[Date Prev][Date Next] [Chronological] [Thread] [Top]

Having problem retrieving an attribute ....



Hi all,

 

 

I having some weird problem, I am trying to retrieve an attribute
associated with a 

DN in Directory, even though this DN has been assigned rights to this
attribute, I continue

to get "negative" response.  I have a captured trace include, does
anyone know why my search 

is failing?  It seemed to work yesterday, but today it just stopped
working and I haven't made any

modification to my code:  Any clue would be highly appreciated:  Please
see trace below

 

 

 

do_bind: SASL/EXTERNAL bind: dn="cn=hadrian rsa,ou=sasl,ou=hadrian test
enteries,dc=my-domain,dc=com" ssf=0

daemon: select: listen=6 active_threads=0 tvp=NULL

daemon: select: listen=7 active_threads=0 tvp=NULL

daemon: activity on 1 descriptors

daemon: select: listen=6 active_threads=0 tvp=NULL

daemon: select: listen=7 active_threads=0 tvp=NULL

daemon: activity on 1 descriptors

daemon: activity on: 10r

..

..

..

 

>>> dnPrettyNormal: <cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com>

=> ldap_bv2dn(cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com,0)

<= ldap_bv2dn(cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com,0)=0

=> ldap_dn2bv(272)

<= ldap_dn2bv(cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com,272)=0

=> ldap_dn2bv(272)

<= ldap_dn2bv(cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com,272)=0

<<< dnPrettyNormal: <cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com>, <cn=hadrian rsa,ou=sasl,ou=had

rian test entries,dc=my-domain,dc=com>

SRCH "cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com" 0 3    0 0 0

begin get_filter

PRESENT

ber_scanf fmt (m) ber:

ber_dump: buf=0x08189e08 ptr=0x08189e60 end=0x08189e9a len=58

  0000:  87 0b 6f 62 6a 65 63 74  43 6c 61 73 73 30 0e 04
..objectClass0..

  0010:  0c 75 73 65 72 50 61 73  73 77 6f 72 64 a0 1b 30
.userPassword..0

  0020:  19 04 17 32 2e 31 36 2e  38 34 30 2e 31 2e 31 31
...2.16.840.1.11

  0030:  33 37 33 30 2e 33 2e 34  2e 32                     3730.3.4.2

end get_filter 0

    filter: (objectClass=*)

ber_scanf fmt ({M}}) ber:

ber_dump: buf=0x08189e08 ptr=0x08189e6d end=0x08189e9a len=45

  0000:  00 0e 04 0c 75 73 65 72  50 61 73 73 77 6f 72 64
....userPassword

  0010:  a0 1b 30 19 04 17 32 2e  31 36 2e 38 34 30 2e 31
..0...2.16.840.1

  0020:  2e 31 31 33 37 33 30 2e  33 2e 34 2e 32
.113730.3.4.2

=> get_ctrls

ber_scanf fmt ({m) ber:

ber_dump: buf=0x08189e08 ptr=0x08189e7f end=0x08189e9a len=27

  0000:  30 19 04 17 32 2e 31 36  2e 38 34 30 2e 31 2e 31
0...2.16.840.1.1

  0010:  31 33 37 33 30 2e 33 2e  34 2e 32                  13730.3.4.2

=> get_ctrls: oid="2.16.840.1.113730.3.4.2" (noncritical)

<= get_ctrls: n=1 rc=0 err=""

    attrs: userPassword

==> limits_get: conn=0 op=2 dn="cn=hadrian rsa,ou=sasl,ou=hadrian test
enteries,dc=my-domain,dc=com"

=> ldbm_back_search

dn2entry_r: dn: "cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com"

=> dn2id( "cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com" )

=> ldbm_cache_open( "dn2id.dbb", 7, 600 )

daemon: select: listen=6 active_threads=0 tvp=NULL

daemon: select: listen=7 active_threads=0 tvp=NULL

daemon: activity on 1 descriptors

=> id2entry_r( 75 )

=> ldbm_cache_open( "id2entry.dbb", 7, 600 )

ldbm_cache_open (blksize 8192) (maxids 2046) (maxindirect 5)

<= ldbm_cache_open (opened 1)

=> str2entry: "dn: cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com

objectClass: organizationalPerson

objectClass: person

objectClass: top

sn: Sasl

structuralObjectClass: organizationalPerson

entryUUID: a588eb66-76df-1029-9f4b-bba7fdf31ca9

creatorsName: cn=Manager,dc=my-domain,dc=com

createTimestamp: 20050621203444Z

cn: Hadrian rsa

description: Talented

facsimileTelephoneNumber: 972-395-1437

l: Carrollton

ou: Export

telephoneNumber: 972-395-1437

title: Chi Chi boy

userPassword:: cGFzc3dvcmQ=

entryCSN: 20050623162940Z#000001#00#000000

modifiersName: cn=Manager,dc=my-domain,dc=com

modifyTimestamp: 20050623162940Z

"

>>> dnPrettyNormal: <cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com>

=> ldap_bv2dn(cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com,0)

<= ldap_bv2dn(cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com,0)=0

=> ldap_dn2bv(272)

<= ldap_dn2bv(cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com,272)=0

=> ldap_dn2bv(272)

<= ldap_dn2bv(cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com,272)=0

<<< dnPrettyNormal: <cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com>, <cn=hadrian rsa,ou=sasl,ou=had

rian test entries,dc=my-domain,dc=com>

>>> dnNormalize: <cn=Manager,dc=my-domain,dc=com>

=> ldap_bv2dn(cn=Manager,dc=my-domain,dc=com,0)

<= ldap_bv2dn(cn=Manager,dc=my-domain,dc=com,0)=0

=> ldap_dn2bv(272)

<= ldap_dn2bv(cn=manager,dc=my-domain,dc=com,272)=0

<<< dnNormalize: <cn=manager,dc=my-domain,dc=com>

 

<= str2entry(cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com) -> 0x818ac50

<= id2entry_r( 75 ) 0x818ac50 (disk)

base_candidates: base: "cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com"

====> cache_return_entry_r( 75 ): created (0)

=> id2entry_r( 75 )

====> cache_find_entry_id( 75 ) "cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com" (found) (1 tries)

<= id2entry_r( 75 ) 0x818ac50 (cache)

=> test_filter

    PRESENT

=> access_allowed: search access to "cn=Hadrian rsa,ou=SASL,ou=Hadrian
Test Entries,dc=my-domain,dc=com" "objectClass" r

equested

=> dn: [2] cn=no read
permission,ou=uidpasswordgroup,ou=connectdirect,dc=my-domain,dc=com

=> dn: [3] cn=no write
permission,ou=uidpasswordgroup,ou=connectdirect,dc=my-domain,dc=com

=> dn: [4] cn=hadrian rsa,ou=sasl,ou=hadrian test
entries,dc=my-domain,dc=com

=> acl_get: [4] matched

=> acl_get: [4] attr objectClass

=> acl_mask: access to entry "cn=Hadrian rsa,ou=SASL,ou=Hadrian Test
Entries,dc=my-domain,dc=com", attr "objectClass" re

quested

=> acl_mask: to all values by "cn=hadrian rsa,ou=sasl,ou=hadrian test
enteries,dc=my-domain,dc=com", (=n)

<= check a_dn_pat: self

<= check a_dn_pat: self

<= check a_dn_pat: anonymous

<= check a_dn_pat: anonymous

<= acl_mask: no more <who> clauses, returning =n (stop)

=> access_allowed: search access denied by =n

<= test_filter 50

ldbm_search: candidate entry 75 does not match filter

====> cache_return_entry_r( 75 ): returned (0)

send_ldap_result: conn=0 op=2 p=3

send_ldap_result: err=0 matched="" text=""

send_ldap_response: msgid=3 tag=101 err=0