldap::server::install from openldap/server/install into production | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/client/utils.pp' in environment production | |
Debug: Automatically imported openldap::client::utils from openldap/client/utils into production | |
Debug: hiera(): Looking up openldap::client::utils::package in YAML backend | |
Debug: hiera(): Looking for data source common | |
Debug: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Debug: Executing '/bin/rpm --version' | |
Debug: Executing '/bin/rpm -ql rpm' | |
Debug: Executing '/bin/rpm --version' | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server/config.pp' in environment production | |
Debug: Automatically imported openldap::server::config from openldap/server/config into production | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server/service.pp' in environment production | |
Debug: Automatically imported openldap::server::service from openldap/server/service into production | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server/slapdconf.pp' in environment production | |
Debug: Automatically imported openldap::server::slapdconf from openldap/server/slapdconf into production | |
Debug: importing '/vagrant/puppet/modules/openldap/manifests/server/database.pp' in environment production | |
Debug: Automatically imported openldap::server::database from openldap/server/database into production | |
Debug: Executing 'slappasswd -s password' | |
Debug: Adding relationship from Class[Openldap::Server::Install] to Class[Openldap::Server::Config] with 'before' | |
Debug: Adding relationship from Class[Openldap::Server::Config] to Class[Openldap::Server::Service] with 'notify' | |
Debug: Adding relationship from Class[Openldap::Server::Service] to Class[Openldap::Server::Slapdconf] with 'before' | |
Debug: Adding relationship from Class[Openldap::Server::Slapdconf] to Class[Openldap::Server] with 'before' | |
Debug: Adding relationship from Class[Openldap::Server::Service] to Openldap::Server::Database[dc=my-domain,dc=com] with 'before' | |
Debug: Adding relationship from Openldap::Server::Database[dc=my-domain,dc=com] to Class[Openldap::Server] with 'before' | |
Debug: Adding relationship from Class[Openldap::Server::Service] to Openldap::Server::Database[dc=dt0388,dc=local] with 'before' | |
Debug: Adding relationship from Openldap::Server::Database[dc=dt0388,dc=local] to Class[Openldap::Server] with 'before' | |
Notice: Compiled catalog for ldaptest-centos7.dt0388.local in environment production in 2.36 seconds | |
Debug: Puppet::Type::Package::ProviderAix: file /usr/bin/lslpp does not exist | |
Debug: Puppet::Type::Package::ProviderDpkg: file /usr/bin/dpkg does not exist | |
Debug: Puppet::Type::Package::ProviderApt: file /usr/bin/apt-get does not exist | |
Debug: Puppet::Type::Package::ProviderAptitude: file /usr/bin/aptitude does not exist | |
Debug: Puppet::Type::Package::ProviderAptrpm: file apt-get does not exist | |
Debug: Puppet::Type::Package::ProviderSun: file /usr/bin/pkginfo does not exist | |
Debug: Puppet::Type::Package::ProviderFink: file /sw/bin/fink does not exist | |
Debug: Puppet::Type::Package::ProviderOpenbsd: file pkg_info does not exist | |
Debug: Puppet::Type::Package::ProviderFreebsd: file /usr/sbin/pkg_info does not exist | |
Debug: Puppet::Type::Package::ProviderHpux: file /usr/sbin/swinstall does not exist | |
Debug: Puppet::Type::Package::ProviderNim: file /usr/sbin/nimclient does not exist | |
Debug: Puppet::Type::Package::ProviderOpkg: file opkg does not exist | |
Debug: Puppet::Type::Package::ProviderPacman: file /usr/bin/pacman does not exist | |
Debug: Puppet::Type::Package::ProviderPkg: file /usr/bin/pkg does not exist | |
Debug: Puppet::Type::Package::ProviderPkgin: file pkgin does not exist | |
Debug: Puppet::Type::Package::ProviderPortage: file /usr/bin/emerge does not exist | |
Debug: Puppet::Type::Package::ProviderPorts: file /usr/local/sbin/portupgrade does not exist | |
Debug: Puppet::Type::Package::ProviderPortupgrade: file /usr/local/sbin/portupgrade does not exist | |
Debug: Puppet::Type::Package::ProviderRug: file /usr/bin/rug does not exist | |
Debug: Puppet::Type::Package::ProviderSunfreeware: file pkg-get does not exist | |
Debug: Puppet::Type::Package::ProviderUp2date: file /usr/sbin/up2date-nox does not exist | |
Debug: Puppet::Type::Package::ProviderUrpmi: file urpmi does not exist | |
Debug: Puppet::Type::Package::ProviderZypper: file /usr/bin/zypper does not exist | |
Debug: Puppet::Type::Service::ProviderDaemontools: file /usr/bin/svc does not exist | |
Debug: Puppet::Type::Service::ProviderDebian: file /usr/sbin/update-rc.d does not exist | |
Debug: Puppet::Type::Service::ProviderGentoo: file /sbin/rc-update does not exist | |
Debug: Puppet::Type::Service::ProviderLaunchd: file /bin/launchctl does not exist | |
Debug: Puppet::Type::Service::ProviderOpenrc: file /bin/rc-status does not exist | |
Debug: Puppet::Type::Service::ProviderRunit: file /usr/bin/sv does not exist | |
Debug: Puppet::Type::Service::ProviderUpstart: 0 confines (of 2) were true | |
Debug: Creating default schedules | |
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist | |
Debug: Failed to load library 'ldap' for feature 'ldap' | |
Debug: Puppet::Type::User::ProviderLdap: feature ldap is missing | |
Debug: Puppet::Type::User::ProviderPw: file pw does not exist | |
Debug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist | |
Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist | |
Debug: Failed to load library 'ldap' for feature 'ldap' | |
Debug: Puppet::Type::Group::ProviderLdap: feature ldap is missing | |
Debug: Puppet::Type::Group::ProviderPw: file pw does not exist | |
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet] | |
Debug: Finishing transaction 26339820 | |
Debug: Loaded state in 0.01 seconds | |
Debug: Loaded state in 0.01 seconds | |
Debug: /Stage[main]/Openldap::Server::Install/before: requires Class[Openldap::Server::Config] | |
Debug: /Stage[main]/Openldap::Server::Config/notify: subscribes to Class[Openldap::Server::Service] | |
Debug: /Stage[main]/Openldap::Server::Service/before: requires Class[Openldap::Server::Slapdconf] | |
Debug: /Stage[main]/Openldap::Server::Service/before: requires Openldap::Server::Database[dc=my-domain,dc=com] | |
Debug: /Stage[main]/Openldap::Server::Service/before: requires Openldap::Server::Database[dc=dt0388,dc=local] | |
Debug: /Stage[main]/Openldap::Server::Slapdconf/before: requires Class[Openldap::Server] | |
Debug: /Stage[main]/Openldap::Server::Slapdconf/Openldap::Server::Database[dc=my-domain,dc=com]/before: requires Class[Openldap::Server] | |
Debug: /Stage[main]/Main/Openldap::Server::Database[dc=dt0388,dc=local]/before: requires Class[Openldap::Server] | |
Debug: /Stage[main]/Main/Ldap_entry[ou=groups,dc=dt0388,dc=local]/require: requires Openldap::Server::Database[dc=dt0388,dc=local] | |
Debug: /Stage[main]/Main/Ldap_entry[ou=groups,dc=dt0388,dc=local]/require: requires Package[net-ldap] | |
Debug: /Stage[main]/Main/Openldap::Server::Database[dc=dt0388,dc=local]/File[/var/lib/ldap]/before: requires Openldap_database[dc=dt0388,dc=local] | |
Info: Applying configuration version '1413821436' | |
Debug: Prefetching gem resources for package | |
Debug: Executing '/bin/gem list --local' | |
Debug: Prefetching yum resources for package | |
Debug: Executing '/bin/rpm --version' | |
Debug: Executing '/bin/rpm -qa --nosignature --nodigest --qf '%{NAME} %|EPOCH?{%{EPOCH}}:{0}| %{VERSION} %{RELEASE} %{ARCH}\n'' | |
Debug: Executing '/bin/systemctl is-active slapd' | |
Debug: Executing '/bin/systemctl is-enabled slapd' | |
Debug: Executing '/bin/systemctl enable slapd' | |
Notice: /Stage[main]/Openldap::Server::Service/Service[slapd]/enable: enable changed 'false' to 'true' | |
Debug: /Stage[main]/Openldap::Server::Service/Service[slapd]: The container Class[Openldap::Server::Service] will propagate my refresh event | |
Debug: Class[Openldap::Server::Service]: The container Stage[main] will propagate my refresh event | |
Notice: /Stage[main]/Openldap::Server::Slapdconf/File[/etc/openldap/slapd.d]/mode: mode changed '0700' to '0750' | |
Debug: /Stage[main]/Openldap::Server::Slapdconf/File[/etc/openldap/slapd.d]: The container Class[Openldap::Server::Slapdconf] will propagate my refresh event | |
Debug: Prefetching olc resources for openldap_database | |
Debug: Executing '/sbin/slapcat -b cn=config -H ldap:///???(&(objectClass=olcDatabaseConfig)(|(objectClass=olcBdbConfig)(objectClass=olcHdbConfig)))' | |
Debug: dn: olcDatabase=bdb,cn=config | |
changetype: add | |
objectClass: olcDatabaseConfig | |
objectClass: olcBdbConfig | |
olcDatabase: bdb | |
olcDbCheckpoint: 512 30 | |
olcDbConfig: set_cachesize 0 2097152 0 | |
olcDbConfig: set_lk_max_objects 1500 | |
olcDbConfig: set_lk_max_locks 1500 | |
olcDbConfig: set_lk_max_lockers 1500 | |
olcLastMod: TRUE | |
olcDbDirectory: /var/lib/ldap | |
olcRootDN: cn=admin,dc=dt0388,dc=local | |
olcRootPW: {SSHA}tZJU3RmiN2CSKwj3k0+5gl1b2iaYs6nT | |
olcSuffix: dc=dt0388,dc=local | |
olcDbIndex: objectClass eq | |
olcAccess: to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth manage by * break | |
olcAccess: to attrs=userPassword,shadowLastChange | |
by self write | |
by anonymous auth | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * none | |
olcAccess: to dn.base="" by * read | |
olcAccess: to * | |
by self write | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * read | |
Debug: Executing '/bin/ldapmodify -Y EXTERNAL -H ldapi:/// -f /tmp/openldap_database20141020-15695-gi73ec' | |
Error: LDIF content: | |
dn: olcDatabase=bdb,cn=config | |
changetype: add | |
objectClass: olcDatabaseConfig | |
objectClass: olcBdbConfig | |
olcDatabase: bdb | |
olcDbCheckpoint: 512 30 | |
olcDbConfig: set_cachesize 0 2097152 0 | |
olcDbConfig: set_lk_max_objects 1500 | |
olcDbConfig: set_lk_max_locks 1500 | |
olcDbConfig: set_lk_max_lockers 1500 | |
olcLastMod: TRUE | |
olcDbDirectory: /var/lib/ldap | |
olcRootDN: cn=admin,dc=dt0388,dc=local | |
olcRootPW: {SSHA}tZJU3RmiN2CSKwj3k0+5gl1b2iaYs6nT | |
olcSuffix: dc=dt0388,dc=local | |
olcDbIndex: objectClass eq | |
olcAccess: to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth manage by * break | |
olcAccess: to attrs=userPassword,shadowLastChange | |
by self write | |
by anonymous auth | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * none | |
olcAccess: to dn.base="" by * read | |
olcAccess: to * | |
by self write | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * read | |
Error message: Execution of '/bin/ldapmodify -Y EXTERNAL -H ldapi:/// -f /tmp/openldap_database20141020-15695-gi73ec' returned 80: SASL/EXTERNAL authentication started | |
SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth | |
SASL SSF: 0 | |
ldap_add: Other (e.g., implementation specific) error (80) | |
additional info: <olcAccess> handler exited with 1 | |
adding new entry "olcDatabase=bdb,cn=config" | |
Error: /Stage[main]/Main/Openldap::Server::Database[dc=dt0388,dc=local]/Openldap_database[dc=dt0388,dc=local]/ensure: change from absent to present failed: LDIF content: | |
dn: olcDatabase=bdb,cn=config | |
changetype: add | |
objectClass: olcDatabaseConfig | |
objectClass: olcBdbConfig | |
olcDatabase: bdb | |
olcDbCheckpoint: 512 30 | |
olcDbConfig: set_cachesize 0 2097152 0 | |
olcDbConfig: set_lk_max_objects 1500 | |
olcDbConfig: set_lk_max_locks 1500 | |
olcDbConfig: set_lk_max_lockers 1500 | |
olcLastMod: TRUE | |
olcDbDirectory: /var/lib/ldap | |
olcRootDN: cn=admin,dc=dt0388,dc=local | |
olcRootPW: {SSHA}tZJU3RmiN2CSKwj3k0+5gl1b2iaYs6nT | |
olcSuffix: dc=dt0388,dc=local | |
olcDbIndex: objectClass eq | |
olcAccess: to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth manage by * break | |
olcAccess: to attrs=userPassword,shadowLastChange | |
by self write | |
by anonymous auth | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * none | |
olcAccess: to dn.base="" by * read | |
olcAccess: to * | |
by self write | |
by dn="cn=admin,dc=dt0388,dc=local" write | |
by * read | |
Error message: Execution of '/bin/ldapmodify -Y EXTERNAL -H ldapi:/// -f /tmp/openldap_database20141020-15695-gi73ec' returned 80: SASL/EXTERNAL authentication started | |
SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth | |
SASL SSF: 0 | |
ldap_add: Other (e.g., implementation specific) error (80) | |
additional info: <olcAccess> handler exited with 1 | |
adding new entry "olcDatabase=bdb,cn=config" | |
Notice: /Stage[main]/Main/Ldap_entry[ou=groups,dc=dt0388,dc=local]: Dependency Openldap_database[dc=dt0388,dc=local] has failures: true | |
Warning: /Stage[main]/Main/Ldap_entry[ou=groups,dc=dt0388,dc=local]: Skipping because of failed dependencies | |
Redirecting to /bin/systemctl stop slapd.service | |
Error: Could not set 'absent' on ensure: No such file or directory - /etc/openldap/slapd.d/cn=config/olcDatabase={2}bdb.ldif at 44:/vagrant/puppet/modules/openldap/manifests/server/database.pp | |
Error: Could not set 'absent' on ensure: No such file or directory - /etc/openldap/slapd.d/cn=config/olcDatabase={2}bdb.ldif at 44:/vagrant/puppet/modules/openldap/manifests/server/database.pp | |
Wrapped exception: | |
No such file or directory - /etc/openldap/slapd.d/cn=config/olcDatabase={2}bdb.ldif | |
Error: /Stage[main]/Openldap::Server::Slapdconf/Openldap::Server::Database[dc=my-domain,dc=com]/Openldap_database[dc=my-domain,dc=com]/ensure: change from present to absent failed: Could not set 'absent' on ensure: No such file or directory - /etc/openldap/slapd.d/cn=config/olcDatabase={2}bdb.ldif at 44:/vagrant/puppet/modules/openldap/manifests/server/database.pp | |
Debug: Class[Openldap::Server::Slapdconf]: The container Stage[main] will propagate my refresh event | |
Debug: Finishing transaction 32917540 | |
Debug: Storing state | |
Debug: Stored state in 0.01 seconds | |
Notice: Finished catalog run in 0.93 seconds | |
Debug: Using settings: adding file resource 'rrddir': 'File[/var/lib/puppet/rrd]{:path=>"/var/lib/puppet/rrd", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' | |
Debug: Finishing transaction 33035960 | |
Debug: Received report to process from ldaptest-centos7.dt0388.local | |
Debug: Processing report from ldaptest-centos7.dt0388.local with processor Puppet::Reports::Store |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 fd=11 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=0 BIND dn="" method=163 | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=0 RESULT tag=97 err=0 text= | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=1 ADD dn="olcDatabase=bdb,cn=config" | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: slapd: line 0: unknown attr "shadowLastChange" in to clause | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: <access clause> ::= access to <what> [ by <who> [ <access> ] [ <control> ] ]+ | |
<what> ::= * | dn[.<dnstyle>=<DN>] [filter=<filter>] [attrs=<attrspec>] | |
<attrspec> ::= <attrname> [val[/<matchingRule>][.<attrstyle>]=<value>] | <attrlist> | |
<attrlist> ::= <attr> [ , <attrlist> ] | |
<attr> ::= <attrname> | @<objectClass> | !<objectClass> | entry | children | |
<who> ::= [ * | anonymous | users | self | dn[.<dnstyle>]=<DN> ] | |
[ realanonymous | realusers | realself | realdn[.<dnstyle>]=<DN> ] | |
[dnattr=<attrname>] | |
[realdnattr=<attrname>] | |
[group[/<objectclass>[/<attrname>]][.<style>]=<group>] | |
[peername[.<peernamestyle>]=<peer>] [sockname[.<style>]=<name>] | |
[domain[.<domainstyle>]=<domain>] [sockurl[.<style>]=<url>] | |
[dynacl/<name>[/<options>][.<dynstyle>][=<pattern>]] | |
[ssf=<n>] [transport_ssf=<n>] [tls_ssf=<n>] [sasl_ssf=<n>] | |
<style> ::= exact | regex | base(Object) | |
<dnstyle> ::= base(Object) | one(level) | sub(tree) | children | exact | regex | |
<attrstyle> ::= exact | regex | base(Object) | one(level) | sub(tree) | children | |
<peernamestyle> ::= exact | regex | ip | ipv6 | path | |
<domainstyle> ::= exact | regex | base(Object) | sub(tree) | |
<access> ::= [[real]self]{<level>|<priv>} | |
<level> ::= none|disclose|auth|compare|search|read|{write|add|delete}|manage | |
<priv> ::= {=|+|-}{0|d|x|c|s|r|{w|a|z}|m}+ | |
<control> ::= [ stop | continue | break ] | |
dynacl: | |
<name>=ACI <pattern>=<attrname> | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=1 RESULT tag=105 err=80 text=<olcAccess> handler exited with 1 | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 op=2 UNBIND | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: conn=1000 fd=11 closed | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: daemon: shutdown requested and initiated. | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: slapd shutdown: waiting for 0 operations/tasks to finish | |
Oct 20 17:10:40 ldaptest-centos7 slapd[15688]: slapd stopped. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment