How to file a useful SSSD bug report¶
Unfortunately, SSSD is not perfect and sometimes, you might encounter a bug. This document describes how to file an SSSD bug report or an enhancement request. Providing accurate and well formed information might help us find the bug and ultimately fix it. As a bug reporter, you should work with us on pinpointing the bug - we should then work with you on fixing the bug.
Where to file the bugs?¶
You’ll need a Fedora Account System login to file a bug. When you have one, navigate to the new ticket form.
Some bugs will be automatically cloned from distribution bug-trackers, such as http://bugzilla.redhat.com.
Help us reproduce the bug¶
The easier for us is to see the flaw in our environment, the easier it is to fix the bug. If we can’t conclusively see the bug exist, it might even be closed as invalid. If the bug can’t be reproduced easily, describe your environment in detail and allow us more time to analyze your problem.
Include necessary debugging data¶
Always include the following data in a bug report:
One bug report per ticket. If you think you found multiple problems, file each one in a separate ticket
Search the ticket database for possible duplicates. If you find a duplicate, please add a comment saying that you encountered the problem as well.
Is this a defect or an enhancement? If the ticket you are filing is about adding new functionality and not about a defect in existing functionality, please add the
RFE
tag.Short summary. A good example is: “The LDAP provider segfaults when an invalid TLS certificate is specified”.
CC (optional). If there are other parties interested in a particular bug, please
@mention
their Fedora usernames in the ticket.What platform are you on? Please provide the operating system version and architecture.
The SSSD version. On an RPM-based system, you can just run
rpm -q sssd
. (If the bug is in the current working tree, please mention that as well)The SSSD config file. Typically this would be located at
/etc/sssd/sssd.conf
The SSSD log files with a high debug level. Please see the troubleshooting page on information on how to gather them and other required information. When submitting the logs, it’s very helpful to remove the existing log files before running the test case. This ensures the logs only capture the problem and developers don’t need to weed out gigabytes of info.
The steps to reproduce the bug. It’s very useful to log the times of the commands that reproduce the bug as you execute them. For instance, if two
id
commands run in sequence would give different information for the admin user, please run them like this:$ date; id admin; date; id admin; dateThis would help us cross-link your actions with the log files.
Describe your network topology and the server types and versions. This is especially important in complex setups with trusted IPA or Active Directory domains.
What are the results you expect? What were the results you see instead? Please be specific. A bad example is “My logins are slow”. A much better example is “When a user who is a member of 100 groups logs in, his login takes 50 seconds even though a kinit and id -G for the same user are fast.”
Some data in the SSSD tickets are handled by the SSSD team members. Please leave Priority, Milestone, and Assignee to their defaults.
Providing SSSD crash data¶
In addition to the data described above, please also provide the coredump and backtrace along with the bug report.
If you are on a Fedora or RHEL system, abrt
is a great tool for
gathering crash info. If abrt is not available, you can retrieve the
core file and backtrace manually. First, find out which sssd process is
crashing. Please always make sure you have the exact matching debuginfo
package version on your system. On Fedora and RHEL, you can easily install
the debuginfo packages with debuginfo-install sssd
. Then, connect to
the faulty process with gdb and resume it:
# gdb program $(pidof sssd_be)
(gdb) continue
When the program crashes, save the core file and backtrace:
(gdb) generate-core-file
Saved corefile core.7336
(gdb) bt full
# lots of output, copy and paste to the bug report
Then attach the core file and the backtrace.
When connecting to an sssd process with gdb
, you should increase the
timeout
option in the debugged process’s section up from its default
value, such as:
[domain/test]
id_provider=ldap
....
timeout = 300
If you don’t do this, chances are that gdb
will be interrupted by SSSD’s
internal watchdog (which manifests as SSSD receiving SIGRT
) before you
can catch the error you’re debugging.
Alternatively, you can disable the watchdog from inside the gdb session:
gdb process `pgrep sssd_be` -ex "p teardown_watchdog()"
This has the advantage of not having to restart the sssd, on the other hand, the watchdog is also disabled for the single gdb session only.
Mind your privacy¶
Both the SSSD log files and the coredumps might include confidential
information. If you don’t like them to be exposed in the SSSD bug tracker
instance, please contact some of the SSSD developers on the #sssd
channel on FreeNode or on the
sssd-users
mailing list.
Always test the latest available version¶
SSSD moves at a rapid pace. It’s not useful to file a bug report against an old version, please upgrade to the latest release in the branch you’re running, if the branch is still active. You can find the tarballs on our releases page. If you’re running an Enterprise or Long-Term-Maintenance distribution and can’t update to a newer version, consider filing a bug report in your distribution bug tracker instead.
Alternatively, ask on the #sssd
channel on FreeNode. Several SSSD or
FreeIPA developers maintain private repositories with custom builds for
stable platforms.
Consider if the bug has security consequences¶
If you think you found a bug that has security impact (allows an unprivileged user to take down SSSD or elevate privileges for instance), don’t file the bug in a public bug tracker. Instead, e-mail any of the SSSD developers instead.