-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Regression 1.13.2: "no LDAP groups found in groupDN" #20416
Comments
Same issue after upgrading to 1.12.6. Temporary workaround: |
Same issue here, fixed by disabling pagination (-1) against FreeIPA / Redhat Identity. |
Same issue Symas OpenLDAP |
We appreciate you notifying us of this issue. You can find more information about the issue and the proposed fix at #20453. Meanwhile, as a temporary solution, you can manually set the |
I'm back in by setting the max_page_size to -1, cheers. |
Where do you set this parameter Exactly, as a workaround? |
I used this command:
|
This works great for me as well, same issue as others, 1.13.2 |
Glad there’s a pr for this.
Worked great! |
We ran into this as well using Active Directory. Definitely a bad bug |
I have the same issue and the workaround paging does not work for me. |
Well, we run into this as well with Red Hat Directory Server as a backend. As all of our policies are bind to LDAP/external groups and as we followed the best practice to revoke the root token this basically closed us out from our Vault cluster!!! Now we can test our recovery token procedure (I hope enough people will have their part of the recovery key as well as the gpg keys to decrypt it...) UPDATE: our recovery token procedure worked and setting the |
Why not just rollback? I use auto-unseal keys, I just needed to roll back to 1.13.1 and it all came back just fine. |
@Cajga you can always generate a new root token using unseal tokens: https://developer.hashicorp.com/vault/tutorials/operations/generate-root |
I just rolled back... |
This is a regression after upgrading 1.13.1 to 1.13.2.
We have LDAP authentication configured against AD, using this groupfilter:
"(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))
Login still works, but we get an error in the Web UI:
"no LDAP groups found in groupDN [...] only policies from locally-defined groups available". The token then won't get any LDAP-related policies attached.
Downgrading to 1.13.1 fixes the issue.
The text was updated successfully, but these errors were encountered: