Jump to content


DVCS with LDAP

dvcs ldap

  • Please log in to reply
19 replies to this topic

#1 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 29 April 2015 - 03:03 AM

My team has upgraded p4d recently.
While I am having a fun with DVCS, I'm struggling at the very first step.

Below are my tries:

* get recent binaries p4, p4d
* "p4 remote xx" - Success
* "p4 -p sharedServer:1666 configure set allowfetch blahblah" - success
* "p4 -p sharedServer:1666 clone xx" - fail with `access for user has not been enabled by 'p4 protect'`

It seems like local p4d failed to clone users from the shared server, because of LDAP.

Any clues of similar problem?

#2 P4Matt

P4Matt

    Advanced Member

  • Members
  • PipPipPip
  • 1383 posts

Posted 29 April 2015 - 05:27 AM

Thankfully it's an easy fix; just move that -p argument:

   p4 clone -p sharedServer:1666 -f //your/interesting/depotPath/...

That is a delightfully obtuse error message though; I'll file a bug to see if we can be a bit more clever.

#3 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 29 April 2015 - 06:18 AM

Oh, sorry, it need to be corrected. I did:

p4 -u "DOMAIN\myid" -d test clone -p sharedServer:1666 -r xx

Is there a chance to occur a problem by "the backslash" in the user name?

#4 P4Matt

P4Matt

    Advanced Member

  • Members
  • PipPipPip
  • 1383 posts

Posted 29 April 2015 - 06:35 AM

I got it to work on a test server; try dropping the double quotes.

○ → p4 -d test2 -u domain\mcbackslashy clone -p localhost:1666 -f //depot/f...
Server domainmcbackslashy-dvcs-1430289183 saved.
Cloning from 'localhost:1666'...
fetch load revisions 1 finishing
check files 100% finishing
fetch archives 100% finishing
commit revisions 100% finishing
sync 1 finishing
1 change(s) containing a total of 1 file revision(s) were successfully fetched.

I'm not sure I trust my result though; I'm going to to try on the AD test machine when I get into the office tomorrow. Quoted I couldn't get it to work, but dropping the quotes works. However looking at my users list I then have a suspect new user with no '\' in the name.

#5 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 29 April 2015 - 08:08 AM

No, doesn't work for me.

- no double quote
p4 -d test -u DOMAIN\kson clone -p sharedServer:1666 -r test_kson
'DOMAINkson' is not currently logged in to 'sharedServer:1666'
run 'p4 -u DOMAINkson -p sharedServer:1666 login' to authenticate

- with single quote
p4 -d test -u 'DOMAIN\kson' clone -p sharedServer:1666 -r test_kson
Access for user 'DOMAIN\kson' has not been enabled by 'p4 protect'.

It'd be wiser which is waiting your next reply.
Thanks though.

#6 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 30 April 2015 - 12:55 AM

FYI

Shared Server - Server version: P4D/LINUX26X86_64/2015.1/1028542 (2015/03/20)
Local Server - Rev. P4D/DARWIN90X86_64/2015.1/1028542 (2015/03/20).
Local Client - Rev. P4/DARWIN90X86_64/2015.1/1024208 (2015/03/16).

#7 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 04 May 2015 - 12:59 AM

any clue?

#8 Michael Mirman

Michael Mirman

    Member

  • Sandbox Beta
  • PipPip
  • 11 posts
  • LocationNatick, MA

Posted 04 May 2015 - 11:01 AM

Did you try just user id - without the domain?

Just curious,

-Mike
--
Michael Mirman
MathWorks, Inc.
508-647-7555

#9 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 05 May 2015 - 10:21 PM

View PostMichael Mirman, on 04 May 2015 - 11:01 AM, said:

Did you try just user id - without the domain?

Just curious,

-Mike


$ p4 -d test -u kson clone -p sharedServer:1666 -r test_kson
'kson' is not currently logged in to 'sharedServer:1666'
run 'p4 -u kson -p sharedServer:1666 login' to authenticate



Doesn't work. The user id contains DOMAIN itself.

#10 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 07 May 2015 - 09:41 PM

Is there any diagnosis approach to confirm the meta data itself what I got from `clone`?

#11 P4Nick

P4Nick

    Advanced Member

  • Staff
  • 50 posts
  • LocationReading, UK

Posted 08 May 2015 - 12:35 PM

I think we need to take a step back.

View PostKei Son, on 29 April 2015 - 03:03 AM, said:

`access for user has not been enabled by 'p4 protect'`

The error you reported generally means that the user exists, but hasn't been given any access to the Perforce Server.
To check if that's the case, please run these commands:

# Depending on how the shared server is setup, this will either confirm that the user exists (and if they have a password) or create them after authentication against the LDAP server.
p4 -u 'DOMAIN\kson' clone -p sharedServer:1666 login

# This will tell us how the user authenticates
p4 -u 'DOMAIN\kson' clone -p sharedServer:1666 user -o

# This will tell us what the user has access to do on the shared server
p4 -u 'DOMAIN\kson' clone -p sharedServer:1666 protects

As far as debugging on 'p4 clone', I think the most useful thing to see will be the communication between the client and the shared server turning on the RPC trace: this will produce a lot of extra output.
To do this, just add the global argument "-vrpc=3" to the clone command. For example:

p4 -vrpc=3 -d test -u 'DOMAIN\kson' clone -p sharedServer:1666 -r test_kson

Please let us know what you find.

#12 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 11 May 2015 - 01:58 AM

p4 -u 'DOMAIN\kson' clone -p sharedServer:1666 login


Is it correct command? clone + login?

#13 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 11 May 2015 - 04:06 AM

Anyway, this is the result:

$ p4 -vrpc=3 -d test -u 'DOMAIN\kson' clone -p sharedServer:1666 -r test_kson
RpcSendBuffer cmpfile =
RpcSendBuffer client = 78
RpcSendBuffer cmpfile =
RpcSendBuffer client = 78
RpcSendBuffer cmpfile =
RpcSendBuffer client = 78
RpcSendBuffer tag =
RpcSendBuffer enableStreams =
RpcSendBuffer client = kson.mbpr.meta
RpcSendBuffer cwd = /Users/kson/Documents/test
RpcSendBuffer host = mbpr.local
RpcSendBuffer os = UNIX
RpcSendBuffer user = DOMAIN\kson
RpcSendBuffer unicode =
RpcSendBuffer charset = 1
RpcSendBuffer clientCase = 1
RpcSendBuffer progress = 1
RpcSendBuffer host = mbpr.local
RpcSendBuffer port = sharedServer:1666
RpcSendBuffer sndbuf = 30720
RpcSendBuffer rcvbuf = 525624
RpcSendBuffer func = protocol
Rpc invoking protocol
RpcSendBuffer func = user-info
Rpc invoking user-info
RpcRecvBuffer xfiles = 6
RpcRecvBuffer server = 3
RpcRecvBuffer server2 = 39
RpcRecvBuffer serverID =
RpcRecvBuffer revver = 9
RpcRecvBuffer unicode = 1
RpcRecvBuffer nocase =
RpcRecvBuffer tzoffset = 32400
RpcRecvBuffer security = 3
RpcRecvBuffer sndbuf = 187391
RpcRecvBuffer rcvbuf = 187392
RpcRecvBuffer func = protocol
Rpc dispatch protocol
RpcRecvBuffer userName = DOMAIN\kson
RpcRecvBuffer clientName = kson.mbpr.meta
RpcRecvBuffer clientRoot = /Users/kson/Documents/rhombus
RpcRecvBuffer clientLock = none
RpcRecvBuffer clientStream = //rhombus/virtual.ml
RpcRecvBuffer clientCwd = /Users/kson/Documents/test
RpcRecvBuffer clientHost = mbpr.local
RpcRecvBuffer clientCase = insensitive
RpcRecvBuffer peerAddress = yy.yy.yy.yy(localhost's):64438
RpcRecvBuffer clientAddress = yy.yy.yy.yy(localhost's)
RpcRecvBuffer unicode = enabled
RpcRecvBuffer monitor = enabled
RpcRecvBuffer security = enabled
RpcRecvBuffer externalAuth = enabled
RpcRecvBuffer serverAddress = xx.xx.xx.xx(sharedServer's):1666
RpcRecvBuffer serverRoot = /p4db/p4root
RpcRecvBuffer serverDate = 2015/05/11 12:51:03 +0900 KST
RpcRecvBuffer serverUptime = 171:12:27
RpcRecvBuffer serverVersion = P4D/LINUX26X86_64/2015.1/1028542 (2015/03/20)
RpcRecvBuffer serverServices = standard
RpcRecvBuffer serverLicense = Electronic Arts [EA] (USA studios) 5001 users (support ends 2015/10/30)
RpcRecvBuffer serverLicense-ip = xx.xx.xx.xx(sharedServer's):1666
RpcRecvBuffer caseHandling = insensitive
RpcRecvBuffer allowPush = 3
RpcRecvBuffer allowFetch = 3
RpcRecvBuffer func = client-FstatInfo
Rpc dispatch client-FstatInfo
RpcRecvBuffer func = release
Rpc dispatch release
RpcSendBuffer = -E
RpcSendBuffer = test_kson
RpcSendBuffer client = kson.mbpr.meta
RpcSendBuffer cwd = /Users/kson/Documents/test
RpcSendBuffer host = mbpr.local
RpcSendBuffer os = UNIX
RpcSendBuffer user = DOMAIN\kson
RpcSendBuffer unicode =
RpcSendBuffer charset = 1
RpcSendBuffer clientCase = 1
RpcSendBuffer progress = 1
RpcSendBuffer func = user-remotes
Rpc invoking user-remotes
RpcRecvBuffer serverAddress = xx.xx.xx.xx(sharedServer's):1666
RpcRecvBuffer token = yy.yy.yy.yy(localhost's).1431316263
RpcRecvBuffer confirm = crypto
RpcRecvBuffer func = client-Crypto
Rpc dispatch client-Crypto
RpcSendBuffer daddr = xx.xx.xx.xx(sharedServer's):1666
RpcSendBuffer token = 1FA171FA4DA8CBAD9E32ADC684D4B269
RpcSendBuffer func = crypto
Rpc invoking crypto
RpcRecvBuffer himark = 0
RpcRecvBuffer fseq = 176
RpcRecvBuffer func = flush1
Rpc dispatch flush1
RpcSendBuffer himark = 0
RpcSendBuffer fseq = 176
RpcSendBuffer func = flush2
Rpc invoking flush2
RpcRecvBuffer RemoteID = test_kson
RpcRecvBuffer Address = localhost:1666
RpcRecvBuffer Description = Created by DOMAIN\kson.
RpcRecvBuffer func = client-FstatInfo
Rpc dispatch client-FstatInfo
RpcRecvBuffer func = release
Rpc dispatch release
RpcSendBuffer = -o
RpcSendBuffer = test_kson
RpcSendBuffer client = kson.mbpr.meta
RpcSendBuffer cwd = /Users/kson/Documents/test
RpcSendBuffer host = mbpr.local
RpcSendBuffer os = UNIX
RpcSendBuffer user = DOMAIN\kson
RpcSendBuffer unicode =
RpcSendBuffer charset = 1
RpcSendBuffer clientCase = 1
RpcSendBuffer progress = 1
RpcSendBuffer func = user-remote
Rpc invoking user-remote
RpcRecvBuffer RemoteID = test_kson
RpcRecvBuffer Address = localhost:1666
RpcRecvBuffer Owner = DOMAIN\kson
RpcRecvBuffer Options = unlocked nocompress
RpcRecvBuffer Update = 2015/04/29 07:52:30
RpcRecvBuffer Description = Created by DOMAIN\kson.
RpcRecvBuffer LastFetch = default
RpcRecvBuffer LastPush = default
RpcRecvBuffer DepotMap0 = //test_kson/virtual.ml/... //rhombus/virtual.ml/...
RpcRecvBuffer specFormatted =
RpcRecvBuffer func = client-FstatInfo
Rpc dispatch client-FstatInfo
RpcRecvBuffer func = release
Rpc dispatch release
RpcSendBuffer func = release2
Rpc invoking release2
RpcSendBuffer cmpfile =
RpcSendBuffer client = 78
RpcSendBuffer tag =
RpcSendBuffer enableStreams =
RpcSendBuffer = -i
RpcSendBuffer client = DOMAIN\kson-dvcs-1431316292
RpcSendBuffer cwd = /Users/kson/Documents/test
RpcSendBuffer initroot = /Users/kson/Documents/test
RpcSendBuffer os = UNIX
RpcSendBuffer user = DOMAIN\kson
RpcSendBuffer unicode =
RpcSendBuffer charset = 1
RpcSendBuffer clientCase = 1
RpcSendBuffer progress = 1
RpcSendBuffer sndbuf = 2048
RpcSendBuffer rcvbuf = 2048
RpcSendBuffer func = protocol
Rpc invoking protocol
RpcSendBuffer func = user-server
Rpc invoking user-server
RpcRecvBuffer xfiles = 6
RpcRecvBuffer server = 3
RpcRecvBuffer server2 = 39
RpcRecvBuffer serverID = DOMAIN\kson-dvcs-1431316292
RpcRecvBuffer revver = 9
RpcRecvBuffer unicode = 1
RpcRecvBuffer nocase =
RpcRecvBuffer tzoffset = 32400
RpcRecvBuffer sndbuf = 2048
RpcRecvBuffer rcvbuf = 2048
RpcRecvBuffer func = protocol
Rpc dispatch protocol
RpcRecvBuffer code0 = 822483067
RpcRecvBuffer fmt0 = Access for user '%user%' has not been enabled by '%'p4 protect'%'.
RpcRecvBuffer user = DOMAIN\kson
RpcRecvBuffer func = client-Message
Rpc dispatch client-Message
Access for user 'DOMAIN\kson' has not been enabled by 'p4 protect'.
RpcRecvBuffer func = release
Rpc dispatch release
RpcSendBuffer func = release2
Rpc invoking release2
$ ll test
total 16
drwxr-xr-x 5 kson DOMAIN\Domain Users 170 May 11 12:51 .
drwxr-xr-x 7 kson DOMAIN\Domain Users 238 May 11 12:51 ..
-rw-r--r-- 1 kson DOMAIN\Domain Users 191 May 11 12:51 .p4config
-rw-r--r-- 1 kson DOMAIN\Domain Users 54 May 11 12:51 .p4ignore
drwx------ 66 kson DOMAIN\Domain Users 2244 May 11 12:51 .p4root
$ ll test/.p4root
total 1912
drwx------ 66 kson DOMAIN\Domain Users 2244 May 11 12:51 .
drwxr-xr-x 5 kson DOMAIN\Domain Users 170 May 11 12:51 ..
drwx------ 2 kson DOMAIN\Domain Users	 68 May 11 12:51 backups
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.archmap
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.bodtext
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.change
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.changex
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.config
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.counters
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.depot
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.desc
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.domain
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.excl
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.fix
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.fixrev
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.group
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.groupx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.have
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.have.rp
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.integ
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.integed
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.integtx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.ixtext
-rw------- 1 kson DOMAIN\Domain Users	 0 May 11 12:51 db.jnlack
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.job
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.label
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.locks
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.logger
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.message
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.monitor
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.nameval
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.property
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.protect
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.remote
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.resolve
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.resolvex
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.rev
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revbx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revcx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revdx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revhx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.review
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revpx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revsh
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revsx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revtx
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.revux
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.rmtview
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.sendq
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.server
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.stash
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.stream
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.svrview
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.template
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.traits
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.trigger
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.user
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.user.rp
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.uxtext
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.view
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.view.rp
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.working
-rw------- 1 kson DOMAIN\Domain Users 16384 May 11 12:51 db.workingx
-rw------- 1 kson DOMAIN\Domain Users 2240 May 11 12:51 journal
-rw------- 1 kson DOMAIN\Domain Users 1338 May 11 12:51 p4_log.txt
-rw-r--r-- 1 kson DOMAIN\Domain Users	 27 May 11 12:51 server.id


#14 P4Nick

P4Nick

    Advanced Member

  • Staff
  • 50 posts
  • LocationReading, UK

Posted 11 May 2015 - 01:00 PM

View PostKei Son, on 11 May 2015 - 01:58 AM, said:

p4 -u 'DOMAIN\kson' clone -p sharedServer:1666 login

Is it correct command? clone + login?

Sorry, that was my mistake: a copy/paste error. It should have been: p4 -u 'DOMAIN\kson' -p sharedServer:1666 login


However, the -vrpc=3 output has given us everything we need:

View PostKei Son, on 11 May 2015 - 04:06 AM, said:

$ p4 -vrpc=3 -d test -u 'DOMAIN\kson' clone -p sharedServer:1666 -r test_kson

RpcSendBuffer func = user-remote
Rpc invoking user-remote
RpcRecvBuffer RemoteID = test_kson
RpcRecvBuffer Address = localhost:1666
RpcRecvBuffer Owner = DOMAIN\kson

RpcSendBuffer func = user-server
Rpc invoking user-server
Rpc dispatch client-Message
Access for user 'DOMAIN\kson' has not been enabled by 'p4 protect'.

We can see that the remote spec was successfully retrieved, which means that the server exists, was authenticated and had permission on the remote server.

The failure came during the setup of the local server: this appears to be a bug where the backslashes in the username are removed when the username is passed to the Perforce Server during its initialisation.

I've logged the bug, referencing this topic; however, if you'd like to be informed when this issue has been fixed, please email support@perforce.com

It is possible to workaround this issue by performing a number of manual steps; however this can be complicated. If you want, I'll summarise these steps.

Regards,

Nick

#15 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 12 May 2015 - 05:16 AM

Okay, I expected that.
I'd liked to get the manual step to test it before it's fixed.

Thanks

#16 P4Nick

P4Nick

    Advanced Member

  • Staff
  • 50 posts
  • LocationReading, UK

Posted 12 May 2015 - 01:34 PM

View PostKei Son, on 12 May 2015 - 05:16 AM, said:

I'd liked to get the manual step to test it before it's fixed.

These steps have been tailored to you, but you'll still need to correct the references to "sharedServer".

# Init the server with the username 'kson' (the stream name comes from the left side of your remote)
p4 -d test -u kson init -p sharedServer:1666 -c //test_kson/virtual.ml

# Move into the DVCS dir
cd test

# Create a user with the correct username
p4 user -o 'DOMAIN\kson' | p4 user -i -f

# Update the local protections table to allow the correct username
p4 protect -o | sed -e 's/kson/DOMAIN\\kson/' | p4 protect -i

# Update the .p4config file with the correct username
sed -i -e 's/P4USER=.*/P4USER=DOMAIN\\kson/' .p4config

# Copy the remote spec to the local server
p4 -p sharedServer:1666 remote -o test_kson | sed -e 's/RemoteID:.*/RemoteID: origin/' -e 's/Address:.*/Address: sharedServer:1666/' | p4 remote -i

# Fetch from the 'origin' remote
p4 fetch

If you encounter any further issues, the support team will be happy to assist (please reference this topic).

Regards,

Nick

#17 Kei Son

Kei Son

    Advanced Member

  • Members
  • PipPipPip
  • 46 posts

Posted 14 May 2015 - 11:43 PM

29 change(s) containing a total of 4088 file revision(s) were successfully fetched.
Okay, now I can start with this stuff! Thanks, a lot. Can't wait the fixed version of p4c. :)

#18 Mailman Sync

Mailman Sync

    Advanced Member

  • Maillist Aggregator
  • 2495 posts

Posted 30 July 2015 - 12:20 PM

Originally posted to the perforce-user mailing list by: Michael Mirman


I wonder if what Matt tried was on Windows, but clone Kei is running is in Unix.

Kei -

Would dropping 'DOMAIN\' completely from your command help?

I have some interest in this story because we plan to start using both LDAP and DVCS soon. ;-)

--
Michael Mirman
MathWorks, Inc.
508-647-7555

-----Original Message-----
From: perforce-user-bounces@perforce.com [mailto:perforce-user-bounces@perforce.com] On Behalf Of Kei Son
Sent: Wednesday, April 29, 2015 4:10 AM
To: perforce-user@perforce.com
Subject: Re: [p4] DVCS with LDAP


Posted on behalf of forum user 'Kei Son'.

No, doesn't work for me.

- no double quote
p4 -d test -u DOMAIN\kson clone -p sharedServer:1666 -r test_kson
'DOMAINkson' is not currently logged in to 'sharedServer:1666'
run 'p4 -u DOMAINkson -p sharedServer:1666 login' to authenticate  
- with single quote
p4 -d test -u 'DOMAIN\kson' clone -p sharedServer:1666 -r test_kson
Access for user 'DOMAIN\kson' has not been enabled by 'p4
protect'.  
It'd be wiser which is waiting your next reply.
Thanks though.



--
Please click here to see the post in its original format:
  http://forums.perfor...-dvcs-with-ldap
_______________________________________________
perforce-user mailing list  -  perforce-user@perforce.com
http://maillist.perf...o/perforce-user
_______________________________________________
perforce-user mailing list  -  perforce-user@perforce.com
http://maillist.perf...o/perforce-user


#19 Mailman Sync

Mailman Sync

    Advanced Member

  • Maillist Aggregator
  • 2495 posts

Posted 30 July 2015 - 12:20 PM

Originally posted to the perforce-user mailing list by: Michael Mirman


Quote

The user id contains DOMAIN itself.

That's the puzzling piece for me.
We have a Linux-based server, and the domain is not a part of the user id.
I wonder:
Did you try to follow the message

Quote

run 'p4 -u kson -p sharedServer:1666 login' to authenticate  
and get a login ticket?
Or, did the login command not work?
I would not expect to have to login - since LDAP is on - but I would try to do it anyway.

--
Michael Mirman
MathWorks, Inc.
508-647-7555

-----Original Message-----
From: perforce-user-bounces@perforce.com [mailto:perforce-user-bounces@perforce.com] On Behalf Of Kei Son
Sent: Tuesday, May 5, 2015 6:25 PM
To: perforce-user@perforce.com
Subject: Re: [p4] DVCS with LDAP


Posted on behalf of forum user 'Kei Son'.



[http://forums.perfor...post&pid=17326]
Michael Mirman, on 2015/05/04 11:01:10 UTC, said:

Quote

   Did you try just user id - without the domain?

  Just curious,

  -Mike


$ p4 -d test -u kson clone -p sharedServer:1666 -r test_kson 'kson'
is not currently logged in to 'sharedServer:1666' run 'p4 -u kson -p
sharedServer:1666 login' to authenticate  

Doesn't work. The user id contains DOMAIN itself.



--
Please click here to see the post in its original format:
  http://forums.perfor...-dvcs-with-ldap
_______________________________________________
perforce-user mailing list  -  perforce-user@perforce.com
http://maillist.perf...o/perforce-user
_______________________________________________
perforce-user mailing list  -  perforce-user@perforce.com
http://maillist.perf...o/perforce-user



#20 P4Nick

P4Nick

    Advanced Member

  • Staff
  • 50 posts
  • LocationReading, UK

Posted 31 July 2015 - 01:17 PM

Just to let everyone know, this bug has been fixed in a patch release:

	#1059694 (Bug #78818)
		Usernames containing backslash characters no longer cause 'p4 init'
		or 'p4 clone' to fail.






Also tagged with one or more of these keywords: dvcs, ldap

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users