-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(Regression) sssd backend fails if ad_domain is not set #910
Comments
IIRC, we did that change on purpose so that it’s not implicit and random anymore. Can you check what sssd does in that configuration so that we align behaviour, which seems the most logical? (If sss fails in that case, we should fail too, if it’s taking the first, then we take the first) |
I confirmed that sssd works properly without this setting, and their AD join documentation suggests these options aren't mandatory. |
This restores the functionality prior to the refactor in PR #467, where the case of having a domain section without the ad_domain setting resorted to using the domain from the sssd.domains setting. This is valid behavior supported and suggested[1] by sssd. In addition to that, avoid being too lenient and still raise an error if the domain section is empty or does not exist. Fixes #910 / UDENG-2268 [1] https://sssd.io/docs/ad/ad-provider-manual.html#id4
This restores the functionality prior to the refactor in PR #467, where the case of having a domain section without the ad_domain setting resorted to using the domain from the sssd.domains setting. This is valid behavior supported and suggested[1] by sssd. In addition to that, avoid being too lenient and still raise an error if the domain section is empty or does not exist. Fixes #910 / UDENG-2268 [1] https://sssd.io/docs/ad/ad-provider-manual.html#id4
This restores the functionality prior to the refactor in PR #467, where the case of having a domain section without the `ad_domain` setting resorted to using the domain from the `sssd.domains` setting. This is valid behavior supported and [suggested](https://sssd.io/docs/ad/ad-provider-manual.html#id4) by sssd. In addition to that, avoid being too lenient and still raise an error if the domain section is empty or does not exist. Fixes #910 / UDENG-2268
Is there an existing issue for this?
Describe the issue
This is a regression from when we added support for multiple AD backends (see #467)
Previously adsys would use the first domain from
sssd.conf
and potentially override it ifad_domain
is explicitly set for the domain, see:adsys/internal/adsysservice/adsysservice.go
Lines 279 to 280 in 32a830f
The current implementation raises an error if we are not able to find an
ad_domain
setting in the domain section, even if we already have a domain (sssdDomain
):adsys/internal/ad/backends/sss/sss.go
Lines 62 to 65 in c68d2cc
Ideally we should set
domain
tosssdDomain
if we cannot find a value forad_domain
, which will mimic the behavior previous to the refactor.While by default joining a domain with
realm join
will set the appropriate configuration values insssd.conf
so this doesn't happen, this is a regression we should aim to fix.Steps to reproduce it
realm join
)adsysctl update -m -vv
, everything should workad_domain
line from/etc/sssd/sssd.conf
adsysctl update -m -vv
now fails, and the adsysd service does not start anymoread_domain
setting.Ubuntu users: System information
No response
Non Ubuntu users: System information
No response
Additional information
No response
Double check your logs
The text was updated successfully, but these errors were encountered: