Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- @ldap2:~$ sudo slapd -u openldap -g openldap -d -1
- @(#) $OpenLDAP: slapd 2.4.21 (Apr 26 2010 11:08:43) $
- buildd@yellow:/build/buildd/openldap-2.4.21/debian/build/servers/slapd
- ldap_pvt_gethostbyname_a: host=ldap2, r=0
- daemon_init: <null>
- daemon_init: listen on ldap:///
- daemon_init: 1 listeners to open...
- ldap_url_parse_ext(ldap:///)
- daemon: listener initialized ldap:///
- daemon_init: 2 listeners opened
- ldap_create
- slapd init: initiated server.
- slap_sasl_init: initialized!
- backend_startup_one: starting "cn=config"
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config.ldif"
- => str2entry: "dn: cn=config
- objectClass: olcGlobal
- cn: config
- olcArgsFile: /var/run/slapd/slapd.args
- olcLogLevel: none
- olcPidFile: /var/run/slapd/slapd.pid
- olcToolThreads: 1
- structuralObjectClass: olcGlobal
- entryUUID: cee0ef5e-ebc4-102e-9a10-5b86b1f5b888
- creatorsName: cn=config
- createTimestamp: 20100504123212Z
- olcTLSCACertificateFile: /etc/ssl/certs/cacert.pem
- olcTLSCertificateFile: /etc/ssl/certs/etc/ssl/certs/x01-test_slapd_cert.pem
- olcTLSCertificateKeyFile: /etc/ssl/private/ldap01_slapd_key.pem
- entryCSN: 20100505120923.177991Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100505120923Z
- "
- >>> dnPrettyNormal: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnPrettyNormal: <cn=config>, <cn=config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn=config) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=module{0}.ldif"
- => str2entry: "dn: cn=module{0}
- objectClass: olcModuleList
- cn: module{0}
- olcModulePath: /usr/lib/ldap
- olcModuleLoad: {0}back_hdb
- olcModuleLoad: {1}syncprov
- olcModuleLoad: {2}accesslog
- structuralObjectClass: olcModuleList
- entryUUID: 0fbeb31c-ebc5-102e-8dac-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504123400Z
- entryCSN: 20100504145612.924639Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <cn=module{0}>
- => ldap_bv2dn(cn=module{0},0)
- <= ldap_bv2dn(cn=module{0})=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=module{0})=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=module{0})=0
- <<< dnPrettyNormal: <cn=module{0}>, <cn=module{0}>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn=module{0}) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn=module{0},cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- loaded module back_hdb
- hdb_back_initialize: initialize HDB backend
- hdb_back_initialize: Berkeley DB 4.7.25: (May 15, 2008)
- module back_hdb: null module registered
- loaded module syncprov
- module syncprov: null module registered
- loaded module accesslog
- module accesslog: null module registered
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema.ldif"
- => str2entry: "dn: cn=schema
- objectClass: olcSchemaConfig
- cn: schema
- structuralObjectClass: olcSchemaConfig
- entryUUID: cee10b7e-ebc4-102e-9a13-5b86b1f5b888
- creatorsName: cn=config
- createTimestamp: 20100504123212Z
- entryCSN: 20100504123212.066254Z#000000#000#000000
- modifiersName: cn=config
- modifyTimestamp: 20100504123212Z
- "
- >>> dnPrettyNormal: <cn=schema>
- => ldap_bv2dn(cn=schema,0)
- <= ldap_bv2dn(cn=schema)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=schema)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=schema)=0
- <<< dnPrettyNormal: <cn=schema>, <cn=schema>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- <= str2entry(cn=schema) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema/cn={0}core.ldif"
- => str2entry: "dn: cn={0}core
- objectClass: olcSchemaConfig
- cn: {0}core
- olcAttributeTypes: {0}( 2.5.4.2 NAME 'knowledgeInformation' DESC 'RFC2256: kno
- wledge information' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
- 1.15{32768} )
- olcAttributeTypes: {1}( 2.5.4.4 NAME ( 'sn' 'surname' ) DESC 'RFC2256: last (f
- amily) name(s) for which the entity is known by' SUP name )
- olcAttributeTypes: {2}( 2.5.4.5 NAME 'serialNumber' DESC 'RFC2256: serial numb
- er of the entity' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
- YNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
- olcAttributeTypes: {3}( 2.5.4.6 NAME ( 'c' 'countryName' ) DESC 'RFC2256: ISO-
- 3166 country 2-letter code' SUP name SINGLE-VALUE )
- olcAttributeTypes: {4}( 2.5.4.7 NAME ( 'l' 'localityName' ) DESC 'RFC2256: loc
- ality which this object resides in' SUP name )
- olcAttributeTypes: {5}( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' ) DESC 'RFC2
- 256: state or province which this object resides in' SUP name )
- olcAttributeTypes: {6}( 2.5.4.9 NAME ( 'street' 'streetAddress' ) DESC 'RFC225
- 6: street address of this object' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreS
- ubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
- olcAttributeTypes: {7}( 2.5.4.10 NAME ( 'o' 'organizationName' ) DESC 'RFC2256
- : organization this object belongs to' SUP name )
- olcAttributeTypes: {8}( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' ) DESC '
- RFC2256: organizational unit this object belongs to' SUP name )
- olcAttributeTypes: {9}( 2.5.4.12 NAME 'title' DESC 'RFC2256: title associated
- with the entity' SUP name )
- olcAttributeTypes: {10}( 2.5.4.14 NAME 'searchGuide' DESC 'RFC2256: search gui
- de, deprecated by enhancedSearchGuide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
- olcAttributeTypes: {11}( 2.5.4.15 NAME 'businessCategory' DESC 'RFC2256: busin
- ess category' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
- X 1.3.6.1.4.1.1466.115.121.1.15{128} )
- olcAttributeTypes: {12}( 2.5.4.16 NAME 'postalAddress' DESC 'RFC2256: postal a
- ddress' EQUALITY caseIgnoreListMatch SUBSTR caseIgnoreListSubstringsMatch SYN
- TAX 1.3.6.1.4.1.1466.115.121.1.41 )
- olcAttributeTypes: {13}( 2.5.4.17 NAME 'postalCode' DESC 'RFC2256: postal code
- ' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.
- 1.1466.115.121.1.15{40} )
- olcAttributeTypes: {14}( 2.5.4.18 NAME 'postOfficeBox' DESC 'RFC2256: Post Off
- ice Box' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3
- .6.1.4.1.1466.115.121.1.15{40} )
- olcAttributeTypes: {15}( 2.5.4.19 NAME 'physicalDeliveryOfficeName' DESC 'RFC2
- 256: Physical Delivery Office Name' EQUALITY caseIgnoreMatch SUBSTR caseIgnor
- eSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
- olcAttributeTypes: {16}( 2.5.4.20 NAME 'telephoneNumber' DESC 'RFC2256: Teleph
- one Number' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMat
- ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
- olcAttributeTypes: {17}( 2.5.4.21 NAME 'telexNumber' DESC 'RFC2256: Telex Numb
- er' SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
- olcAttributeTypes: {18}( 2.5.4.22 NAME 'teletexTerminalIdentifier' DESC 'RFC22
- 56: Teletex Terminal Identifier' SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
- olcAttributeTypes: {19}( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' ) DE
- SC 'RFC2256: Facsimile (Fax) Telephone Number' SYNTAX 1.3.6.1.4.1.1466.115.12
- 1.1.22 )
- olcAttributeTypes: {20}( 2.5.4.24 NAME 'x121Address' DESC 'RFC2256: X.121 Addr
- ess' EQUALITY numericStringMatch SUBSTR numericStringSubstringsMatch SYNTAX 1
- .3.6.1.4.1.1466.115.121.1.36{15} )
- olcAttributeTypes: {21}( 2.5.4.25 NAME 'internationaliSDNNumber' DESC 'RFC2256
- : international ISDN number' EQUALITY numericStringMatch SUBSTR numericString
- SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
- olcAttributeTypes: {22}( 2.5.4.26 NAME 'registeredAddress' DESC 'RFC2256: regi
- stered postal address' SUP postalAddress SYNTAX 1.3.6.1.4.1.1466.115.121.1.41
- )
- olcAttributeTypes: {23}( 2.5.4.27 NAME 'destinationIndicator' DESC 'RFC2256: d
- estination indicator' EQUALITY caseIgnoreMatch SUBSTR cas>>> dnPrettyNormal: <cn={0}core>
- => ldap_bv2dn(cn={0}core,0)
- <= ldap_bv2dn(cn={0}core)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={0}core)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={0}core)=0
- <<< dnPrettyNormal: <cn={0}core>, <cn={0}core>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- <= str2entry(cn={0}core) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn={0}core,cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema/cn={1}cosine.ldif"
- => str2entry: "dn: cn={1}cosine
- objectClass: olcSchemaConfig
- cn: {1}cosine
- olcAttributeTypes: {0}( 0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress'
- EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
- 1466.115.121.1.15{256} )
- olcAttributeTypes: {1}( 0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g
- eneral information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
- SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} )
- olcAttributeTypes: {2}( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri
- nk' ) DESC 'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR caseIgno
- reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {3}( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RFC1
- 274: room number' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
- YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {4}( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274:
- photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000} )
- olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.8 NAME 'userClass' DESC 'RFC12
- 74: category of user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
- ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {6}( 0.9.2342.19200300.100.1.9 NAME 'host' DESC 'RFC1274: h
- ost computer' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
- X 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {7}( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC127
- 4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
- .121.1.12 )
- olcAttributeTypes: {8}( 0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D
- ESC 'RFC1274: unique identifier of document' EQUALITY caseIgnoreMatch SUBSTR
- caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {9}( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC '
- RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstri
- ngsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {10}( 0.9.2342.19200300.100.1.13 NAME 'documentVersion' DES
- C 'RFC1274: version of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSu
- bstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {11}( 0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DESC
- 'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNTAX 1
- .3.6.1.4.1.1466.115.121.1.12 )
- olcAttributeTypes: {12}( 0.9.2342.19200300.100.1.15 NAME 'documentLocation' DE
- SC 'RFC1274: location of document original' EQUALITY caseIgnoreMatch SUBSTR c
- aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
- olcAttributeTypes: {13}( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone' 'homeTe
- lephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY telephoneNumb
- erMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121
- .1.50 )
- olcAttributeTypes: {14}( 0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'RFC
- 1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
- 6.115.121.1.12 )
- olcAttributeTypes: {15}( 0.9.2342.19200300.100.1.22 NAME 'otherMailbox' SYNTAX
- 1.3.6.1.4.1.1466.115.121.1.39 )
- olcAttributeTypes: {16}( 0.9.2342.19200300.100.1.26 NAME 'aRecord' EQUALITY ca
- seIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {17}( 0.9.2342.19200300.100.1.27 NAME 'mDRecord' EQUALITY c
- aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {18}( 0.9.2342.19200300.100.1.28 NAME 'mXRecord' EQUALITY c
- aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {19}( 0.9.2342.19200300.100.1.29 NAME 'nSRecord' EQUALITY c
- aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {20}( 0.9.2342.19200300.100.1.30 NAME 'sOARecord' EQUALITY
- caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {21}( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord' EQUALIT
- Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {22}( 0.9.2342.19200300.100.1.38 NAM>>> dnPrettyNormal: <cn={1}cosine>
- => ldap_bv2dn(cn={1}cosine,0)
- <= ldap_bv2dn(cn={1}cosine)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={1}cosine)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={1}cosine)=0
- <<< dnPrettyNormal: <cn={1}cosine>, <cn={1}cosine>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn={1}cosine) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn={1}cosine,cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema/cn={2}nis.ldif"
- => str2entry: "dn: cn={2}nis
- objectClass: olcSchemaConfig
- cn: {2}nis
- olcAttributeTypes: {0}( 1.3.6.1.1.1.1.2 NAME 'gecos' DESC 'The GECOS field; th
- e common name' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatc
- h SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
- olcAttributeTypes: {1}( 1.3.6.1.1.1.1.3 NAME 'homeDirectory' DESC 'The absolut
- e path to the home directory' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1
- 466.115.121.1.26 SINGLE-VALUE )
- olcAttributeTypes: {2}( 1.3.6.1.1.1.1.4 NAME 'loginShell' DESC 'The path to th
- e login shell' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.2
- 6 SINGLE-VALUE )
- olcAttributeTypes: {3}( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange' EQUALITY integ
- erMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {4}( 1.3.6.1.1.1.1.6 NAME 'shadowMin' EQUALITY integerMatch
- SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {5}( 1.3.6.1.1.1.1.7 NAME 'shadowMax' EQUALITY integerMatch
- SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {6}( 1.3.6.1.1.1.1.8 NAME 'shadowWarning' EQUALITY integerM
- atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {7}( 1.3.6.1.1.1.1.9 NAME 'shadowInactive' EQUALITY integer
- Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {8}( 1.3.6.1.1.1.1.10 NAME 'shadowExpire' EQUALITY integerM
- atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {9}( 1.3.6.1.1.1.1.11 NAME 'shadowFlag' EQUALITY integerMat
- ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {10}( 1.3.6.1.1.1.1.12 NAME 'memberUid' EQUALITY caseExactI
- A5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
- 26 )
- olcAttributeTypes: {11}( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca
- seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.11
- 5.121.1.26 )
- olcAttributeTypes: {12}( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple' DESC 'Netgr
- oup triple' SYNTAX 1.3.6.1.1.1.0.0 )
- olcAttributeTypes: {13}( 1.3.6.1.1.1.1.15 NAME 'ipServicePort' EQUALITY intege
- rMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {14}( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol' SUP name )
- olcAttributeTypes: {15}( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber' EQUALITY int
- egerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {16}( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber' EQUALITY integer
- Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
- olcAttributeTypes: {17}( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber' DESC 'IP address
- ' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
- olcAttributeTypes: {18}( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber' DESC 'IP netw
- ork' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
- NGLE-VALUE )
- olcAttributeTypes: {19}( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber' DESC 'IP netm
- ask' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
- NGLE-VALUE )
- olcAttributeTypes: {20}( 1.3.6.1.1.1.1.22 NAME 'macAddress' DESC 'MAC address'
- EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
- olcAttributeTypes: {21}( 1.3.6.1.1.1.1.23 NAME 'bootParameter' DESC 'rpc.bootp
- aramd parameter' SYNTAX 1.3.6.1.1.1.0.1 )
- olcAttributeTypes: {22}( 1.3.6.1.1.1.1.24 NAME 'bootFile' DESC 'Boot image nam
- e' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
- olcAttributeTypes: {23}( 1.3.6.1.1.1.1.26 NAME 'nisMapName' SUP name )
- olcAttributeTypes: {24}( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry' EQUALITY caseExac
- tIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
- 1.26{1024} SINGLE-VALUE )
- olcObjectClasses: {0}( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Abstraction o
- f an account with POSIX attributes' SUP top AUXILIARY MUST ( cn $ uid $ uidNu
- mber $ gidNumber $ homeDirectory ) MAY ( userPassword $ loginShell $ gecos $
- description ) )
- olcObjectClasses: {1}( 1.3.6.1.1.1.2.1 NAME 'shadowAccount' DESC 'Additional a
- ttributes for shadow passwords'>>> dnPrettyNormal: <cn={2}nis>
- => ldap_bv2dn(cn={2}nis,0)
- <= ldap_bv2dn(cn={2}nis)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={2}nis)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={2}nis)=0
- <<< dnPrettyNormal: <cn={2}nis>, <cn={2}nis>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn={2}nis) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn={2}nis,cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema/cn={3}inetorgperson.ldif"
- => str2entry: "dn: cn={3}inetorgperson
- objectClass: olcSchemaConfig
- cn: {3}inetorgperson
- olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC279
- 8: vehicle license or registration plate' EQUALITY caseIgnoreMatch SUBSTR cas
- eIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
- olcAttributeTypes: {1}( 2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC '
- RFC2798: identifies a department within an organization' EQUALITY caseIgnoreM
- atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
- olcAttributeTypes: {2}( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC
- 2798: preferred name to be used when displaying entries' EQUALITY caseIgnoreM
- atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SI
- NGLE-VALUE )
- olcAttributeTypes: {3}( 2.16.840.1.113730.3.1.3 NAME 'employeeNumber' DESC 'RF
- C2798: numerically identifies an employee within an organization' EQUALITY ca
- seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
- 1.1.15 SINGLE-VALUE )
- olcAttributeTypes: {4}( 2.16.840.1.113730.3.1.4 NAME 'employeeType' DESC 'RFC2
- 798: type of employment for a person' EQUALITY caseIgnoreMatch SUBSTR caseIgn
- oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
- olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RFC2
- 798: a JPEG image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
- olcAttributeTypes: {6}( 2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DESC
- 'RFC2798: preferred written or spoken language for a person' EQUALITY caseIg
- noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
- 15 SINGLE-VALUE )
- olcAttributeTypes: {7}( 2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate' D
- ESC 'RFC2798: PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
- 66.115.121.1.5 )
- olcAttributeTypes: {8}( 2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RFC2
- 798: personal identity information, a PKCS #12 PFX' SYNTAX 1.3.6.1.4.1.1466.1
- 15.121.1.5 )
- olcObjectClasses: {0}( 2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RFC2
- 798: Internet Organizational Person' SUP organizationalPerson STRUCTURAL MAY
- ( audio $ businessCategory $ carLicense $ departmentNumber $ displayName $ em
- ployeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddress $ ini
- tials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $ pager $ photo
- $ roomNumber $ secretary $ uid $ userCertificate $ x500uniqueIdentifier $ pre
- ferredLanguage $ userSMIMECertificate $ userPKCS12 ) )
- structuralObjectClass: olcSchemaConfig
- entryUUID: d9db631c-ebc4-102e-8dab-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504123230Z
- entryCSN: 20100504123230.484110Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504123230Z
- "
- >>> dnPrettyNormal: <cn={3}inetorgperson>
- => ldap_bv2dn(cn={3}inetorgperson,0)
- <= ldap_bv2dn(cn={3}inetorgperson)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={3}inetorgperson)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={3}inetorgperson)=0
- <<< dnPrettyNormal: <cn={3}inetorgperson>, <cn={3}inetorgperson>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn={3}inetorgperson) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn={3}inetorgperson,cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/cn=schema/cn={4}dyngroup.ldif"
- => str2entry: "dn: cn={4}dyngroup
- objectClass: olcSchemaConfig
- cn: {4}dyngroup
- olcObjectIdentifier: {0}NetscapeRoot 2.16.840.1.113730
- olcObjectIdentifier: {1}NetscapeLDAP NetscapeRoot:3
- olcObjectIdentifier: {2}NetscapeLDAPattributeType NetscapeLDAP:1
- olcObjectIdentifier: {3}NetscapeLDAPobjectClass NetscapeLDAP:2
- olcObjectIdentifier: {4}OpenLDAPExp11 1.3.6.1.4.1.4203.666.11
- olcObjectIdentifier: {5}DynGroupBase OpenLDAPExp11:8
- olcObjectIdentifier: {6}DynGroupAttr DynGroupBase:1
- olcObjectIdentifier: {7}DynGroupOC DynGroupBase:2
- olcAttributeTypes: {0}( NetscapeLDAPattributeType:198 NAME 'memberURL' DESC 'I
- dentifies an URL associated with each member of a group. Any type of labeled
- URL can be used.' SUP labeledURI )
- olcAttributeTypes: {1}( DynGroupAttr:1 NAME 'dgIdentity' DESC 'Identity to use
- when processing the memberURL' SUP distinguishedName SINGLE-VALUE )
- olcAttributeTypes: {2}( DynGroupAttr:2 NAME 'dgAuthz' DESC 'Optional authoriza
- tion rules that determine who is allowed to assume the dgIdentity' EQUALITY a
- uthzMatch SYNTAX 1.3.6.1.4.1.4203.666.2.7 X-ORDERED 'VALUES' )
- olcObjectClasses: {0}( NetscapeLDAPobjectClass:33 NAME 'groupOfURLs' SUP top S
- TRUCTURAL MUST cn MAY ( memberURL $ businessCategory $ description $ o $ ou $
- owner $ seeAlso ) )
- olcObjectClasses: {1}( DynGroupOC:1 NAME 'dgIdentityAux' SUP top AUXILIARY MAY
- ( dgIdentity $ dgAuthz ) )
- structuralObjectClass: olcSchemaConfig
- entryUUID: 4ad1f88a-ebc8-102e-8daf-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504125708Z
- entryCSN: 20100504125708.495128Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504125708Z
- "
- >>> dnPrettyNormal: <cn={4}dyngroup>
- => ldap_bv2dn(cn={4}dyngroup,0)
- <= ldap_bv2dn(cn={4}dyngroup)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={4}dyngroup)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn={4}dyngroup)=0
- <<< dnPrettyNormal: <cn={4}dyngroup>, <cn={4}dyngroup>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(cn={4}dyngroup) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "cn={4}dyngroup,cn=schema,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={-1}frontend.ldif"
- => str2entry: "dn: olcDatabase={-1}frontend
- objectClass: olcDatabaseConfig
- objectClass: olcFrontendConfig
- olcDatabase: {-1}frontend
- olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external
- ,cn=auth manage by * break
- olcAccess: {1}to dn.base="" by * read
- olcAccess: {2}to dn.base="cn=subschema" by * read
- olcSizeLimit: 500
- structuralObjectClass: olcDatabaseConfig
- entryUUID: cee0fb66-ebc4-102e-9a11-5b86b1f5b888
- creatorsName: cn=config
- createTimestamp: 20100504123212Z
- entryCSN: 20100504123212.065842Z#000000#000#000000
- modifiersName: cn=config
- modifyTimestamp: 20100504123212Z
- "
- >>> dnPrettyNormal: <olcDatabase={-1}frontend>
- => ldap_bv2dn(olcDatabase={-1}frontend,0)
- <= ldap_bv2dn(olcDatabase={-1}frontend)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={-1}frontend)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={-1}frontend)=0
- <<< dnPrettyNormal: <olcDatabase={-1}frontend>, <olcDatabase={-1}frontend>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- <= str2entry(olcDatabase={-1}frontend) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcDatabase={-1}frontend,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- Backend ACL: access to *
- by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" manage
- by * +0 break
- >>> dnNormalize: <>
- <<< dnNormalize: <>
- Backend ACL: access to dn.base=""
- by * read
- >>> dnNormalize: <cn=subschema>
- => ldap_bv2dn(cn=subschema,0)
- <= ldap_bv2dn(cn=subschema)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=subschema)=0
- <<< dnNormalize: <cn=subschema>
- Backend ACL: access to dn.base="cn=subschema"
- by * read
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={0}config.ldif"
- => str2entry: "dn: olcDatabase={0}config
- objectClass: olcDatabaseConfig
- olcDatabase: {0}config
- olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external
- ,cn=auth manage by * break
- structuralObjectClass: olcDatabaseConfig
- entryUUID: cee1043a-ebc4-102e-9a12-5b86b1f5b888
- creatorsName: cn=config
- createTimestamp: 20100504123212Z
- entryCSN: 20100504123212.066068Z#000000#000#000000
- modifiersName: cn=config
- modifyTimestamp: 20100504123212Z
- "
- >>> dnPrettyNormal: <olcDatabase={0}config>
- => ldap_bv2dn(olcDatabase={0}config,0)
- <= ldap_bv2dn(olcDatabase={0}config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={0}config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={0}config)=0
- <<< dnPrettyNormal: <olcDatabase={0}config>, <olcDatabase={0}config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- >>> dnNormalize: <cn=config>
- => ldap_bv2dn(cn=config,0)
- <= ldap_bv2dn(cn=config)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=config)=0
- <<< dnNormalize: <cn=config>
- <= str2entry(olcDatabase={0}config) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcDatabase={0}config,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- Backend ACL: access to *
- by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" manage
- by * +0 break
- /etc/ldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={1}hdb.ldif"
- => str2entry: "dn: olcDatabase={1}hdb
- objectClass: olcDatabaseConfig
- objectClass: olcHdbConfig
- olcDatabase: {1}hdb
- olcDbDirectory: /var/lib/ldap
- olcSuffix: dc=alatest,dc=com
- olcAccess: {0}to attrs=userPassword by dn="cn=admin,dc=alatest,dc=com" write b
- y anonymous auth by self write by * none
- olcAccess: {1}to attrs=shadowLastChange by self write by * read
- olcAccess: {2}to dn.base="" by * read
- olcAccess: {3}to * by dn="cn=admin,dc=alatest,dc=com" write by * read
- olcLastMod: TRUE
- olcRootDN: cn=admin,dc=alatest,dc=com
- olcRootPW:: YXR0LjU2MA==
- olcDbCheckpoint: 512 30
- olcDbConfig: {0}set_cachesize 0 2097152 0
- olcDbConfig: {1}set_lk_max_objects 1500
- olcDbConfig: {2}set_lk_max_locks 1500
- olcDbConfig: {3}set_lk_max_lockers 1500
- olcDbIndex: objectClass eq
- olcDbIndex: uidNumber eq
- olcDbIndex: uid eq,pres,sub
- olcDbIndex: entryCSN eq
- olcDbIndex: entryUUID eq
- structuralObjectClass: olcHdbConfig
- entryUUID: 0fbf0da8-ebc5-102e-8dad-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504123400Z
- entryCSN: 20100504145612.923447Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <olcDatabase={1}hdb>
- => ldap_bv2dn(olcDatabase={1}hdb,0)
- <= ldap_bv2dn(olcDatabase={1}hdb)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={1}hdb)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={1}hdb)=0
- <<< dnPrettyNormal: <olcDatabase={1}hdb>, <olcDatabase={1}hdb>
- >>> dnNormalize: <dc=alatest,dc=com>
- => ldap_bv2dn(dc=alatest,dc=com,0)
- <= ldap_bv2dn(dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(dc=alatest,dc=com)=0
- <<< dnNormalize: <dc=alatest,dc=com>
- >>> dnNormalize: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnNormalize: <cn=admin,dc=alatest,dc=com>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(olcDatabase={1}hdb) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcDatabase={1}hdb,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- >>> dnPrettyNormal: <dc=alatest,dc=com>
- => ldap_bv2dn(dc=alatest,dc=com,0)
- <= ldap_bv2dn(dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <dc=alatest,dc=com>, <dc=alatest,dc=com>
- >>> dnPrettyNormal: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <cn=admin,dc=alatest,dc=com>, <cn=admin,dc=alatest,dc=com>
- hdb_db_init: Initializing HDB database
- >>> dnPrettyNormal: <dc=alatest,dc=com>
- => ldap_bv2dn(dc=alatest,dc=com,0)
- <= ldap_bv2dn(dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <dc=alatest,dc=com>, <dc=alatest,dc=com>
- >>> dnNormalize: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnNormalize: <cn=admin,dc=alatest,dc=com>
- Backend ACL: access to attrs=userPassword
- by dn.base="cn=admin,dc=alatest,dc=com" write
- by anonymous auth
- by self write
- by * none
- /etc/ldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
- Backend ACL: access to attrs=shadowLastChange
- by self write
- by * read
- /etc/ldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
- >>> dnNormalize: <>
- <<< dnNormalize: <>
- Backend ACL: access to dn.base=""
- by * read
- /etc/ldap/slapd.d: line 1: warning: ACL appears to be out of scope within backend naming context
- >>> dnNormalize: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnNormalize: <cn=admin,dc=alatest,dc=com>
- Backend ACL: access to *
- by dn.base="cn=admin,dc=alatest,dc=com" write
- by * read
- /etc/ldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
- >>> dnPrettyNormal: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <cn=admin,dc=alatest,dc=com>, <cn=admin,dc=alatest,dc=com>
- index objectClass 0x0004
- index uidNumber 0x0004
- index uid 0x0716
- index entryCSN 0x0004
- index entryUUID 0x0004
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={1}hdb/olcOverlay={0}syncprov.ldif"
- => str2entry: "dn: olcOverlay={0}syncprov
- objectClass: olcOverlayConfig
- objectClass: olcSyncProvConfig
- olcOverlay: {0}syncprov
- olcSpNoPresent: TRUE
- structuralObjectClass: olcSyncProvConfig
- entryUUID: ed448bf4-ebd8-102e-8dc0-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504145612Z
- entryCSN: 20100504145612.984589Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <olcOverlay={0}syncprov>
- => ldap_bv2dn(olcOverlay={0}syncprov,0)
- <= ldap_bv2dn(olcOverlay={0}syncprov)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={0}syncprov)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={0}syncprov)=0
- <<< dnPrettyNormal: <olcOverlay={0}syncprov>, <olcOverlay={0}syncprov>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(olcOverlay={0}syncprov) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcOverlay={0}syncprov,olcDatabase={1}hdb,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={1}hdb/olcOverlay={1}accesslog.ldif"
- => str2entry: "dn: olcOverlay={1}accesslog
- objectClass: olcOverlayConfig
- objectClass: olcAccessLogConfig
- olcOverlay: {1}accesslog
- olcAccessLogDB: cn=accesslog
- olcAccessLogOps: writes
- olcAccessLogPurge: 07+00:00 01+00:00
- olcAccessLogSuccess: TRUE
- structuralObjectClass: olcAccessLogConfig
- entryUUID: ed449a04-ebd8-102e-8dc1-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504145612Z
- entryCSN: 20100504145612.984949Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <olcOverlay={1}accesslog>
- => ldap_bv2dn(olcOverlay={1}accesslog,0)
- <= ldap_bv2dn(olcOverlay={1}accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={1}accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={1}accesslog)=0
- <<< dnPrettyNormal: <olcOverlay={1}accesslog>, <olcOverlay={1}accesslog>
- >>> dnNormalize: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnNormalize: <cn=accesslog>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(olcOverlay={1}accesslog) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcOverlay={1}accesslog,olcDatabase={1}hdb,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- >>> dnPrettyNormal: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnPrettyNormal: <cn=accesslog>, <cn=accesslog>
- >>> dnPrettyNormal: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnPrettyNormal: <cn=accesslog>, <cn=accesslog>
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={2}hdb.ldif"
- => str2entry: "dn: olcDatabase={2}hdb
- objectClass: olcDatabaseConfig
- objectClass: olcHdbConfig
- olcDatabase: {2}hdb
- olcDbDirectory: /var/lib/ldap/accesslog
- olcSuffix: cn=accesslog
- olcRootDN: cn=admin,dc=alatest,dc=com
- olcDbIndex: default eq
- olcDbIndex: entryCSN,objectClass,reqEnd,reqResult,reqStart
- structuralObjectClass: olcHdbConfig
- entryUUID: ed4003fe-ebd8-102e-8dbd-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504145612Z
- entryCSN: 20100504145612.954892Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <olcDatabase={2}hdb>
- => ldap_bv2dn(olcDatabase={2}hdb,0)
- <= ldap_bv2dn(olcDatabase={2}hdb)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={2}hdb)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcDatabase={2}hdb)=0
- <<< dnPrettyNormal: <olcDatabase={2}hdb>, <olcDatabase={2}hdb>
- >>> dnNormalize: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnNormalize: <cn=accesslog>
- >>> dnNormalize: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnNormalize: <cn=admin,dc=alatest,dc=com>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(olcDatabase={2}hdb) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcDatabase={2}hdb,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- >>> dnPrettyNormal: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnPrettyNormal: <cn=accesslog>, <cn=accesslog>
- >>> dnPrettyNormal: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <cn=admin,dc=alatest,dc=com>, <cn=admin,dc=alatest,dc=com>
- hdb_db_init: Initializing HDB database
- >>> dnPrettyNormal: <cn=accesslog>
- => ldap_bv2dn(cn=accesslog,0)
- <= ldap_bv2dn(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=accesslog)=0
- <<< dnPrettyNormal: <cn=accesslog>, <cn=accesslog>
- >>> dnPrettyNormal: <cn=admin,dc=alatest,dc=com>
- => ldap_bv2dn(cn=admin,dc=alatest,dc=com,0)
- <= ldap_bv2dn(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=admin,dc=alatest,dc=com)=0
- <<< dnPrettyNormal: <cn=admin,dc=alatest,dc=com>, <cn=admin,dc=alatest,dc=com>
- index entryCSN 0x0004
- index objectClass 0x0004
- index reqEnd 0x0004
- index reqResult 0x0004
- index reqStart 0x0004
- ldif_read_file: read entry file: "/etc/ldap/slapd.d/cn=config/olcDatabase={2}hdb/olcOverlay={0}syncprov.ldif"
- => str2entry: "dn: olcOverlay={0}syncprov
- objectClass: olcOverlayConfig
- objectClass: olcSyncProvConfig
- olcOverlay: {0}syncprov
- olcSpNoPresent: TRUE
- olcSpReloadHint: TRUE
- structuralObjectClass: olcSyncProvConfig
- entryUUID: ed4463c2-ebd8-102e-8dbf-6b4ee0d5dde4
- creatorsName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- createTimestamp: 20100504145612Z
- entryCSN: 20100504145612.983558Z#000000#000#000000
- modifiersName: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
- modifyTimestamp: 20100504145612Z
- "
- >>> dnPrettyNormal: <olcOverlay={0}syncprov>
- => ldap_bv2dn(olcOverlay={0}syncprov,0)
- <= ldap_bv2dn(olcOverlay={0}syncprov)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={0}syncprov)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(olcOverlay={0}syncprov)=0
- <<< dnPrettyNormal: <olcOverlay={0}syncprov>, <olcOverlay={0}syncprov>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- >>> dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- => ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth,0)
- <= ldap_bv2dn(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth)=0
- <<< dnNormalize: <gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth>
- <= str2entry(olcOverlay={0}syncprov) -> 0x7f9a162b1a78
- => test_filter
- PRESENT
- => access_allowed: search access to "olcOverlay={0}syncprov,olcDatabase={2}hdb,cn=config" "objectClass" requested
- <= root access granted
- => access_allowed: search access granted by manage(=mwrscxd)
- <= test_filter 6
- send_ldap_result: conn=-1 op=0 p=0
- send_ldap_result: err=0 matched="" text=""
- >>> dnNormalize: <cn=Subschema>
- => ldap_bv2dn(cn=Subschema,0)
- <= ldap_bv2dn(cn=Subschema)=0
- => ldap_dn2bv(272)
- <= ldap_dn2bv(cn=subschema)=0
- <<< dnNormalize: <cn=subschema>
- matching_rule_use_init
- 1.2.840.113556.1.4.804 (integerBitOrMatch): matchingRuleUse: ( 1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
- 1.2.840.113556.1.4.803 (integerBitAndMatch): matchingRuleUse: ( 1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
- 1.3.6.1.4.1.1466.109.114.2 (caseIgnoreIA5Match): matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' APPLIES ( altServer $ olcDbConfig $ mail $ dc $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) )
- 1.3.6.1.4.1.1466.109.114.1 (caseExactIA5Match): matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES ( altServer $ olcDbConfig $ mail $ dc $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) )
- 2.5.13.39 (certificateListMatch): 2.5.13.38 (certificateListExactMatch): matchingRuleUse: ( 2.5.13.38 NAME 'certificateListExactMatch' APPLIES ( authorityRevocationList $ certificateRevocationList $ deltaRevocationList ) )
- 2.5.13.35 (certificateMatch): 2.5.13.34 (certificateExactMatch): matchingRuleUse: ( 2.5.13.34 NAME 'certificateExactMatch' APPLIES ( userCertificate $ cACertificate ) )
- 2.5.13.30 (objectIdentifierFirstComponentMatch): matchingRuleUse: ( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ ldapSyntaxes $ supportedApplicationContext ) )
- 2.5.13.29 (integerFirstComponentMatch): matchingRuleUse: ( 2.5.13.29 NAME 'integerFirstComponentMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
- 2.5.13.27 (generalizedTimeMatch): matchingRuleUse: ( 2.5.13.27 NAME 'generalizedTimeMatch' APPLIES ( createTimestamp $ modifyTimestamp ) )
- 2.5.13.24 (protocolInformationMatch): matchingRuleUse: ( 2.5.13.24 NAME 'protocolInformationMatch' APPLIES protocolInformation )
- 2.5.13.23 (uniqueMemberMatch): matchingRuleUse: ( 2.5.13.23 NAME 'uniqueMemberMatch' APPLIES uniqueMember )
- 2.5.13.22 (presentationAddressMatch): matchingRuleUse: ( 2.5.13.22 NAME 'presentationAddressMatch' APPLIES presentationAddress )
- 2.5.13.20 (telephoneNumberMatch): matchingRuleUse: ( 2.5.13.20 NAME 'telephoneNumberMatch' APPLIES ( telephoneNumber $ homePhone $ mobile $ pager ) )
- 2.5.13.17 (octetStringMatch): matchingRuleUse: ( 2.5.13.17 NAME 'octetStringMatch' APPLIES ( userPassword $ olcDbCryptKey ) )
- 2.5.13.16 (bitStringMatch): matchingRuleUse: ( 2.5.13.16 NAME 'bitStringMatch' APPLIES x500UniqueIdentifier )
- 2.5.13.14 (integerMatch): matchingRuleUse: ( 2.5.13.14 NAME 'integerMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
- 2.5.13.13 (booleanMatch): matchingRuleUse: ( 2.5.13.13 NAME 'booleanMatch' APPLIES ( hasSubordinates $ olcAddContentAcl $ olcGentleHUP $ olcHidden $ olcLastMod $ olcMirrorMode $ olcMonitoring $ olcReadOnly $ olcReverseLookup $ olcSyncUseSubentry $ olcDbChecksum $ olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex $ olcSpNoPresent $ olcSpReloadHint $ olcAccessLogSuccess ) )
- 2.5.13.11 (caseIgnoreListMatch): matchingRuleUse: ( 2.5.13.11 NAME 'caseIgnoreListMatch' APPLIES ( postalAddress $ registeredAddress $ homePostalAddress ) )
- 2.5.13.8 (numericStringMatch): matchingRuleUse: ( 2.5.13.8 NAME 'numericStringMatch' APPLIES ( x121Address $ internationaliSDNNumber ) )
- 2.5.13.7 (caseExactSubstringsMatch): matchingRuleUse: ( 2.5.13.7 NAME 'caseExactSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
- 2.5.13.6 (caseExactOrderingMatch): matchingRuleUse: ( 2.5.13.6 NAME 'caseExactOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
- 2.5.13.5 (caseExactMatch): matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcTLSCACertificatePath $ olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $ olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $ olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $ olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $ olcDbLockDetect $ olcDbMode $ olcSpCheckpoint $ olcAccessLogOps $ olcAccessLogPurge $ olcAccessLogOld $ olcAccessLogOldAttr $ knowledgeInformation $ sn $ serialNumber $ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $ postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $ givenName $ initials $ generationQualifier $ dnQualifier $ houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $ drink $ roomNumber $ userClass $ host $ documentIdentifier $ documentTitle $ documentVersion $ documentLocation $ personalTitle $ co $ uniqueIdentifier $ organizationalStatus $ buildingName $ documentPublisher $ ipServiceProtocol $ nisMapName $ carLicense $ departmentNumber $ displayName $ employeeNumber $ employeeType $ preferredLanguage $ memberURL ) )
- 2.5.13.4 (caseIgnoreSubstringsMatch): matchingRuleUse: ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
- 2.5.13.3 (caseIgnoreOrderingMatch): matchingRuleUse: ( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
- 2.5.13.2 (caseIgnoreMatch): matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcTLSCACertificatePath $ olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $ olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $ olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $ olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $ olcDbLockDetect $ olcDbMode $ olcSpCheckpoint $ olcAccessLogOps $ olcAccessLogPurge $ olcAccessLogOld $ olcAccessLogOldAttr $ knowledgeInformation $ sn $ serialNumber $ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $ postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $ givenName $ initials $ generationQualifier $ dnQualifier $ houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $ drink $ roomNumber $ userClass $ host $ documentIdentifier $ documentTitle $ documentVersion $ documentLocation $ personalTitle $ co $ uniqueIdentifier $ organizationalStatus $ buildingName $ documentPublisher $ ipServiceProtocol $ nisMapName $ carLicense $ departmentNumber $ displayName $ employeeNumber $ employeeType $ preferredLanguage $ memberURL ) )
- 1.2.36.79672281.1.13.3 (rdnMatch): 2.5.13.1 (distinguishedNameMatch): matchingRuleUse: ( 2.5.13.1 NAME 'distinguishedNameMatch' APPLIES ( creatorsName $ modifiersName $ subschemaSubentry $ entryDN $ namingContexts $ aliasedObjectName $ dynamicSubtrees $ distinguishedName $ seeAlso $ olcDefaultSearchBase $ olcRootDN $ olcSchemaDN $ olcSuffix $ olcUpdateDN $ olcAccessLogDB $ member $ owner $ roleOccupant $ manager $ documentAuthor $ secretary $ associatedName $ dITRedirect $ dgIdentity ) )
- 2.5.13.0 (objectIdentifierMatch): matchingRuleUse: ( 2.5.13.0 NAME 'objectIdentifierMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ supportedApplicationContext ) )
- main: TLS init def ctx failed: -1
- slapd destroy: freeing system resources.
- slapd stopped.
- connections_destroy: nothing to destroy.
- alasudo@ldap2:~$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement