Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Regression 1.13.2: "no LDAP groups found in groupDN" #20416

Closed
lukasertl opened this issue Apr 28, 2023 · 15 comments · Fixed by #20453
Closed

Regression 1.13.2: "no LDAP groups found in groupDN" #20416

lukasertl opened this issue Apr 28, 2023 · 15 comments · Fixed by #20453
Labels
auth/ldap bug Used to indicate a potential bug ecosystem

Comments

@lukasertl
Copy link

This is a regression after upgrading 1.13.1 to 1.13.2.

We have LDAP authentication configured against AD, using this groupfilter:

"(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))

Login still works, but we get an error in the Web UI:

"no LDAP groups found in groupDN [...] only policies from locally-defined groups available". The token then won't get any LDAP-related policies attached.

Downgrading to 1.13.1 fixes the issue.

@bovy89
Copy link

bovy89 commented Apr 28, 2023

Same issue after upgrading to 1.12.6. Temporary workaround: max_page_size=-1

@scaronni
Copy link

Same issue here, fixed by disabling pagination (-1) against FreeIPA / Redhat Identity.

@krocans
Copy link

krocans commented Apr 29, 2023

Same issue Symas OpenLDAP

@ltcarbonell
Copy link
Contributor

We appreciate you notifying us of this issue. You can find more information about the issue and the proposed fix at #20453. Meanwhile, as a temporary solution, you can manually set the max_page_size configuration option instead of relying on the default behavior.

@runtman
Copy link

runtman commented May 2, 2023

I'm back in by setting the max_page_size to -1, cheers.

@Q-efx
Copy link

Q-efx commented May 3, 2023

We appreciate you notifying us of this issue. You can find more information about the issue and the proposed fix at #20453. Meanwhile, as a temporary solution, you can manually set the max_page_size configuration option instead of relying on the default behavior.

Where do you set this parameter Exactly, as a workaround?

@lukasertl
Copy link
Author

I used this command:

vault write auth/ldap/config max_page_size=-1

@mgob
Copy link

mgob commented May 4, 2023

I used this command:

vault write auth/ldap/config max_page_size=-1

This works great for me as well, same issue as others, 1.13.2

@davama
Copy link

davama commented May 7, 2023

Glad there’s a pr for this.

vault write auth/ldap/config max_page_size=-1

Worked great!
Using v1.13.2 with symas openldap

@liquidspikes
Copy link

We ran into this as well using Active Directory. Definitely a bad bug

@digiserg
Copy link

I have the same issue and the workaround paging does not work for me.

@Cajga
Copy link

Cajga commented May 17, 2023

Well, we run into this as well with Red Hat Directory Server as a backend.

As all of our policies are bind to LDAP/external groups and as we followed the best practice to revoke the root token this basically closed us out from our Vault cluster!!!

Now we can test our recovery token procedure (I hope enough people will have their part of the recovery key as well as the gpg keys to decrypt it...)

UPDATE: our recovery token procedure worked and setting the max_page_size=-1 helped

@digiserg
Copy link

As all of our policies are bind to LDAP/external groups and as we followed the best practice to revoke the root token this basically closed us out from our Vault cluster!!!

Why not just rollback? I use auto-unseal keys, I just needed to roll back to 1.13.1 and it all came back just fine.

@zerkms
Copy link
Contributor

zerkms commented May 17, 2023

@Cajga you can always generate a new root token using unseal tokens: https://developer.hashicorp.com/vault/tutorials/operations/generate-root

@AndrewSav
Copy link

Now we can test our recovery token procedure (I hope enough people will have their part of the recovery key as well as the gpg keys to decrypt it...)

I just rolled back...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth/ldap bug Used to indicate a potential bug ecosystem
Projects
None yet
Development

Successfully merging a pull request may close this issue.