Bug 54112 - udm/put (groups/group): ldap.INVALID_DN_SYNTAX
udm/put (groups/group): ldap.INVALID_DN_SYNTAX
Status: NEW
Product: UCS
Classification: Unclassified
Component: UDM (Generic)
UCS 5.0
Other Linux
: P5 normal (vote)
: ---
Assigned To: UMC maintainers
UMC maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-11-19 16:57 CET by Maximilian Janßen
Modified: 2021-11-19 16:57 CET (History)
0 users

See Also:
What kind of report is it?: Bug Report
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number: 2021091121000171
Bug group (optional): External feedback
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Maximilian Janßen univentionstaff 2021-11-19 16:57:11 CET
Version: 5.0-0 errata68

Error: 
Interner Server-Fehler in "udm/put (groups/group)".
Request: udm/put (groups/group)

  File "%PY3%/notifier/threads.py", line 80, in _run
    result = self._function()
  File "%PY3%/notifier/__init__.py", line 105, in __call__
    return self._function(*tmp, **self._kwargs)
  File "%PY3%/univention/management/console/modules/udm/__init__.py", line 442, in _thread
    module.modify(properties)
  File "%PY3%/univention/management/console/modules/udm/udm_ldap.py", line 649, in modify
    obj.modify()
  File "%PY3%/univention/admin/handlers/__init__.py", line 633, in modify
    self._ldap_pre_ready()
  File "%PY3%/univention/admin/handlers/groups/group.py", line 444, in _ldap_pre_ready
    self.request_lock('mailPrimaryAddress', self['mailAddress'])
  File "%PY3%/univention/admin/handlers/__init__.py", line 1691, in request_lock
    value = univention.admin.allocators.request(self.lo, self.position, name, value)
  File "%PY3%/univention/admin/allocators.py", line 209, in request
    return acquireUnique(lo, position, type, value, _type2attr[type], scope=_type2scope[type])
  File "%PY3%/univention/admin/allocators.py", line 198, in acquireUnique
    univention.admin.locking.lock(lo, position, type, value.encode('utf-8'), scope=scope)
  File "%PY3%/univention/admin/locking.py", line 95, in lock
    if not lo.get(dn, ['lockTime']):
  File "%PY3%/univention/admin/uldap.py", line 624, in get
    return self.lo.get(dn, attr, required)
  File "%PY3%/univention/uldap.py", line 208, in _decorated
    return func(self, *args, **kwargs)
  File "%PY3%/univention/uldap.py", line 442, in get
    result = self.lo.search_s(dn, ldap.SCOPE_BASE, '(objectClass=*)', attr)
  File "%PY3%/ldap/ldapobject.py", line 852, in search_s
    return self.search_ext_s(base,scope,filterstr,attrlist,attrsonly,None,None,timeout=self.timeout)
  File "%PY3%/ldap/ldapobject.py", line 1259, in search_ext_s
    return self._apply_method_s(SimpleLDAPObject.search_ext_s,*args,**kwargs)
  File "%PY3%/ldap/ldapobject.py", line 1197, in _apply_method_s
    return func(self,*args,**kwargs)
  File "%PY3%/ldap/ldapobject.py", line 846, in search_ext_s
    return self.result(msgid,all=1,timeout=timeout)[1]
  File "%PY3%/ldap/ldapobject.py", line 738, in result
    resp_type, resp_data, resp_msgid = self.result2(msgid,all,timeout)
  File "%PY3%/ldap/ldapobject.py", line 742, in result2
    resp_type, resp_data, resp_msgid, resp_ctrls = self.result3(msgid,all,timeout)
  File "%PY3%/ldap/ldapobject.py", line 749, in result3
    resp_ctrl_classes=resp_ctrl_classes
  File "%PY3%/ldap/ldapobject.py", line 756, in result4
    ldap_result = self._ldap_call(self._l.result4,msgid,all,timeout,add_ctrls,add_intermediates,add_extop)
  File "%PY3%/ldap/ldapobject.py", line 329, in _ldap_call
    reraise(exc_type, exc_value, exc_traceback)
  File "%PY3%/ldap/compat.py", line 44, in reraise
    raise exc_value
  File "%PY3%/ldap/ldapobject.py", line 313, in _ldap_call
    result = func(*args,**kwargs)
ldap.INVALID_DN_SYNTAX: {'desc': 'Invalid DN syntax', 'info': 'invalid DN'}

Role: domaincontroller_master