Quellcode durchsuchen

Initial setup, not working yes

Tomi Cvetic vor 6 Jahren
Commit
e896bdf51c

+ 43 - 0
Dockerfile

@@ -0,0 +1,43 @@
+FROM alpine
+
+MAINTAINER Tomi Cvetic <tomi@slurm.ch>
+
+# The setup follows the OpenLDAP admin guide on 
+# http://www.openldap.org/doc/admin24/guide.html
+
+# Define env variables
+ENV DOMAIN        ""
+ENV PASSWORD      ""
+ENV DEBUG         1
+ENV SERVER_NAME   ""
+
+# Default env variables
+ENV USER          "ldap"
+ENV GROUP         "$USER"
+
+# Install openldap with MDB backend
+RUN apk update --no-cache && apk upgrade --no-cache
+RUN apk add --no-cache \ 
+  pwgen \
+  openldap \
+  openldap-clients \
+  openldap-back-mdb
+
+RUN mkdir /run/openldap
+RUN chown $USER:$GROUP /run/openldap
+
+# Add schemas that are not initially in the installation
+ADD samba.schema  /etc/openldap/schema/samba.schema
+
+# Add start script
+ADD start.sh /start.sh
+CMD ["/start.sh"]
+
+EXPOSE 389
+EXPOSE 636
+
+VOLUME /etc/ldap
+VOLUME /var/backups
+VOLUME /var/restore
+VOLUME /var/lib/ldap
+

+ 0 - 0
backups/201805030805-startup-data.ldif


+ 61 - 0
entrypoint.sh

@@ -0,0 +1,61 @@
+#!/bin/sh
+
+# Log everything to this log file
+exec &> $ENTRYLOG
+
+# Inspired by https://github.com/acobaugh/openldap-alpine
+
+# When not limiting the open file descriptors, the memory consumption
+# of slapd is absurdly high. See https://github.com/docker/docker/issues/8231
+ulimit -n 8192
+
+# If there's no cn=config database, initialize one.
+# Take the original slapd.conf file as template.
+if [ ! -d '/etc/openldap/slapd.d/cn=config' ]; then
+
+	# Limit the access to the database
+	SLAPD_CONFIG_ROOTPW=`< /dev/urandom tr -dc A-Za-z0-9 | head -c14; echo`
+	
+	# Generate a password hash
+	config_rootpw_hash=`slappasswd -s "${SLAPD_CONFIG_ROOTPW}"`
+	printf "$SLAPD_CONFIG_ROOTPW" > /etc/openldap/slapd.d/slapd_config_rootpw
+	chmod 400 /etc/openldap/slapd.d/slapd_config_rootpw
+	
+	# Check if all certificates and keys are present 
+	if 	[ ! -f ${SSL_PATH}/slurm.ch-rootCA.crt ] || \
+		[ ! -f ${SSL_PATH}/ldap.slurm.ch.crt ] || \
+		[ ! -f ${SSL_PATH}/ldap.slurm.ch.key ]; then
+		echo "Not all certificates and keys found for TLS."
+		exit 1
+	fi
+	
+	# Use the original slapd.conf file
+	cp /etc/openldap/slapd.conf /tmp/slapd.conf
+	
+	# Set the correct suffix
+	sed -i -e "s/dc=my-domain,dc=com/${SUFFIX}/g" /tmp/slapd.conf
+	sed -i -e "/core.schema/a include\t\t/etc/openldap/schema/cosine.schema" /tmp/slapd.conf
+	sed -i -e "/cosine.schema/a include\t\t/etc/openldap/schema/inetorgperson.schema" /tmp/slapd.conf
+	
+	# Add configuration for TLS and set root password for config database.
+	cat <<-EOF >> /tmp/slapd.conf
+	TLSCACertificateFile ${SSL_PATH}/slurm.ch-rootCA.crt
+	TLSCertificateFile ${SSL_PATH}/ldap.slurm.ch.crt
+	TLSCertificateKeyFile ${SSL_PATH}/ldap.slurm.ch.key
+	TLSCipherSuite HIGH:-SSLv2:-SSLv3
+	
+	database 	config
+	rootDN 		"cn=admin,cn=config"
+	rootPW 		$config_rootpw_hash
+	EOF
+	
+	# Generate config database from slapd.conf file.
+	echo Generating configuration
+	slaptest -f /tmp/slapd.conf -F /etc/openldap/slapd.d
+fi
+
+# Set all ownerships straight.	
+chown -R ldap:ldap /etc/openldap/slapd.d /etc/openldap/ssl /run/openldap
+
+echo Starting slapd with $@
+exec "$@" 

BIN
ldap-db/data.mdb


BIN
ldap-db/lock.mdb


+ 1 - 0
ldap/from-guide.ldif

@@ -0,0 +1 @@
+

+ 1 - 0
ldap/password

@@ -0,0 +1 @@
+poh2Shioloch8Aich5zi

+ 71 - 0
ldap/slapd.conf

@@ -0,0 +1,71 @@
+#
+# See slapd.conf(5) for details on configuration options.
+# This file should NOT be world readable.
+#
+include		/etc/openldap/schema/core.schema
+
+# Define global ACLs to disable default read access.
+
+# Do not enable referrals until AFTER you have a working directory
+# service AND an understanding of referrals.
+#referral	ldap://root.openldap.org
+
+# If you change this, adjust pidfile path also in runscript!
+pidfile		/run/openldap/slapd.pid
+argsfile	/run/openldap/slapd.args
+
+# Load dynamic backend modules:
+modulepath	/usr/lib/openldap
+moduleload	back_mdb.so
+# moduleload	back_hdb.so
+# moduleload	back_bbd.so
+# moduleload	back_ldap.so
+
+# Sample security restrictions
+#	Require integrity protection (prevent hijacking)
+#	Require 112-bit (3DES or better) encryption for updates
+#	Require 63-bit encryption for simple bind
+# security ssf=1 update_ssf=112 simple_bind=64
+
+# Sample access control policy:
+#	Root DSE: allow anyone to read it
+#	Subschema (sub)entry DSE: allow anyone to read it
+#	Other DSEs:
+#		Allow self write access
+#		Allow authenticated users read access
+#		Allow anonymous users to authenticate
+#	Directives needed to implement policy:
+# access to dn.base="" by * read
+# access to dn.base="cn=Subschema" by * read
+access to *
+	by self write
+	by users read
+	by anonymous auth
+#
+# if no access controls are present, the default policy
+# allows anyone and everyone to read anything but restricts
+# updates to rootdn.  (e.g., "access to * by * read")
+#
+# rootdn can always read and write EVERYTHING!
+
+#######################################################################
+# MDB database definitions
+#######################################################################
+
+database	mdb
+maxsize		1073741824
+suffix		"dc=slurm,dc=ch"
+rootdn		"cn=admin,dc=slurm,dc=ch"
+
+# Cleartext passwords, especially for the rootdn, should
+# be avoid.  See slappasswd(8) and slapd.conf(5) for details.
+# Use of strong authentication encouraged.
+rootpw		{SSHA}X2dGJ3xg+o8K5Y8pROXPsCNmoCKyIc8e
+
+# The database directory MUST exist prior to running slapd AND 
+# should only be accessible by the slapd and slap tools.
+# Mode 700 recommended.
+directory /var/lib/ldap
+
+# Indices to maintain
+index	objectClass	eq

+ 631 - 0
samba.schema

@@ -0,0 +1,631 @@
+##
+## schema file for OpenLDAP 2.x
+## Schema for storing Samba user accounts and group maps in LDAP
+## OIDs are owned by the Samba Team
+##
+## Prerequisite schemas - uid         (cosine.schema)
+##                      - displayName (inetorgperson.schema)
+##                      - gidNumber   (nis.schema)
+##
+## 1.3.6.1.4.1.7165.2.1.x - attributetypes
+## 1.3.6.1.4.1.7165.2.2.x - objectclasses
+##
+## Printer support
+## 1.3.6.1.4.1.7165.2.3.1.x - attributetypes
+## 1.3.6.1.4.1.7165.2.3.2.x - objectclasses
+##
+## Samba4
+## 1.3.6.1.4.1.7165.4.1.x - attributetypes
+## 1.3.6.1.4.1.7165.4.2.x - objectclasses
+## 1.3.6.1.4.1.7165.4.3.x - LDB/LDAP Controls
+## 1.3.6.1.4.1.7165.4.4.x - LDB/LDAP Extended Operations
+## 1.3.6.1.4.1.7165.4.255.x - mapped OIDs due to conflicts between AD and standards-track
+##
+## ----- READ THIS WHEN ADDING A NEW ATTRIBUTE OR OBJECT CLASS ------
+##
+## Run the 'get_next_oid' bash script in this directory to find the 
+## next available OID for attribute type and object classes.
+##
+##   $ ./get_next_oid
+##   attributetype ( 1.3.6.1.4.1.7165.2.1.XX NAME ....
+##   objectclass ( 1.3.6.1.4.1.7165.2.2.XX NAME ....
+##
+## Also ensure that new entries adhere to the declaration style
+## used throughout this file
+##
+##    <attributetype|objectclass> ( 1.3.6.1.4.1.7165.2.XX.XX NAME ....
+##                               ^ ^                        ^
+##
+## The spaces are required for the get_next_oid script (and for 
+## readability).
+##
+## ------------------------------------------------------------------
+
+# objectIdentifier SambaRoot 1.3.6.1.4.1.7165
+# objectIdentifier Samba3 SambaRoot:2
+# objectIdentifier Samba3Attrib Samba3:1
+# objectIdentifier Samba3ObjectClass Samba3:2
+# objectIdentifier Samba4 SambaRoot:4
+
+########################################################################
+##                            HISTORICAL                              ##
+########################################################################
+
+##
+## Password hashes
+##
+#attributetype ( 1.3.6.1.4.1.7165.2.1.1 NAME 'lmPassword'
+#	DESC 'LanManager Passwd'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.2 NAME 'ntPassword'
+#	DESC 'NT Passwd'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )
+
+##
+## Account flags in string format ([UWDX     ])
+##
+#attributetype ( 1.3.6.1.4.1.7165.2.1.4 NAME 'acctFlags'
+#	DESC 'Account Flags'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{16} SINGLE-VALUE )
+
+##
+## Password timestamps & policies
+##
+#attributetype ( 1.3.6.1.4.1.7165.2.1.3 NAME 'pwdLastSet'
+#	DESC 'NT pwdLastSet'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.5 NAME 'logonTime'
+#	DESC 'NT logonTime'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.6 NAME 'logoffTime'
+#	DESC 'NT logoffTime'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.7 NAME 'kickoffTime'
+#	DESC 'NT kickoffTime'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.8 NAME 'pwdCanChange'
+#	DESC 'NT pwdCanChange'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.9 NAME 'pwdMustChange'
+#	DESC 'NT pwdMustChange'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+##
+## string settings
+##
+#attributetype ( 1.3.6.1.4.1.7165.2.1.10 NAME 'homeDrive'
+#	DESC 'NT homeDrive'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{4} SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.11 NAME 'scriptPath'
+#	DESC 'NT scriptPath'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{255} SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.12 NAME 'profilePath'
+#	DESC 'NT profilePath'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{255} SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.13 NAME 'userWorkstations'
+#	DESC 'userWorkstations'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{255} SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.17 NAME 'smbHome'
+#	DESC 'smbHome'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.18 NAME 'domain'
+#	DESC 'Windows NT domain to which the user belongs'
+#	EQUALITY caseIgnoreIA5Match
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
+
+##
+## user and group RID
+##
+#attributetype ( 1.3.6.1.4.1.7165.2.1.14 NAME 'rid'
+#	DESC 'NT rid'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#attributetype ( 1.3.6.1.4.1.7165.2.1.15 NAME 'primaryGroupID'
+#	DESC 'NT Group RID'
+#	EQUALITY integerMatch
+#	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+##
+## The smbPasswordEntry objectclass has been depreciated in favor of the
+## sambaAccount objectclass
+##
+#objectclass ( 1.3.6.1.4.1.7165.2.2.1 NAME 'smbPasswordEntry' SUP top AUXILIARY
+#        DESC 'Samba smbpasswd entry'
+#        MUST ( uid $ uidNumber )
+#        MAY  ( lmPassword $ ntPassword $ pwdLastSet $ acctFlags ))
+
+#objectclass ( 1.3.6.1.4.1.7165.2.2.2 NAME 'sambaAccount' SUP top STRUCTURAL
+#	DESC 'Samba Account'
+#	MUST ( uid $ rid )
+#	MAY  ( cn $ lmPassword $ ntPassword $ pwdLastSet $ logonTime $
+#               logoffTime $ kickoffTime $ pwdCanChange $ pwdMustChange $ acctFlags $
+#               displayName $ smbHome $ homeDrive $ scriptPath $ profilePath $
+#               description $ userWorkstations $ primaryGroupID $ domain ))
+
+#objectclass ( 1.3.6.1.4.1.7165.2.2.3 NAME 'sambaAccount' SUP top AUXILIARY
+#	DESC 'Samba Auxiliary Account'
+#	MUST ( uid $ rid )
+#	MAY  ( cn $ lmPassword $ ntPassword $ pwdLastSet $ logonTime $
+#              logoffTime $ kickoffTime $ pwdCanChange $ pwdMustChange $ acctFlags $
+#              displayName $ smbHome $ homeDrive $ scriptPath $ profilePath $
+#              description $ userWorkstations $ primaryGroupID $ domain ))
+
+########################################################################
+##                        END OF HISTORICAL                           ##
+########################################################################
+
+#######################################################################
+##                Attributes used by Samba 3.0 schema                ##
+#######################################################################
+
+##
+## Password hashes
+##
+attributetype ( 1.3.6.1.4.1.7165.2.1.24 NAME 'sambaLMPassword'
+	DESC 'LanManager Password'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.25 NAME 'sambaNTPassword'
+	DESC 'MD4 hash of the unicode password'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )
+
+##
+## Account flags in string format ([UWDX     ])
+##
+attributetype ( 1.3.6.1.4.1.7165.2.1.26 NAME 'sambaAcctFlags'
+	DESC 'Account Flags'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{16} SINGLE-VALUE )
+
+##
+## Password timestamps & policies
+##
+attributetype ( 1.3.6.1.4.1.7165.2.1.27 NAME 'sambaPwdLastSet'
+	DESC 'Timestamp of the last password update'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.28 NAME 'sambaPwdCanChange'
+	DESC 'Timestamp of when the user is allowed to update the password'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.29 NAME 'sambaPwdMustChange'
+	DESC 'Timestamp of when the password will expire'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.30 NAME 'sambaLogonTime'
+	DESC 'Timestamp of last logon'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.31 NAME 'sambaLogoffTime'
+	DESC 'Timestamp of last logoff'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.32 NAME 'sambaKickoffTime'
+	DESC 'Timestamp of when the user will be logged off automatically'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.48 NAME 'sambaBadPasswordCount'
+	DESC 'Bad password attempt count'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.49 NAME 'sambaBadPasswordTime'
+	DESC 'Time of the last bad password attempt'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.55 NAME 'sambaLogonHours'
+	DESC 'Logon Hours'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{42} SINGLE-VALUE )
+
+##
+## string settings
+##
+attributetype ( 1.3.6.1.4.1.7165.2.1.33 NAME 'sambaHomeDrive'
+	DESC 'Driver letter of home directory mapping'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{4} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.34 NAME 'sambaLogonScript'
+	DESC 'Logon script path'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{255} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.35 NAME 'sambaProfilePath'
+	DESC 'Roaming profile path'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{255} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.36 NAME 'sambaUserWorkstations'
+	DESC 'List of user workstations the user is allowed to logon to'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{255} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.37 NAME 'sambaHomePath'
+	DESC 'Home directory UNC path'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.38 NAME 'sambaDomainName'
+	DESC 'Windows NT domain to which the user belongs'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.47 NAME 'sambaMungedDial'
+	DESC 'Base64 encoded user parameter string'
+	EQUALITY caseExactMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.54 NAME 'sambaPasswordHistory'
+	DESC 'Concatenated MD5 hashes of the salted NT passwords used on this account'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} )
+
+##
+## SID, of any type
+##
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.20 NAME 'sambaSID'
+	DESC 'Security ID'
+	EQUALITY caseIgnoreIA5Match
+	SUBSTR caseExactIA5SubstringsMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE )
+
+##
+## Primary group SID, compatible with ntSid
+##
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.23 NAME 'sambaPrimaryGroupSID'
+	DESC 'Primary Group Security ID'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.51 NAME 'sambaSIDList'
+	DESC 'Security ID List'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} )
+
+##
+## group mapping attributes
+##
+attributetype ( 1.3.6.1.4.1.7165.2.1.19 NAME 'sambaGroupType'
+	DESC 'NT Group Type'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+##
+## Store info on the domain
+##
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.21 NAME 'sambaNextUserRid'
+	DESC 'Next NT rid to give our for users'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.22 NAME 'sambaNextGroupRid'
+	DESC 'Next NT rid to give out for groups'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.39 NAME 'sambaNextRid'
+	DESC 'Next NT rid to give out for anything'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.40 NAME 'sambaAlgorithmicRidBase'
+	DESC 'Base at which the samba RID generation algorithm should operate'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.41 NAME 'sambaShareName'
+	DESC 'Share Name'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.42 NAME 'sambaOptionName'
+	DESC 'Option Name'
+	EQUALITY caseIgnoreMatch
+	SUBSTR caseIgnoreSubstringsMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.43 NAME 'sambaBoolOption'
+	DESC 'A boolean option'
+	EQUALITY booleanMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.44 NAME 'sambaIntegerOption'
+	DESC 'An integer option'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.45 NAME 'sambaStringOption'
+	DESC 'A string option'
+	EQUALITY caseExactIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.46 NAME 'sambaStringListOption'
+	DESC 'A string list option'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+
+
+##attributetype ( 1.3.6.1.4.1.7165.2.1.50 NAME 'sambaPrivName' 
+##	SUP name )
+
+##attributetype ( 1.3.6.1.4.1.7165.2.1.52 NAME 'sambaPrivilegeList'
+##	DESC 'Privileges List'
+##	EQUALITY caseIgnoreIA5Match
+##	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.53 NAME 'sambaTrustFlags'
+	DESC 'Trust Password Flags'
+	EQUALITY caseIgnoreIA5Match
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+
+# "min password length"
+attributetype ( 1.3.6.1.4.1.7165.2.1.58 NAME 'sambaMinPwdLength'
+	DESC 'Minimal password length (default: 5)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "password history"
+attributetype ( 1.3.6.1.4.1.7165.2.1.59 NAME 'sambaPwdHistoryLength'
+	DESC 'Length of Password History Entries (default: 0 => off)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "user must logon to change password"
+attributetype ( 1.3.6.1.4.1.7165.2.1.60 NAME 'sambaLogonToChgPwd'
+	DESC 'Force Users to logon for password change (default: 0 => off, 2 => on)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "maximum password age"
+attributetype ( 1.3.6.1.4.1.7165.2.1.61 NAME 'sambaMaxPwdAge'
+	DESC 'Maximum password age, in seconds (default: -1 => never expire passwords)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "minimum password age"
+attributetype ( 1.3.6.1.4.1.7165.2.1.62 NAME 'sambaMinPwdAge'
+	DESC 'Minimum password age, in seconds (default: 0 => allow immediate password change)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "lockout duration"
+attributetype ( 1.3.6.1.4.1.7165.2.1.63 NAME 'sambaLockoutDuration'
+	DESC 'Lockout duration in minutes (default: 30, -1 => forever)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "reset count minutes"
+attributetype ( 1.3.6.1.4.1.7165.2.1.64 NAME 'sambaLockoutObservationWindow'
+	DESC 'Reset time after lockout in minutes (default: 30)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "bad lockout attempt"
+attributetype ( 1.3.6.1.4.1.7165.2.1.65 NAME 'sambaLockoutThreshold'
+	DESC 'Lockout users after bad logon attempts (default: 0 => off)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "disconnect time"
+attributetype ( 1.3.6.1.4.1.7165.2.1.66 NAME 'sambaForceLogoff'
+	DESC 'Disconnect Users outside logon hours (default: -1 => off, 0 => on)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+# "refuse machine password change"
+attributetype ( 1.3.6.1.4.1.7165.2.1.67 NAME 'sambaRefuseMachinePwdChange'
+	DESC 'Allow Machine Password changes (default: 0 => off)'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+#
+attributetype ( 1.3.6.1.4.1.7165.2.1.68 NAME 'sambaClearTextPassword'
+	DESC 'Clear text password (used for trusted domain passwords)'
+	EQUALITY octetStringMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+#
+attributetype ( 1.3.6.1.4.1.7165.2.1.69 NAME 'sambaPreviousClearTextPassword'
+	DESC 'Previous clear text password (used for trusted domain passwords)'
+	EQUALITY octetStringMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType'
+	DESC 'Type of trust'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes'
+	DESC 'Trust attributes for a trusted domain'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection'
+	DESC 'Direction of a trust'
+	EQUALITY integerMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner'
+	DESC 'Fully qualified name of the domain with which a trust exists'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName'
+	DESC 'NetBIOS name of a domain'
+	EQUALITY caseIgnoreMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing'
+	DESC 'Authentication information for the outgoing portion of a trust'
+	EQUALITY caseExactMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming'
+	DESC 'Authentication information for the incoming portion of a trust'
+	EQUALITY caseExactMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier'
+	DESC 'SID of a trusted domain'
+	EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE )
+
+attributetype ( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo'
+	DESC 'Forest trust information for a trusted domain object'
+	EQUALITY caseExactMatch
+	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} )
+
+
+#######################################################################
+##              objectClasses used by Samba 3.0 schema               ##
+#######################################################################
+
+## The X.500 data model (and therefore LDAPv3) says that each entry can
+## only have one structural objectclass.  OpenLDAP 2.0 does not enforce
+## this currently but will in v2.1
+
+##
+## added new objectclass (and OID) for 3.0 to help us deal with backwards
+## compatibility with 2.2 installations (e.g. ldapsam_compat)  --jerry
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.6 NAME 'sambaSamAccount' SUP top AUXILIARY
+	DESC 'Samba 3.0 Auxilary SAM Account'
+	MUST ( uid $ sambaSID )
+	MAY  ( cn $ sambaLMPassword $ sambaNTPassword $ sambaPwdLastSet $
+	       sambaLogonTime $ sambaLogoffTime $ sambaKickoffTime $
+	       sambaPwdCanChange $ sambaPwdMustChange $ sambaAcctFlags $
+               displayName $ sambaHomePath $ sambaHomeDrive $ sambaLogonScript $
+	       sambaProfilePath $ description $ sambaUserWorkstations $
+	       sambaPrimaryGroupSID $ sambaDomainName $ sambaMungedDial $
+	       sambaBadPasswordCount $ sambaBadPasswordTime $
+	       sambaPasswordHistory $ sambaLogonHours))
+
+##
+## Group mapping info
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.4 NAME 'sambaGroupMapping' SUP top AUXILIARY
+	DESC 'Samba Group Mapping'
+	MUST ( gidNumber $ sambaSID $ sambaGroupType )
+	MAY  ( displayName $ description $ sambaSIDList ))
+
+##
+## Trust password for trust relationships (any kind)
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.14 NAME 'sambaTrustPassword' SUP top STRUCTURAL
+	DESC 'Samba Trust Password'
+	MUST ( sambaDomainName $ sambaNTPassword $ sambaTrustFlags )
+	MAY ( sambaSID $ sambaPwdLastSet ))
+
+##
+## Trust password for trusted domains
+## (to be stored beneath the trusting sambaDomain object in the DIT)
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.15 NAME 'sambaTrustedDomainPassword' SUP top STRUCTURAL
+	DESC 'Samba Trusted Domain Password'
+	MUST ( sambaDomainName $ sambaSID $
+	       sambaClearTextPassword $ sambaPwdLastSet )
+	MAY  ( sambaPreviousClearTextPassword ))
+
+##
+## Whole-of-domain info
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.5 NAME 'sambaDomain' SUP top STRUCTURAL
+	DESC 'Samba Domain Information'
+	MUST ( sambaDomainName $ 
+	       sambaSID ) 
+	MAY ( sambaNextRid $ sambaNextGroupRid $ sambaNextUserRid $
+	      sambaAlgorithmicRidBase $ 
+	      sambaMinPwdLength $ sambaPwdHistoryLength $ sambaLogonToChgPwd $
+	      sambaMaxPwdAge $ sambaMinPwdAge $
+	      sambaLockoutDuration $ sambaLockoutObservationWindow $ sambaLockoutThreshold $
+	      sambaForceLogoff $ sambaRefuseMachinePwdChange ))
+
+##
+## used for idmap_ldap module
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.7 NAME 'sambaUnixIdPool' SUP top AUXILIARY
+        DESC 'Pool for allocating UNIX uids/gids'
+        MUST ( uidNumber $ gidNumber ) )
+
+
+objectclass ( 1.3.6.1.4.1.7165.2.2.8 NAME 'sambaIdmapEntry' SUP top AUXILIARY
+        DESC 'Mapping from a SID to an ID'
+        MUST ( sambaSID )
+	MAY ( uidNumber $ gidNumber ) )
+
+objectclass ( 1.3.6.1.4.1.7165.2.2.9 NAME 'sambaSidEntry' SUP top STRUCTURAL
+	DESC 'Structural Class for a SID'
+	MUST ( sambaSID ) )
+
+objectclass ( 1.3.6.1.4.1.7165.2.2.10 NAME 'sambaConfig' SUP top AUXILIARY
+	DESC 'Samba Configuration Section'
+	MAY ( description ) )
+
+objectclass ( 1.3.6.1.4.1.7165.2.2.11 NAME 'sambaShare' SUP top STRUCTURAL
+	DESC 'Samba Share Section'
+	MUST ( sambaShareName )
+	MAY ( description ) )
+
+objectclass ( 1.3.6.1.4.1.7165.2.2.12 NAME 'sambaConfigOption' SUP top STRUCTURAL
+	DESC 'Samba Configuration Option'
+	MUST ( sambaOptionName )
+	MAY ( sambaBoolOption $ sambaIntegerOption $ sambaStringOption $ 
+	      sambaStringListoption $ description ) )
+
+
+## retired during privilege rewrite
+##objectclass ( 1.3.6.1.4.1.7165.2.2.13 NAME 'sambaPrivilege' SUP top AUXILIARY
+##	DESC 'Samba Privilege'
+##	MUST ( sambaSID )
+##	MAY ( sambaPrivilegeList ) )
+
+##
+## used for IPA_ldapsam
+##
+objectclass ( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL
+	DESC 'Samba Trusted Domain Object'
+	MUST ( cn )
+	MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $
+	      sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $
+	      sambaTrustAuthIncoming $ sambaSecurityIdentifier $
+	      sambaTrustForestTrustInfo) )
+	      

+ 45 - 0
slapd.d/cn=config.ldif

@@ -0,0 +1,45 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 f5842287
+dn: cn=config
+objectClass: olcGlobal
+cn: config
+olcConfigFile: /tmp/slapd.conf
+olcConfigDir: /etc/openldap/slapd.d
+olcArgsFile: /run/openldap/slapd.args
+olcAttributeOptions: lang-
+olcAuthzPolicy: none
+olcConcurrency: 0
+olcConnMaxPending: 100
+olcConnMaxPendingAuth: 1000
+olcGentleHUP: FALSE
+olcIdleTimeout: 0
+olcIndexSubstrIfMaxLen: 4
+olcIndexSubstrIfMinLen: 2
+olcIndexSubstrAnyLen: 4
+olcIndexSubstrAnyStep: 2
+olcIndexIntLen: 4
+olcListenerThreads: 1
+olcLocalSSF: 71
+olcLogLevel: 0
+olcPidFile: /run/openldap/slapd.pid
+olcReadOnly: FALSE
+olcSaslSecProps: noplain,noanonymous
+olcSockbufMaxIncoming: 262143
+olcSockbufMaxIncomingAuth: 16777215
+olcThreads: 16
+olcTLSCACertificateFile: /etc/openldap/ssl/slurm.ch-rootCA.crt
+olcTLSCertificateFile: /etc/openldap/ssl/ldap.slurm.ch.crt
+olcTLSCertificateKeyFile: /etc/openldap/ssl/ldap.slurm.ch.key
+olcTLSCipherSuite: HIGH:-SSLv2:-SSLv3
+olcTLSCRLCheck: none
+olcTLSVerifyClient: never
+olcTLSProtocolMin: 0.0
+olcToolThreads: 1
+olcWriteTimeout: 0
+structuralObjectClass: olcGlobal
+entryUUID: 7750d7c3-15cc-4a82-b3be-0f84b81e4dd7
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 14 - 0
slapd.d/cn=config/cn=module{0}.ldif

@@ -0,0 +1,14 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 2b243cce
+dn: cn=module{0}
+objectClass: olcModuleList
+cn: module{0}
+olcModulePath: /usr/lib/openldap
+olcModuleLoad: {0}back_mdb.so
+structuralObjectClass: olcModuleList
+entryUUID: 8ede0468-d432-4a27-988c-f71889486f9c
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 599 - 0
slapd.d/cn=config/cn=schema.ldif

@@ -0,0 +1,599 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 055d1494
+dn: cn=schema
+objectClass: olcSchemaConfig
+cn: schema
+olcObjectIdentifier: OLcfg 1.3.6.1.4.1.4203.1.12.2
+olcObjectIdentifier: OLcfgAt OLcfg:3
+olcObjectIdentifier: OLcfgGlAt OLcfgAt:0
+olcObjectIdentifier: OLcfgBkAt OLcfgAt:1
+olcObjectIdentifier: OLcfgDbAt OLcfgAt:2
+olcObjectIdentifier: OLcfgOvAt OLcfgAt:3
+olcObjectIdentifier: OLcfgCtAt OLcfgAt:4
+olcObjectIdentifier: OLcfgOc OLcfg:4
+olcObjectIdentifier: OLcfgGlOc OLcfgOc:0
+olcObjectIdentifier: OLcfgBkOc OLcfgOc:1
+olcObjectIdentifier: OLcfgDbOc OLcfgOc:2
+olcObjectIdentifier: OLcfgOvOc OLcfgOc:3
+olcObjectIdentifier: OLcfgCtOc OLcfgOc:4
+olcObjectIdentifier: OMsyn 1.3.6.1.4.1.1466.115.121.1
+olcObjectIdentifier: OMsBoolean OMsyn:7
+olcObjectIdentifier: OMsDN OMsyn:12
+olcObjectIdentifier: OMsDirectoryString OMsyn:15
+olcObjectIdentifier: OMsIA5String OMsyn:26
+olcObjectIdentifier: OMsInteger OMsyn:27
+olcObjectIdentifier: OMsOID OMsyn:38
+olcObjectIdentifier: OMsOctetString OMsyn:40
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' X-BINARY-TRA
+ NSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' X-NOT-HU
+ MAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Descrip
+ tion' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' X-NOT-HUMAN-REA
+ DABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' X-NOT-HUMAN-RE
+ ADABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' X-BINARY-
+ TRANSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' X-BI
+ NARY-TRANSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' X-B
+ INARY-TRANSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.11.10.2.1 DESC 'X.509 AttributeCerti
+ ficate' X-BINARY-TRANSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'Distinguished Name' )
+olcLdapSyntaxes: ( 1.2.36.79672281.1.5.0 DESC 'RDN' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Desc
+ ription' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule De
+ scription' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone N
+ umber' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' X-NOT-HUMAN-READ
+ ABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' X-NOT-HUMAN-REA
+ DABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Acc
+ ess Points' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Descrip
+ tion' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Des
+ cription' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID
+ ' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description
+ ' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Descript
+ ion' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information'
+  )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address'
+  )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.45 DESC 'SubtreeSpecification'
+  )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' 
+ X-BINARY-TRANSFER-REQUIRED 'TRUE' X-NOT-HUMAN-READABLE 'TRUE' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Iden
+ tifier' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Descripti
+ on' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definitio
+ n' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Descripti
+ on' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' 
+ )
+olcLdapSyntaxes: ( 1.3.6.1.1.1.0.0 DESC 'RFC2307 NIS Netgroup Triple' )
+olcLdapSyntaxes: ( 1.3.6.1.1.1.0.1 DESC 'RFC2307 Boot Parameter' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.1 DESC 'Certificate Exact Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.2 DESC 'Certificate Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.3 DESC 'Certificate Pair Exact Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.4 DESC 'Certificate Pair Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.5 DESC 'Certificate List Exact Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.6 DESC 'Certificate List Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.15.7 DESC 'Algorithm Identifier' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.11.10.2.2 DESC 'AttributeCertificate
+  Exact Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.11.10.2.3 DESC 'AttributeCertificate
+  Assertion' )
+olcLdapSyntaxes: ( 1.3.6.1.1.16.1 DESC 'UUID' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.11.2.1 DESC 'CSN' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.11.2.4 DESC 'CSN SID' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.1.1.1 DESC 'OpenLDAP void' )
+olcLdapSyntaxes: ( 1.3.6.1.4.1.4203.666.2.7 DESC 'OpenLDAP authz' )
+olcAttributeTypes: ( 2.5.4.0 NAME 'objectClass' DESC 'RFC4512: object classe
+ s of the entity' EQUALITY objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115
+ .121.1.38 )
+olcAttributeTypes: ( 2.5.21.9 NAME 'structuralObjectClass' DESC 'RFC4512: st
+ ructural object class of entry' EQUALITY objectIdentifierMatch SYNTAX 1.3.6
+ .1.4.1.1466.115.121.1.38 SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryO
+ peration )
+olcAttributeTypes: ( 2.5.18.1 NAME 'createTimestamp' DESC 'RFC4512: time whi
+ ch object was created' EQUALITY generalizedTimeMatch ORDERING generalizedTi
+ meOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE NO-USER-M
+ ODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.2 NAME 'modifyTimestamp' DESC 'RFC4512: time whi
+ ch object was last modified' EQUALITY generalizedTimeMatch ORDERING general
+ izedTimeOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE NO-
+ USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.3 NAME 'creatorsName' DESC 'RFC4512: name of cre
+ ator' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 
+ SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.4 NAME 'modifiersName' DESC 'RFC4512: name of la
+ st modifier' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.12
+ 1.1.12 SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.9 NAME 'hasSubordinates' DESC 'X.501: entry has 
+ children' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-
+ VALUE NO-USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.10 NAME 'subschemaSubentry' DESC 'RFC4512: name 
+ of controlling subschema entry' EQUALITY distinguishedNameMatch SYNTAX 1.3.
+ 6.1.4.1.1466.115.121.1.12 SINGLE-VALUE NO-USER-MODIFICATION USAGE directory
+ Operation )
+olcAttributeTypes: ( 1.3.6.1.1.20 NAME 'entryDN' DESC 'DN of the entry' EQUA
+ LITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VAL
+ UE NO-USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 1.3.6.1.1.16.4 NAME 'entryUUID' DESC 'UUID of the entry
+ ' EQUALITY UUIDMatch ORDERING UUIDOrderingMatch SYNTAX 1.3.6.1.1.16.1 SINGL
+ E-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.7 NAME 'entryCSN' DESC 'change s
+ equence number of the entry content' EQUALITY CSNMatch ORDERING CSNOrdering
+ Match SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} SINGLE-VALUE NO-USER-MODIFICAT
+ ION USAGE directoryOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.13 NAME 'namingCSN' DESC 'change
+  sequence number of the entry naming (RDN)' EQUALITY CSNMatch ORDERING CSNO
+ rderingMatch SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} SINGLE-VALUE NO-USER-MO
+ DIFICATION USAGE directoryOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.23 NAME 'syncreplCookie' DESC 's
+ yncrepl Cookie for shadow copy' EQUALITY octetStringMatch ORDERING octetStr
+ ingOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 SINGLE-VALUE NO-USER-
+ MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.25 NAME 'contextCSN' DESC 'the l
+ argest committed CSN of a context' EQUALITY CSNMatch ORDERING CSNOrderingMa
+ tch SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} NO-USER-MODIFICATION USAGE dSAOp
+ eration )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.6 NAME 'altServer' DESC 'RFC45
+ 12: alternative servers' SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 USAGE dSAOper
+ ation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.5 NAME 'namingContexts' DESC '
+ RFC4512: naming contexts' SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 USAGE dSAOpe
+ ration )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.13 NAME 'supportedControl' DES
+ C 'RFC4512: supported controls' SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 USAGE 
+ dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.7 NAME 'supportedExtension' DE
+ SC 'RFC4512: supported extended operations' SYNTAX 1.3.6.1.4.1.1466.115.121
+ .1.38 USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.15 NAME 'supportedLDAPVersion'
+  DESC 'RFC4512: supported LDAP versions' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
+ 27 USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.14 NAME 'supportedSASLMechanis
+ ms' DESC 'RFC4512: supported SASL mechanisms' SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.15 USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.1.3.5 NAME 'supportedFeatures' DESC 'R
+ FC4512: features supported by the server' EQUALITY objectIdentifierMatch SY
+ NTAX 1.3.6.1.4.1.1466.115.121.1.38 USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.10 NAME 'monitorContext' DESC 'm
+ onitor context' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
+ .121.1.12 SINGLE-VALUE NO-USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.1.12.2.1 NAME 'configContext' DESC 'co
+ nfig context' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.12 SINGLE-VALUE NO-USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.1.4 NAME 'vendorName' DESC 'RFC3045: name of im
+ plementation vendor' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.12
+ 1.1.15 SINGLE-VALUE NO-USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.1.5 NAME 'vendorVersion' DESC 'RFC3045: version
+  of implementation' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121
+ .1.15 SINGLE-VALUE NO-USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 2.5.18.5 NAME 'administrativeRole' DESC 'RFC3672: admin
+ istrative role' EQUALITY objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115.
+ 121.1.38 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.18.6 NAME 'subtreeSpecification' DESC 'RFC3672: sub
+ tree specification' SYNTAX 1.3.6.1.4.1.1466.115.121.1.45 SINGLE-VALUE USAGE
+  directoryOperation )
+olcAttributeTypes: ( 2.5.21.1 NAME 'dITStructureRules' DESC 'RFC4512: DIT st
+ ructure rules' EQUALITY integerFirstComponentMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.17 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.2 NAME 'dITContentRules' DESC 'RFC4512: DIT cont
+ ent rules' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1.
+ 1466.115.121.1.16 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.4 NAME 'matchingRules' DESC 'RFC4512: matching r
+ ules' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.30 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.5 NAME 'attributeTypes' DESC 'RFC4512: attribute
+  types' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1.146
+ 6.115.121.1.3 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.6 NAME 'objectClasses' DESC 'RFC4512: object cla
+ sses' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.37 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.7 NAME 'nameForms' DESC 'RFC4512: name forms ' E
+ QUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1.1466.115.121
+ .1.35 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.21.8 NAME 'matchingRuleUse' DESC 'RFC4512: matching
+  rule uses' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 1.3.6.1.4.1
+ .1466.115.121.1.31 USAGE directoryOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.120.16 NAME 'ldapSyntaxes' DESC 'R
+ FC4512: LDAP syntaxes' EQUALITY objectIdentifierFirstComponentMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.54 USAGE directoryOperation )
+olcAttributeTypes: ( 2.5.4.1 NAME ( 'aliasedObjectName' 'aliasedEntryName' )
+  DESC 'RFC4512: name of aliased object' EQUALITY distinguishedNameMatch SYN
+ TAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
+olcAttributeTypes: ( 2.16.840.1.113730.3.1.34 NAME 'ref' DESC 'RFC3296: subo
+ rdinate referral URL' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.15 USAGE distributedOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.1.3.1 NAME 'entry' DESC 'OpenLDAP ACL 
+ entry pseudo-attribute' SYNTAX 1.3.6.1.4.1.4203.1.1.1 SINGLE-VALUE NO-USER-
+ MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.1.3.2 NAME 'children' DESC 'OpenLDAP A
+ CL children pseudo-attribute' SYNTAX 1.3.6.1.4.1.4203.1.1.1 SINGLE-VALUE NO
+ -USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.8 NAME ( 'authzTo' 'saslAuthzTo'
+  ) DESC 'proxy authorization targets' EQUALITY authzMatch SYNTAX 1.3.6.1.4.
+ 1.4203.666.2.7 USAGE distributedOperation X-ORDERED 'VALUES' )
+olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.9 NAME ( 'authzFrom' 'saslAuthzF
+ rom' ) DESC 'proxy authorization sources' EQUALITY authzMatch SYNTAX 1.3.6.
+ 1.4.1.4203.666.2.7 USAGE distributedOperation X-ORDERED 'VALUES' )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.119.3 NAME 'entryTtl' DESC 'RFC258
+ 9: entry time-to-live' SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE NO
+ -USER-MODIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 1.3.6.1.4.1.1466.101.119.4 NAME 'dynamicSubtrees' DESC 
+ 'RFC2589: dynamic subtrees' SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 NO-USER-MO
+ DIFICATION USAGE dSAOperation )
+olcAttributeTypes: ( 2.5.4.49 NAME 'distinguishedName' DESC 'RFC4519: common
+  supertype of DN attributes' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1
+ .4.1.1466.115.121.1.12 )
+olcAttributeTypes: ( 2.5.4.41 NAME 'name' DESC 'RFC4519: common supertype of
+  name attributes' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
+  SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
+olcAttributeTypes: ( 2.5.4.3 NAME ( 'cn' 'commonName' ) DESC 'RFC4519: commo
+ n name(s) for which the entity is known by' SUP name )
+olcAttributeTypes: ( 0.9.2342.19200300.100.1.1 NAME ( 'uid' 'userid' ) DESC 
+ 'RFC4519: user identifier' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstr
+ ingsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: ( 1.3.6.1.1.1.1.0 NAME 'uidNumber' DESC 'RFC2307: An inte
+ ger uniquely identifying a user in an administrative domain' EQUALITY integ
+ erMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 
+ SINGLE-VALUE )
+olcAttributeTypes: ( 1.3.6.1.1.1.1.1 NAME 'gidNumber' DESC 'RFC2307: An inte
+ ger uniquely identifying a group in an administrative domain' EQUALITY inte
+ gerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
+  SINGLE-VALUE )
+olcAttributeTypes: ( 2.5.4.35 NAME 'userPassword' DESC 'RFC4519/2307: passwo
+ rd of user' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{
+ 128} )
+olcAttributeTypes: ( 1.3.6.1.4.1.250.1.57 NAME 'labeledURI' DESC 'RFC2079: U
+ niform Resource Identifier with optional label' EQUALITY caseExactMatch SYN
+ TAX 1.3.6.1.4.1.1466.115.121.1.15 )
+olcAttributeTypes: ( 2.5.4.13 NAME 'description' DESC 'RFC4519: descriptive 
+ information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNT
+ AX 1.3.6.1.4.1.1466.115.121.1.15{1024} )
+olcAttributeTypes: ( 2.5.4.34 NAME 'seeAlso' DESC 'RFC4519: DN of related ob
+ ject' SUP distinguishedName )
+olcAttributeTypes: ( OLcfgGlAt:78 NAME 'olcConfigFile' DESC 'File for slapd 
+ configuration directives' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryStrin
+ g SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:79 NAME 'olcConfigDir' DESC 'Directory for sl
+ apd configuration backend' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryStri
+ ng SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:1 NAME 'olcAccess' DESC 'Access Control List'
+  EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:86 NAME 'olcAddContentAcl' DESC 'Check ACLs a
+ gainst content of Add ops' SYNTAX OMsBoolean SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:2 NAME 'olcAllows' DESC 'Allowed set of depre
+ cated features' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:3 NAME 'olcArgsFile' DESC 'File for slapd com
+ mand line options' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:5 NAME 'olcAttributeOptions' EQUALITY caseIgn
+ oreMatch SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:4 NAME 'olcAttributeTypes' DESC 'OpenLDAP att
+ ributeTypes' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNT
+ AX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:6 NAME 'olcAuthIDRewrite' EQUALITY caseIgnore
+ Match SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:7 NAME 'olcAuthzPolicy' EQUALITY caseIgnoreMa
+ tch SYNTAX OMsDirectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:8 NAME 'olcAuthzRegexp' EQUALITY caseIgnoreMa
+ tch SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:9 NAME 'olcBackend' DESC 'A type of backend' 
+ EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString SINGLE-VALUE X-ORDERED '
+ SIBLINGS' )
+olcAttributeTypes: ( OLcfgGlAt:10 NAME 'olcConcurrency' SYNTAX OMsInteger SI
+ NGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:11 NAME 'olcConnMaxPending' SYNTAX OMsInteger
+  SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:12 NAME 'olcConnMaxPendingAuth' SYNTAX OMsInt
+ eger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:13 NAME 'olcDatabase' DESC 'The backend type 
+ for a database instance' SUP olcBackend SINGLE-VALUE X-ORDERED 'SIBLINGS' )
+olcAttributeTypes: ( OLcfgGlAt:14 NAME 'olcDefaultSearchBase' SYNTAX OMsDN S
+ INGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:15 NAME 'olcDisallows' EQUALITY caseIgnoreMat
+ ch SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:16 NAME 'olcDitContentRules' DESC 'OpenLDAP D
+ IT content rules' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
+  SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgDbAt:0.20 NAME 'olcExtraAttrs' EQUALITY caseIgnore
+ Match SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:17 NAME 'olcGentleHUP' SYNTAX OMsBoolean SING
+ LE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.17 NAME 'olcHidden' SYNTAX OMsBoolean SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:18 NAME 'olcIdleTimeout' SYNTAX OMsInteger SI
+ NGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:19 NAME 'olcInclude' SUP labeledURI )
+olcAttributeTypes: ( OLcfgGlAt:20 NAME 'olcIndexSubstrIfMinLen' SYNTAX OMsIn
+ teger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:21 NAME 'olcIndexSubstrIfMaxLen' SYNTAX OMsIn
+ teger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:22 NAME 'olcIndexSubstrAnyLen' SYNTAX OMsInte
+ ger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:23 NAME 'olcIndexSubstrAnyStep' SYNTAX OMsInt
+ eger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:84 NAME 'olcIndexIntLen' SYNTAX OMsInteger SI
+ NGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.4 NAME 'olcLastMod' SYNTAX OMsBoolean SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:85 NAME 'olcLdapSyntaxes' DESC 'OpenLDAP ldap
+ Syntax' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX OM
+ sDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgDbAt:0.5 NAME 'olcLimits' EQUALITY caseIgnoreMatch
+  SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:93 NAME 'olcListenerThreads' SYNTAX OMsIntege
+ r SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:26 NAME 'olcLocalSSF' SYNTAX OMsInteger SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:27 NAME 'olcLogFile' SYNTAX OMsDirectoryStrin
+ g SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:28 NAME 'olcLogLevel' EQUALITY caseIgnoreMatc
+ h SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgDbAt:0.6 NAME 'olcMaxDerefDepth' SYNTAX OMsInteger
+  SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.16 NAME 'olcMirrorMode' SYNTAX OMsBoolean S
+ INGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:30 NAME 'olcModuleLoad' EQUALITY caseIgnoreMa
+ tch SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:31 NAME 'olcModulePath' SYNTAX OMsDirectorySt
+ ring SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.18 NAME 'olcMonitoring' SYNTAX OMsBoolean S
+ INGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:32 NAME 'olcObjectClasses' DESC 'OpenLDAP obj
+ ect classes' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNT
+ AX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:33 NAME 'olcObjectIdentifier' EQUALITY caseIg
+ noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX OMsDirectoryString X-ORDE
+ RED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:34 NAME 'olcOverlay' SUP olcDatabase SINGLE-V
+ ALUE X-ORDERED 'SIBLINGS' )
+olcAttributeTypes: ( OLcfgGlAt:35 NAME 'olcPasswordCryptSaltFormat' SYNTAX O
+ MsDirectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:36 NAME 'olcPasswordHash' EQUALITY caseIgnore
+ Match SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:37 NAME 'olcPidFile' SYNTAX OMsDirectoryStrin
+ g SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:38 NAME 'olcPlugin' EQUALITY caseIgnoreMatch 
+ SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:39 NAME 'olcPluginLogFile' SYNTAX OMsDirector
+ yString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:40 NAME 'olcReadOnly' SYNTAX OMsBoolean SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:41 NAME 'olcReferral' SUP labeledURI SINGLE-V
+ ALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.7 NAME 'olcReplica' SUP labeledURI EQUALITY
+  caseIgnoreMatch X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:43 NAME 'olcReplicaArgsFile' SYNTAX OMsDirect
+ oryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:44 NAME 'olcReplicaPidFile' SYNTAX OMsDirecto
+ ryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:45 NAME 'olcReplicationInterval' SYNTAX OMsIn
+ teger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:46 NAME 'olcReplogFile' SYNTAX OMsDirectorySt
+ ring SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:47 NAME 'olcRequires' EQUALITY caseIgnoreMatc
+ h SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:48 NAME 'olcRestrict' EQUALITY caseIgnoreMatc
+ h SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:49 NAME 'olcReverseLookup' SYNTAX OMsBoolean 
+ SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.8 NAME 'olcRootDN' EQUALITY distinguishedNa
+ meMatch SYNTAX OMsDN SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:51 NAME 'olcRootDSE' EQUALITY caseIgnoreMatch
+  SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgDbAt:0.9 NAME 'olcRootPW' SYNTAX OMsDirectoryStrin
+ g SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:89 NAME 'olcSaslAuxprops' SYNTAX OMsDirectory
+ String SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:53 NAME 'olcSaslHost' SYNTAX OMsDirectoryStri
+ ng SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:54 NAME 'olcSaslRealm' SYNTAX OMsDirectoryStr
+ ing SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:56 NAME 'olcSaslSecProps' SYNTAX OMsDirectory
+ String SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:58 NAME 'olcSchemaDN' EQUALITY distinguishedN
+ ameMatch SYNTAX OMsDN SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:59 NAME 'olcSecurity' EQUALITY caseIgnoreMatc
+ h SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:81 NAME 'olcServerID' EQUALITY caseIgnoreMatc
+ h SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:60 NAME 'olcSizeLimit' SYNTAX OMsDirectoryStr
+ ing SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:61 NAME 'olcSockbufMaxIncoming' SYNTAX OMsInt
+ eger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:62 NAME 'olcSockbufMaxIncomingAuth' SYNTAX OM
+ sInteger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:83 NAME 'olcSortVals' DESC 'Attributes whose 
+ values will always be sorted' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryS
+ tring )
+olcAttributeTypes: ( OLcfgDbAt:0.15 NAME 'olcSubordinate' SYNTAX OMsDirector
+ yString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.10 NAME 'olcSuffix' EQUALITY distinguishedN
+ ameMatch SYNTAX OMsDN )
+olcAttributeTypes: ( OLcfgDbAt:0.19 NAME 'olcSyncUseSubentry' DESC 'Store sy
+ nc context in a subentry' SYNTAX OMsBoolean SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.11 NAME 'olcSyncrepl' EQUALITY caseIgnoreMa
+ tch SYNTAX OMsDirectoryString X-ORDERED 'VALUES' )
+olcAttributeTypes: ( OLcfgGlAt:90 NAME 'olcTCPBuffer' DESC 'Custom TCP buffe
+ r size' SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgGlAt:66 NAME 'olcThreads' SYNTAX OMsInteger SINGLE
+ -VALUE )
+olcAttributeTypes: ( OLcfgGlAt:67 NAME 'olcTimeLimit' SYNTAX OMsDirectoryStr
+ ing )
+olcAttributeTypes: ( OLcfgGlAt:68 NAME 'olcTLSCACertificateFile' SYNTAX OMsD
+ irectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:69 NAME 'olcTLSCACertificatePath' SYNTAX OMsD
+ irectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:70 NAME 'olcTLSCertificateFile' SYNTAX OMsDir
+ ectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:71 NAME 'olcTLSCertificateKeyFile' SYNTAX OMs
+ DirectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:72 NAME 'olcTLSCipherSuite' SYNTAX OMsDirecto
+ ryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:73 NAME 'olcTLSCRLCheck' SYNTAX OMsDirectoryS
+ tring SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:82 NAME 'olcTLSCRLFile' SYNTAX OMsDirectorySt
+ ring SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:74 NAME 'olcTLSRandFile' SYNTAX OMsDirectoryS
+ tring SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:75 NAME 'olcTLSVerifyClient' SYNTAX OMsDirect
+ oryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:77 NAME 'olcTLSDHParamFile' SYNTAX OMsDirecto
+ ryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:87 NAME 'olcTLSProtocolMin' SYNTAX OMsDirecto
+ ryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgGlAt:80 NAME 'olcToolThreads' SYNTAX OMsInteger SI
+ NGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.12 NAME 'olcUpdateDN' SYNTAX OMsDN SINGLE-V
+ ALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.13 NAME 'olcUpdateRef' SUP labeledURI EQUAL
+ ITY caseIgnoreMatch )
+olcAttributeTypes: ( OLcfgGlAt:88 NAME 'olcWriteTimeout' SYNTAX OMsInteger S
+ INGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.1 NAME 'olcDbDirectory' DESC 'Directory for
+  database content' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:1.2 NAME 'olcDbCheckpoint' DESC 'Database che
+ ckpoint interval in kbytes and minutes' SYNTAX OMsDirectoryString SINGLE-VA
+ LUE )
+olcAttributeTypes: ( OLcfgDbAt:1.4 NAME 'olcDbNoSync' DESC 'Disable synchron
+ ous database writes' SYNTAX OMsBoolean SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:12.3 NAME 'olcDbEnvFlags' DESC 'Database envi
+ ronment flags' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgDbAt:0.2 NAME 'olcDbIndex' DESC 'Attribute index p
+ arameters' EQUALITY caseIgnoreMatch SYNTAX OMsDirectoryString )
+olcAttributeTypes: ( OLcfgDbAt:12.1 NAME 'olcDbMaxReaders' DESC 'Maximum num
+ ber of threads that may access the DB concurrently' SYNTAX OMsInteger SINGL
+ E-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:12.2 NAME 'olcDbMaxSize' DESC 'Maximum size o
+ f DB in bytes' SYNTAX OMsInteger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:0.3 NAME 'olcDbMode' DESC 'Unix permissions o
+ f database files' SYNTAX OMsDirectoryString SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:12.5 NAME 'olcDbRtxnSize' DESC 'Number of ent
+ ries to process in one read transaction' SYNTAX OMsInteger SINGLE-VALUE )
+olcAttributeTypes: ( OLcfgDbAt:1.9 NAME 'olcDbSearchStack' DESC 'Depth of se
+ arch stack in IDLs' SYNTAX OMsInteger SINGLE-VALUE )
+olcObjectClasses: ( 2.5.6.0 NAME 'top' DESC 'top of the superclass chain' AB
+ STRACT MUST objectClass )
+olcObjectClasses: ( 1.3.6.1.4.1.1466.101.120.111 NAME 'extensibleObject' DES
+ C 'RFC4512: extensible object' SUP top AUXILIARY )
+olcObjectClasses: ( 2.5.6.1 NAME 'alias' DESC 'RFC4512: an alias' SUP top ST
+ RUCTURAL MUST aliasedObjectName )
+olcObjectClasses: ( 2.16.840.1.113730.3.2.6 NAME 'referral' DESC 'namedref: 
+ named subordinate referral' SUP top STRUCTURAL MUST ref )
+olcObjectClasses: ( 1.3.6.1.4.1.4203.1.4.1 NAME ( 'OpenLDAProotDSE' 'LDAProo
+ tDSE' ) DESC 'OpenLDAP Root DSE object' SUP top STRUCTURAL MAY cn )
+olcObjectClasses: ( 2.5.17.0 NAME 'subentry' DESC 'RFC3672: subentry' SUP to
+ p STRUCTURAL MUST ( cn $ subtreeSpecification ) )
+olcObjectClasses: ( 2.5.20.1 NAME 'subschema' DESC 'RFC4512: controlling sub
+ schema (sub)entry' AUXILIARY MAY ( dITStructureRules $ nameForms $ dITConte
+ ntRules $ objectClasses $ attributeTypes $ matchingRules $ matchingRuleUse 
+ ) )
+olcObjectClasses: ( 1.3.6.1.4.1.1466.101.119.2 NAME 'dynamicObject' DESC 'RF
+ C2589: Dynamic Object' SUP top AUXILIARY )
+olcObjectClasses: ( 1.3.6.1.4.1.4203.666.3.4 NAME 'glue' DESC 'Glue Entry' S
+ UP top STRUCTURAL )
+olcObjectClasses: ( 1.3.6.1.4.1.4203.666.3.5 NAME 'syncConsumerSubentry' DES
+ C 'Persistent Info for SyncRepl Consumer' AUXILIARY MAY syncreplCookie )
+olcObjectClasses: ( 1.3.6.1.4.1.4203.666.3.6 NAME 'syncProviderSubentry' DES
+ C 'Persistent Info for SyncRepl Producer' AUXILIARY MAY contextCSN )
+olcObjectClasses: ( OLcfgGlOc:0 NAME 'olcConfig' DESC 'OpenLDAP configuratio
+ n object' SUP top ABSTRACT )
+olcObjectClasses: ( OLcfgGlOc:1 NAME 'olcGlobal' DESC 'OpenLDAP Global confi
+ guration options' SUP olcConfig STRUCTURAL MAY ( cn $ olcConfigFile $ olcCo
+ nfigDir $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAuthIDRewrite 
+ $ olcAuthzPolicy $ olcAuthzRegexp $ olcConcurrency $ olcConnMaxPending $ ol
+ cConnMaxPendingAuth $ olcDisallows $ olcGentleHUP $ olcIdleTimeout $ olcInd
+ exSubstrIfMaxLen $ olcIndexSubstrIfMinLen $ olcIndexSubstrAnyLen $ olcIndex
+ SubstrAnyStep $ olcIndexIntLen $ olcListenerThreads $ olcLocalSSF $ olcLogF
+ ile $ olcLogLevel $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFi
+ le $ olcPluginLogFile $ olcReadOnly $ olcReferral $ olcReplogFile $ olcRequ
+ ires $ olcRestrict $ olcReverseLookup $ olcRootDSE $ olcSaslAuxprops $ olcS
+ aslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcS
+ izeLimit $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcTCPBuffer
+  $ olcThreads $ olcTimeLimit $ olcTLSCACertificateFile $ olcTLSCACertificat
+ ePath $ olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuit
+ e $ olcTLSCRLCheck $ olcTLSRandFile $ olcTLSVerifyClient $ olcTLSDHParamFil
+ e $ olcTLSCRLFile $ olcTLSProtocolMin $ olcToolThreads $ olcWriteTimeout $ 
+ olcObjectIdentifier $ olcAttributeTypes $ olcObjectClasses $ olcDitContentR
+ ules $ olcLdapSyntaxes ) )
+olcObjectClasses: ( OLcfgGlOc:2 NAME 'olcSchemaConfig' DESC 'OpenLDAP schema
+  object' SUP olcConfig STRUCTURAL MAY ( cn $ olcObjectIdentifier $ olcLdapS
+ yntaxes $ olcAttributeTypes $ olcObjectClasses $ olcDitContentRules ) )
+olcObjectClasses: ( OLcfgGlOc:3 NAME 'olcBackendConfig' DESC 'OpenLDAP Backe
+ nd-specific options' SUP olcConfig STRUCTURAL MUST olcBackend )
+olcObjectClasses: ( OLcfgGlOc:4 NAME 'olcDatabaseConfig' DESC 'OpenLDAP Data
+ base-specific options' SUP olcConfig STRUCTURAL MUST olcDatabase MAY ( olcH
+ idden $ olcSuffix $ olcSubordinate $ olcAccess $ olcAddContentAcl $ olcLast
+ Mod $ olcLimits $ olcMaxDerefDepth $ olcPlugin $ olcReadOnly $ olcReplica $
+  olcReplicaArgsFile $ olcReplicaPidFile $ olcReplicationInterval $ olcReplo
+ gFile $ olcRequires $ olcRestrict $ olcRootDN $ olcRootPW $ olcSchemaDN $ o
+ lcSecurity $ olcSizeLimit $ olcSyncUseSubentry $ olcSyncrepl $ olcTimeLimit
+  $ olcUpdateDN $ olcUpdateRef $ olcMirrorMode $ olcMonitoring $ olcExtraAtt
+ rs ) )
+olcObjectClasses: ( OLcfgGlOc:5 NAME 'olcOverlayConfig' DESC 'OpenLDAP Overl
+ ay-specific options' SUP olcConfig STRUCTURAL MUST olcOverlay )
+olcObjectClasses: ( OLcfgGlOc:6 NAME 'olcIncludeFile' DESC 'OpenLDAP configu
+ ration include file' SUP olcConfig STRUCTURAL MUST olcInclude MAY ( cn $ ol
+ cRootDSE ) )
+olcObjectClasses: ( OLcfgGlOc:7 NAME 'olcFrontendConfig' DESC 'OpenLDAP fron
+ tend configuration' AUXILIARY MAY ( olcDefaultSearchBase $ olcPasswordHash 
+ $ olcSortVals ) )
+olcObjectClasses: ( OLcfgGlOc:8 NAME 'olcModuleList' DESC 'OpenLDAP dynamic 
+ module info' SUP olcConfig STRUCTURAL MAY ( cn $ olcModulePath $ olcModuleL
+ oad ) )
+olcObjectClasses: ( OLcfgDbOc:2.1 NAME 'olcLdifConfig' DESC 'LDIF backend co
+ nfiguration' SUP olcDatabaseConfig STRUCTURAL MUST olcDbDirectory )
+olcObjectClasses: ( OLcfgDbOc:12.1 NAME 'olcMdbConfig' DESC 'MDB backend con
+ figuration' SUP olcDatabaseConfig STRUCTURAL MUST olcDbDirectory MAY ( olcD
+ bCheckpoint $ olcDbEnvFlags $ olcDbNoSync $ olcDbIndex $ olcDbMaxReaders $ 
+ olcDbMaxSize $ olcDbMode $ olcDbSearchStack $ olcDbRtxnSize ) )
+structuralObjectClass: olcSchemaConfig
+entryUUID: 65bcfed8-93de-4f09-9d70-5afd339a038b
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 247 - 0
slapd.d/cn=config/cn=schema/cn={0}core.ldif

@@ -0,0 +1,247 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 a97701c1
+dn: cn={0}core
+objectClass: olcSchemaConfig
+cn: {0}core
+olcAttributeTypes: {0}( 2.5.4.2 NAME 'knowledgeInformation' DESC 'RFC2256: k
+ nowledge information' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.
+ 121.1.15{32768} )
+olcAttributeTypes: {1}( 2.5.4.4 NAME ( 'sn' 'surname' ) DESC 'RFC2256: last 
+ (family) name(s) for which the entity is known by' SUP name )
+olcAttributeTypes: {2}( 2.5.4.5 NAME 'serialNumber' DESC 'RFC2256: serial nu
+ mber of the entity' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
+ ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
+olcAttributeTypes: {3}( 2.5.4.6 NAME ( 'c' 'countryName' ) DESC 'RFC4519: tw
+ o-letter ISO-3166 country code' SUP name SYNTAX 1.3.6.1.4.1.1466.115.121.1.
+ 11 SINGLE-VALUE )
+olcAttributeTypes: {4}( 2.5.4.7 NAME ( 'l' 'localityName' ) DESC 'RFC2256: l
+ ocality which this object resides in' SUP name )
+olcAttributeTypes: {5}( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' ) DESC 'RF
+ C2256: state or province which this object resides in' SUP name )
+olcAttributeTypes: {6}( 2.5.4.9 NAME ( 'street' 'streetAddress' ) DESC 'RFC2
+ 256: street address of this object' EQUALITY caseIgnoreMatch SUBSTR caseIgn
+ oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+olcAttributeTypes: {7}( 2.5.4.10 NAME ( 'o' 'organizationName' ) DESC 'RFC22
+ 56: organization this object belongs to' SUP name )
+olcAttributeTypes: {8}( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' ) DESC
+  'RFC2256: organizational unit this object belongs to' SUP name )
+olcAttributeTypes: {9}( 2.5.4.12 NAME 'title' DESC 'RFC2256: title associate
+ d with the entity' SUP name )
+olcAttributeTypes: {10}( 2.5.4.14 NAME 'searchGuide' DESC 'RFC2256: search g
+ uide, deprecated by enhancedSearchGuide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
+ 25 )
+olcAttributeTypes: {11}( 2.5.4.15 NAME 'businessCategory' DESC 'RFC2256: bus
+ iness category' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
+ YNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+olcAttributeTypes: {12}( 2.5.4.16 NAME 'postalAddress' DESC 'RFC2256: postal
+  address' EQUALITY caseIgnoreListMatch SUBSTR caseIgnoreListSubstringsMatch
+  SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
+olcAttributeTypes: {13}( 2.5.4.17 NAME 'postalCode' DESC 'RFC2256: postal co
+ de' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.
+ 1.4.1.1466.115.121.1.15{40} )
+olcAttributeTypes: {14}( 2.5.4.18 NAME 'postOfficeBox' DESC 'RFC2256: Post O
+ ffice Box' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX
+  1.3.6.1.4.1.1466.115.121.1.15{40} )
+olcAttributeTypes: {15}( 2.5.4.19 NAME 'physicalDeliveryOfficeName' DESC 'RF
+ C2256: Physical Delivery Office Name' EQUALITY caseIgnoreMatch SUBSTR caseI
+ gnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
+olcAttributeTypes: {16}( 2.5.4.20 NAME 'telephoneNumber' DESC 'RFC2256: Tele
+ phone Number' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstring
+ sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
+olcAttributeTypes: {17}( 2.5.4.21 NAME 'telexNumber' DESC 'RFC2256: Telex Nu
+ mber' SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
+olcAttributeTypes: {18}( 2.5.4.22 NAME 'teletexTerminalIdentifier' DESC 'RFC
+ 2256: Teletex Terminal Identifier' SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
+olcAttributeTypes: {19}( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' ) 
+ DESC 'RFC2256: Facsimile (Fax) Telephone Number' SYNTAX 1.3.6.1.4.1.1466.11
+ 5.121.1.22 )
+olcAttributeTypes: {20}( 2.5.4.24 NAME 'x121Address' DESC 'RFC2256: X.121 Ad
+ dress' EQUALITY numericStringMatch SUBSTR numericStringSubstringsMatch SYNT
+ AX 1.3.6.1.4.1.1466.115.121.1.36{15} )
+olcAttributeTypes: {21}( 2.5.4.25 NAME 'internationaliSDNNumber' DESC 'RFC22
+ 56: international ISDN number' EQUALITY numericStringMatch SUBSTR numericSt
+ ringSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
+olcAttributeTypes: {22}( 2.5.4.26 NAME 'registeredAddress' DESC 'RFC2256: re
+ gistered postal address' SUP postalAddress SYNTAX 1.3.6.1.4.1.1466.115.121.
+ 1.41 )
+olcAttributeTypes: {23}( 2.5.4.27 NAME 'destinationIndicator' DESC 'RFC2256:
+  destination indicator' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstring
+ sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{128} )
+olcAttributeTypes: {24}( 2.5.4.28 NAME 'preferredDeliveryMethod' DESC 'RFC22
+ 56: preferred delivery method' SYNTAX 1.3.6.1.4.1.1466.115.121.1.14 SINGLE-
+ VALUE )
+olcAttributeTypes: {25}( 2.5.4.29 NAME 'presentationAddress' DESC 'RFC2256: 
+ presentation address' EQUALITY presentationAddressMatch SYNTAX 1.3.6.1.4.1.
+ 1466.115.121.1.43 SINGLE-VALUE )
+olcAttributeTypes: {26}( 2.5.4.30 NAME 'supportedApplicationContext' DESC 'R
+ FC2256: supported application context' EQUALITY objectIdentifierMatch SYNTA
+ X 1.3.6.1.4.1.1466.115.121.1.38 )
+olcAttributeTypes: {27}( 2.5.4.31 NAME 'member' DESC 'RFC2256: member of a g
+ roup' SUP distinguishedName )
+olcAttributeTypes: {28}( 2.5.4.32 NAME 'owner' DESC 'RFC2256: owner (of the 
+ object)' SUP distinguishedName )
+olcAttributeTypes: {29}( 2.5.4.33 NAME 'roleOccupant' DESC 'RFC2256: occupan
+ t of role' SUP distinguishedName )
+olcAttributeTypes: {30}( 2.5.4.36 NAME 'userCertificate' DESC 'RFC2256: X.50
+ 9 user certificate, use ;binary' EQUALITY certificateExactMatch SYNTAX 1.3.
+ 6.1.4.1.1466.115.121.1.8 )
+olcAttributeTypes: {31}( 2.5.4.37 NAME 'cACertificate' DESC 'RFC2256: X.509 
+ CA certificate, use ;binary' EQUALITY certificateExactMatch SYNTAX 1.3.6.1.
+ 4.1.1466.115.121.1.8 )
+olcAttributeTypes: {32}( 2.5.4.38 NAME 'authorityRevocationList' DESC 'RFC22
+ 56: X.509 authority revocation list, use ;binary' SYNTAX 1.3.6.1.4.1.1466.1
+ 15.121.1.9 )
+olcAttributeTypes: {33}( 2.5.4.39 NAME 'certificateRevocationList' DESC 'RFC
+ 2256: X.509 certificate revocation list, use ;binary' SYNTAX 1.3.6.1.4.1.14
+ 66.115.121.1.9 )
+olcAttributeTypes: {34}( 2.5.4.40 NAME 'crossCertificatePair' DESC 'RFC2256:
+  X.509 cross certificate pair, use ;binary' SYNTAX 1.3.6.1.4.1.1466.115.121
+ .1.10 )
+olcAttributeTypes: {35}( 2.5.4.42 NAME ( 'givenName' 'gn' ) DESC 'RFC2256: f
+ irst name(s) for which the entity is known by' SUP name )
+olcAttributeTypes: {36}( 2.5.4.43 NAME 'initials' DESC 'RFC2256: initials of
+  some or all of names, but not the surname(s).' SUP name )
+olcAttributeTypes: {37}( 2.5.4.44 NAME 'generationQualifier' DESC 'RFC2256: 
+ name qualifier indicating a generation' SUP name )
+olcAttributeTypes: {38}( 2.5.4.45 NAME 'x500UniqueIdentifier' DESC 'RFC2256:
+  X.500 unique identifier' EQUALITY bitStringMatch SYNTAX 1.3.6.1.4.1.1466.1
+ 15.121.1.6 )
+olcAttributeTypes: {39}( 2.5.4.46 NAME 'dnQualifier' DESC 'RFC2256: DN quali
+ fier' EQUALITY caseIgnoreMatch ORDERING caseIgnoreOrderingMatch SUBSTR case
+ IgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
+olcAttributeTypes: {40}( 2.5.4.47 NAME 'enhancedSearchGuide' DESC 'RFC2256: 
+ enhanced search guide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
+olcAttributeTypes: {41}( 2.5.4.48 NAME 'protocolInformation' DESC 'RFC2256: 
+ protocol information' EQUALITY protocolInformationMatch SYNTAX 1.3.6.1.4.1.
+ 1466.115.121.1.42 )
+olcAttributeTypes: {42}( 2.5.4.50 NAME 'uniqueMember' DESC 'RFC2256: unique 
+ member of a group' EQUALITY uniqueMemberMatch SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.34 )
+olcAttributeTypes: {43}( 2.5.4.51 NAME 'houseIdentifier' DESC 'RFC2256: hous
+ e identifier' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYN
+ TAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
+olcAttributeTypes: {44}( 2.5.4.52 NAME 'supportedAlgorithms' DESC 'RFC2256: 
+ supported algorithms' SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
+olcAttributeTypes: {45}( 2.5.4.53 NAME 'deltaRevocationList' DESC 'RFC2256: 
+ delta revocation list; use ;binary' SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
+olcAttributeTypes: {46}( 2.5.4.54 NAME 'dmdName' DESC 'RFC2256: name of DMD'
+  SUP name )
+olcAttributeTypes: {47}( 2.5.4.65 NAME 'pseudonym' DESC 'X.520(4th): pseudon
+ ym for the object' SUP name )
+olcAttributeTypes: {48}( 0.9.2342.19200300.100.1.3 NAME ( 'mail' 'rfc822Mail
+ box' ) DESC 'RFC1274: RFC822 Mailbox' EQUALITY caseIgnoreIA5Match SUBSTR ca
+ seIgnoreIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
+olcAttributeTypes: {49}( 0.9.2342.19200300.100.1.25 NAME ( 'dc' 'domainCompo
+ nent' ) DESC 'RFC1274/2247: domain component' EQUALITY caseIgnoreIA5Match S
+ UBSTR caseIgnoreIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SIN
+ GLE-VALUE )
+olcAttributeTypes: {50}( 0.9.2342.19200300.100.1.37 NAME 'associatedDomain' 
+ DESC 'RFC1274: domain associated with object' EQUALITY caseIgnoreIA5Match S
+ UBSTR caseIgnoreIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {51}( 1.2.840.113549.1.9.1 NAME ( 'email' 'emailAddress' 
+ 'pkcs9email' ) DESC 'RFC3280: legacy attribute for email addresses in DNs' 
+ EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatch SYNTAX 1.3.
+ 6.1.4.1.1466.115.121.1.26{128} )
+olcObjectClasses: {0}( 2.5.6.2 NAME 'country' DESC 'RFC2256: a country' SUP 
+ top STRUCTURAL MUST c MAY ( searchGuide $ description ) )
+olcObjectClasses: {1}( 2.5.6.3 NAME 'locality' DESC 'RFC2256: a locality' SU
+ P top STRUCTURAL MAY ( street $ seeAlso $ searchGuide $ st $ l $ descriptio
+ n ) )
+olcObjectClasses: {2}( 2.5.6.4 NAME 'organization' DESC 'RFC2256: an organiz
+ ation' SUP top STRUCTURAL MUST o MAY ( userPassword $ searchGuide $ seeAlso
+  $ businessCategory $ x121Address $ registeredAddress $ destinationIndicato
+ r $ preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $ tel
+ ephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $ street 
+ $ postOfficeBox $ postalCode $ postalAddress $ physicalDeliveryOfficeName $
+  st $ l $ description ) )
+olcObjectClasses: {3}( 2.5.6.5 NAME 'organizationalUnit' DESC 'RFC2256: an o
+ rganizational unit' SUP top STRUCTURAL MUST ou MAY ( userPassword $ searchG
+ uide $ seeAlso $ businessCategory $ x121Address $ registeredAddress $ desti
+ nationIndicator $ preferredDeliveryMethod $ telexNumber $ teletexTerminalId
+ entifier $ telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNu
+ mber $ street $ postOfficeBox $ postalCode $ postalAddress $ physicalDelive
+ ryOfficeName $ st $ l $ description ) )
+olcObjectClasses: {4}( 2.5.6.6 NAME 'person' DESC 'RFC2256: a person' SUP to
+ p STRUCTURAL MUST ( sn $ cn ) MAY ( userPassword $ telephoneNumber $ seeAls
+ o $ description ) )
+olcObjectClasses: {5}( 2.5.6.7 NAME 'organizationalPerson' DESC 'RFC2256: an
+  organizational person' SUP person STRUCTURAL MAY ( title $ x121Address $ r
+ egisteredAddress $ destinationIndicator $ preferredDeliveryMethod $ telexNu
+ mber $ teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumbe
+ r $ facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $ postal
+ Address $ physicalDeliveryOfficeName $ ou $ st $ l ) )
+olcObjectClasses: {6}( 2.5.6.8 NAME 'organizationalRole' DESC 'RFC2256: an o
+ rganizational role' SUP top STRUCTURAL MUST cn MAY ( x121Address $ register
+ edAddress $ destinationIndicator $ preferredDeliveryMethod $ telexNumber $ 
+ teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumber $ fac
+ simileTelephoneNumber $ seeAlso $ roleOccupant $ preferredDeliveryMethod $ 
+ street $ postOfficeBox $ postalCode $ postalAddress $ physicalDeliveryOffic
+ eName $ ou $ st $ l $ description ) )
+olcObjectClasses: {7}( 2.5.6.9 NAME 'groupOfNames' DESC 'RFC2256: a group of
+  names (DNs)' SUP top STRUCTURAL MUST ( member $ cn ) MAY ( businessCategor
+ y $ seeAlso $ owner $ ou $ o $ description ) )
+olcObjectClasses: {8}( 2.5.6.10 NAME 'residentialPerson' DESC 'RFC2256: an r
+ esidential person' SUP person STRUCTURAL MUST l MAY ( businessCategory $ x1
+ 21Address $ registeredAddress $ destinationIndicator $ preferredDeliveryMet
+ hod $ telexNumber $ teletexTerminalIdentifier $ telephoneNumber $ internati
+ onaliSDNNumber $ facsimileTelephoneNumber $ preferredDeliveryMethod $ stree
+ t $ postOfficeBox $ postalCode $ postalAddress $ physicalDeliveryOfficeName
+  $ st $ l ) )
+olcObjectClasses: {9}( 2.5.6.11 NAME 'applicationProcess' DESC 'RFC2256: an 
+ application process' SUP top STRUCTURAL MUST cn MAY ( seeAlso $ ou $ l $ de
+ scription ) )
+olcObjectClasses: {10}( 2.5.6.12 NAME 'applicationEntity' DESC 'RFC2256: an 
+ application entity' SUP top STRUCTURAL MUST ( presentationAddress $ cn ) MA
+ Y ( supportedApplicationContext $ seeAlso $ ou $ o $ l $ description ) )
+olcObjectClasses: {11}( 2.5.6.13 NAME 'dSA' DESC 'RFC2256: a directory syste
+ m agent (a server)' SUP applicationEntity STRUCTURAL MAY knowledgeInformati
+ on )
+olcObjectClasses: {12}( 2.5.6.14 NAME 'device' DESC 'RFC2256: a device' SUP 
+ top STRUCTURAL MUST cn MAY ( serialNumber $ seeAlso $ owner $ ou $ o $ l $ 
+ description ) )
+olcObjectClasses: {13}( 2.5.6.15 NAME 'strongAuthenticationUser' DESC 'RFC22
+ 56: a strong authentication user' SUP top AUXILIARY MUST userCertificate )
+olcObjectClasses: {14}( 2.5.6.16 NAME 'certificationAuthority' DESC 'RFC2256
+ : a certificate authority' SUP top AUXILIARY MUST ( authorityRevocationList
+  $ certificateRevocationList $ cACertificate ) MAY crossCertificatePair )
+olcObjectClasses: {15}( 2.5.6.17 NAME 'groupOfUniqueNames' DESC 'RFC2256: a 
+ group of unique names (DN and Unique Identifier)' SUP top STRUCTURAL MUST (
+  uniqueMember $ cn ) MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ de
+ scription ) )
+olcObjectClasses: {16}( 2.5.6.18 NAME 'userSecurityInformation' DESC 'RFC225
+ 6: a user security information' SUP top AUXILIARY MAY supportedAlgorithms )
+olcObjectClasses: {17}( 2.5.6.16.2 NAME 'certificationAuthority-V2' SUP cert
+ ificationAuthority AUXILIARY MAY deltaRevocationList )
+olcObjectClasses: {18}( 2.5.6.19 NAME 'cRLDistributionPoint' SUP top STRUCTU
+ RAL MUST cn MAY ( certificateRevocationList $ authorityRevocationList $ del
+ taRevocationList ) )
+olcObjectClasses: {19}( 2.5.6.20 NAME 'dmd' SUP top STRUCTURAL MUST dmdName 
+ MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $ x121Address
+  $ registeredAddress $ destinationIndicator $ preferredDeliveryMethod $ tel
+ exNumber $ teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNN
+ umber $ facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $ po
+ stalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
+olcObjectClasses: {20}( 2.5.6.21 NAME 'pkiUser' DESC 'RFC2587: a PKI user' S
+ UP top AUXILIARY MAY userCertificate )
+olcObjectClasses: {21}( 2.5.6.22 NAME 'pkiCA' DESC 'RFC2587: PKI certificate
+  authority' SUP top AUXILIARY MAY ( authorityRevocationList $ certificateRe
+ vocationList $ cACertificate $ crossCertificatePair ) )
+olcObjectClasses: {22}( 2.5.6.23 NAME 'deltaCRL' DESC 'RFC2587: PKI user' SU
+ P top AUXILIARY MAY deltaRevocationList )
+olcObjectClasses: {23}( 1.3.6.1.4.1.250.3.15 NAME 'labeledURIObject' DESC 'R
+ FC2079: object that contains the URI attribute type' SUP top AUXILIARY MAY 
+ labeledURI )
+olcObjectClasses: {24}( 0.9.2342.19200300.100.4.19 NAME 'simpleSecurityObjec
+ t' DESC 'RFC1274: simple security object' SUP top AUXILIARY MUST userPasswo
+ rd )
+olcObjectClasses: {25}( 1.3.6.1.4.1.1466.344 NAME 'dcObject' DESC 'RFC2247: 
+ domain component object' SUP top AUXILIARY MUST dc )
+olcObjectClasses: {26}( 1.3.6.1.1.3.1 NAME 'uidObject' DESC 'RFC2377: uid ob
+ ject' SUP top AUXILIARY MUST uid )
+structuralObjectClass: olcSchemaConfig
+entryUUID: 008473a2-a0e7-4dc6-9064-59a09696ccaf
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 178 - 0
slapd.d/cn=config/cn=schema/cn={1}cosine.ldif

@@ -0,0 +1,178 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 2279b923
+dn: cn={1}cosine
+objectClass: olcSchemaConfig
+cn: {1}cosine
+olcAttributeTypes: {0}( 0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress
+ ' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.
+ 4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {1}( 0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274:
+  general information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsM
+ atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} )
+olcAttributeTypes: {2}( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteD
+ rink' ) DESC 'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR case
+ IgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {3}( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RF
+ C1274: room number' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
+ ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {4}( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274
+ : photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000} )
+olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.8 NAME 'userClass' DESC 'RFC
+ 1274: category of user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstring
+ sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {6}( 0.9.2342.19200300.100.1.9 NAME 'host' DESC 'RFC1274:
+  host computer' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
+ YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {7}( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC1
+ 274: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466
+ .115.121.1.12 )
+olcAttributeTypes: {8}( 0.9.2342.19200300.100.1.11 NAME 'documentIdentifier'
+  DESC 'RFC1274: unique identifier of document' EQUALITY caseIgnoreMatch SUB
+ STR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {9}( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC
+  'RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSub
+ stringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {10}( 0.9.2342.19200300.100.1.13 NAME 'documentVersion' D
+ ESC 'RFC1274: version of document' EQUALITY caseIgnoreMatch SUBSTR caseIgno
+ reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {11}( 0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DE
+ SC 'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNT
+ AX 1.3.6.1.4.1.1466.115.121.1.12 )
+olcAttributeTypes: {12}( 0.9.2342.19200300.100.1.15 NAME 'documentLocation' 
+ DESC 'RFC1274: location of document original' EQUALITY caseIgnoreMatch SUBS
+ TR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {13}( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone' 'home
+ TelephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY telephone
+ NumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.1
+ 15.121.1.50 )
+olcAttributeTypes: {14}( 0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'R
+ FC1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1
+ .1466.115.121.1.12 )
+olcAttributeTypes: {15}( 0.9.2342.19200300.100.1.22 NAME 'otherMailbox' SYNT
+ AX 1.3.6.1.4.1.1466.115.121.1.39 )
+olcAttributeTypes: {16}( 0.9.2342.19200300.100.1.26 NAME 'aRecord' EQUALITY 
+ caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {17}( 0.9.2342.19200300.100.1.27 NAME 'mDRecord' EQUALITY
+  caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {18}( 0.9.2342.19200300.100.1.28 NAME 'mXRecord' EQUALITY
+  caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {19}( 0.9.2342.19200300.100.1.29 NAME 'nSRecord' EQUALITY
+  caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {20}( 0.9.2342.19200300.100.1.30 NAME 'sOARecord' EQUALIT
+ Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {21}( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord' EQUAL
+ ITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {22}( 0.9.2342.19200300.100.1.38 NAME 'associatedName' DE
+ SC 'RFC1274: DN of entry associated with domain' EQUALITY distinguishedName
+ Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
+olcAttributeTypes: {23}( 0.9.2342.19200300.100.1.39 NAME 'homePostalAddress'
+  DESC 'RFC1274: home postal address' EQUALITY caseIgnoreListMatch SUBSTR ca
+ seIgnoreListSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
+olcAttributeTypes: {24}( 0.9.2342.19200300.100.1.40 NAME 'personalTitle' DES
+ C 'RFC1274: personal title' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubst
+ ringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {25}( 0.9.2342.19200300.100.1.41 NAME ( 'mobile' 'mobileT
+ elephoneNumber' ) DESC 'RFC1274: mobile telephone number' EQUALITY telephon
+ eNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.50 )
+olcAttributeTypes: {26}( 0.9.2342.19200300.100.1.42 NAME ( 'pager' 'pagerTel
+ ephoneNumber' ) DESC 'RFC1274: pager telephone number' EQUALITY telephoneNu
+ mberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115
+ .121.1.50 )
+olcAttributeTypes: {27}( 0.9.2342.19200300.100.1.43 NAME ( 'co' 'friendlyCou
+ ntryName' ) DESC 'RFC1274: friendly country name' EQUALITY caseIgnoreMatch 
+ SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+olcAttributeTypes: {28}( 0.9.2342.19200300.100.1.44 NAME 'uniqueIdentifier' 
+ DESC 'RFC1274: unique identifer' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.
+ 1.1466.115.121.1.15{256} )
+olcAttributeTypes: {29}( 0.9.2342.19200300.100.1.45 NAME 'organizationalStat
+ us' DESC 'RFC1274: organizational status' EQUALITY caseIgnoreMatch SUBSTR c
+ aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {30}( 0.9.2342.19200300.100.1.46 NAME 'janetMailbox' DESC
+  'RFC1274: Janet mailbox' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5S
+ ubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
+olcAttributeTypes: {31}( 0.9.2342.19200300.100.1.47 NAME 'mailPreferenceOpti
+ on' DESC 'RFC1274: mail preference option' SYNTAX 1.3.6.1.4.1.1466.115.121.
+ 1.27 )
+olcAttributeTypes: {32}( 0.9.2342.19200300.100.1.48 NAME 'buildingName' DESC
+  'RFC1274: name of building' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubs
+ tringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
+olcAttributeTypes: {33}( 0.9.2342.19200300.100.1.49 NAME 'dSAQuality' DESC '
+ RFC1274: DSA Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.19 SINGLE-VALUE )
+olcAttributeTypes: {34}( 0.9.2342.19200300.100.1.50 NAME 'singleLevelQuality
+ ' DESC 'RFC1274: Single Level Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.13
+  SINGLE-VALUE )
+olcAttributeTypes: {35}( 0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQual
+ ity' DESC 'RFC1274: Subtree Mininum Quality' SYNTAX 1.3.6.1.4.1.1466.115.12
+ 1.1.13 SINGLE-VALUE )
+olcAttributeTypes: {36}( 0.9.2342.19200300.100.1.52 NAME 'subtreeMaximumQual
+ ity' DESC 'RFC1274: Subtree Maximun Quality' SYNTAX 1.3.6.1.4.1.1466.115.12
+ 1.1.13 SINGLE-VALUE )
+olcAttributeTypes: {37}( 0.9.2342.19200300.100.1.53 NAME 'personalSignature'
+  DESC 'RFC1274: Personal Signature (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.12
+ 1.1.23 )
+olcAttributeTypes: {38}( 0.9.2342.19200300.100.1.54 NAME 'dITRedirect' DESC 
+ 'RFC1274: DIT Redirect' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.
+ 1466.115.121.1.12 )
+olcAttributeTypes: {39}( 0.9.2342.19200300.100.1.55 NAME 'audio' DESC 'RFC12
+ 74: audio (u-law)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.4{25000} )
+olcAttributeTypes: {40}( 0.9.2342.19200300.100.1.56 NAME 'documentPublisher'
+  DESC 'RFC1274: publisher of document' EQUALITY caseIgnoreMatch SUBSTR case
+ IgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+olcObjectClasses: {0}( 0.9.2342.19200300.100.4.4 NAME ( 'pilotPerson' 'newPi
+ lotPerson' ) SUP person STRUCTURAL MAY ( userid $ textEncodedORAddress $ rf
+ c822Mailbox $ favouriteDrink $ roomNumber $ userClass $ homeTelephoneNumber
+  $ homePostalAddress $ secretary $ personalTitle $ preferredDeliveryMethod 
+ $ businessCategory $ janetMailbox $ otherMailbox $ mobileTelephoneNumber $ 
+ pagerTelephoneNumber $ organizationalStatus $ mailPreferenceOption $ person
+ alSignature ) )
+olcObjectClasses: {1}( 0.9.2342.19200300.100.4.5 NAME 'account' SUP top STRU
+ CTURAL MUST userid MAY ( description $ seeAlso $ localityName $ organizatio
+ nName $ organizationalUnitName $ host ) )
+olcObjectClasses: {2}( 0.9.2342.19200300.100.4.6 NAME 'document' SUP top STR
+ UCTURAL MUST documentIdentifier MAY ( commonName $ description $ seeAlso $ 
+ localityName $ organizationName $ organizationalUnitName $ documentTitle $ 
+ documentVersion $ documentAuthor $ documentLocation $ documentPublisher ) )
+olcObjectClasses: {3}( 0.9.2342.19200300.100.4.7 NAME 'room' SUP top STRUCTU
+ RAL MUST commonName MAY ( roomNumber $ description $ seeAlso $ telephoneNum
+ ber ) )
+olcObjectClasses: {4}( 0.9.2342.19200300.100.4.9 NAME 'documentSeries' SUP t
+ op STRUCTURAL MUST commonName MAY ( description $ seeAlso $ telephonenumber
+  $ localityName $ organizationName $ organizationalUnitName ) )
+olcObjectClasses: {5}( 0.9.2342.19200300.100.4.13 NAME 'domain' SUP top STRU
+ CTURAL MUST domainComponent MAY ( associatedName $ organizationName $ descr
+ iption $ businessCategory $ seeAlso $ searchGuide $ userPassword $ locality
+ Name $ stateOrProvinceName $ streetAddress $ physicalDeliveryOfficeName $ p
+ ostalAddress $ postalCode $ postOfficeBox $ streetAddress $ facsimileTeleph
+ oneNumber $ internationalISDNNumber $ telephoneNumber $ teletexTerminalIden
+ tifier $ telexNumber $ preferredDeliveryMethod $ destinationIndicator $ reg
+ isteredAddress $ x121Address ) )
+olcObjectClasses: {6}( 0.9.2342.19200300.100.4.14 NAME 'RFC822localPart' SUP
+  domain STRUCTURAL MAY ( commonName $ surname $ description $ seeAlso $ tel
+ ephoneNumber $ physicalDeliveryOfficeName $ postalAddress $ postalCode $ po
+ stOfficeBox $ streetAddress $ facsimileTelephoneNumber $ internationalISDNN
+ umber $ telephoneNumber $ teletexTerminalIdentifier $ telexNumber $ preferr
+ edDeliveryMethod $ destinationIndicator $ registeredAddress $ x121Address )
+  )
+olcObjectClasses: {7}( 0.9.2342.19200300.100.4.15 NAME 'dNSDomain' SUP domai
+ n STRUCTURAL MAY ( ARecord $ MDRecord $ MXRecord $ NSRecord $ SOARecord $ C
+ NAMERecord ) )
+olcObjectClasses: {8}( 0.9.2342.19200300.100.4.17 NAME 'domainRelatedObject'
+  DESC 'RFC1274: an object related to an domain' SUP top AUXILIARY MUST asso
+ ciatedDomain )
+olcObjectClasses: {9}( 0.9.2342.19200300.100.4.18 NAME 'friendlyCountry' SUP
+  country STRUCTURAL MUST friendlyCountryName )
+olcObjectClasses: {10}( 0.9.2342.19200300.100.4.20 NAME 'pilotOrganization' 
+ SUP ( organization $ organizationalUnit ) STRUCTURAL MAY buildingName )
+olcObjectClasses: {11}( 0.9.2342.19200300.100.4.21 NAME 'pilotDSA' SUP dsa S
+ TRUCTURAL MAY dSAQuality )
+olcObjectClasses: {12}( 0.9.2342.19200300.100.4.22 NAME 'qualityLabelledData
+ ' SUP top AUXILIARY MUST dsaQuality MAY ( subtreeMinimumQuality $ subtreeMa
+ ximumQuality ) )
+structuralObjectClass: olcSchemaConfig
+entryUUID: b167e1ff-aa23-420f-9e7e-396b6baad1e7
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 49 - 0
slapd.d/cn=config/cn=schema/cn={2}inetorgperson.ldif

@@ -0,0 +1,49 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 c050fdde
+dn: cn={2}inetorgperson
+objectClass: olcSchemaConfig
+cn: {2}inetorgperson
+olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC2
+ 798: vehicle license or registration plate' EQUALITY caseIgnoreMatch SUBSTR
+  caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+olcAttributeTypes: {1}( 2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC
+  'RFC2798: identifies a department within an organization' EQUALITY caseIgn
+ oreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
+ .15 )
+olcAttributeTypes: {2}( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'R
+ FC2798: preferred name to be used when displaying entries' EQUALITY caseIgn
+ oreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
+ .15 SINGLE-VALUE )
+olcAttributeTypes: {3}( 2.16.840.1.113730.3.1.3 NAME 'employeeNumber' DESC '
+ RFC2798: numerically identifies an employee within an organization' EQUALIT
+ Y caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {4}( 2.16.840.1.113730.3.1.4 NAME 'employeeType' DESC 'RF
+ C2798: type of employment for a person' EQUALITY caseIgnoreMatch SUBSTR cas
+ eIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RF
+ C2798: a JPEG image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
+olcAttributeTypes: {6}( 2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DE
+ SC 'RFC2798: preferred written or spoken language for a person' EQUALITY ca
+ seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.
+ 121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {7}( 2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate'
+  DESC 'RFC2798: PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.
+ 1.1466.115.121.1.5 )
+olcAttributeTypes: {8}( 2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RF
+ C2798: personal identity information, a PKCS #12 PFX' SYNTAX 1.3.6.1.4.1.14
+ 66.115.121.1.5 )
+olcObjectClasses: {0}( 2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RF
+ C2798: Internet Organizational Person' SUP organizationalPerson STRUCTURAL 
+ MAY ( audio $ businessCategory $ carLicense $ departmentNumber $ displayNam
+ e $ employeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddre
+ ss $ initials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $ page
+ r $ photo $ roomNumber $ secretary $ uid $ userCertificate $ x500uniqueIden
+ tifier $ preferredLanguage $ userSMIMECertificate $ userPKCS12 ) )
+structuralObjectClass: olcSchemaConfig
+entryUUID: 4db5bcbe-d3de-48b6-8fa9-1ac2f0044d70
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 62 - 0
slapd.d/cn=config/cn=schema/cn={3}core-fd.ldif

@@ -0,0 +1,62 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 08b21e99
+dn: cn={3}core-fd
+objectClass: olcSchemaConfig
+cn: {3}core-fd
+olcAttributeTypes: {0}( 1.3.6.1.4.1.10098.1.1.12.30 NAME 'gosaGroupObjects' 
+ DESC 'GOsa - List of all object types that are in a gosaGroupOfNames' EQUAL
+ ITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatch SYNTAX 1.3.6.1.4
+ .1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {1}( 1.3.6.1.4.1.10098.1.1.12.34 NAME 'gosaAclTemplate' D
+ ESC 'GOsa - ACL entries for ACL roles' EQUALITY caseIgnoreIA5Match SUBSTR c
+ aseIgnoreIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26)
+olcAttributeTypes: {2}( 1.3.6.1.4.1.10098.1.1.12.35 NAME 'gosaAclEntry' DESC
+  'GOsa - ACL entries' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5Subst
+ ringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26)
+olcAttributeTypes: {3}( 1.3.6.1.4.1.10098.1.1.12.37 NAME 'gosaSnapshotTimest
+ amp' DESC 'GOsa - Unix timestamp of snapshot' EQUALITY caseIgnoreMatch SUBS
+ TR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VA
+ LUE)
+olcAttributeTypes: {4}( 1.3.6.1.4.1.10098.1.1.12.38 NAME 'gosaSnapshotDN' DE
+ SC 'GOsa - Original DN of saved object in snapshot' EQUALITY caseIgnoreMatc
+ h SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SIN
+ GLE-VALUE)
+olcAttributeTypes: {5}( 1.3.6.1.4.1.10098.1.1.12.39 NAME 'gosaSnapshotData' 
+ DESC 'GOsa - Original data of saved object in snapshot' SYNTAX 1.3.6.1.4.1.
+ 1466.115.121.1.5 SINGLE-VALUE)
+olcAttributeTypes: {6}( 1.3.6.1.4.1.38414.62.1.1 NAME 'fdUserDn' DESC 'GOsa 
+ - DN of a user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
+ YNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {7}( 1.3.6.1.4.1.38414.62.1.2 NAME 'fdObjectDn' DESC 'GOs
+ a - DN of an object' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMa
+ tch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {8}( 1.3.6.1.4.1.38414.62.1.3 NAME 'fdLockTimestamp' DESC
+  'FusionDirectory - Lock token timestamp' EQUALITY generalizedTimeMatch ORD
+ ERING generalizedTimeOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SIN
+ GLE-VALUE )
+olcObjectClasses: {0}( 1.3.6.1.4.1.10098.1.2.1.19.4 NAME 'gosaDepartment' SU
+ P top AUXILIARY DESC 'GOsa - Class to mark Departments for GOsa' MUST  ( ou
+  $ description ) MAY   ( manager $ co $ labeledURI ) )
+olcObjectClasses: {1}( 1.3.6.1.4.1.10098.1.2.1.19.12 NAME 'gosaGroupOfNames'
+  DESC 'GOsa - Adds the gosaGroupObjects field to groupOfNames' SUP top AUXI
+ LIARY MUST ( cn $ gosaGroupObjects ) MAY ( member $ description ) )
+olcObjectClasses: {2}( 1.3.6.1.4.1.10098.1.2.1.19.17 NAME 'gosaRole' DESC 'G
+ Osa - ACL container to define ACL roles' SUP top STRUCTURAL MUST ( gosaAclT
+ emplate $ cn ) MAY  ( description ) )
+olcObjectClasses: {3}( 1.3.6.1.4.1.10098.1.2.1.19.18 NAME 'gosaAcl' DESC 'GO
+ sa - ACL container to define single ACLs' SUP top AUXILIARY MUST ( gosaAclE
+ ntry  ))
+olcObjectClasses: {4}( 1.3.6.1.4.1.10098.1.2.1.19.19 NAME 'gosaSnapshotObjec
+ t' DESC 'GOsa - Container object for undo and snapshot data' SUP top STRUCT
+ URAL MUST ( gosaSnapshotTimestamp $ gosaSnapshotDN $ gosaSnapshotData ) MAY
+   ( description ) )
+olcObjectClasses: {5}( 1.3.6.1.4.1.38414.62.2.1 NAME 'fdLockEntry' SUP top S
+ TRUCTURAL DESC 'GOsa - Class for FD locking' MUST ( fdUserDn $ fdObjectDn $
+  cn $ fdLockTimestamp ))
+structuralObjectClass: olcSchemaConfig
+entryUUID: b906540a-6015-4d96-b328-a13695341ff5
+creatorsName: cn=admin,cn=config
+createTimestamp: 20180225210939Z
+entryCSN: 20180225210939.657363Z#000000#000#000000
+modifiersName: cn=admin,cn=config
+modifyTimestamp: 20180225210939Z

+ 306 - 0
slapd.d/cn=config/cn=schema/cn={4}core-fd-conf.ldif

@@ -0,0 +1,306 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 6bb2593c
+dn: cn={4}core-fd-conf
+objectClass: olcSchemaConfig
+cn: {4}core-fd-conf
+olcAttributeTypes: {0}( 1.3.6.1.4.1.38414.8.10.2 NAME 'fdSchemaCheck' DESC '
+ FusionDirectory - Schema check' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.14
+ 66.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {1}( 1.3.6.1.4.1.38414.8.11.1 NAME 'fdLanguage' DESC 'Fus
+ ionDirectory - language' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Subs
+ tringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {2}( 1.3.6.1.4.1.38414.8.11.2 NAME 'fdTheme' DESC 'Fusion
+ Directory - theme' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Substrings
+ Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {3}( 1.3.6.1.4.1.38414.8.11.3 NAME 'fdTimezone' DESC 'Fus
+ ionDirectory - timezone' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Subs
+ tringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {4}( 1.3.6.1.4.1.38414.8.12.1 NAME 'fdAccountPrimaryAttri
+ bute' DESC 'FusionDirectory - attribute that should be used in user dn' EQU
+ ALITY caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4
+ .1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {5}( 1.3.6.1.4.1.38414.8.12.3 NAME 'fdNextIdHook' DESC 'F
+ usionDirectory - A script to be called for finding the next free id for use
+ rs or groups' EQUALITY caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch
+  SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {6}( 1.3.6.1.4.1.38414.8.12.6 NAME 'fdStrictNamingRules' 
+ DESC 'FusionDirectory - Strict naming rules' EQUALITY booleanMatch SYNTAX 1
+ .3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {7}( 1.3.6.1.4.1.38414.8.12.7 NAME 'fdMinId' DESC 'Fusion
+ Directory - minimum user id' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {8}( 1.3.6.1.4.1.38414.8.12.8 NAME 'fdUidNumberBase' DESC
+  'FusionDirectory - uid number base' EQUALITY integerMatch SYNTAX 1.3.6.1.4
+ .1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {9}( 1.3.6.1.4.1.38414.8.12.9 NAME 'fdGidNumberBase' DESC
+  'FusionDirectory - gid number base' EQUALITY integerMatch SYNTAX 1.3.6.1.4
+ .1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {10}( 1.3.6.1.4.1.38414.8.12.10 NAME 'fdUserRDN' DESC 'Fu
+ sionDirectory - User RDN' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Sub
+ stringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {11}( 1.3.6.1.4.1.38414.8.12.11 NAME 'fdGroupRDN' DESC 'F
+ usionDirectory - Group RDN' EQUALITY caseExactIA5Match SUBSTR caseExactIA5S
+ ubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {12}( 1.3.6.1.4.1.38414.8.12.12 NAME 'fdIdAllocationMetho
+ d' DESC 'FusionDirectory - id allocation method traditional/pool' EQUALITY 
+ caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.146
+ 6.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {13}( 1.3.6.1.4.1.38414.8.12.13 NAME 'fdGidNumberPoolMin'
+  DESC 'FusionDirectory - pool gid number min' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {14}( 1.3.6.1.4.1.38414.8.12.14 NAME 'fdUidNumberPoolMin'
+  DESC 'FusionDirectory - pool uid number min' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {15}( 1.3.6.1.4.1.38414.8.12.15 NAME 'fdGidNumberPoolMax'
+  DESC 'FusionDirectory - pool gid number max' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {16}( 1.3.6.1.4.1.38414.8.12.16 NAME 'fdUidNumberPoolMax'
+  DESC 'FusionDirectory - pool uid number max' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {17}( 1.3.6.1.4.1.38414.8.12.17 NAME 'fdAclRoleRDN' DESC 
+ 'FusionDirectory - ACL role RDN' EQUALITY caseExactIA5Match SUBSTR caseExac
+ tIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {18}( 1.3.6.1.4.1.38414.8.12.18 NAME 'fdCnPattern' DESC '
+ FusionDirectory - Common Name pattern' EQUALITY caseExactIA5Match SUBSTR ca
+ seExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE
+ )
+olcAttributeTypes: {19}( 1.3.6.1.4.1.38414.8.12.19 NAME 'fdRestrictRoleMembe
+ rs' DESC 'FusionDirectory - Restrict role members to users from the same LD
+ AP branch' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE
+ -VALUE )
+olcAttributeTypes: {20}( 1.3.6.1.4.1.38414.8.12.20 NAME 'fdSplitPostalAddres
+ s' DESC 'FusionDirectory - Expose street, postOfficeBox and postalCode fiel
+ ds instead of postalAddress' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {21}( 1.3.6.1.4.1.38414.8.12.21 NAME 'fdPostalAddressPatt
+ ern' DESC 'FusionDirectory - When using separate address fields, you can us
+ e a pattern to fill postalAddress field' EQUALITY caseExactIA5Match SUBSTR 
+ caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VAL
+ UE)
+olcAttributeTypes: {22}( 1.3.6.1.4.1.38414.8.13.1 NAME 'fdPasswordDefaultHas
+ h' DESC 'FusionDirectory - Password default hash' EQUALITY caseExactIA5Matc
+ h SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 S
+ INGLE-VALUE)
+olcAttributeTypes: {23}( 1.3.6.1.4.1.38414.8.13.2 NAME 'fdPasswordMinLength'
+  DESC 'FusionDirectory - Password min length' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {24}( 1.3.6.1.4.1.38414.8.13.3 NAME 'fdPasswordMinDiffer'
+  DESC 'FusionDirectory - password min differ' EQUALITY integerMatch SYNTAX 
+ 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {25}( 1.3.6.1.4.1.38414.8.13.5 NAME 'fdHandleExpiredAccou
+ nts' DESC 'FusionDirectory - Handle expired accounts' EQUALITY booleanMatch
+  SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {26}( 1.3.6.1.4.1.38414.8.13.6 NAME 'fdSaslRealm' DESC 'F
+ usionDirectory - SASL Realm' EQUALITY caseExactIA5Match SUBSTR caseExactIA5
+ SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {27}( 1.3.6.1.4.1.38414.8.13.7 NAME 'fdSaslExop' DESC 'Fu
+ sionDirectory - SASL Exop' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Su
+ bstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {28}( 1.3.6.1.4.1.38414.8.13.8 NAME 'fdForcePasswordDefau
+ ltHash' DESC 'FusionDirectory - Force password default hash' EQUALITY boole
+ anMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {29}( 1.3.6.1.4.1.38414.8.14.2 NAME 'fdListSummary' DESC 
+ 'FusionDirectory - Show list summary' EQUALITY booleanMatch SYNTAX 1.3.6.1.
+ 4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {30}( 1.3.6.1.4.1.38414.8.14.4 NAME 'fdModificationDetect
+ ionAttribute' DESC 'FusionDirectory - Modification detection attribute' EQU
+ ALITY caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4
+ .1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {31}( 1.3.6.1.4.1.38414.8.14.6 NAME 'fdLogging' DESC 'Fus
+ ionDirectory - Logging' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.7 SINGLE-VALUE )
+olcAttributeTypes: {32}( 1.3.6.1.4.1.38414.8.14.7 NAME 'fdLdapSizeLimit' DES
+ C 'FusionDirectory - LDAP size limit' EQUALITY integerMatch SYNTAX 1.3.6.1.
+ 4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {33}( 1.3.6.1.4.1.38414.8.15.1 NAME 'fdLoginAttribute' DE
+ SC 'FusionDirectory attribute that will be used for login' EQUALITY caseExa
+ ctIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.1
+ 21.1.26 SINGLE-VALUE)
+olcAttributeTypes: {34}( 1.3.6.1.4.1.38414.8.15.2 NAME 'fdForceSSL' DESC 'Fu
+ sionDirectory - Force SSL' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.11
+ 5.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {35}( 1.3.6.1.4.1.38414.8.15.3 NAME 'fdWarnSSL' DESC 'Fus
+ ionDirectory - Warn user when SSL is not used' EQUALITY booleanMatch SYNTAX
+  1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {36}( 1.3.6.1.4.1.38414.8.15.4 NAME 'fdStoreFilterSetting
+ s' DESC 'FusionDirectory - Store filter settings' EQUALITY booleanMatch SYN
+ TAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {37}( 1.3.6.1.4.1.38414.8.15.5 NAME 'fdSessionLifeTime' D
+ ESC 'FusionDirectory - Session life time in seconds' EQUALITY integerMatch 
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {38}( 1.3.6.1.4.1.38414.8.15.6 NAME 'fdHttpAuthActivated'
+  DESC 'FusionDirectory - HTTP Basic Auth activation' EQUALITY booleanMatch 
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {39}( 1.3.6.1.4.1.38414.8.15.7 NAME 'fdHttpHeaderAuthActi
+ vated' DESC 'FusionDirectory - HTTP Header Auth activation' EQUALITY boolea
+ nMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {40}( 1.3.6.1.4.1.38414.8.15.8 NAME 'fdHttpHeaderAuthHead
+ erName' DESC 'FusionDirectory - HTTP Header Auth - Header name' EQUALITY ca
+ seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.
+ 115.121.1.26 SINGLE-VALUE )
+olcAttributeTypes: {41}( 1.3.6.1.4.1.38414.8.16.1 NAME 'fdDisplayErrors' DES
+ C 'FusionDirectory - Weither or not to display errors' EQUALITY booleanMatc
+ h SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {42}( 1.3.6.1.4.1.38414.8.16.2 NAME 'fdLdapMaxQueryTime' 
+ DESC 'FusionDirectory - Maximum LDAP query time' EQUALITY integerMatch SYNT
+ AX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {43}( 1.3.6.1.4.1.38414.8.16.3 NAME 'fdLdapStats' DESC 'F
+ usionDirectory - Weither or not to activate ldap stats' EQUALITY booleanMat
+ ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {44}( 1.3.6.1.4.1.38414.8.16.4 NAME 'fdDebugLevel' DESC '
+ FusionDirectory - Debug level' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.146
+ 6.115.121.1.27 SINGLE-VALUE)
+olcAttributeTypes: {45}( 1.3.6.1.4.1.38414.8.17.1 NAME 'fdEnableSnapshots' D
+ ESC 'FusionDirectory - Weither or not to enable snapshots' EQUALITY boolean
+ Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {46}( 1.3.6.1.4.1.38414.8.17.2 NAME 'fdSnapshotBase' DESC
+  'FusionDirectory - Snaphost base' EQUALITY caseExactIA5Match SUBSTR caseEx
+ actIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {47}( 1.3.6.1.4.1.38414.8.18.2 NAME 'fdTabHook' DESC 'Fus
+ ionDirectory - tab hook' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Subs
+ tringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {48}( 1.3.6.1.4.1.38414.8.18.3 NAME 'fdShells' DESC 'Fusi
+ onDirectory - available shells' EQUALITY caseExactIA5Match SUBSTR caseExact
+ IA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {49}( 1.3.6.1.4.1.38414.8.18.4 NAME 'fusionConfigMd5' DES
+ C 'FusionDirectory - md5sum of class.cache' EQUALITY caseExactIA5Match SUBS
+ TR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
+olcAttributeTypes: {50}( 1.3.6.1.4.1.38414.8.18.5 NAME 'fdDisplayHookOutput'
+  DESC 'FusionDirectory - display hook execution output to the user' EQUALIT
+ Y booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {51}( 1.3.6.1.4.1.38414.8.18.6 NAME 'fdAclTabOnObjects' D
+ ESC 'FusionDirectory - Should acl tabs be shown on all objects' EQUALITY bo
+ oleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {52}( 1.3.6.1.4.1.38414.8.18.7 NAME 'fdDepartmentCategori
+ es' DESC 'FusionDirectory - available categories for departments' EQUALITY 
+ caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.146
+ 6.115.121.1.26 )
+olcAttributeTypes: {53}( 1.3.6.1.4.1.38414.8.18.8 NAME 'fdDefaultShell' DESC
+  'FusionDirectory - default shell' EQUALITY caseExactIA5Match SUBSTR caseEx
+ actIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {54}( 1.3.6.1.4.1.38414.8.18.9 NAME 'fdPluginsMenuBlackli
+ st' DESC 'FusionDirectory - Blacklist as groupdn|plugin or roledn|plugin' E
+ QUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1
+ .1466.115.121.1.15)
+olcAttributeTypes: {55}( 1.3.6.1.4.1.38414.8.19.1 NAME 'fdOGroupRDN' DESC 'F
+ usionDirectory - OGroup RDN' EQUALITY caseExactIA5Match SUBSTR caseExactIA5
+ SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {56}( 1.3.6.1.4.1.38414.8.19.2 NAME 'fdForceSaslPasswordA
+ sk' DESC 'FusionDirectory - Force password ask for SASL users' EQUALITY boo
+ leanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {57}( 1.3.6.1.4.1.38414.8.20.1 NAME 'fdSslCaCertPath' DES
+ C 'FusionDirectory - CA certificate path' EQUALITY caseExactIA5Match SUBSTR
+  caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VA
+ LUE)
+olcAttributeTypes: {58}( 1.3.6.1.4.1.38414.8.20.2 NAME 'fdSslKeyPath' DESC '
+ FusionDirectory - SSL key path' EQUALITY caseExactIA5Match SUBSTR caseExact
+ IA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {59}( 1.3.6.1.4.1.38414.8.20.3 NAME 'fdSslCertPath' DESC 
+ 'FusionDirectory - SSL certificate path' EQUALITY caseExactIA5Match SUBSTR 
+ caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VAL
+ UE)
+olcAttributeTypes:: ezYwfSggMS4zLjYuMS40LjEuMzg0MTQuOC4yMS4xIE5BTUUgJ2ZkQ2Fz
+ QWN0aXZhdGVkJyBERVNDICdGdXNpb25EaXJlY3RvcnkgLSBDQVPCoGFjdGl2YXRpb24nIEVRVUF
+ MSVRZIGJvb2xlYW5NYXRjaCBTWU5UQVggMS4zLjYuMS40LjEuMTQ2Ni4xMTUuMTIxLjEuNyBTSU
+ 5HTEUtVkFMVUUgKQ==
+olcAttributeTypes:: ezYxfSggMS4zLjYuMS40LjEuMzg0MTQuOC4yMS4yIE5BTUUgJ2ZkQ2Fz
+ U2VydmVyQ2FDZXJ0UGF0aCcgREVTQyAnRnVzaW9uRGlyZWN0b3J5IC0gQ0FTwqBzZXJ2ZXIgQ0E
+ gY2VydGlmaWNhdGUgcGF0aCcgRVFVQUxJVFkgY2FzZUV4YWN0SUE1TWF0Y2ggU1VCU1RSIGNhc2
+ VFeGFjdElBNVN1YnN0cmluZ3NNYXRjaCBTWU5UQVggMS4zLjYuMS40LjEuMTQ2Ni4xMTUuMTIxL
+ jEuMjYgU0lOR0xFLVZBTFVFKQ==
+olcAttributeTypes: {62}( 1.3.6.1.4.1.38414.8.21.3 NAME 'fdCasHost' DESC 'Fus
+ ionDirectory - CAS host' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Subs
+ tringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes:: ezYzfSggMS4zLjYuMS40LjEuMzg0MTQuOC4yMS40IE5BTUUgJ2ZkQ2Fz
+ UG9ydCcgREVTQyAnRnVzaW9uRGlyZWN0b3J5IC0gQ0FTwqBwb3J0JyBFUVVBTElUWSBpbnRlZ2V
+ yTWF0Y2ggU1lOVEFYIDEuMy42LjEuNC4xLjE0NjYuMTE1LjEyMS4xLjI3IFNJTkdMRS1WQUxVRS
+ k=
+olcAttributeTypes: {64}( 1.3.6.1.4.1.38414.8.21.5 NAME 'fdCasContext' DESC '
+ FusionDirectory - CAS context' EQUALITY caseExactIA5Match SUBSTR caseExactI
+ A5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
+olcAttributeTypes: {65}( 1.3.6.1.4.1.38414.27.1.1 NAME 'fdDashboardPrefix' D
+ ESC 'FusionDirectory - Dashboard computer name prefix' EQUALITY caseExactIA
+ 5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
+ .26)
+olcAttributeTypes: {66}( 1.3.6.1.4.1.38414.27.1.2 NAME 'fdDashboardNumberOfD
+ igit' DESC 'FusionDirectory - Dashboard number of digits after prefixes in 
+ computer names' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 
+ SINGLE-VALUE )
+olcAttributeTypes: {67}( 1.3.6.1.4.1.38414.27.1.3 NAME 'fdDashboardExpiredAc
+ countsDays' DESC 'FusionDirectory - Dashboard number of days before expirat
+ ion to be shown in board user tab' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1
+ .1466.115.121.1.27 SINGLE-VALUE )
+olcAttributeTypes: {68}( 1.3.6.1.4.1.38414.8.110.1 NAME 'fdPasswordRecoveryA
+ ctivated' DESC 'Fusion Directory - Password recovery enabled/disabled' EQUA
+ LITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {69}( 1.3.6.1.4.1.38414.8.110.2 NAME 'fdPasswordRecoveryE
+ mail' DESC 'Fusion Directory - Password recovery sender email' EQUALITY cas
+ eExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
+olcAttributeTypes: {70}( 1.3.6.1.4.1.38414.8.110.3 NAME 'fdPasswordRecoveryM
+ ailSubject' DESC 'Fusion Directory - Password recovery first email subject'
+  EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE 
+ )
+olcAttributeTypes: {71}( 1.3.6.1.4.1.38414.8.110.4 NAME 'fdPasswordRecoveryM
+ ailBody' DESC 'Fusion Directory - Password recovery first email body' EQUAL
+ ITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {72}( 1.3.6.1.4.1.38414.8.110.5 NAME 'fdPasswordRecoveryM
+ ail2Subject' DESC 'Fusion Directory - Password recovery second email subjec
+ t' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALU
+ E )
+olcAttributeTypes: {73}( 1.3.6.1.4.1.38414.8.110.6 NAME 'fdPasswordRecoveryM
+ ail2Body' DESC 'Fusion Directory - Password recovery second email body' EQU
+ ALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
+olcAttributeTypes: {74}( 1.3.6.1.4.1.38414.8.110.7 NAME 'fdPasswordRecoveryV
+ alidity' DESC 'Fusion Directory - Password recovery link validity in minute
+ s' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1
+ 466.115.121.1.27 SINGLE-VALUE )
+olcAttributeTypes: {75}( 1.3.6.1.4.1.38414.8.110.8 NAME 'fdPasswordRecoveryS
+ alt' DESC 'Fusion Directory - Password recovery token salt' EQUALITY caseEx
+ actIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
+olcAttributeTypes: {76}( 1.3.6.1.4.1.38414.8.110.9 NAME 'fdPasswordRecoveryU
+ seAlternate' DESC 'Fusion Directory - Allow/disallow the use of alternate a
+ ddresses for password recovery' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.14
+ 66.115.121.1.7 SINGLE-VALUE )
+olcAttributeTypes: {77}( 1.3.6.1.4.1.38414.8.110.10 NAME 'fdPasswordRecovery
+ LoginAttribute' DESC 'Fusion Directory - Password recovery login attribute 
+ (usually uid)' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1
+ .26 SINGLE-VALUE )
+olcObjectClasses: {0}( 1.3.6.1.4.1.38414.8.2.1 NAME 'fusionDirectoryConf' DE
+ SC 'FusionDirectory configuration' SUP top STRUCTURAL MUST ( cn ) MAY ( fus
+ ionConfigMd5 $ fdSchemaCheck $ fdLanguage $ fdTheme $ fdTimezone $ fdAccoun
+ tPrimaryAttribute $ fdNextIdHook $ fdStrictNamingRules $ fdMinId $ fdUidNum
+ berBase $ fdGidNumberBase $ fdUserRDN $ fdGroupRDN $ fdIdAllocationMethod $
+  fdGidNumberPoolMin $ fdUidNumberPoolMin $ fdGidNumberPoolMax $ fdUidNumber
+ PoolMax $ fdAclRoleRDN $ fdCnPattern $ fdRestrictRoleMembers $ fdSplitPosta
+ lAddress $ fdPostalAddressPattern $ fdPasswordDefaultHash $ fdPasswordMinLe
+ ngth $ fdPasswordMinDiffer $ fdHandleExpiredAccounts $ fdSaslRealm $ fdSasl
+ Exop $ fdForcePasswordDefaultHash $ fdListSummary $ fdModificationDetection
+ Attribute $ fdLogging $ fdLdapSizeLimit $ fdLoginAttribute $ fdForceSSL $ f
+ dWarnSSL $ fdStoreFilterSettings $ fdSessionLifeTime $ fdHttpAuthActivated 
+ $ fdHttpHeaderAuthActivated $ fdHttpHeaderAuthHeaderName $ fdDisplayErrors 
+ $ fdLdapMaxQueryTime $ fdLdapStats $ fdDebugLevel $ fdEnableSnapshots $ fdS
+ napshotBase $ fdTabHook $ fdShells $ fdDefaultShell $ fdDisplayHookOutput $
+  fdPluginsMenuBlacklist $ fdAclTabOnObjects $ fdDepartmentCategories $ fdSs
+ lCaCertPath $ fdSslKeyPath $ fdSslCertPath $ fdCasActivated $ fdCasServerCa
+ CertPath $ fdCasHost $ fdCasPort $ fdCasContext ) )
+olcObjectClasses: {1}( 1.3.6.1.4.1.38414.8.2.2 NAME 'fusionDirectoryPluginsC
+ onf' DESC 'FusionDirectory plugins configuration' SUP top AUXILIARY MUST ( 
+ cn ) MAY ( fdOGroupRDN $ fdForceSaslPasswordAsk ) )
+olcObjectClasses: {2}( 1.3.6.1.4.1.38414.8.2.3 NAME 'fdPasswordRecoveryConf'
+  DESC 'FusionDirectory password recovery configuration' SUP top AUXILIARY M
+ UST ( cn ) MAY ( fdPasswordRecoveryActivated     $ fdPasswordRecoveryEmail 
+     $ fdPasswordRecoveryMailSubject   $ fdPasswordRecoveryMailBody  $ fdPas
+ swordRecoveryMail2Subject  $ fdPasswordRecoveryMail2Body $ fdPasswordRecove
+ ryValidity      $ fdPasswordRecoverySalt      $ fdPasswordRecoveryUseAltern
+ ate  $ fdPasswordRecoveryLoginAttribute ) )
+olcObjectClasses: {3}( 1.3.6.1.4.1.38414.27.2.1 NAME 'fdDashboardPluginConf'
+  DESC 'FusionDirectory dashboard plugin configuration' SUP top AUXILIARY MU
+ ST ( cn ) MAY ( fdDashboardPrefix $ fdDashboardNumberOfDigit $ fdDashboardE
+ xpiredAccountsDays) )
+structuralObjectClass: olcSchemaConfig
+entryUUID: 8a8a7d11-5291-41aa-8528-272f87703e69
+creatorsName: cn=admin,cn=config
+createTimestamp: 20180225211109Z
+entryCSN: 20180225211109.022007Z#000000#000#000000
+modifiersName: cn=admin,cn=config
+modifyTimestamp: 20180225211109Z

+ 20 - 0
slapd.d/cn=config/cn=schema/cn={5}ldapns.ldif

@@ -0,0 +1,20 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 d99c09b7
+dn: cn={5}ldapns
+objectClass: olcSchemaConfig
+cn: {5}ldapns
+olcAttributeTypes: {0}( 1.3.6.1.4.1.5322.17.2.1 NAME 'authorizedService' DES
+ C 'IANA GSS-API authorized service name' EQUALITY caseIgnoreMatch SYNTAX 1.
+ 3.6.1.4.1.1466.115.121.1.15{256} )
+olcObjectClasses: {0}( 1.3.6.1.4.1.5322.17.1.1 NAME 'authorizedServiceObject
+ ' DESC 'Auxiliary object class for adding authorizedService attribute' SUP 
+ top AUXILIARY MAY authorizedService )
+olcObjectClasses: {1}( 1.3.6.1.4.1.5322.17.1.2 NAME 'hostObject' DESC 'Auxil
+ iary object class for adding host attribute' SUP top AUXILIARY MAY host )
+structuralObjectClass: olcSchemaConfig
+entryUUID: fa7b16e1-ed59-47dc-a102-09c5083c8241
+creatorsName: cn=admin,cn=config
+createTimestamp: 20180225211115Z
+entryCSN: 20180225211115.465614Z#000000#000#000000
+modifiersName: cn=admin,cn=config
+modifyTimestamp: 20180225211115Z

+ 17 - 0
slapd.d/cn=config/cn=schema/cn={6}template-fd.ldif

@@ -0,0 +1,17 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 77c96e57
+dn: cn={6}template-fd
+objectClass: olcSchemaConfig
+cn: {6}template-fd
+olcAttributeTypes: {0}( 1.3.6.1.4.1.38414.38.1.1 NAME 'fdTemplateField' DESC
+  'FusionDirectory - template field' EQUALITY octetStringMatch SYNTAX 1.3.6.
+ 1.4.1.1466.115.121.1.40)
+olcObjectClasses: {0}(1.3.6.1.4.1.38414.38.2.1 NAME 'fdTemplate' DESC 'Fusio
+ nDirectory - template object' MUST ( cn ) MAY ( fdTemplateField ) )
+structuralObjectClass: olcSchemaConfig
+entryUUID: f270375c-da99-4065-9847-be637be4e79d
+creatorsName: cn=admin,cn=config
+createTimestamp: 20180225211120Z
+entryCSN: 20180225211120.107546Z#000000#000#000000
+modifiersName: cn=admin,cn=config
+modifyTimestamp: 20180225211120Z

+ 20 - 0
slapd.d/cn=config/olcDatabase={-1}frontend.ldif

@@ -0,0 +1,20 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 5aa1a7b7
+dn: olcDatabase={-1}frontend
+objectClass: olcDatabaseConfig
+objectClass: olcFrontendConfig
+olcDatabase: {-1}frontend
+olcAddContentAcl: FALSE
+olcLastMod: TRUE
+olcMaxDerefDepth: 0
+olcReadOnly: FALSE
+olcSchemaDN: cn=Subschema
+olcSyncUseSubentry: FALSE
+olcMonitoring: FALSE
+structuralObjectClass: olcDatabaseConfig
+entryUUID: 84c81794-ef18-450d-8e78-2865935a70ba
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 21 - 0
slapd.d/cn=config/olcDatabase={0}config.ldif

@@ -0,0 +1,21 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 3b87d4e7
+dn: olcDatabase={0}config
+objectClass: olcDatabaseConfig
+olcDatabase: {0}config
+olcAccess: {0}to *  by * none
+olcAddContentAcl: TRUE
+olcLastMod: TRUE
+olcMaxDerefDepth: 15
+olcReadOnly: FALSE
+olcRootDN: cn=admin,cn=config
+olcRootPW:: e1NTSEF9MG1aRzcwbnhxSTUybm8rQ1c4NThzb3dsYzVEQUZOdFY=
+olcSyncUseSubentry: FALSE
+olcMonitoring: FALSE
+structuralObjectClass: olcDatabaseConfig
+entryUUID: 4a851f76-e98c-426a-9471-8c1eff84f59a
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 30 - 0
slapd.d/cn=config/olcDatabase={1}mdb.ldif

@@ -0,0 +1,30 @@
+# AUTO-GENERATED FILE - DO NOT EDIT!! Use ldapmodify.
+# CRC32 baf8602f
+dn: olcDatabase={1}mdb
+objectClass: olcDatabaseConfig
+objectClass: olcMdbConfig
+olcDatabase: {1}mdb
+olcSuffix: dc=slurm,dc=ch
+olcAddContentAcl: FALSE
+olcLastMod: TRUE
+olcMaxDerefDepth: 15
+olcReadOnly: FALSE
+olcRootDN: cn=Manager,dc=slurm,dc=ch
+olcRootPW:: c2VjcmV0
+olcSyncUseSubentry: FALSE
+olcMonitoring: FALSE
+olcDbDirectory: /var/lib/openldap/openldap-data
+olcDbNoSync: FALSE
+olcDbIndex: objectClass eq
+olcDbMaxReaders: 0
+olcDbMaxSize: 1073741824
+olcDbMode: 0600
+olcDbSearchStack: 16
+olcDbRtxnSize: 10000
+structuralObjectClass: olcMdbConfig
+entryUUID: b1ed8d40-40e3-44e9-935a-7f07ee29324c
+creatorsName: cn=config
+createTimestamp: 20180225210720Z
+entryCSN: 20180225210720.376989Z#000000#000#000000
+modifiersName: cn=config
+modifyTimestamp: 20180225210720Z

+ 1746 - 0
slapd.d/entrypoint.log

@@ -0,0 +1,1746 @@
+Generating configuration
+5a932588 mdb_db_open: database "dc=slurm,dc=ch" cannot be opened: No such file or directory (2). Restore from backup!
+5a932588 backend_startup_one (type=mdb, suffix="dc=slurm,dc=ch"): bi_db_open failed! (2)
+slap_startup failed (test would succeed using the -u switch)
+Starting slapd with slapd -d 256 -u ldap -g ldap -h ldaps:/// ldap:/// -F /etc/openldap/slapd.d
+5a932588 @(#) $OpenLDAP: slapd 2.4.45 (Nov  9 2017 20:08:19) $
+	buildozer@build-3-7-x86_64:/home/buildozer/aports/main/openldap/src/openldap-2.4.45/servers/slapd
+5a932588 slapd starting
+5a932613 conn=1000 fd=14 ACCEPT from IP=172.19.0.3:56450 (IP=0.0.0.0:389)
+5a932613 conn=1000 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932613 conn=1000 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932613 conn=1000 op=0 RESULT tag=97 err=0 text=
+5a932613 conn=1000 op=1 ADD dn="cn=core-fd,cn=schema,cn=config"
+5a932613 conn=1000 op=1 RESULT tag=105 err=0 text=
+5a932613 conn=1000 op=2 UNBIND
+5a932613 conn=1000 fd=14 closed
+5a932662 conn=1001 fd=14 ACCEPT from IP=172.19.0.3:56452 (IP=0.0.0.0:389)
+5a932662 conn=1001 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932662 conn=1001 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932662 conn=1001 op=0 RESULT tag=97 err=0 text=
+5a932662 conn=1001 op=1 SRCH base="cn=config" scope=2 deref=0 filter="(cn=config)"
+5a932662 conn=1001 op=1 SRCH attr=dn
+5a932662 conn=1001 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932662 conn=1001 op=2 UNBIND
+5a932662 conn=1001 fd=14 closed
+5a932663 conn=1002 fd=14 ACCEPT from IP=172.19.0.3:56454 (IP=0.0.0.0:389)
+5a932663 conn=1002 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932663 conn=1002 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932663 conn=1002 op=0 RESULT tag=97 err=0 text=
+5a932663 conn=1002 op=1 SRCH base="cn=schema,cn=config" scope=2 deref=0 filter="(cn={*}core-fd)"
+5a932663 conn=1002 op=1 SRCH attr=cn
+5a932663 conn=1002 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932663 conn=1002 op=2 UNBIND
+5a932663 conn=1002 fd=14 closed
+5a932667 conn=1003 fd=14 ACCEPT from IP=172.19.0.3:56456 (IP=0.0.0.0:389)
+5a932667 conn=1003 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932667 conn=1003 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932667 conn=1003 op=0 RESULT tag=97 err=0 text=
+5a932667 conn=1003 op=1 SRCH base="cn=schema,cn=config" scope=2 deref=0 filter="(cn={*}core-fd-conf)"
+5a932667 conn=1003 op=1 SRCH attr=cn
+5a932667 conn=1003 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932667 conn=1003 op=2 UNBIND
+5a932667 conn=1003 fd=14 closed
+5a93266d conn=1004 fd=14 ACCEPT from IP=172.19.0.3:56458 (IP=0.0.0.0:389)
+5a93266d conn=1004 op=0 BIND dn="cn=admin,cn=config" method=128
+5a93266d conn=1004 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a93266d conn=1004 op=0 RESULT tag=97 err=0 text=
+5a93266d conn=1004 op=1 ADD dn="cn=core-fd-conf,cn=schema,cn=config"
+5a93266d conn=1004 op=1 RESULT tag=105 err=0 text=
+5a93266d conn=1004 op=2 UNBIND
+5a93266d conn=1004 fd=14 closed
+5a93266f conn=1005 fd=14 ACCEPT from IP=172.19.0.3:56460 (IP=0.0.0.0:389)
+5a93266f conn=1005 op=0 BIND dn="cn=admin,cn=config" method=128
+5a93266f conn=1005 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a93266f conn=1005 op=0 RESULT tag=97 err=0 text=
+5a93266f conn=1005 op=1 SRCH base="cn=schema,cn=config" scope=2 deref=0 filter="(cn={*}ldapns)"
+5a93266f conn=1005 op=1 SRCH attr=cn
+5a93266f conn=1005 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93266f conn=1005 op=2 UNBIND
+5a93266f conn=1005 fd=14 closed
+5a932673 conn=1006 fd=14 ACCEPT from IP=172.19.0.3:56462 (IP=0.0.0.0:389)
+5a932673 conn=1006 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932673 conn=1006 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932673 conn=1006 op=0 RESULT tag=97 err=0 text=
+5a932673 conn=1006 op=1 ADD dn="cn=ldapns,cn=schema,cn=config"
+5a932673 conn=1006 op=1 RESULT tag=105 err=0 text=
+5a932673 conn=1006 op=2 UNBIND
+5a932673 conn=1006 fd=14 closed
+5a932675 conn=1007 fd=14 ACCEPT from IP=172.19.0.3:56464 (IP=0.0.0.0:389)
+5a932675 conn=1007 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932675 conn=1007 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932675 conn=1007 op=0 RESULT tag=97 err=0 text=
+5a932675 conn=1007 op=1 SRCH base="cn=schema,cn=config" scope=2 deref=0 filter="(cn={*}template-fd)"
+5a932675 conn=1007 op=1 SRCH attr=cn
+5a932675 conn=1007 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932675 conn=1007 op=2 UNBIND
+5a932675 conn=1007 fd=14 closed
+5a932678 conn=1008 fd=14 ACCEPT from IP=172.19.0.3:56466 (IP=0.0.0.0:389)
+5a932678 conn=1008 op=0 BIND dn="cn=admin,cn=config" method=128
+5a932678 conn=1008 op=0 BIND dn="cn=admin,cn=config" mech=SIMPLE ssf=0
+5a932678 conn=1008 op=0 RESULT tag=97 err=0 text=
+5a932678 conn=1008 op=1 ADD dn="cn=template-fd,cn=schema,cn=config"
+5a932678 conn=1008 op=1 RESULT tag=105 err=0 text=
+5a932678 conn=1008 op=2 UNBIND
+5a932678 conn=1008 fd=14 closed
+5a9326bf conn=1009 fd=14 ACCEPT from IP=172.19.0.3:56494 (IP=0.0.0.0:389)
+5a9326bf conn=1009 op=0 BIND dn="" method=128
+5a9326bf conn=1009 op=0 RESULT tag=97 err=0 text=
+5a9326bf conn=1009 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1009 op=1 SRCH attr=namingContexts
+5a9326bf conn=1009 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326bf conn=1009 op=2 UNBIND
+5a9326bf conn=1009 fd=14 closed
+5a9326bf conn=1010 fd=14 ACCEPT from IP=172.19.0.3:56496 (IP=0.0.0.0:389)
+5a9326bf conn=1010 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326bf conn=1010 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326bf conn=1010 op=0 RESULT tag=97 err=0 text=
+5a9326bf conn=1011 fd=15 ACCEPT from IP=172.19.0.3:56498 (IP=0.0.0.0:389)
+5a9326bf conn=1011 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326bf conn=1011 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326bf conn=1011 op=0 RESULT tag=97 err=0 text=
+5a9326bf conn=1011 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1011 op=1 SRCH attr=*
+5a9326bf conn=1011 op=1 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326bf conn=1011 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a9326bf conn=1011 op=2 SRCH attr=objectClass description ou c dc dc l o
+5a9326bf conn=1011 op=2 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326bf conn=1011 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1011 op=3 SRCH attr=objectClass
+5a9326bf conn=1011 op=3 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326bf conn=1011 op=4 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1011 op=4 SRCH attr=objectClass
+5a9326bf conn=1011 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326bf conn=1011 op=5 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1011 op=5 SRCH attr=*
+5a9326bf conn=1011 op=5 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326bf conn=1012 fd=16 ACCEPT from IP=172.19.0.3:56500 (IP=0.0.0.0:389)
+5a9326bf conn=1012 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326bf conn=1012 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326bf conn=1012 op=0 RESULT tag=97 err=0 text=
+5a9326bf conn=1012 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1012 op=1 SRCH attr=subschemaSubentry
+5a9326bf conn=1012 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326bf conn=1012 op=2 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a9326bf conn=1012 op=2 SRCH attr=objectclasses
+5a9326bf conn=1012 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326bf conn=1012 op=3 UNBIND
+5a9326bf conn=1012 fd=16 closed
+5a9326bf conn=1011 op=6 UNBIND
+5a9326bf conn=1011 fd=15 closed
+5a9326bf conn=1010 op=1 UNBIND
+5a9326bf conn=1010 fd=14 closed
+5a9326c6 conn=1013 fd=14 ACCEPT from IP=172.19.0.3:56506 (IP=0.0.0.0:389)
+5a9326c6 conn=1013 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326c6 conn=1013 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326c6 conn=1013 op=0 RESULT tag=97 err=0 text=
+5a9326c6 conn=1014 fd=15 ACCEPT from IP=172.19.0.3:56508 (IP=0.0.0.0:389)
+5a9326c6 conn=1014 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326c6 conn=1014 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326c6 conn=1014 op=0 RESULT tag=97 err=0 text=
+5a9326c6 conn=1014 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1014 op=1 SRCH attr=*
+5a9326c6 conn=1014 op=1 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326c6 conn=1014 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a9326c6 conn=1014 op=2 SRCH attr=objectClass description ou c dc dc l o
+5a9326c6 conn=1014 op=2 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326c6 conn=1014 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1014 op=3 SRCH attr=objectClass
+5a9326c6 conn=1014 op=3 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326c6 conn=1014 op=4 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1014 op=4 SRCH attr=objectClass
+5a9326c6 conn=1014 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326c6 conn=1014 op=5 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1014 op=5 SRCH attr=*
+5a9326c6 conn=1014 op=5 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326c6 conn=1015 fd=16 ACCEPT from IP=172.19.0.3:56510 (IP=0.0.0.0:389)
+5a9326c6 conn=1015 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326c6 conn=1015 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326c6 conn=1015 op=0 RESULT tag=97 err=0 text=
+5a9326c6 conn=1015 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1015 op=1 SRCH attr=subschemaSubentry
+5a9326c6 conn=1015 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326c6 conn=1015 op=2 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a9326c6 conn=1015 op=2 SRCH attr=objectclasses
+5a9326c6 conn=1015 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326c6 conn=1015 op=3 UNBIND
+5a9326c6 conn=1015 fd=16 closed
+5a9326c6 conn=1014 op=6 UNBIND
+5a9326c6 conn=1014 fd=15 closed
+5a9326c6 conn=1013 op=1 UNBIND
+5a9326c6 conn=1013 fd=14 closed
+5a9326ed conn=1016 fd=14 ACCEPT from IP=172.19.0.3:56516 (IP=0.0.0.0:389)
+5a9326ed conn=1016 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9326ed conn=1016 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9326ed conn=1016 op=0 RESULT tag=97 err=0 text=
+5a9326ed conn=1016 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=1 SRCH attr=*
+5a9326ed conn=1016 op=1 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326ed conn=1016 op=2 ADD dn="dc=slurm,dc=ch"
+5a9326ed conn=1016 op=2 RESULT tag=105 err=0 text=
+5a9326ed conn=1016 op=3 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=3 SRCH attr=fdTemplateField objectClass
+5a9326ed conn=1016 op=3 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326ed conn=1016 op=4 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=4 SRCH attr=objectClass
+5a9326ed conn=1016 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326ed conn=1016 op=5 SRCH base="ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=5 SRCH attr=*
+5a9326ed conn=1016 op=5 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9326ed conn=1016 op=6 ADD dn="ou=fusiondirectory,dc=slurm,dc=ch"
+5a9326ed conn=1016 op=6 RESULT tag=105 err=0 text=
+5a9326ed conn=1016 op=7 ADD dn="cn=config,ou=fusiondirectory,dc=slurm,dc=ch"
+5a9326ed conn=1016 op=7 RESULT tag=105 err=0 text=
+5a9326ed conn=1016 op=8 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=8 SRCH attr=*
+5a9326ed conn=1016 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=9 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a9326ed conn=1016 op=9 SRCH attr=objectClass description ou c dc dc l o
+5a9326ed conn=1016 op=9 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9326ed conn=1016 op=10 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a9326ed conn=1016 op=10 SRCH attr=objectClass description ou c dc dc l o
+5a9326ed conn=1016 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9326ed conn=1016 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=11 SRCH attr=objectClass
+5a9326ed conn=1016 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=12 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a9326ed conn=1016 op=12 SRCH attr=cn
+5a9326ed conn=1016 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9326ed conn=1016 op=13 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=13 SRCH attr=objectClass
+5a9326ed conn=1016 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=14 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a9326ed conn=1016 op=14 SRCH attr=cn
+5a9326ed conn=1016 op=14 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9326ed conn=1016 op=15 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=15 SRCH attr=*
+5a9326ed conn=1016 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=16 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=16 SRCH attr=entryCSN
+5a9326ed conn=1016 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=17 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9326ed conn=1016 op=17 SRCH attr=entryCSN
+5a9326ed conn=1016 op=17 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9326ed conn=1016 op=18 UNBIND
+5a9326ed conn=1016 fd=14 closed
+5a9326fa conn=1017 fd=14 ACCEPT from IP=172.19.0.3:50480 (IP=0.0.0.0:636)
+5a9326fa conn=1017 fd=14 TLS established tls_ssf=256 ssf=256
+5a9326fa conn=1017 fd=14 closed (connection lost)
+5a9326fa conn=1018 fd=14 ACCEPT from IP=172.19.0.3:50482 (IP=0.0.0.0:636)
+5a9326fa conn=1018 fd=14 TLS established tls_ssf=256 ssf=256
+5a9326fa conn=1019 fd=15 ACCEPT from IP=172.19.0.3:50484 (IP=0.0.0.0:636)
+5a9326fa conn=1019 fd=15 TLS established tls_ssf=256 ssf=256
+5a9326fa conn=1019 fd=15 closed (connection lost)
+5a9326fa conn=1018 fd=14 closed (connection lost)
+5a932703 conn=1020 fd=14 ACCEPT from IP=172.19.0.3:50490 (IP=0.0.0.0:636)
+5a932703 conn=1020 fd=14 TLS established tls_ssf=256 ssf=256
+5a932703 conn=1020 fd=14 closed (connection lost)
+5a93270d conn=1021 fd=14 ACCEPT from IP=172.19.0.3:50496 (IP=0.0.0.0:636)
+5a93270d conn=1021 fd=14 TLS established tls_ssf=256 ssf=256
+5a93270d conn=1021 fd=14 closed (connection lost)
+5a932720 conn=1022 fd=14 ACCEPT from IP=172.19.0.3:50502 (IP=0.0.0.0:636)
+5a932720 conn=1022 fd=14 TLS established tls_ssf=256 ssf=256
+5a932720 conn=1022 fd=14 closed (connection lost)
+5a932745 conn=1023 fd=14 ACCEPT from IP=172.19.0.3:50518 (IP=0.0.0.0:636)
+5a932745 conn=1023 fd=14 TLS established tls_ssf=256 ssf=256
+5a932745 conn=1023 fd=14 closed (connection lost)
+5a932756 conn=1024 fd=14 ACCEPT from IP=172.19.0.3:50524 (IP=0.0.0.0:636)
+5a932756 conn=1024 fd=14 TLS established tls_ssf=256 ssf=256
+5a932756 conn=1024 fd=14 closed (connection lost)
+5a932774 conn=1025 fd=14 ACCEPT from IP=172.19.0.3:50532 (IP=0.0.0.0:636)
+5a932774 conn=1025 fd=14 TLS established tls_ssf=256 ssf=256
+5a932774 conn=1025 fd=14 closed (connection lost)
+5a932786 conn=1026 fd=14 ACCEPT from IP=172.19.0.3:56580 (IP=0.0.0.0:389)
+5a932786 conn=1026 fd=14 closed (connection lost)
+5a932786 conn=1027 fd=14 ACCEPT from IP=172.19.0.3:56582 (IP=0.0.0.0:389)
+5a932786 conn=1027 fd=14 closed (connection lost)
+5a932786 conn=1028 fd=14 ACCEPT from IP=172.19.0.3:56584 (IP=0.0.0.0:389)
+5a932786 conn=1028 fd=14 closed (connection lost)
+5a93278f conn=1029 fd=14 ACCEPT from IP=172.19.0.3:56590 (IP=0.0.0.0:389)
+5a93278f conn=1029 fd=14 closed (connection lost)
+5a932791 conn=1030 fd=14 ACCEPT from IP=172.19.0.3:56592 (IP=0.0.0.0:389)
+5a932791 conn=1030 fd=14 closed (connection lost)
+5a93279c conn=1031 fd=14 ACCEPT from IP=172.19.0.3:56598 (IP=0.0.0.0:389)
+5a93279c conn=1031 fd=14 closed (connection lost)
+5a9327a0 conn=1032 fd=14 ACCEPT from IP=172.19.0.3:56600 (IP=0.0.0.0:389)
+5a9327a0 conn=1032 fd=14 closed (connection lost)
+5a9327ae conn=1033 fd=14 ACCEPT from IP=172.19.0.3:56606 (IP=0.0.0.0:389)
+5a9327ae conn=1033 fd=14 closed (connection lost)
+5a9327b2 conn=1034 fd=14 ACCEPT from IP=172.19.0.3:56608 (IP=0.0.0.0:389)
+5a9327b2 conn=1034 fd=14 closed (connection lost)
+5a9327f1 conn=1035 fd=14 ACCEPT from IP=172.19.0.3:56652 (IP=0.0.0.0:389)
+5a9327f1 conn=1035 fd=14 closed (connection lost)
+5a9327f3 conn=1036 fd=14 ACCEPT from IP=172.19.0.3:56654 (IP=0.0.0.0:389)
+5a9327f3 conn=1036 fd=14 closed (connection lost)
+5a932805 conn=1037 fd=14 ACCEPT from IP=172.19.0.3:56660 (IP=0.0.0.0:389)
+5a932805 conn=1037 fd=14 closed (connection lost)
+5a93280c conn=1038 fd=14 ACCEPT from IP=172.19.0.3:56666 (IP=0.0.0.0:389)
+5a93280c conn=1038 fd=14 closed (connection lost)
+5a932843 conn=1039 fd=14 ACCEPT from IP=172.19.0.3:56698 (IP=0.0.0.0:389)
+5a932843 conn=1039 op=0 BIND dn="" method=128
+5a932843 conn=1039 op=0 RESULT tag=97 err=0 text=
+5a932843 conn=1039 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1039 op=1 SRCH attr=namingContexts
+5a932843 conn=1039 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1039 op=2 UNBIND
+5a932843 conn=1039 fd=14 closed
+5a932843 conn=1040 fd=14 ACCEPT from IP=172.19.0.3:56700 (IP=0.0.0.0:389)
+5a932843 conn=1040 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932843 conn=1040 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932843 conn=1040 op=0 RESULT tag=97 err=0 text=
+5a932843 conn=1041 fd=15 ACCEPT from IP=172.19.0.3:56702 (IP=0.0.0.0:389)
+5a932843 conn=1041 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932843 conn=1041 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932843 conn=1041 op=0 RESULT tag=97 err=0 text=
+5a932843 conn=1041 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1041 op=1 SRCH attr=*
+5a932843 conn=1041 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1041 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932843 conn=1041 op=2 SRCH attr=objectClass description ou c dc dc l o
+5a932843 conn=1041 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932843 conn=1041 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1041 op=3 SRCH attr=objectClass
+5a932843 conn=1041 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1041 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932843 conn=1041 op=4 SRCH attr=cn
+5a932843 conn=1041 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932843 conn=1041 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1041 op=5 SRCH attr=objectClass
+5a932843 conn=1041 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1041 op=6 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932843 conn=1041 op=6 SRCH attr=cn
+5a932843 conn=1041 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932843 conn=1041 op=7 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1041 op=7 SRCH attr=*
+5a932843 conn=1041 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1041 op=8 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1041 op=8 SRCH attr=entryCSN
+5a932843 conn=1041 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1042 fd=16 ACCEPT from IP=172.19.0.3:56704 (IP=0.0.0.0:389)
+5a932843 conn=1042 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932843 conn=1042 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932843 conn=1042 op=0 RESULT tag=97 err=0 text=
+5a932843 conn=1042 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1042 op=1 SRCH attr=subschemaSubentry
+5a932843 conn=1042 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1042 op=2 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a932843 conn=1042 op=2 SRCH attr=objectclasses
+5a932843 conn=1042 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932843 conn=1042 op=3 UNBIND
+5a932843 conn=1042 fd=16 closed
+5a932843 conn=1041 op=9 UNBIND
+5a932843 conn=1041 fd=15 closed
+5a932843 conn=1040 op=1 UNBIND
+5a932843 conn=1040 fd=14 closed
+5a932848 conn=1043 fd=14 ACCEPT from IP=172.19.0.3:56708 (IP=0.0.0.0:389)
+5a932848 conn=1043 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932848 conn=1043 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932848 conn=1043 op=0 RESULT tag=97 err=0 text=
+5a932848 conn=1044 fd=15 ACCEPT from IP=172.19.0.3:56710 (IP=0.0.0.0:389)
+5a932848 conn=1044 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932848 conn=1044 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932848 conn=1044 op=0 RESULT tag=97 err=0 text=
+5a932848 conn=1044 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1044 op=1 SRCH attr=*
+5a932848 conn=1044 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1044 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932848 conn=1044 op=2 SRCH attr=objectClass description ou c dc dc l o
+5a932848 conn=1044 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932848 conn=1044 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1044 op=3 SRCH attr=objectClass
+5a932848 conn=1044 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1044 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932848 conn=1044 op=4 SRCH attr=cn
+5a932848 conn=1044 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932848 conn=1044 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1044 op=5 SRCH attr=objectClass
+5a932848 conn=1044 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1044 op=6 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932848 conn=1044 op=6 SRCH attr=cn
+5a932848 conn=1044 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932848 conn=1044 op=7 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1044 op=7 SRCH attr=*
+5a932848 conn=1044 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1044 op=8 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1044 op=8 SRCH attr=entryCSN
+5a932848 conn=1044 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1045 fd=16 ACCEPT from IP=172.19.0.3:56712 (IP=0.0.0.0:389)
+5a932848 conn=1045 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932848 conn=1045 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932848 conn=1045 op=0 RESULT tag=97 err=0 text=
+5a932848 conn=1045 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1045 op=1 SRCH attr=subschemaSubentry
+5a932848 conn=1045 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1045 op=2 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a932848 conn=1045 op=2 SRCH attr=objectclasses
+5a932848 conn=1045 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932848 conn=1045 op=3 UNBIND
+5a932848 conn=1045 fd=16 closed
+5a932848 conn=1044 op=9 UNBIND
+5a932848 conn=1044 fd=15 closed
+5a932848 conn=1043 op=1 UNBIND
+5a932848 conn=1043 fd=14 closed
+5a93289a conn=1046 fd=14 ACCEPT from IP=172.19.0.3:56718 (IP=0.0.0.0:389)
+5a93289a conn=1046 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a93289a conn=1046 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a93289a conn=1046 op=0 RESULT tag=97 err=0 text=
+5a93289a conn=1046 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=1 SRCH attr=entryCSN
+5a93289a conn=1046 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=2 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=2 SRCH attr=*
+5a93289a conn=1046 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=3 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=3 SRCH attr=fdTemplateField objectClass
+5a93289a conn=1046 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=4 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=4 SRCH attr=objectClass
+5a93289a conn=1046 op=4 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=5 MOD dn="cn=config,ou=fusiondirectory,dc=slurm,dc=ch"
+5a93289a conn=1046 op=5 MOD attr=fdTimezone fdForcePasswordDefaultHash fdPasswordMinLength
+5a93289a conn=1046 op=5 RESULT tag=103 err=0 text=
+5a93289a conn=1046 op=6 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=6 SRCH attr=*
+5a93289a conn=1046 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=7 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a93289a conn=1046 op=7 SRCH attr=objectClass description ou c dc dc l o
+5a93289a conn=1046 op=7 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=8 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=8 SRCH attr=objectClass
+5a93289a conn=1046 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=9 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a93289a conn=1046 op=9 SRCH attr=cn
+5a93289a conn=1046 op=9 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=10 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=10 SRCH attr=objectClass
+5a93289a conn=1046 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=11 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a93289a conn=1046 op=11 SRCH attr=cn
+5a93289a conn=1046 op=11 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=12 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=12 SRCH attr=*
+5a93289a conn=1046 op=12 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=13 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=13 SRCH attr=entryCSN
+5a93289a conn=1046 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=14 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=14 SRCH attr=entryCSN
+5a93289a conn=1046 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=15 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a93289a conn=1046 op=15 SRCH attr=objectClass description ou c dc dc l o
+5a93289a conn=1046 op=15 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=16 SRCH attr=*
+5a93289a conn=1046 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=17 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=17 SRCH attr=*
+5a93289a conn=1046 op=17 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=18 ADD dn="ou=GOsa_setup_text_entry_pa6qvdhpc52d5l8jlk7a31t551684618,dc=slurm,dc=ch"
+5a93289a conn=1046 op=18 RESULT tag=105 err=0 text=
+5a93289a conn=1046 op=19 SRCH base="ou=GOsa_setup_text_entry_pa6qvdhpc52d5l8jlk7a31t551684618,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=19 SRCH attr=*
+5a93289a conn=1046 op=19 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=20 DEL dn="ou=GOsa_setup_text_entry_pa6qvdhpc52d5l8jlk7a31t551684618,dc=slurm,dc=ch"
+5a93289a conn=1046 op=20 RESULT tag=107 err=0 text=
+5a93289a conn=1046 op=21 SRCH base="ou=GOsa_setup_text_entry_pa6qvdhpc52d5l8jlk7a31t551684618,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=21 SRCH attr=*
+5a93289a conn=1046 op=21 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a93289a conn=1046 op=22 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(|(?objectClass=posixAccount)(objectClass=person)(?objectClass=OpenLDAPperson))(!(objectClass=inetOrgPerson))(uid=*))"
+5a93289a conn=1046 op=22 SRCH attr=sn givenName cn uid
+5a93289a conn=1046 op=22 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=23 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=23 SRCH attr=*
+5a93289a conn=1046 op=23 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=24 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=inetOrgPerson)"
+5a93289a conn=1046 op=24 SRCH attr=uid dn
+5a93289a conn=1046 op=24 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=25 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?objectClass=posixGroup)"
+5a93289a conn=1046 op=25 SRCH attr=cn dn
+5a93289a conn=1046 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=26 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=organizationalRole)"
+5a93289a conn=1046 op=26 SRCH attr=cn dn
+5a93289a conn=1046 op=26 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=27 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=27 SRCH attr=*
+5a93289a conn=1046 op=27 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=28 SRCH base="cn=manager,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=28 SRCH attr=dn
+5a93289a conn=1046 op=28 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a93289a conn=1046 op=29 SRCH base="cn=editowninfos,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=29 SRCH attr=dn
+5a93289a conn=1046 op=29 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a93289a conn=1046 op=30 SRCH base="cn=editownpwd,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a93289a conn=1046 op=30 SRCH attr=dn
+5a93289a conn=1046 op=30 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a93289a conn=1046 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=inetOrgPerson)(!(uid=*$)))"
+5a93289a conn=1046 op=31 SRCH attr=dn
+5a93289a conn=1046 op=31 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=32 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?objectClass=posixGroup)"
+5a93289a conn=1046 op=32 SRCH attr=dn
+5a93289a conn=1046 op=32 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=33 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=organizationalUnit)(!(objectClass=gosaDepartment)))"
+5a93289a conn=1046 op=33 SRCH attr=ou description dn
+5a93289a conn=1046 op=33 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a93289a conn=1046 op=34 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixAccount)(uidNumber=*))"
+5a93289a conn=1046 op=34 SRCH attr=dn uidNumber
+5a93289a conn=1046 op=34 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=35 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(gidNumber=*))"
+5a93289a conn=1046 op=35 SRCH attr=dn gidNumber
+5a93289a conn=1046 op=35 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a93289a conn=1046 op=36 UNBIND
+5a93289a conn=1046 fd=14 closed
+5a9328bb conn=1047 fd=14 ACCEPT from IP=172.19.0.3:56738 (IP=0.0.0.0:389)
+5a9328bb conn=1047 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9328bb conn=1047 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9328bb conn=1047 op=0 RESULT tag=97 err=0 text=
+5a9328bb conn=1047 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328bb conn=1047 op=1 SRCH attr=*
+5a9328bb conn=1047 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328bb conn=1047 op=2 MOD dn="dc=slurm,dc=ch"
+5a9328bb conn=1047 op=2 MOD attr=objectClass ou description
+5a9328bb conn=1047 op=2 RESULT tag=103 err=0 text=
+5a9328bb conn=1047 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328bb conn=1047 op=3 SRCH attr=*
+5a9328bb conn=1047 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328bb conn=1047 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=inetOrgPerson)"
+5a9328bb conn=1047 op=4 SRCH attr=uid dn
+5a9328bb conn=1047 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328bb conn=1047 op=5 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?objectClass=posixGroup)"
+5a9328bb conn=1047 op=5 SRCH attr=cn dn
+5a9328bb conn=1047 op=5 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328bb conn=1047 op=6 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=organizationalRole)"
+5a9328bb conn=1047 op=6 SRCH attr=cn dn
+5a9328bb conn=1047 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328bb conn=1047 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328bb conn=1047 op=7 SRCH attr=*
+5a9328bb conn=1047 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328bb conn=1047 op=8 UNBIND
+5a9328bb conn=1047 fd=14 closed
+5a9328ca conn=1048 fd=14 ACCEPT from IP=172.19.0.3:56748 (IP=0.0.0.0:389)
+5a9328ca conn=1048 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9328ca conn=1048 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9328ca conn=1048 op=0 RESULT tag=97 err=0 text=
+5a9328ca conn=1048 op=1 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaRole)(gosaAclTemplate=*:all;cmdrw))"
+5a9328ca conn=1048 op=1 SRCH attr=dn
+5a9328ca conn=1048 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328ca conn=1048 op=2 do_search: invalid dn: "new"
+5a9328ca conn=1048 op=2 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a9328ca conn=1048 op=3 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(cn=admin)(objectClass=gosaRole)(&(objectClass=top)(objectClass=gosaRole)))"
+5a9328ca conn=1048 op=3 SRCH attr=cn
+5a9328ca <= mdb_equality_candidates: (cn) not indexed
+5a9328ca conn=1048 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328ca conn=1048 op=4 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328ca conn=1048 op=4 SRCH attr=fdTemplateField objectClass
+5a9328ca conn=1048 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328ca conn=1048 op=5 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328ca conn=1048 op=5 SRCH attr=objectClass
+5a9328ca conn=1048 op=5 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328ca conn=1048 op=6 SRCH base="ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328ca conn=1048 op=6 SRCH attr=*
+5a9328ca conn=1048 op=6 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328ca conn=1048 op=7 ADD dn="ou=aclroles,dc=slurm,dc=ch"
+5a9328ca conn=1048 op=7 RESULT tag=105 err=0 text=
+5a9328ca conn=1048 op=8 ADD dn="cn=admin,ou=aclroles,dc=slurm,dc=ch"
+5a9328ca conn=1048 op=8 RESULT tag=105 err=0 text=
+5a9328ca conn=1048 op=9 do_search: invalid dn: "new"
+5a9328ca conn=1048 op=9 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a9328ca conn=1048 op=10 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328ca conn=1048 op=10 SRCH attr=objectClass
+5a9328ca conn=1048 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328ca conn=1048 op=11 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a9328ca conn=1048 op=11 SRCH attr=cn description
+5a9328ca conn=1048 op=11 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328ca conn=1048 op=12 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328ca conn=1048 op=12 SRCH attr=objectClass
+5a9328ca conn=1048 op=12 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328ca conn=1048 op=13 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a9328ca conn=1048 op=13 SRCH attr=cn description
+5a9328ca conn=1048 op=13 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328ca conn=1048 op=14 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(uid=fd-admin)(objectClass=inetOrgPerson)(&(objectClass=inetOrgPerson)(objectClass=organizationalPerson)(objectClass=person)))"
+5a9328ca conn=1048 op=14 SRCH attr=uid
+5a9328ca <= mdb_equality_candidates: (uid) not indexed
+5a9328ca conn=1048 op=14 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328ca conn=1048 op=15 do_search: invalid dn: "new"
+5a9328ca conn=1048 op=15 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a9328ca conn=1048 op=16 UNBIND
+5a9328ca conn=1048 fd=14 closed
+5a9328d8 conn=1049 fd=14 ACCEPT from IP=172.19.0.3:56754 (IP=0.0.0.0:389)
+5a9328d8 conn=1049 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9328d8 conn=1049 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9328d8 conn=1049 op=0 RESULT tag=97 err=0 text=
+5a9328d8 conn=1049 op=1 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaRole)(gosaAclTemplate=*:all;cmdrw))"
+5a9328d8 conn=1049 op=1 SRCH attr=dn
+5a9328d8 <= mdb_substring_candidates: (gosaAclTemplate) not indexed
+5a9328d8 conn=1049 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=2 do_search: invalid dn: "new"
+5a9328d8 conn=1049 op=2 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a9328d8 conn=1049 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=3 SRCH attr=objectClass
+5a9328d8 conn=1049 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a9328d8 conn=1049 op=4 SRCH attr=cn description
+5a9328d8 conn=1049 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=5 SRCH attr=objectClass
+5a9328d8 conn=1049 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=6 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a9328d8 conn=1049 op=6 SRCH attr=cn description
+5a9328d8 conn=1049 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=7 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(uid=fd-admin)(objectClass=inetOrgPerson)(&(objectClass=inetOrgPerson)(objectClass=organizationalPerson)(objectClass=person)))"
+5a9328d8 conn=1049 op=7 SRCH attr=uid
+5a9328d8 <= mdb_equality_candidates: (uid) not indexed
+5a9328d8 conn=1049 op=7 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=8 do_search: invalid dn: "new"
+5a9328d8 conn=1049 op=8 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a9328d8 conn=1049 op=9 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=9 SRCH attr=dn
+5a9328d8 conn=1049 op=9 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328d8 conn=1049 op=10 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=10 SRCH attr=fdTemplateField objectClass
+5a9328d8 conn=1049 op=10 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328d8 conn=1049 op=11 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=11 SRCH attr=objectClass
+5a9328d8 conn=1049 op=11 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328d8 conn=1049 op=12 SRCH base="ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=12 SRCH attr=*
+5a9328d8 conn=1049 op=12 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328d8 conn=1049 op=13 ADD dn="ou=people,dc=slurm,dc=ch"
+5a9328d8 conn=1049 op=13 RESULT tag=105 err=0 text=
+5a9328d8 conn=1049 op=14 ADD dn="uid=fd-admin,ou=people,dc=slurm,dc=ch"
+5a9328d8 conn=1049 op=14 RESULT tag=105 err=0 text=
+5a9328d8 conn=1049 op=15 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=15 SRCH attr=*
+5a9328d8 conn=1049 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=16 SRCH attr=fdTemplateField objectClass
+5a9328d8 conn=1049 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=17 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=17 SRCH attr=objectClass
+5a9328d8 conn=1049 op=17 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=18 MOD dn="dc=slurm,dc=ch"
+5a9328d8 conn=1049 op=18 MOD attr=objectClass gosaAclEntry
+5a9328d8 conn=1049 op=18 RESULT tag=103 err=0 text=
+5a9328d8 conn=1049 op=19 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=groupOfNames)(?member=fake_dn))"
+5a9328d8 conn=1049 op=19 SRCH attr=dn
+5a9328d8 conn=1049 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=20 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(?memberUid=fake_uid))"
+5a9328d8 conn=1049 op=20 SRCH attr=dn
+5a9328d8 conn=1049 op=20 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=21 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=organizationalRole)(?roleOccupant=fake_dn))"
+5a9328d8 conn=1049 op=21 SRCH attr=dn
+5a9328d8 conn=1049 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=22 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=gosaAcl)"
+5a9328d8 conn=1049 op=22 SRCH attr=dn gosaAclEntry
+5a9328d8 conn=1049 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=23 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=23 SRCH attr=cn objectClass description uid
+5a9328d8 conn=1049 op=23 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=24 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=24 SRCH attr=gosaAclTemplate
+5a9328d8 conn=1049 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=25 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328d8 conn=1049 op=25 SRCH attr=*
+5a9328d8 conn=1049 op=25 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=26 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=inetOrgPerson)"
+5a9328d8 conn=1049 op=26 SRCH attr=uid dn
+5a9328d8 conn=1049 op=26 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=27 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?objectClass=posixGroup)"
+5a9328d8 conn=1049 op=27 SRCH attr=cn dn
+5a9328d8 conn=1049 op=27 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=28 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=organizationalRole)"
+5a9328d8 conn=1049 op=28 SRCH attr=cn dn
+5a9328d8 conn=1049 op=28 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a9328d8 conn=1049 op=29 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(gosaAclTemplate=*:all;cmdrw)"
+5a9328d8 conn=1049 op=29 SRCH attr=gosaAclTemplate
+5a9328d8 conn=1049 op=29 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328d8 conn=1049 op=30 UNBIND
+5a9328d8 conn=1049 fd=14 closed
+5a9328dd conn=1050 fd=14 ACCEPT from IP=172.19.0.3:56760 (IP=0.0.0.0:389)
+5a9328dd conn=1050 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a9328dd conn=1050 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a9328dd conn=1050 op=0 RESULT tag=97 err=0 text=
+5a9328dd conn=1050 op=1 SRCH base="cn=manager,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=1 SRCH attr=*
+5a9328dd conn=1050 op=1 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328dd conn=1050 op=2 SRCH base="ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=2 SRCH attr=*
+5a9328dd conn=1050 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=3 ADD dn="cn=manager,ou=aclroles,dc=slurm,dc=ch"
+5a9328dd conn=1050 op=3 RESULT tag=105 err=0 text=
+5a9328dd conn=1050 op=4 SRCH base="cn=editowninfos,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=4 SRCH attr=*
+5a9328dd conn=1050 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328dd conn=1050 op=5 SRCH base="ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=5 SRCH attr=*
+5a9328dd conn=1050 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=6 ADD dn="cn=editowninfos,ou=aclroles,dc=slurm,dc=ch"
+5a9328dd conn=1050 op=6 RESULT tag=105 err=0 text=
+5a9328dd conn=1050 op=7 SRCH base="cn=editownpwd,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=7 SRCH attr=*
+5a9328dd conn=1050 op=7 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a9328dd conn=1050 op=8 SRCH base="ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=8 SRCH attr=*
+5a9328dd conn=1050 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=9 ADD dn="cn=editownpwd,ou=aclroles,dc=slurm,dc=ch"
+5a9328dd conn=1050 op=9 RESULT tag=105 err=0 text=
+5a9328dd conn=1050 op=10 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=10 SRCH attr=*
+5a9328dd conn=1050 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=11 SRCH base="cn=manager,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=11 SRCH attr=dn
+5a9328dd conn=1050 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=12 SRCH base="cn=editowninfos,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=12 SRCH attr=dn
+5a9328dd conn=1050 op=12 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=13 SRCH base="cn=editownpwd,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a9328dd conn=1050 op=13 SRCH attr=dn
+5a9328dd conn=1050 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a9328dd conn=1050 op=14 UNBIND
+5a9328dd conn=1050 fd=14 closed
+5a932a22 conn=1051 fd=14 ACCEPT from IP=172.19.0.3:56784 (IP=0.0.0.0:389)
+5a932a22 conn=1051 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a22 conn=1051 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a22 conn=1051 op=0 RESULT tag=97 err=0 text=
+5a932a22 conn=1051 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=1 SRCH attr=*
+5a932a22 conn=1051 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=2 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=2 SRCH attr=cn sn givenName uid gidNumber preferredLanguage
+5a932a22 conn=1051 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=3 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=groupOfNames)(member=))"
+5a932a22 conn=1051 op=3 SRCH attr=dn
+5a932a22 conn=1051 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a22 conn=1051 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(?memberUid=))"
+5a932a22 conn=1051 op=4 SRCH attr=dn
+5a932a22 conn=1051 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a22 conn=1051 op=5 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=organizationalRole)(roleOccupant=))"
+5a932a22 conn=1051 op=5 SRCH attr=dn
+5a932a22 conn=1051 op=5 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a22 conn=1051 op=6 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=gosaAcl)"
+5a932a22 conn=1051 op=6 SRCH attr=dn gosaAclEntry
+5a932a22 conn=1051 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=7 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=7 SRCH attr=cn objectClass description uid
+5a932a22 conn=1051 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=8 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=8 SRCH attr=gosaAclTemplate
+5a932a22 conn=1051 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=9 SRCH attr=objectClass
+5a932a22 conn=1051 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=10 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a22 conn=1051 op=10 SRCH attr=cn
+5a932a22 conn=1051 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a22 conn=1051 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=11 SRCH attr=objectClass
+5a932a22 conn=1051 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=12 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a22 conn=1051 op=12 SRCH attr=cn
+5a932a22 conn=1051 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a22 conn=1051 op=13 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=13 SRCH attr=*
+5a932a22 conn=1051 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=14 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=14 SRCH attr=entryCSN
+5a932a22 conn=1051 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=15 SRCH base="ou=recovery,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=15 SRCH attr=dn
+5a932a22 conn=1051 op=15 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a22 conn=1051 op=16 SRCH base="ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=16 SRCH attr=*
+5a932a22 conn=1051 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=17 SRCH base="ou=recovery,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=17 SRCH attr=*
+5a932a22 conn=1051 op=17 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a22 conn=1051 op=18 ADD dn="ou=recovery,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a22 conn=1051 op=18 RESULT tag=105 err=0 text=
+5a932a22 conn=1051 op=19 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=19 SRCH attr=entryCSN
+5a932a22 conn=1051 op=19 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=20 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=20 SRCH attr=fdTemplateField objectClass
+5a932a22 conn=1051 op=20 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=21 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=21 SRCH attr=fdTemplateField objectClass
+5a932a22 conn=1051 op=21 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=22 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=22 SRCH attr=objectClass
+5a932a22 conn=1051 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=23 MOD dn="cn=config,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a22 conn=1051 op=23 MOD attr=objectClass fdDashboardNumberOfDigit fdDashboardPrefix fdDashboardExpiredAccountsDays
+5a932a22 conn=1051 op=23 RESULT tag=103 err=0 text=
+5a932a22 conn=1051 op=24 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=24 SRCH attr=fdTemplateField objectClass
+5a932a22 conn=1051 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=25 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=25 SRCH attr=objectClass
+5a932a22 conn=1051 op=25 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=26 MOD dn="cn=config,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a22 conn=1051 op=26 MOD attr=objectClass fdOGroupRDN fdForceSaslPasswordAsk
+5a932a22 conn=1051 op=26 RESULT tag=103 err=0 text=
+5a932a22 conn=1051 op=27 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=27 SRCH attr=fdTemplateField objectClass
+5a932a22 conn=1051 op=27 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=28 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=28 SRCH attr=objectClass
+5a932a22 conn=1051 op=28 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=29 MOD dn="cn=config,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a22 conn=1051 op=29 MOD attr=objectClass fdPasswordRecoveryActivated fdPasswordRecoveryEmail fdPasswordRecoveryValidity fdPasswordRecoverySalt fdPasswordRecoveryUseAlternate fdPasswordRecoveryLoginAttribute fdPasswordRecoveryMailSubject fdPasswordRecoveryMailBody fdPasswordRecoveryMail2Subject fdPasswordRecoveryMail2Body
+5a932a22 conn=1051 op=29 RESULT tag=103 err=0 text=
+5a932a22 conn=1051 op=30 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1051 op=30 SRCH attr=*
+5a932a22 conn=1051 op=30 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a22 conn=1051 op=31 SRCH attr=objectClass description ou c dc dc l o
+5a932a22 conn=1051 op=31 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1051 op=32 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=fdLockEntry)(fdObjectDn=y249y29uzmlnlg91pwz1c2lvbmrpcmvjdg9yesxkyz1zbhvybsxkyz1jaa==))"
+5a932a22 conn=1051 op=32 SRCH attr=fdObjectDn
+5a932a22 conn=1051 op=32 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a22 conn=1051 op=33 UNBIND
+5a932a22 conn=1051 fd=14 closed
+5a932a22 conn=1052 fd=14 ACCEPT from IP=172.19.0.3:56786 (IP=0.0.0.0:389)
+5a932a22 conn=1052 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a22 conn=1052 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a22 conn=1052 op=0 RESULT tag=97 err=0 text=
+5a932a22 conn=1052 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a22 conn=1052 op=1 SRCH attr=*
+5a932a22 conn=1052 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a22 conn=1052 op=2 UNBIND
+5a932a22 conn=1052 fd=14 closed
+5a932a31 conn=1053 fd=14 ACCEPT from IP=172.19.0.3:56816 (IP=0.0.0.0:389)
+5a932a31 conn=1053 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a31 conn=1053 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a31 conn=1053 op=0 RESULT tag=97 err=0 text=
+5a932a31 conn=1053 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1053 op=1 SRCH attr=*
+5a932a31 conn=1053 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1053 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(|(uid=fd-admin))(objectClass=inetOrgPerson))"
+5a932a31 conn=1053 op=2 SRCH attr=uid uid
+5a932a31 <= mdb_equality_candidates: (uid) not indexed
+5a932a31 conn=1053 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1053 op=3 UNBIND
+5a932a31 conn=1053 fd=14 closed
+5a932a31 conn=1054 fd=14 ACCEPT from IP=172.19.0.3:56818 (IP=0.0.0.0:389)
+5a932a31 conn=1054 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a31 conn=1054 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a31 conn=1054 op=0 RESULT tag=97 err=0 text=
+5a932a31 conn=1054 op=1 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=1 SRCH attr=cn sn givenName uid gidNumber preferredLanguage
+5a932a31 conn=1054 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1055 fd=15 ACCEPT from IP=172.19.0.3:56820 (IP=0.0.0.0:389)
+5a932a31 conn=1055 op=0 BIND dn="uid=fd-admin,ou=people,dc=slurm,dc=ch" method=128
+5a932a31 conn=1055 op=0 BIND dn="uid=fd-admin,ou=people,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a31 conn=1055 op=0 RESULT tag=97 err=0 text=
+5a932a31 conn=1054 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=groupOfNames)(member=uid=fd-admin,ou=people,dc=slurm,dc=ch))"
+5a932a31 conn=1054 op=2 SRCH attr=dn
+5a932a31 conn=1054 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a31 conn=1054 op=3 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(?memberUid=fd-admin))"
+5a932a31 conn=1054 op=3 SRCH attr=dn
+5a932a31 conn=1054 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a31 conn=1054 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=organizationalRole)(roleOccupant=uid=fd-admin,ou=people,dc=slurm,dc=ch))"
+5a932a31 conn=1054 op=4 SRCH attr=dn
+5a932a31 conn=1054 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a31 conn=1054 op=5 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(objectClass=gosaAcl)"
+5a932a31 conn=1054 op=5 SRCH attr=dn gosaAclEntry
+5a932a31 conn=1054 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=6 SRCH base="uid=fd-admin,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=6 SRCH attr=cn objectClass description uid
+5a932a31 conn=1054 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=7 SRCH base="cn=admin,ou=aclroles,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=7 SRCH attr=gosaAclTemplate
+5a932a31 conn=1054 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1055 op=1 UNBIND
+5a932a31 conn=1055 fd=15 closed
+5a932a31 conn=1054 op=8 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=8 SRCH attr=dn
+5a932a31 conn=1054 op=8 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a31 conn=1054 op=9 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=9 SRCH attr=subschemaSubentry
+5a932a31 conn=1054 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=10 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=10 SRCH attr=objectclasses
+5a932a31 conn=1054 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=11 SRCH base="ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=11 SRCH attr=*
+5a932a31 conn=1054 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=12 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=12 SRCH attr=*
+5a932a31 conn=1054 op=12 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a31 conn=1054 op=13 ADD dn="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a31 conn=1054 op=13 RESULT tag=105 err=0 text=
+5a932a31 conn=1054 op=14 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=fdLockEntry)(fdUserDn=uid=fd-admin,ou=people,dc=slurm,dc=ch))"
+5a932a31 conn=1054 op=14 SRCH attr=fdUserDn
+5a932a31 conn=1054 op=14 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a31 conn=1054 op=15 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a31 conn=1054 op=15 SRCH attr=objectClass description ou c dc dc l o
+5a932a31 conn=1054 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1054 op=16 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1054 op=16 SRCH attr=fusionConfigMd5
+5a932a31 conn=1054 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1056 fd=15 ACCEPT from IP=172.19.0.3:56822 (IP=0.0.0.0:389)
+5a932a31 conn=1056 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a31 conn=1056 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a31 conn=1056 op=0 RESULT tag=97 err=0 text=
+5a932a31 conn=1056 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1056 op=1 SRCH attr=subschemaSubentry
+5a932a31 conn=1056 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1056 op=2 SRCH base="cn=Subschema" scope=0 deref=0 filter="(objectClass=*)"
+5a932a31 conn=1056 op=2 SRCH attr=objectclasses
+5a932a31 conn=1056 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a31 conn=1056 op=3 UNBIND
+5a932a31 conn=1056 fd=15 closed
+5a932a31 conn=1054 op=17 UNBIND
+5a932a31 conn=1054 fd=14 closed
+5a932a31 conn=1057 fd=14 ACCEPT from IP=172.19.0.3:56824 (IP=0.0.0.0:389)
+5a932a31 conn=1057 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a31 conn=1057 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a31 conn=1057 op=0 RESULT tag=97 err=0 text=
+5a932a31 conn=1057 op=1 UNBIND
+5a932a31 conn=1057 fd=14 closed
+5a932a37 conn=1058 fd=14 ACCEPT from IP=172.19.0.3:56852 (IP=0.0.0.0:389)
+5a932a37 conn=1058 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a37 conn=1058 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a37 conn=1058 op=0 RESULT tag=97 err=0 text=
+5a932a37 conn=1058 op=1 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=1 SRCH attr=*
+5a932a37 conn=1058 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=2 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=2 SRCH attr=objectClass
+5a932a37 conn=1058 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=3 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=fusionDirectoryConf))"
+5a932a37 conn=1058 op=3 SRCH attr=dn
+5a932a37 conn=1058 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=4 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=4 SRCH attr=objectClass
+5a932a37 conn=1058 op=4 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=5 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a37 conn=1058 op=5 SRCH attr=dn
+5a932a37 conn=1058 op=5 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=6 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=6 SRCH attr=objectClass
+5a932a37 conn=1058 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=7 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=inetOrgPerson))"
+5a932a37 conn=1058 op=7 SRCH attr=dn
+5a932a37 conn=1058 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=8 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=8 SRCH attr=objectClass
+5a932a37 conn=1058 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=9 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=gosaAcl))"
+5a932a37 conn=1058 op=9 SRCH attr=dn
+5a932a37 conn=1058 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=10 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=10 SRCH attr=objectClass
+5a932a37 conn=1058 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=11 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=gosaRole))"
+5a932a37 conn=1058 op=11 SRCH attr=dn
+5a932a37 conn=1058 op=11 SEARCH RESULT tag=101 err=0 nentries=4 text=
+5a932a37 conn=1058 op=12 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=12 SRCH attr=objectClass
+5a932a37 conn=1058 op=12 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=13 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=13 SRCH attr=dn
+5a932a37 conn=1058 op=13 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=14 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=14 SRCH attr=objectClass
+5a932a37 conn=1058 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=15 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=15 SRCH attr=dn
+5a932a37 conn=1058 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=16 SRCH attr=objectClass
+5a932a37 conn=1058 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=17 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=17 SRCH attr=dn
+5a932a37 conn=1058 op=17 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=18 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=18 SRCH attr=objectClass
+5a932a37 conn=1058 op=18 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=19 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=19 SRCH attr=dn
+5a932a37 conn=1058 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=20 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=20 SRCH attr=objectClass
+5a932a37 conn=1058 op=20 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=21 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=21 SRCH attr=dn
+5a932a37 conn=1058 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=22 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=22 SRCH attr=objectClass
+5a932a37 conn=1058 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=23 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a37 conn=1058 op=23 SRCH attr=dn
+5a932a37 conn=1058 op=23 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=24 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=24 SRCH attr=objectClass
+5a932a37 conn=1058 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=25 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a37 conn=1058 op=25 SRCH attr=dn
+5a932a37 conn=1058 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=26 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=26 SRCH attr=objectClass
+5a932a37 conn=1058 op=26 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=27 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=inetOrgPerson))"
+5a932a37 conn=1058 op=27 SRCH attr=dn
+5a932a37 conn=1058 op=27 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=28 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=inetOrgPerson)(?objectClass=gosaMailAccount))"
+5a932a37 conn=1058 op=28 SRCH attr=cn
+5a932a37 conn=1058 op=28 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=29 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=inetOrgPerson)(?objectClass=posixAccount))"
+5a932a37 conn=1058 op=29 SRCH attr=cn
+5a932a37 conn=1058 op=29 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=30 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=inetOrgPerson)(?objectClass=sambaSamAccount))"
+5a932a37 conn=1058 op=30 SRCH attr=cn
+5a932a37 conn=1058 op=30 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?objectClass=posixGroup)"
+5a932a37 conn=1058 op=31 SRCH attr=cn
+5a932a37 conn=1058 op=31 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=32 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(?objectClass=fdGroupMail))"
+5a932a37 conn=1058 op=32 SRCH attr=cn
+5a932a37 conn=1058 op=32 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=33 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(?objectClass=posixGroup)(?objectClass=sambaSamAccount))"
+5a932a37 conn=1058 op=33 SRCH attr=cn
+5a932a37 conn=1058 op=33 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 get_filter: conn 1058 unknown attribute type=shadowExpire (17)
+5a932a37 conn=1058 op=34 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(?shadowExpire=*)"
+5a932a37 conn=1058 op=34 SRCH attr=uid shadowExpire mail telephoneNumber cn manager
+5a932a37 conn=1058 op=34 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a37 conn=1058 op=35 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a37 conn=1058 op=35 SRCH attr=objectClass
+5a932a37 conn=1058 op=35 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=36 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=inetOrgPerson))"
+5a932a37 conn=1058 op=36 SRCH attr=userPassword
+5a932a37 conn=1058 op=36 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a37 conn=1058 op=37 UNBIND
+5a932a37 conn=1058 fd=14 closed
+5a932a3b conn=1059 fd=14 ACCEPT from IP=172.19.0.3:56880 (IP=0.0.0.0:389)
+5a932a3b conn=1059 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a3b conn=1059 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a3b conn=1059 op=0 RESULT tag=97 err=0 text=
+5a932a3b conn=1059 op=1 UNBIND
+5a932a3b conn=1059 fd=14 closed
+5a932a43 conn=1060 fd=14 ACCEPT from IP=172.19.0.3:56886 (IP=0.0.0.0:389)
+5a932a43 conn=1060 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a43 conn=1060 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a43 conn=1060 op=0 RESULT tag=97 err=0 text=
+5a932a43 conn=1060 op=1 UNBIND
+5a932a43 conn=1060 fd=14 closed
+5a932a4b conn=1061 fd=14 ACCEPT from IP=172.19.0.3:56892 (IP=0.0.0.0:389)
+5a932a4b conn=1061 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a4b conn=1061 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a4b conn=1061 op=0 RESULT tag=97 err=0 text=
+5a932a4b conn=1061 op=1 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4b conn=1061 op=1 SRCH attr=*
+5a932a4b conn=1061 op=1 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a4b conn=1061 op=2 ADD dn="ou=snapshots,dc=slurm,dc=ch"
+5a932a4b conn=1061 op=2 RESULT tag=105 err=0 text=
+5a932a4b conn=1061 op=3 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))))"
+5a932a4b conn=1061 op=3 SRCH attr=dn cn description ou c dc l o objectClass
+5a932a4b conn=1061 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4b conn=1061 op=4 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932a4b conn=1061 op=4 SRCH attr=gosaSnapshotDN
+5a932a4b conn=1061 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4b conn=1061 op=5 UNBIND
+5a932a4b conn=1061 fd=14 closed
+5a932a4e conn=1062 fd=14 ACCEPT from IP=172.19.0.3:56914 (IP=0.0.0.0:389)
+5a932a4e conn=1062 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a4e conn=1062 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a4e conn=1062 op=0 RESULT tag=97 err=0 text=
+5a932a4e conn=1062 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=1 SRCH attr=objectClass
+5a932a4e conn=1062 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=2 SRCH attr=dn objectClass description ou
+5a932a4e conn=1062 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=3 SRCH attr=objectClass
+5a932a4e conn=1062 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=4 SRCH attr=dn objectClass description c
+5a932a4e conn=1062 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=5 SRCH attr=objectClass
+5a932a4e conn=1062 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=6 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=6 SRCH attr=dn objectClass description dc
+5a932a4e conn=1062 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=7 SRCH attr=objectClass
+5a932a4e conn=1062 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=8 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=8 SRCH attr=dn objectClass description dc
+5a932a4e conn=1062 op=8 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=9 SRCH attr=objectClass
+5a932a4e conn=1062 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=10 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=10 SRCH attr=dn objectClass description l
+5a932a4e conn=1062 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=11 SRCH attr=objectClass
+5a932a4e conn=1062 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=12 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=12 SRCH attr=dn objectClass description o
+5a932a4e conn=1062 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=13 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=13 SRCH attr=*
+5a932a4e conn=1062 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=14 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=14 SRCH attr=objectClass
+5a932a4e conn=1062 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=15 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=15 SRCH attr=dn objectClass description ou
+5a932a4e conn=1062 op=15 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=16 SRCH attr=objectClass
+5a932a4e conn=1062 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=17 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=17 SRCH attr=dn objectClass description c
+5a932a4e conn=1062 op=17 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=18 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=18 SRCH attr=objectClass
+5a932a4e conn=1062 op=18 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=19 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=19 SRCH attr=dn objectClass description dc
+5a932a4e conn=1062 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=20 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=20 SRCH attr=objectClass
+5a932a4e conn=1062 op=20 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=21 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=21 SRCH attr=dn objectClass description dc
+5a932a4e conn=1062 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=22 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=22 SRCH attr=objectClass
+5a932a4e conn=1062 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=23 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=23 SRCH attr=dn objectClass description l
+5a932a4e conn=1062 op=23 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=24 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=24 SRCH attr=objectClass
+5a932a4e conn=1062 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=25 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a4e conn=1062 op=25 SRCH attr=dn objectClass description o
+5a932a4e conn=1062 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=26 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=inetOrgPerson)(|(objectClass=*))))))"
+5a932a4e conn=1062 op=26 SRCH attr=*
+5a932a4e conn=1062 op=26 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=27 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932a4e conn=1062 op=27 SRCH attr=gosaSnapshotDN
+5a932a4e conn=1062 op=27 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=28 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=28 SRCH attr=objectClass
+5a932a4e conn=1062 op=28 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=29 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a4e conn=1062 op=29 SRCH attr=cn description
+5a932a4e conn=1062 op=29 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=30 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a4e conn=1062 op=30 SRCH attr=objectClass
+5a932a4e conn=1062 op=30 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a4e conn=1062 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a4e conn=1062 op=31 SRCH attr=cn description
+5a932a4e conn=1062 op=31 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a4e conn=1062 op=32 SRCH base="ou=people,ou=snapshots,dc=slurm,dc=ch" scope=1 deref=0 filter="(objectClass=gosaSnapshotObject)"
+5a932a4e conn=1062 op=32 SRCH attr=gosaSnapshotTimestamp gosaSnapshotDN description
+5a932a4e conn=1062 op=32 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a4e conn=1062 op=33 UNBIND
+5a932a4e conn=1062 fd=14 closed
+5a932a58 conn=1063 fd=14 ACCEPT from IP=172.19.0.3:56922 (IP=0.0.0.0:389)
+5a932a58 conn=1063 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a58 conn=1063 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a58 conn=1063 op=0 RESULT tag=97 err=0 text=
+5a932a58 conn=1063 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a58 conn=1063 op=1 SRCH attr=objectClass
+5a932a58 conn=1063 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a58 conn=1063 op=2 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a58 conn=1063 op=2 SRCH attr=cn
+5a932a58 conn=1063 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a58 conn=1063 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a58 conn=1063 op=3 SRCH attr=objectClass
+5a932a58 conn=1063 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a58 conn=1063 op=4 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a58 conn=1063 op=4 SRCH attr=cn
+5a932a58 conn=1063 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a58 conn=1063 op=5 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a58 conn=1063 op=5 SRCH attr=*
+5a932a58 conn=1063 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a58 conn=1063 op=6 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a58 conn=1063 op=6 SRCH attr=entryCSN
+5a932a58 conn=1063 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a58 conn=1063 op=7 SRCH base="ou=recovery,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a58 conn=1063 op=7 SRCH attr=dn
+5a932a58 conn=1063 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a58 conn=1063 op=8 UNBIND
+5a932a58 conn=1063 fd=14 closed
+5a932a5b conn=1064 fd=14 ACCEPT from IP=172.19.0.3:56924 (IP=0.0.0.0:389)
+5a932a5b conn=1064 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a5b conn=1064 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a5b conn=1064 op=0 RESULT tag=97 err=0 text=
+5a932a5b conn=1064 op=1 UNBIND
+5a932a5b conn=1064 fd=14 closed
+5a932a70 conn=1065 fd=14 ACCEPT from IP=172.19.0.3:56934 (IP=0.0.0.0:389)
+5a932a70 conn=1065 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a70 conn=1065 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a70 conn=1065 op=0 RESULT tag=97 err=0 text=
+5a932a70 conn=1065 op=1 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=fdLockEntry)(fdObjectDn=y249y29uzmlnlg91pwz1c2lvbmrpcmvjdg9yesxkyz1zbhvybsxkyz1jaa==))"
+5a932a70 conn=1065 op=1 SRCH attr=fdUserDn fdObjectDn fdLockTimestamp
+5a932a70 conn=1065 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a70 conn=1065 op=2 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=fdLockEntry)(fdUserDn=uid=fd-admin,ou=people,dc=slurm,dc=ch)(fdObjectDn=y249y29uzmlnlg91pwz1c2lvbmrpcmvjdg9yesxkyz1zbhvybsxkyz1jaa==))"
+5a932a70 conn=1065 op=2 SRCH attr=fdUserDn
+5a932a70 conn=1065 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a70 conn=1065 op=3 ADD dn="cn=818429750db458b48683f20bdd5d3a75,ou=locks,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a70 conn=1065 op=3 RESULT tag=105 err=0 text=
+5a932a70 conn=1065 op=4 UNBIND
+5a932a70 conn=1065 fd=14 closed
+5a932a75 conn=1066 fd=14 ACCEPT from IP=172.19.0.3:56940 (IP=0.0.0.0:389)
+5a932a75 conn=1066 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a75 conn=1066 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a75 conn=1066 op=0 RESULT tag=97 err=0 text=
+5a932a75 conn=1066 op=1 UNBIND
+5a932a75 conn=1066 fd=14 closed
+5a932a7c conn=1067 fd=14 ACCEPT from IP=172.19.0.3:56942 (IP=0.0.0.0:389)
+5a932a7c conn=1067 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a7c conn=1067 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a7c conn=1067 op=0 RESULT tag=97 err=0 text=
+5a932a7c conn=1067 op=1 SRCH base="ou=locks,ou=fusiondirectory,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=fdLockEntry)(fdObjectDn=y249y29uzmlnlg91pwz1c2lvbmrpcmvjdg9yesxkyz1zbhvybsxkyz1jaa==))"
+5a932a7c conn=1067 op=1 SRCH attr=fdObjectDn
+5a932a7c <= mdb_equality_candidates: (fdObjectDn) not indexed
+5a932a7c conn=1067 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a7c conn=1067 op=2 DEL dn="cn=818429750db458b48683f20bdd5d3a75,ou=locks,ou=fusiondirectory,dc=slurm,dc=ch"
+5a932a7c conn=1067 op=2 RESULT tag=107 err=0 text=
+5a932a7c conn=1067 op=3 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a7c conn=1067 op=3 SRCH attr=*
+5a932a7c conn=1067 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a7c conn=1067 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))))"
+5a932a7c conn=1067 op=4 SRCH attr=dn cn description ou c dc l o objectClass
+5a932a7c conn=1067 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a7c conn=1067 op=5 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932a7c conn=1067 op=5 SRCH attr=gosaSnapshotDN
+5a932a7c conn=1067 op=5 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a7c conn=1067 op=6 UNBIND
+5a932a7c conn=1067 fd=14 closed
+5a932a81 conn=1068 fd=14 ACCEPT from IP=172.19.0.3:56944 (IP=0.0.0.0:389)
+5a932a81 conn=1068 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a81 conn=1068 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a81 conn=1068 op=0 RESULT tag=97 err=0 text=
+5a932a81 conn=1068 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=1 SRCH attr=objectClass
+5a932a81 conn=1068 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=2 SRCH attr=dn objectClass description ou
+5a932a81 conn=1068 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=3 SRCH attr=objectClass
+5a932a81 conn=1068 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=4 SRCH attr=dn objectClass description c
+5a932a81 conn=1068 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=5 SRCH attr=objectClass
+5a932a81 conn=1068 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=6 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=6 SRCH attr=dn objectClass description dc
+5a932a81 conn=1068 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=7 SRCH attr=objectClass
+5a932a81 conn=1068 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=8 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=8 SRCH attr=dn objectClass description dc
+5a932a81 conn=1068 op=8 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=9 SRCH attr=objectClass
+5a932a81 conn=1068 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=10 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=10 SRCH attr=dn objectClass description l
+5a932a81 conn=1068 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=11 SRCH attr=objectClass
+5a932a81 conn=1068 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=12 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=12 SRCH attr=dn objectClass description o
+5a932a81 conn=1068 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=13 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=13 SRCH attr=*
+5a932a81 conn=1068 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=14 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=14 SRCH attr=objectClass
+5a932a81 conn=1068 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=15 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=15 SRCH attr=dn objectClass description ou
+5a932a81 conn=1068 op=15 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=16 SRCH attr=objectClass
+5a932a81 conn=1068 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=17 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=17 SRCH attr=dn objectClass description c
+5a932a81 conn=1068 op=17 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=18 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=18 SRCH attr=objectClass
+5a932a81 conn=1068 op=18 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=19 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=19 SRCH attr=dn objectClass description dc
+5a932a81 conn=1068 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=20 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=20 SRCH attr=objectClass
+5a932a81 conn=1068 op=20 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=21 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=21 SRCH attr=dn objectClass description dc
+5a932a81 conn=1068 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=22 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=22 SRCH attr=objectClass
+5a932a81 conn=1068 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=23 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=23 SRCH attr=dn objectClass description l
+5a932a81 conn=1068 op=23 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=24 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=24 SRCH attr=objectClass
+5a932a81 conn=1068 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=25 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a81 conn=1068 op=25 SRCH attr=dn objectClass description o
+5a932a81 conn=1068 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=26 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=inetOrgPerson)(|(objectClass=*))))))"
+5a932a81 conn=1068 op=26 SRCH attr=*
+5a932a81 conn=1068 op=26 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=27 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932a81 conn=1068 op=27 SRCH attr=gosaSnapshotDN
+5a932a81 conn=1068 op=27 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=28 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=28 SRCH attr=objectClass
+5a932a81 conn=1068 op=28 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=29 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a81 conn=1068 op=29 SRCH attr=cn description
+5a932a81 conn=1068 op=29 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=30 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a81 conn=1068 op=30 SRCH attr=objectClass
+5a932a81 conn=1068 op=30 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a81 conn=1068 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a81 conn=1068 op=31 SRCH attr=cn description
+5a932a81 conn=1068 op=31 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a81 conn=1068 op=32 SRCH base="ou=people,ou=snapshots,dc=slurm,dc=ch" scope=1 deref=0 filter="(objectClass=gosaSnapshotObject)"
+5a932a81 conn=1068 op=32 SRCH attr=gosaSnapshotTimestamp gosaSnapshotDN description
+5a932a81 conn=1068 op=32 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a81 conn=1068 op=33 UNBIND
+5a932a81 conn=1068 fd=14 closed
+5a932a92 conn=1069 fd=14 ACCEPT from IP=172.19.0.3:56956 (IP=0.0.0.0:389)
+5a932a92 conn=1069 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a92 conn=1069 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a92 conn=1069 op=0 RESULT tag=97 err=0 text=
+5a932a92 conn=1069 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=1 SRCH attr=objectClass
+5a932a92 conn=1069 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=2 SRCH attr=dn objectClass description ou
+5a932a92 conn=1069 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=3 SRCH attr=objectClass
+5a932a92 conn=1069 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=4 SRCH attr=dn objectClass description c
+5a932a92 conn=1069 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=5 SRCH attr=objectClass
+5a932a92 conn=1069 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=6 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=6 SRCH attr=dn objectClass description dc
+5a932a92 conn=1069 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=7 SRCH attr=objectClass
+5a932a92 conn=1069 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=8 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=8 SRCH attr=dn objectClass description dc
+5a932a92 conn=1069 op=8 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=9 SRCH attr=objectClass
+5a932a92 conn=1069 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=10 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=10 SRCH attr=dn objectClass description l
+5a932a92 conn=1069 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=11 SRCH attr=objectClass
+5a932a92 conn=1069 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=12 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932a92 conn=1069 op=12 SRCH attr=dn objectClass description o
+5a932a92 conn=1069 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=13 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=inetOrgPerson)(|(objectClass=*))))))"
+5a932a92 conn=1069 op=13 SRCH attr=*
+5a932a92 conn=1069 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=14 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932a92 conn=1069 op=14 SRCH attr=gosaSnapshotDN
+5a932a92 conn=1069 op=14 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=15 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=15 SRCH attr=objectClass
+5a932a92 conn=1069 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=16 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a92 conn=1069 op=16 SRCH attr=cn description
+5a932a92 conn=1069 op=16 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=17 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a92 conn=1069 op=17 SRCH attr=objectClass
+5a932a92 conn=1069 op=17 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a92 conn=1069 op=18 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a92 conn=1069 op=18 SRCH attr=cn description
+5a932a92 conn=1069 op=18 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a92 conn=1069 op=19 SRCH base="ou=people,ou=snapshots,dc=slurm,dc=ch" scope=1 deref=0 filter="(objectClass=gosaSnapshotObject)"
+5a932a92 conn=1069 op=19 SRCH attr=gosaSnapshotTimestamp gosaSnapshotDN description
+5a932a92 conn=1069 op=19 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932a92 conn=1069 op=20 UNBIND
+5a932a92 conn=1069 fd=14 closed
+5a932a9d conn=1070 fd=14 ACCEPT from IP=172.19.0.3:56966 (IP=0.0.0.0:389)
+5a932a9d conn=1070 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932a9d conn=1070 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932a9d conn=1070 op=0 RESULT tag=97 err=0 text=
+5a932a9d conn=1070 op=1 do_search: invalid dn: "new"
+5a932a9d conn=1070 op=1 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a932a9d conn=1070 op=2 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a9d conn=1070 op=2 SRCH attr=objectClass
+5a932a9d conn=1070 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a9d conn=1070 op=3 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932a9d conn=1070 op=3 SRCH attr=cn description
+5a932a9d conn=1070 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a9d conn=1070 op=4 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932a9d conn=1070 op=4 SRCH attr=objectClass
+5a932a9d conn=1070 op=4 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932a9d conn=1070 op=5 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932a9d conn=1070 op=5 SRCH attr=cn description
+5a932a9d conn=1070 op=5 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932a9d conn=1070 op=6 UNBIND
+5a932a9d conn=1070 fd=14 closed
+5a932ac1 conn=1071 fd=14 ACCEPT from IP=172.19.0.3:56996 (IP=0.0.0.0:389)
+5a932ac1 conn=1071 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932ac1 conn=1071 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932ac1 conn=1071 op=0 RESULT tag=97 err=0 text=
+5a932ac1 conn=1071 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=1 SRCH attr=objectClass
+5a932ac1 conn=1071 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=2 SRCH attr=dn objectClass description ou
+5a932ac1 conn=1071 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=3 SRCH attr=objectClass
+5a932ac1 conn=1071 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=4 SRCH attr=dn objectClass description c
+5a932ac1 conn=1071 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=5 SRCH attr=objectClass
+5a932ac1 conn=1071 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=6 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=6 SRCH attr=dn objectClass description dc
+5a932ac1 conn=1071 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=7 SRCH attr=objectClass
+5a932ac1 conn=1071 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=8 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=8 SRCH attr=dn objectClass description dc
+5a932ac1 conn=1071 op=8 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=9 SRCH attr=objectClass
+5a932ac1 conn=1071 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=10 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=10 SRCH attr=dn objectClass description l
+5a932ac1 conn=1071 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=11 SRCH attr=objectClass
+5a932ac1 conn=1071 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=12 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=12 SRCH attr=dn objectClass description o
+5a932ac1 conn=1071 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=13 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=13 SRCH attr=objectClass
+5a932ac1 conn=1071 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=14 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=14 SRCH attr=dn objectClass description ou
+5a932ac1 conn=1071 op=14 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=15 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=15 SRCH attr=objectClass
+5a932ac1 conn=1071 op=15 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=16 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=16 SRCH attr=dn objectClass description c
+5a932ac1 conn=1071 op=16 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=17 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=17 SRCH attr=objectClass
+5a932ac1 conn=1071 op=17 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=18 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=18 SRCH attr=dn objectClass description dc
+5a932ac1 conn=1071 op=18 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=19 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=19 SRCH attr=objectClass
+5a932ac1 conn=1071 op=19 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=20 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=20 SRCH attr=dn objectClass description dc
+5a932ac1 conn=1071 op=20 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=21 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=21 SRCH attr=objectClass
+5a932ac1 conn=1071 op=21 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=22 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=22 SRCH attr=dn objectClass description l
+5a932ac1 conn=1071 op=22 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=23 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932ac1 conn=1071 op=23 SRCH attr=objectClass
+5a932ac1 conn=1071 op=23 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=24 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932ac1 conn=1071 op=24 SRCH attr=dn objectClass description o
+5a932ac1 conn=1071 op=24 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932ac1 conn=1071 op=25 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(objectClass=inetOrgPerson))))"
+5a932ac1 conn=1071 op=25 SRCH attr=dn cn uid description objectClass
+5a932ac1 conn=1071 op=25 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932ac1 conn=1071 op=26 UNBIND
+5a932ac1 conn=1071 fd=14 closed
+5a932b1b conn=1072 fd=14 ACCEPT from IP=172.19.0.3:57006 (IP=0.0.0.0:389)
+5a932b1b conn=1072 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b1b conn=1072 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b1b conn=1072 op=0 RESULT tag=97 err=0 text=
+5a932b1b conn=1072 op=1 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(uid=tomi)(objectClass=inetOrgPerson)(&(objectClass=inetOrgPerson)(objectClass=organizationalPerson)(objectClass=person)))"
+5a932b1b conn=1072 op=1 SRCH attr=uid
+5a932b1b <= mdb_equality_candidates: (uid) not indexed
+5a932b1b conn=1072 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b1b conn=1072 op=2 do_search: invalid dn: "new"
+5a932b1b conn=1072 op=2 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a932b1b conn=1072 op=3 UNBIND
+5a932b1b conn=1072 fd=14 closed
+5a932b2a conn=1073 fd=14 ACCEPT from IP=172.19.0.3:57012 (IP=0.0.0.0:389)
+5a932b2a conn=1073 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b2a conn=1073 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b2a conn=1073 op=0 RESULT tag=97 err=0 text=
+5a932b2a conn=1073 op=1 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(&(uid=tomi)(objectClass=inetOrgPerson)(&(objectClass=inetOrgPerson)(objectClass=organizationalPerson)(objectClass=person)))"
+5a932b2a conn=1073 op=1 SRCH attr=uid
+5a932b2a <= mdb_equality_candidates: (uid) not indexed
+5a932b2a conn=1073 op=1 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=2 do_search: invalid dn: "new"
+5a932b2a conn=1073 op=2 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a932b2a conn=1073 op=3 SRCH base="uid=tomi,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=3 SRCH attr=dn
+5a932b2a conn=1073 op=3 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932b2a conn=1073 op=4 SRCH base="uid=tomi,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=4 SRCH attr=fdTemplateField objectClass
+5a932b2a conn=1073 op=4 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932b2a conn=1073 op=5 SRCH base="uid=tomi,ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=5 SRCH attr=objectClass
+5a932b2a conn=1073 op=5 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932b2a conn=1073 op=6 SRCH base="ou=people,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=6 SRCH attr=*
+5a932b2a conn=1073 op=6 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=7 ADD dn="uid=tomi,ou=people,dc=slurm,dc=ch"
+5a932b2a conn=1073 op=7 RESULT tag=105 err=0 text=
+5a932b2a conn=1073 op=8 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=8 SRCH attr=objectClass
+5a932b2a conn=1073 op=8 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=9 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=9 SRCH attr=dn objectClass description ou
+5a932b2a conn=1073 op=9 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=10 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=10 SRCH attr=objectClass
+5a932b2a conn=1073 op=10 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=11 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=11 SRCH attr=dn objectClass description c
+5a932b2a conn=1073 op=11 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=12 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=12 SRCH attr=objectClass
+5a932b2a conn=1073 op=12 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=13 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=13 SRCH attr=dn objectClass description dc
+5a932b2a conn=1073 op=13 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=14 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=14 SRCH attr=objectClass
+5a932b2a conn=1073 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=15 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=15 SRCH attr=dn objectClass description dc
+5a932b2a conn=1073 op=15 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=16 SRCH attr=objectClass
+5a932b2a conn=1073 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=17 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=17 SRCH attr=dn objectClass description l
+5a932b2a conn=1073 op=17 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=18 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=18 SRCH attr=objectClass
+5a932b2a conn=1073 op=18 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=19 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932b2a conn=1073 op=19 SRCH attr=dn objectClass description o
+5a932b2a conn=1073 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=20 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=inetOrgPerson)(|(objectClass=*))))))"
+5a932b2a conn=1073 op=20 SRCH attr=*
+5a932b2a conn=1073 op=20 SEARCH RESULT tag=101 err=0 nentries=2 text=
+5a932b2a conn=1073 op=21 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932b2a conn=1073 op=21 SRCH attr=gosaSnapshotDN
+5a932b2a conn=1073 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=22 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=22 SRCH attr=objectClass
+5a932b2a conn=1073 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=23 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932b2a conn=1073 op=23 SRCH attr=cn description
+5a932b2a conn=1073 op=23 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=24 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b2a conn=1073 op=24 SRCH attr=objectClass
+5a932b2a conn=1073 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b2a conn=1073 op=25 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932b2a conn=1073 op=25 SRCH attr=cn description
+5a932b2a conn=1073 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b2a conn=1073 op=26 SRCH base="ou=people,ou=snapshots,dc=slurm,dc=ch" scope=1 deref=0 filter="(objectClass=gosaSnapshotObject)"
+5a932b2a conn=1073 op=26 SRCH attr=gosaSnapshotTimestamp gosaSnapshotDN description
+5a932b2a conn=1073 op=26 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932b2a conn=1073 op=27 UNBIND
+5a932b2a conn=1073 fd=14 closed
+5a932b34 conn=1074 fd=14 ACCEPT from IP=172.19.0.3:57018 (IP=0.0.0.0:389)
+5a932b34 conn=1074 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b34 conn=1074 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b34 conn=1074 op=0 RESULT tag=97 err=0 text=
+5a932b34 conn=1074 op=1 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b34 conn=1074 op=1 SRCH attr=*
+5a932b34 conn=1074 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b34 conn=1074 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))))"
+5a932b34 conn=1074 op=2 SRCH attr=dn cn description ou c dc l o objectClass
+5a932b34 conn=1074 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b34 conn=1074 op=3 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932b34 conn=1074 op=3 SRCH attr=gosaSnapshotDN
+5a932b34 conn=1074 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b34 conn=1074 op=4 UNBIND
+5a932b34 conn=1074 fd=14 closed
+5a932b3f conn=1075 fd=14 ACCEPT from IP=172.19.0.3:57028 (IP=0.0.0.0:389)
+5a932b3f conn=1075 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b3f conn=1075 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b3f conn=1075 op=0 RESULT tag=97 err=0 text=
+5a932b3f conn=1075 op=1 do_search: invalid dn: "new"
+5a932b3f conn=1075 op=1 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a932b3f conn=1075 op=2 UNBIND
+5a932b3f conn=1075 fd=14 closed
+5a932b46 conn=1076 fd=14 ACCEPT from IP=172.19.0.3:57034 (IP=0.0.0.0:389)
+5a932b46 conn=1076 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b46 conn=1076 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b46 conn=1076 op=0 RESULT tag=97 err=0 text=
+5a932b46 conn=1076 op=1 UNBIND
+5a932b46 conn=1076 fd=14 closed
+5a932b4b conn=1077 fd=14 ACCEPT from IP=172.19.0.3:57036 (IP=0.0.0.0:389)
+5a932b4b conn=1077 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b4b conn=1077 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b4b conn=1077 op=0 RESULT tag=97 err=0 text=
+5a932b4b conn=1077 op=1 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b4b conn=1077 op=1 SRCH attr=*
+5a932b4b conn=1077 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b4b conn=1077 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment))(&(objectClass=country)(objectClass=gosaDepartment))(&(objectClass=dcObject)(objectClass=gosaDepartment))(&(objectClass=domain)(objectClass=gosaDepartment))(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment))(&(objectClass=organization)(objectClass=gosaDepartment)))))"
+5a932b4b conn=1077 op=2 SRCH attr=dn cn description ou c dc l o objectClass
+5a932b4b conn=1077 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b4b conn=1077 op=3 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932b4b conn=1077 op=3 SRCH attr=gosaSnapshotDN
+5a932b4b conn=1077 op=3 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b4b conn=1077 op=4 UNBIND
+5a932b4b conn=1077 fd=14 closed
+5a932b53 conn=1078 fd=14 ACCEPT from IP=172.19.0.3:57042 (IP=0.0.0.0:389)
+5a932b53 conn=1078 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b53 conn=1078 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b53 conn=1078 op=0 RESULT tag=97 err=0 text=
+5a932b53 conn=1078 op=1 do_search: invalid dn: "new"
+5a932b53 conn=1078 op=1 SEARCH RESULT tag=101 err=34 nentries=0 text=invalid DN
+5a932b53 conn=1078 op=2 UNBIND
+5a932b53 conn=1078 fd=14 closed
+5a932b5a conn=1079 fd=14 ACCEPT from IP=172.19.0.3:57044 (IP=0.0.0.0:389)
+5a932b5a conn=1079 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a932b5a conn=1079 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a932b5a conn=1079 op=0 RESULT tag=97 err=0 text=
+5a932b5a conn=1079 op=1 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=1 SRCH attr=objectClass
+5a932b5a conn=1079 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=2 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=2 SRCH attr=dn objectClass description ou
+5a932b5a conn=1079 op=2 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=3 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=3 SRCH attr=objectClass
+5a932b5a conn=1079 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=4 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=4 SRCH attr=dn objectClass description c
+5a932b5a conn=1079 op=4 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=5 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=5 SRCH attr=objectClass
+5a932b5a conn=1079 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=6 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=6 SRCH attr=dn objectClass description dc
+5a932b5a conn=1079 op=6 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=7 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=7 SRCH attr=objectClass
+5a932b5a conn=1079 op=7 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=8 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=8 SRCH attr=dn objectClass description dc
+5a932b5a conn=1079 op=8 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=9 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=9 SRCH attr=objectClass
+5a932b5a conn=1079 op=9 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=10 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=10 SRCH attr=dn objectClass description l
+5a932b5a conn=1079 op=10 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=11 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=11 SRCH attr=objectClass
+5a932b5a conn=1079 op=11 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=12 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=12 SRCH attr=dn objectClass description o
+5a932b5a conn=1079 op=12 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=13 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=13 SRCH attr=*
+5a932b5a conn=1079 op=13 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=14 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=14 SRCH attr=objectClass
+5a932b5a conn=1079 op=14 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=15 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organizationalUnit)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=15 SRCH attr=dn objectClass description ou
+5a932b5a conn=1079 op=15 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=16 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=16 SRCH attr=objectClass
+5a932b5a conn=1079 op=16 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=17 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=country)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=17 SRCH attr=dn objectClass description c
+5a932b5a conn=1079 op=17 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=18 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=18 SRCH attr=objectClass
+5a932b5a conn=1079 op=18 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=19 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=dcObject)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=19 SRCH attr=dn objectClass description dc
+5a932b5a conn=1079 op=19 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=20 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=20 SRCH attr=objectClass
+5a932b5a conn=1079 op=20 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=21 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=domain)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=21 SRCH attr=dn objectClass description dc
+5a932b5a conn=1079 op=21 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=22 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=22 SRCH attr=objectClass
+5a932b5a conn=1079 op=22 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=23 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(!(objectClass=dcObject))(objectClass=locality)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=23 SRCH attr=dn objectClass description l
+5a932b5a conn=1079 op=23 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=24 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=24 SRCH attr=objectClass
+5a932b5a conn=1079 op=24 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=25 SRCH base="dc=slurm,dc=ch" scope=1 deref=0 filter="(|(&(objectClass=organization)(objectClass=gosaDepartment)))"
+5a932b5a conn=1079 op=25 SRCH attr=dn objectClass description o
+5a932b5a conn=1079 op=25 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=26 SRCH base="ou=people,dc=slurm,dc=ch" scope=1 deref=0 filter="(&(&(|(&(objectClass=inetOrgPerson)(|(objectClass=*))))))"
+5a932b5a conn=1079 op=26 SRCH attr=*
+5a932b5a conn=1079 op=26 SEARCH RESULT tag=101 err=0 nentries=2 text=
+5a932b5a conn=1079 op=27 SRCH base="ou=snapshots,dc=slurm,dc=ch" scope=2 deref=0 filter="(&(objectClass=gosaSnapshotObject)(gosaSnapshotDN=*))"
+5a932b5a conn=1079 op=27 SRCH attr=gosaSnapshotDN
+5a932b5a conn=1079 op=27 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=28 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=28 SRCH attr=objectClass
+5a932b5a conn=1079 op=28 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=29 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(objectClass=groupOfNames))"
+5a932b5a conn=1079 op=29 SRCH attr=cn description
+5a932b5a conn=1079 op=29 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=30 SRCH base="dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a932b5a conn=1079 op=30 SRCH attr=objectClass
+5a932b5a conn=1079 op=30 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a932b5a conn=1079 op=31 SRCH base="dc=slurm,dc=ch" scope=2 deref=0 filter="(|(&(objectClass=organizationalRole)(!(objectClass=simpleSecurityObject))))"
+5a932b5a conn=1079 op=31 SRCH attr=cn description
+5a932b5a conn=1079 op=31 SEARCH RESULT tag=101 err=0 nentries=0 text=
+5a932b5a conn=1079 op=32 SRCH base="ou=people,ou=snapshots,dc=slurm,dc=ch" scope=1 deref=0 filter="(objectClass=gosaSnapshotObject)"
+5a932b5a conn=1079 op=32 SRCH attr=gosaSnapshotTimestamp gosaSnapshotDN description
+5a932b5a conn=1079 op=32 SEARCH RESULT tag=101 err=32 nentries=0 text=
+5a932b5a conn=1079 op=33 UNBIND
+5a932b5a conn=1079 fd=14 closed
+5a933262 conn=1080 fd=14 ACCEPT from IP=172.19.0.3:57652 (IP=0.0.0.0:389)
+5a933262 conn=1080 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" method=128
+5a933262 conn=1080 op=0 BIND dn="cn=Manager,dc=slurm,dc=ch" mech=SIMPLE ssf=0
+5a933262 conn=1080 op=0 RESULT tag=97 err=0 text=
+5a933262 conn=1080 op=1 SRCH base="cn=config,ou=fusiondirectory,dc=slurm,dc=ch" scope=0 deref=0 filter="(objectClass=*)"
+5a933262 conn=1080 op=1 SRCH attr=*
+5a933262 conn=1080 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
+5a933262 conn=1080 op=2 UNBIND
+5a933262 conn=1080 fd=14 closed
+5a964316 daemon: shutdown requested and initiated.
+5a964316 slapd shutdown: waiting for 0 operations/tasks to finish
+5a964316 slapd stopped.

+ 1 - 0
slapd.d/password

@@ -0,0 +1 @@
+gaishun9doCh9sohnae0

+ 71 - 0
slapd.d/slapd.conf

@@ -0,0 +1,71 @@
+#
+# See slapd.conf(5) for details on configuration options.
+# This file should NOT be world readable.
+#
+include		/etc/openldap/schema/core.schema
+
+# Define global ACLs to disable default read access.
+
+# Do not enable referrals until AFTER you have a working directory
+# service AND an understanding of referrals.
+#referral	ldap://root.openldap.org
+
+# If you change this, adjust pidfile path also in runscript!
+pidfile		/run/openldap/slapd.pid
+argsfile	/run/openldap/slapd.args
+
+# Load dynamic backend modules:
+modulepath	/usr/lib/openldap
+moduleload	back_mdb.so
+# moduleload	back_hdb.so
+# moduleload	back_bbd.so
+# moduleload	back_ldap.so
+
+# Sample security restrictions
+#	Require integrity protection (prevent hijacking)
+#	Require 112-bit (3DES or better) encryption for updates
+#	Require 63-bit encryption for simple bind
+# security ssf=1 update_ssf=112 simple_bind=64
+
+# Sample access control policy:
+#	Root DSE: allow anyone to read it
+#	Subschema (sub)entry DSE: allow anyone to read it
+#	Other DSEs:
+#		Allow self write access
+#		Allow authenticated users read access
+#		Allow anonymous users to authenticate
+#	Directives needed to implement policy:
+# access to dn.base="" by * read
+# access to dn.base="cn=Subschema" by * read
+access to *
+	by self write
+	by users read
+	by anonymous auth
+#
+# if no access controls are present, the default policy
+# allows anyone and everyone to read anything but restricts
+# updates to rootdn.  (e.g., "access to * by * read")
+#
+# rootdn can always read and write EVERYTHING!
+
+#######################################################################
+# MDB database definitions
+#######################################################################
+
+database	mdb
+maxsize		1073741824
+suffix		"dc=slurm,dc=ch"
+rootdn		"cn=admin,dc=slurm,dc=ch"
+
+# Cleartext passwords, especially for the rootdn, should
+# be avoid.  See slappasswd(8) and slapd.conf(5) for details.
+# Use of strong authentication encouraged.
+rootpw		{SSHA}O61WeqsSLZNO2yF3PgpO7La1lumlekCW
+
+# The database directory MUST exist prior to running slapd AND 
+# should only be accessible by the slapd and slap tools.
+# Mode 700 recommended.
+directory /var/lib/ldap
+
+# Indices to maintain
+index	objectClass	eq

+ 1 - 0
slapd.d/slapd_config_rootpw

@@ -0,0 +1 @@
+lSOrfLYpiBthIh

+ 29 - 0
ssl/ldap.slurm.ch.crt

@@ -0,0 +1,29 @@
+-----BEGIN CERTIFICATE-----
+MIIE/TCCA2WgAwIBAgIMWorxgxVYjE1a7WnWMA0GCSqGSIb3DQEBCwUAMH4xFDAS
+BgNVBAMTC1RvbWkgQ3ZldGljMQ0wCwYDVQQLEwRsZGFwMQ4wDAYDVQQKEwVTbHVy
+bTEPMA0GA1UECBMGWnVyaWNoMQswCQYDVQQGEwJDSDEVMBMGCgmSJomT8ixkARkW
+BXNsdXJtMRIwEAYKCZImiZPyLGQBGRYCY2gwHhcNMTgwMjE5MTU0NzE1WhcNMTkw
+MjE5MTU0NzE1WjB+MRQwEgYDVQQDEwtUb21pIEN2ZXRpYzENMAsGA1UECxMEbGRh
+cDEOMAwGA1UEChMFU2x1cm0xDzANBgNVBAgTBlp1cmljaDELMAkGA1UEBhMCQ0gx
+FTATBgoJkiaJk/IsZAEZFgVzbHVybTESMBAGCgmSJomT8ixkARkWAmNoMIIBojAN
+BgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEA0ziKr23TTEjbmyp6dHO1r2O3NPCB
+lL0GfuF6jfQJdYDpxaECkyS5QvW2p41Bdbv4J+QqEv0LkwR68rRzs3z73yGn4oj3
+7wpL+kfCDsF+VgiGvvQaxT3YTdkiplwbtonDGnhGfJqeizHjFIxBlIdZlShGyfri
+tU3jo/XqNqO8zlLTSBVkaCwC1claWzS0LSLvQZh2OawMKn93xhB+iBRrlIJin/x1
+vKhmg3ewegaoNIOnvK3uNyl7TF6GVijIsZPwgKagytvr5Vo9NgQTja+m/4j1gAvo
+aRoBsSgAfgp6jxZSc9cux0ncMtVkfXkzMr5nFCk9fjR6cFzE/+f7fXL9DXwIdMNb
+3gxKbyq2vCBv2QjIB3O07R/FiyppngtgZIrM6JzuFlkYplbK2pgQeywXUGZpQ9Lc
+vhKx+IfREvVMlIoK78g41RRb3nsVLyqqwTGcqvc8FGeQWitx0mpI/5dsUx1KK3nC
+obfE8ErRMp1i40NO6q3+mKa6Yoz90SskdEMbAgMBAAGjezB5MAwGA1UdEwEB/wQC
+MAAwGAYDVR0RBBEwD4ENdG9taUBzbHVybS5jaDAPBgNVHQ8BAf8EBQMDB6AAMB0G
+A1UdDgQWBBQO5GBTvetF4KnjCEpWBtgfBPqF5TAfBgNVHSMEGDAWgBT6N5hifa/4
+/sf+whRjOlP7J3alqjANBgkqhkiG9w0BAQsFAAOCAYEAXyHoQTes0cCPfbFEAN+X
+8MMLrHsPbA9n1/wufRftkDyVksj3PrPUOEy426t5dREGGpxRNmPMo4oA36aCmka0
+e5D8goiqZmneIrffs9WWITb6RxAuwUQ2YEQquG4iI8XAQNk7PftmRK1EEkJ1jwl1
+1ws36VfgzimVAfDwC2IhJkLb8y2PZG1MdUajomuzness9W20tRrZisfpBHYeHMKF
+TGEJvorYR4kzGMJzHtpbUxZxszPJxyAW5Fv9/1GJBb6U69RZfyzn2b+hImG2DWZQ
+IjtWgJkfpdRZYVRp5eGH9YoscQJ6erVG+l6KQwp/FG9k/gulCvmT7IUs4pnm0Uv+
+IqBm9Bv22QfNf09PI4lWO+DrXC2iH/EMvAHCfx0dDOmKDbyd95b/OVBhe9pABAnk
+Z7k6h1sTSOSdI8BaTFOOZHY1gMFxvson62eu/oAuqQq6H23QC1TrnPFEmJ12aG9E
+BcWQy/yu7W4g/JrJW3W2/H1lIW2rVCbBBlauYopSLT4y
+-----END CERTIFICATE-----

+ 192 - 0
ssl/ldap.slurm.ch.key

@@ -0,0 +1,192 @@
+Public Key Info:
+	Public Key Algorithm: RSA
+	Key Security Level: High (3072 bits)
+
+modulus:
+	00:d3:38:8a:af:6d:d3:4c:48:db:9b:2a:7a:74:73:b5
+	af:63:b7:34:f0:81:94:bd:06:7e:e1:7a:8d:f4:09:75
+	80:e9:c5:a1:02:93:24:b9:42:f5:b6:a7:8d:41:75:bb
+	f8:27:e4:2a:12:fd:0b:93:04:7a:f2:b4:73:b3:7c:fb
+	df:21:a7:e2:88:f7:ef:0a:4b:fa:47:c2:0e:c1:7e:56
+	08:86:be:f4:1a:c5:3d:d8:4d:d9:22:a6:5c:1b:b6:89
+	c3:1a:78:46:7c:9a:9e:8b:31:e3:14:8c:41:94:87:59
+	95:28:46:c9:fa:e2:b5:4d:e3:a3:f5:ea:36:a3:bc:ce
+	52:d3:48:15:64:68:2c:02:d5:c9:5a:5b:34:b4:2d:22
+	ef:41:98:76:39:ac:0c:2a:7f:77:c6:10:7e:88:14:6b
+	94:82:62:9f:fc:75:bc:a8:66:83:77:b0:7a:06:a8:34
+	83:a7:bc:ad:ee:37:29:7b:4c:5e:86:56:28:c8:b1:93
+	f0:80:a6:a0:ca:db:eb:e5:5a:3d:36:04:13:8d:af:a6
+	ff:88:f5:80:0b:e8:69:1a:01:b1:28:00:7e:0a:7a:8f
+	16:52:73:d7:2e:c7:49:dc:32:d5:64:7d:79:33:32:be
+	67:14:29:3d:7e:34:7a:70:5c:c4:ff:e7:fb:7d:72:fd
+	0d:7c:08:74:c3:5b:de:0c:4a:6f:2a:b6:bc:20:6f:d9
+	08:c8:07:73:b4:ed:1f:c5:8b:2a:69:9e:0b:60:64:8a
+	cc:e8:9c:ee:16:59:18:a6:56:ca:da:98:10:7b:2c:17
+	50:66:69:43:d2:dc:be:12:b1:f8:87:d1:12:f5:4c:94
+	8a:0a:ef:c8:38:d5:14:5b:de:7b:15:2f:2a:aa:c1:31
+	9c:aa:f7:3c:14:67:90:5a:2b:71:d2:6a:48:ff:97:6c
+	53:1d:4a:2b:79:c2:a1:b7:c4:f0:4a:d1:32:9d:62:e3
+	43:4e:ea:ad:fe:98:a6:ba:62:8c:fd:d1:2b:24:74:43
+	1b:
+
+public exponent:
+	01:00:01:
+
+private exponent:
+	00:b0:9c:20:6a:1a:fc:88:56:8b:39:2c:c5:83:45:94
+	ee:f8:03:a2:42:4f:37:1c:ee:a7:7c:c5:4a:98:78:a8
+	45:88:32:75:34:7f:f0:3e:ef:dc:20:43:ec:fa:85:05
+	0c:b3:de:35:c7:f6:c9:8c:be:3c:47:5f:d7:36:87:14
+	db:37:7a:f7:11:eb:ad:76:00:9d:5f:0e:c5:e3:c8:4d
+	0b:88:0f:76:70:43:e8:38:4a:af:7a:27:7b:f0:b8:2a
+	6c:76:5f:87:20:7c:f0:80:16:d0:76:c7:e7:b5:d7:8e
+	72:07:61:59:55:6b:e6:89:20:04:62:84:d9:f7:02:d1
+	c9:b3:5c:1c:76:fe:1b:7e:ab:5f:57:2b:d7:df:a7:b6
+	04:33:e6:d5:43:d7:b5:bc:7b:24:9c:fa:01:b2:aa:d0
+	61:36:bc:5c:65:6d:d4:b7:42:30:3f:0d:d2:9a:6a:5e
+	ae:8e:bc:56:fa:4e:29:63:2d:32:04:45:5a:88:a4:e2
+	ba:bb:14:f2:c0:76:5d:b8:6b:c3:19:20:88:1b:f3:fa
+	88:58:04:4d:d0:39:a7:b7:20:5a:2b:3b:f2:82:16:3f
+	74:8e:9d:bd:63:40:09:ed:71:7a:4b:1c:71:a9:0e:7f
+	9a:9d:d0:e8:33:51:a2:d7:a2:7a:93:cc:5b:5b:6a:59
+	28:08:00:d6:76:62:42:9a:d2:8c:d6:66:48:a9:87:8a
+	6b:70:ac:45:40:a7:8c:55:1b:08:38:d7:a5:5e:21:09
+	78:6d:96:c3:06:4e:2d:f3:cc:5b:a2:8c:e1:d9:ea:96
+	77:e6:f7:8d:e2:12:2e:d5:6b:df:7a:3a:db:1d:56:a1
+	11:85:2e:fe:b3:ef:37:c8:e0:0b:4e:3a:81:14:67:09
+	ff:1d:42:77:9a:97:e5:02:e8:db:7c:7d:54:fc:85:4f
+	66:56:b4:9e:69:01:3e:c1:a9:78:90:6a:a1:97:20:84
+	28:44:62:b2:20:1b:d2:04:99:74:34:7b:45:a7:fc:72
+	61:
+
+prime1:
+	00:e6:67:66:4c:6d:7d:17:3d:61:f6:2f:9a:50:83:b8
+	d8:91:c8:9d:6f:ce:f2:3d:4a:15:ba:13:5c:b1:dc:77
+	bb:04:4a:b9:a6:18:43:01:6c:6e:cc:a7:32:ed:e1:89
+	b0:59:7b:5a:fc:b2:a9:18:c2:a7:61:8f:4d:4a:71:13
+	5c:b8:78:48:bc:95:a0:13:d5:c0:53:14:7b:8e:c8:9a
+	be:c2:46:b7:59:95:e6:3b:4d:16:ec:71:8a:85:bf:7d
+	d1:1d:e6:5c:22:4e:f9:c5:d2:92:fb:66:5d:aa:73:b3
+	c2:cc:f8:f7:5e:5a:59:7b:33:cb:b7:4a:09:53:66:4e
+	3a:d1:7e:30:43:b5:2f:6f:b2:34:09:d4:f3:3f:b8:e3
+	a4:29:d3:f6:d4:51:8d:0b:9d:6f:0c:ff:17:d6:bd:cd
+	23:40:e4:31:cd:5c:95:31:88:73:ff:b3:50:95:79:9a
+	57:b3:d4:3a:bb:b7:a0:e3:63:f9:89:6e:78:24:be:c0
+	29:
+
+prime2:
+	00:ea:af:95:6f:9d:ea:48:ae:94:15:f6:c2:13:f0:51
+	2c:10:80:95:8f:c2:62:4f:f7:c3:24:0c:24:69:1f:b2
+	1d:f9:90:63:55:79:a4:73:c6:ac:46:03:6b:11:43:ac
+	6f:5b:8e:65:be:08:d1:e3:34:7c:89:73:3f:6a:60:bc
+	85:ce:8e:69:ca:3e:92:39:6c:a8:98:b3:62:10:e1:aa
+	f9:f6:8b:0c:84:d7:24:07:47:67:6b:de:d7:07:84:eb
+	ad:43:d1:1c:a4:4e:7e:94:e6:1a:38:92:1c:79:e6:37
+	6c:03:30:9c:2a:5c:19:74:35:78:45:7c:98:42:34:9e
+	01:88:64:a2:82:df:b0:09:d6:cd:9d:bc:87:f1:d6:ab
+	a8:06:18:ae:2e:61:f0:75:1b:32:7b:4d:91:08:6f:b9
+	59:a2:82:ef:44:42:35:6f:55:a3:0c:e7:1a:3d:f1:95
+	cb:52:61:d4:98:db:76:80:2b:2b:16:cd:ee:cf:39:c1
+	a3:
+
+coefficient:
+	65:af:3e:09:cf:21:49:b0:44:45:7c:0a:22:a7:8b:e1
+	3b:2a:10:72:2e:97:f5:3f:be:7d:21:df:ad:d5:74:48
+	94:69:7c:00:61:46:40:4d:b5:7f:9a:d9:93:df:25:e2
+	93:a1:a9:20:07:ad:fb:c3:6d:52:b3:3b:95:10:8a:e8
+	8f:08:de:9f:31:75:66:4c:cd:3c:46:95:4d:82:13:64
+	b5:c8:fa:d2:75:10:f3:a9:48:33:18:9d:ec:41:43:b6
+	03:e0:db:1c:c7:82:81:59:de:73:1f:2a:7c:a1:ef:c1
+	f8:65:bb:97:47:f8:36:89:32:85:0d:62:fa:28:5a:ab
+	eb:b7:67:47:89:99:c4:16:33:90:7f:dc:1d:41:f4:ab
+	4a:ed:c8:3e:4c:b8:80:74:65:e5:96:cc:f8:8c:35:fc
+	3e:69:53:f6:88:e4:cb:82:5e:02:5a:08:1e:41:d6:81
+	ee:cd:59:0b:86:d3:f7:ff:10:43:b5:57:0b:62:af:68
+	
+
+exp1:
+	75:c6:0d:08:ac:3e:f1:0e:33:71:00:4c:45:33:cf:dd
+	04:48:24:11:ef:1a:ec:31:5e:81:cb:3b:ea:be:e3:84
+	f9:60:a9:1d:39:f1:a6:5c:a3:16:81:b1:0a:df:ea:dd
+	f6:1f:94:16:ef:cc:78:17:a8:2f:ba:6c:ab:cc:b9:35
+	00:26:9c:27:a9:e4:35:bf:61:9c:16:30:42:80:50:79
+	8a:1d:53:c3:bb:58:00:a0:1b:43:a9:96:41:5f:ed:14
+	63:d0:48:f0:50:a6:64:74:8b:25:6e:e2:1a:2b:22:8c
+	44:f2:4e:a0:30:56:e5:1f:48:d6:dc:45:80:18:1f:8c
+	f9:61:23:92:b8:9f:12:dd:68:b4:4d:e2:39:84:6c:f8
+	91:59:04:26:eb:b8:c9:63:24:4c:e4:68:6f:20:7e:27
+	b3:17:f2:4d:23:32:30:2b:ab:ff:dc:cd:28:5b:0c:86
+	20:2a:30:0b:9c:85:e5:36:49:6b:f2:c7:ff:20:72:61
+	
+
+exp2:
+	37:b7:5d:cb:f4:fa:b5:2c:b5:3d:8d:aa:bf:df:12:f6
+	5a:28:9c:d9:57:75:cd:b4:6d:a0:b6:3d:42:b3:e2:ae
+	99:1c:3d:69:02:8b:17:6d:78:62:da:d6:e5:6f:62:95
+	c1:6f:ca:19:d6:b0:35:b7:b5:45:50:96:22:a4:3a:bd
+	ad:af:43:d0:5f:10:8a:0f:90:eb:47:d3:25:5c:de:21
+	9f:f5:9d:10:40:9f:6e:16:f6:a7:b6:6c:e8:7d:17:12
+	b8:82:01:c1:c4:5c:ea:ee:c2:14:e2:23:5e:91:58:61
+	0d:54:d2:0e:80:75:0e:90:cf:2f:f8:07:91:d8:3a:16
+	f5:11:a7:3f:58:e9:cb:3c:32:ee:9a:de:cf:7c:7e:9e
+	52:6c:33:96:11:6c:6b:f0:fc:08:27:ff:21:b8:9c:91
+	7a:32:89:a9:73:ea:89:b7:14:11:b1:20:1a:ca:ab:1c
+	6d:3f:8a:a0:8b:a1:d3:85:ec:21:ea:dc:22:58:7c:ef
+	
+
+
+Public Key ID:
+	sha256:FD:85:0F:17:5A:5D:58:3B:8D:4D:78:71:9D:BE:25:C6:3B:1B:F2:B7:5F:C5:67:28:65:B3:34:CD:BF:85:13:F8
+	sha1:0E:E4:60:53:BD:EB:45:E0:A9:E3:08:4A:56:06:D8:1F:04:FA:85:E5
+Public key's random art:
++--[ RSA 3072]----+
+|...oo ..         |
+|.o.+..  o        |
+|. o.E... +       |
+| . =.=  + .      |
+|  +   o.So       |
+| o.   oo. .      |
+|o. . o o..       |
+|.   . . .        |
+|                 |
++-----------------+
+
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----

+ 295 - 0
ssl/slurm-cert.cfg

@@ -0,0 +1,295 @@
+# X.509 Certificate options
+#
+# DN options
+
+# The organization of the subject.
+organization = "Slurm"
+
+# The organizational unit of the subject.
+unit = "ldap"
+
+# The locality of the subject.
+# locality =
+
+# The state of the certificate owner.
+state = "Zurich"
+
+# The country of the subject. Two letter code.
+country = CH
+
+# The common name of the certificate owner.
+cn = "Tomi Cvetic"
+
+# A user id of the certificate owner.
+#uid = "tomi"
+
+# Set domain components
+dc = "slurm"
+dc = "ch"
+
+# If the supported DN OIDs are not adequate you can set
+# any OID here.
+# For example set the X.520 Title and the X.520 Pseudonym
+# by using OID and string pairs.
+#dn_oid = "2.5.4.12 Dr."
+#dn_oid = "2.5.4.65 jackal"
+
+# This is deprecated and should not be used in new
+# certificates.
+# pkcs9_email = "none@none.org"
+
+# An alternative way to set the certificate's distinguished name directly
+# is with the "dn" option. The attribute names allowed are:
+# C (country), street, O (organization), OU (unit), title, CN (common name),
+# L (locality), ST (state), placeOfBirth, gender, countryOfCitizenship, 
+# countryOfResidence, serialNumber, telephoneNumber, surName, initials, 
+# generationQualifier, givenName, pseudonym, dnQualifier, postalCode, name, 
+# businessCategory, DC, UID, jurisdictionOfIncorporationLocalityName, 
+# jurisdictionOfIncorporationStateOrProvinceName,
+# jurisdictionOfIncorporationCountryName, XmppAddr, and numeric OIDs.
+
+#dn = "cn = Nikos,st = New\, Something,C=GR,surName=Mavrogiannopoulos,2.5.4.9=Arkadias"
+
+# The serial number of the certificate
+# Comment the field for a time-based serial number.
+#serial = 007
+
+# In how many days, counting from today, this certificate will expire.
+# Use -1 if there is no expiration date.
+expiration_days = 365
+
+# Alternatively you may set concrete dates and time. The GNU date string 
+# formats are accepted. See:
+# http://www.gnu.org/software/tar/manual/html_node/Date-input-formats.html
+
+#activation_date = "2004-02-29 16:21:42"
+#expiration_date = "2025-02-29 16:24:41"
+
+# X.509 v3 extensions
+
+# A dnsname in case of a WWW server.
+#dns_name = "www.none.org"
+#dns_name = "www.morethanone.org"
+
+# An othername defined by an OID and a hex encoded string
+#other_name = "1.3.6.1.5.2.2 302ca00d1b0b56414e5245494e2e4f5247a11b3019a006020400000002a10f300d1b047269636b1b0561646d696e"
+#other_name_utf8 = "1.2.4.5.6 A UTF8 string"
+#other_name_octet = "1.2.4.5.6 A string that will be encoded as ASN.1 octet string"
+
+# Allows writing an XmppAddr Identifier
+#xmpp_name = juliet@im.example.com
+
+# Names used in PKINIT
+#krb5_principal = user@REALM.COM
+#krb5_principal = HTTP/user@REALM.COM
+
+# A subject alternative name URI
+#uri = "http://www.example.com"
+
+# An IP address in case of a server.
+#ip_address = "192.168.1.1"
+
+# An email in case of a person
+email = "tomi@slurm.ch"
+
+# TLS feature (rfc7633) extension. That can is used to indicate mandatory TLS
+# extension features to be provided by the server. In practice this is used
+# to require the Status Request (extid: 5) extension from the server. That is,
+# to require the server holding this certificate to provide a stapled OCSP response.
+# You can have multiple lines for multiple TLS features.
+
+# To ask for OCSP status request use:
+#tls_feature = 5
+
+# Challenge password used in certificate requests
+#challenge_password = 123456
+
+# Password when encrypting a private key
+#password = secret
+
+# An URL that has CRLs (certificate revocation lists)
+# available. Needed in CA certificates.
+#crl_dist_points = "http://www.getcrl.crl/getcrl/"
+
+# Whether this is a CA certificate or not
+#ca
+
+# Subject Unique ID (in hex)
+#subject_unique_id = 00153224
+
+# Issuer Unique ID (in hex)
+#issuer_unique_id = 00153225
+
+#### Key usage
+
+# The following key usage flags are used by CAs and end certificates
+
+# Whether this certificate will be used to sign data (needed
+# in TLS DHE ciphersuites). This is the digitalSignature flag
+# in RFC5280 terminology.
+signing_key
+
+# Whether this certificate will be used to encrypt data (needed
+# in TLS RSA ciphersuites). Note that it is preferred to use different
+# keys for encryption and signing. This is the keyEncipherment flag
+# in RFC5280 terminology.
+encryption_key
+
+# Whether this key will be used to sign other certificates. The
+# keyCertSign flag in RFC5280 terminology.
+cert_signing_key
+
+# Whether this key will be used to sign CRLs. The
+# cRLSign flag in RFC5280 terminology.
+#crl_signing_key
+
+# The keyAgreement flag of RFC5280. It's purpose is loosely
+# defined. Not use it unless required by a protocol.
+#key_agreement
+
+# The dataEncipherment flag of RFC5280. It's purpose is loosely
+# defined. Not use it unless required by a protocol.
+#data_encipherment
+
+# The nonRepudiation flag of RFC5280. It's purpose is loosely
+# defined. Not use it unless required by a protocol.
+#non_repudiation
+
+#### Extended key usage (key purposes)
+
+# The following extensions are used in an end certificate
+# to clarify its purpose. Some CAs also use it to indicate
+# the types of certificates they are purposed to sign.
+
+
+# Whether this certificate will be used for a TLS client;
+# this sets the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) of 
+# extended key usage.
+#tls_www_client
+
+# Whether this certificate will be used for a TLS server;
+# This sets the id-kp-clientAuth (1.3.6.1.5.5.7.3.2) of 
+# extended key usage.
+#tls_www_server
+
+# Whether this key will be used to sign code. This sets the
+# id-kp-codeSigning (1.3.6.1.5.5.7.3.3) of extended key usage
+# extension.
+#code_signing_key
+
+# Whether this key will be used to sign OCSP data. This sets the
+# id-kp-OCSPSigning (1.3.6.1.5.5.7.3.9) of extended key usage extension.
+#ocsp_signing_key
+
+# Whether this key will be used for time stamping. This sets the
+# id-kp-timeStamping (1.3.6.1.5.5.7.3.8) of extended key usage extension.
+#time_stamping_key
+
+# Whether this key will be used for email protection. This sets the
+# id-kp-emailProtection (1.3.6.1.5.5.7.3.4) of extended key usage extension.
+#email_protection_key
+
+# Whether this key will be used for IPsec IKE operations (1.3.6.1.5.5.7.3.17).
+#ipsec_ike_key
+
+## adding custom key purpose OIDs
+
+# for microsoft smart card logon
+# key_purpose_oid = 1.3.6.1.4.1.311.20.2.2
+
+# for email protection
+# key_purpose_oid = 1.3.6.1.5.5.7.3.4
+
+# for any purpose (must not be used in intermediate CA certificates)
+# key_purpose_oid = 2.5.29.37.0
+
+### end of key purpose OIDs
+
+### Adding arbitrary extensions
+# This requires to provide the extension OIDs, as well as the extension data in
+# hex format. The following two options are available since GnuTLS 3.5.3.
+#add_extension = "1.2.3.4 0x0AAB01ACFE"
+
+# As above but encode the data as an octet string
+#add_extension = "1.2.3.4 octet_string(0x0AAB01ACFE)"
+
+# For portability critical extensions shouldn't be set to certificates.
+#add_critical_extension = "5.6.7.8 0x1AAB01ACFE"
+
+# When generating a certificate from a certificate
+# request, then honor the extensions stored in the request
+# and store them in the real certificate.
+#honor_crq_extensions
+
+# Alternatively only specific extensions can be copied.
+#honor_crq_ext = 2.5.29.17
+#honor_crq_ext = 2.5.29.15
+
+# Path length contraint. Sets the maximum number of
+# certificates that can be used to certify this certificate.
+# (i.e. the certificate chain length)
+#path_len = -1
+#path_len = 2
+
+# OCSP URI
+# ocsp_uri = http://my.ocsp.server/ocsp
+
+# CA issuers URI
+# ca_issuers_uri = http://my.ca.issuer
+
+# Certificate policies
+#policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
+#policy1_txt = "This is a long policy to summarize"
+#policy1_url = http://www.example.com/a-policy-to-read
+
+#policy2 = 1.3.6.1.4.1.5484.1.10.99.1.1
+#policy2_txt = "This is a short policy"
+#policy2_url = http://www.example.com/another-policy-to-read
+
+# The number of additional certificates that may appear in a
+# path before the anyPolicy is no longer acceptable.
+#inhibit_anypolicy_skip_certs 1
+
+# Name constraints
+
+# DNS
+#nc_permit_dns = example.com
+#nc_exclude_dns = test.example.com
+
+# EMAIL
+#nc_permit_email = "nmav@ex.net"
+
+# Exclude subdomains of example.com
+#nc_exclude_email = .example.com
+
+# Exclude all e-mail addresses of example.com
+#nc_exclude_email = example.com
+
+# IP
+#nc_permit_ip = 192.168.0.0/16
+#nc_exclude_ip = 192.168.5.0/24
+#nc_permit_ip = fc0a:eef2:e7e7:a56e::/64
+
+
+# Options for proxy certificates
+#proxy_policy_language = 1.3.6.1.5.5.7.21.1
+
+
+# Options for generating a CRL
+
+# The number of days the next CRL update will be due.
+# next CRL update will be in 43 days
+#crl_next_update = 43
+
+# this is the 5th CRL by this CA
+# Comment the field for a time-based number.
+#crl_number = 5
+
+# Specify the update dates more precisely.
+#crl_this_update_date = "2004-02-29 16:21:42"
+#crl_next_update_date = "2025-02-29 16:24:41"
+
+# The date that the certificates will be made seen as
+# being revoked.
+#crl_revocation_date = "2025-02-29 16:24:41"
+

+ 28 - 0
ssl/slurm.ch-rootCA.crt

@@ -0,0 +1,28 @@
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

+ 192 - 0
ssl/slurm.ch-rootCA.key

@@ -0,0 +1,192 @@
+Public Key Info:
+	Public Key Algorithm: RSA
+	Key Security Level: High (3072 bits)
+
+modulus:
+	00:db:c5:66:b3:3b:8c:a3:ea:99:9a:01:42:71:1e:81
+	2d:90:26:44:3a:81:5f:64:c0:40:49:a1:ed:d2:e7:c3
+	6b:ff:b1:4b:0b:73:85:60:7f:2f:f0:ed:df:e2:14:97
+	d7:b9:e7:57:62:fc:ca:d9:d4:dc:2e:80:6e:d6:65:cd
+	16:81:31:f9:42:fb:26:b5:02:90:30:35:f4:d9:65:6e
+	82:cc:d8:79:d2:3f:04:bd:22:f1:88:42:b1:3e:57:c3
+	ee:01:eb:17:0c:b9:20:72:65:07:82:95:2d:95:f2:19
+	5b:06:55:66:be:42:1b:22:8e:20:3d:17:bf:db:ec:40
+	96:4c:5f:89:93:04:02:02:86:42:49:53:a1:96:b3:1d
+	4f:aa:9e:e1:02:73:25:5b:19:21:36:3d:23:d6:74:2b
+	2f:d8:a5:28:93:fc:2e:a0:11:99:b0:bd:4b:50:08:c9
+	34:2d:23:88:af:67:59:01:2d:6b:c2:14:3f:09:a0:5a
+	a5:57:c0:9f:84:88:56:ca:52:6f:9e:1c:4a:a0:cc:5d
+	52:dc:69:35:83:22:d5:26:34:b7:0b:25:fb:d1:1e:51
+	b1:4e:0e:ad:9f:8b:cb:34:33:a5:7c:a2:c6:22:f1:3b
+	87:56:0a:1c:6d:f4:d3:9d:cc:c7:a0:8c:d8:f6:a2:7d
+	87:21:5a:d5:57:f1:18:b7:be:5e:50:bc:bc:c5:0e:a4
+	22:07:c3:24:0e:01:90:17:c2:72:69:5c:9a:ff:a2:39
+	09:dd:d9:9d:ab:c9:ad:4f:be:60:c5:f4:da:23:02:ee
+	9a:d7:49:bf:58:68:ba:75:ff:b0:ca:64:27:a9:26:28
+	2c:52:1e:e9:ed:83:64:44:f5:3e:78:c3:77:fa:af:92
+	81:15:71:12:82:8b:61:63:e2:d3:66:ec:d5:19:9a:91
+	a8:bd:e7:6e:0a:5b:e7:30:23:f6:9a:1f:b5:70:24:55
+	4c:ae:37:cd:33:6e:28:62:71:9a:09:21:10:bc:9d:7a
+	e5:
+
+public exponent:
+	01:00:01:
+
+private exponent:
+	1a:0a:00:8a:19:f3:26:f4:c3:f0:48:57:eb:f9:36:4b
+	04:ba:53:f9:2e:9c:f3:de:07:7f:f1:ec:b0:c1:7f:19
+	0b:b9:a0:ef:a1:67:5b:30:96:a8:90:36:a7:9d:d3:03
+	df:65:f6:a7:a6:d6:0e:0b:37:6f:57:0e:4a:de:d2:f6
+	e8:a5:d8:27:c4:84:28:8c:3e:33:48:21:53:a4:bd:fc
+	47:73:1a:b3:fb:7d:7f:3f:65:a8:c4:66:25:c1:d6:58
+	1b:e8:13:da:11:11:34:1c:9e:50:2d:86:b2:2e:76:2c
+	9f:ca:7c:9a:ec:50:34:be:ec:38:f0:d8:6d:a1:47:61
+	c7:78:c6:5f:21:e9:6f:0d:23:4b:76:da:3d:75:c9:72
+	47:ff:fd:1f:02:2f:99:e4:97:57:ca:d4:b5:33:1c:6e
+	d5:d7:73:c0:5c:ef:d5:4d:60:8d:5d:50:50:12:4a:6c
+	a1:30:85:a0:6a:b9:53:f7:62:be:23:11:f8:fd:03:e0
+	3d:16:80:22:db:b8:06:85:8d:07:42:2b:4a:20:36:38
+	80:3e:d9:71:65:00:8b:e6:87:bb:6f:c3:3a:de:49:df
+	8e:b4:7f:a0:0a:7f:18:7b:4a:61:6a:82:c8:cc:53:2e
+	0d:99:22:a5:dd:ff:ea:eb:c9:ea:53:b3:10:cd:a1:d3
+	ff:03:32:34:6a:5b:5d:f4:2c:b7:70:98:ca:f3:32:a7
+	62:35:eb:ca:f8:5d:be:54:1a:52:72:63:4f:b2:b4:e1
+	1c:3a:a8:5c:88:61:8e:09:90:83:b0:d6:04:18:a9:77
+	92:f6:01:0c:db:36:db:2f:a8:ad:3d:28:c2:53:4f:86
+	22:e8:04:e5:50:39:04:0d:b9:db:a8:84:51:dd:5d:3f
+	5a:f0:3d:4f:15:1e:05:60:21:7b:66:b3:0e:ed:80:cf
+	a5:fb:3e:35:f6:39:22:b9:c3:4c:34:0c:30:17:38:30
+	db:c8:c3:be:eb:10:a6:bc:58:d0:6f:f3:a7:66:1f:dd
+	
+
+prime1:
+	00:f1:e4:5d:2c:ce:8f:cb:9c:97:a8:9a:d9:dd:7a:23
+	cd:8d:4d:ce:56:9c:f6:96:cf:e5:41:26:ff:7d:30:4d
+	fa:ea:b7:e1:d1:b0:14:39:1c:27:de:e4:5d:e5:b5:f7
+	32:60:a2:41:a0:ac:25:43:ee:c0:72:ed:a7:79:c9:6a
+	44:77:d9:00:7f:53:db:86:00:3c:a2:42:79:c8:36:0f
+	ed:74:04:ec:bc:f7:0d:f9:1f:ba:61:1f:27:9a:e6:fc
+	9b:a6:03:13:b1:75:48:fe:14:6c:1f:68:3e:bf:23:6e
+	f9:db:ea:0a:80:fc:17:a1:1b:2f:2a:3d:d3:a3:58:c3
+	fc:40:d1:26:c7:e5:96:27:15:8c:a4:a4:04:90:57:c5
+	ca:b4:50:77:31:7f:dc:a6:98:eb:17:1d:ea:bf:9c:c9
+	f1:1b:4c:94:f9:88:d0:8d:79:d1:e6:4b:e4:bb:78:c2
+	99:d3:62:d7:e7:9b:31:b0:4a:ce:e7:00:8a:fc:04:32
+	17:
+
+prime2:
+	00:e8:96:c1:18:33:45:17:62:7b:31:2c:08:bc:e0:35
+	57:dc:f5:6f:03:2a:73:26:f2:7f:3c:b5:bd:a2:4f:c6
+	43:ab:f7:79:33:4c:54:9a:8c:23:39:f3:ad:76:76:0c
+	e6:42:04:a4:ff:4f:04:a1:d0:6a:de:f8:c9:e2:5e:25
+	e6:5b:11:a1:f4:a6:df:7c:dc:24:cb:15:78:2e:44:1a
+	23:13:49:b4:99:aa:50:d7:87:1a:53:73:5c:b5:56:b2
+	3b:9b:a4:24:ca:99:8e:89:ac:60:8c:43:07:f5:1c:13
+	73:9a:6d:74:31:e9:fd:d8:23:b6:1d:5e:8a:1b:a0:08
+	20:07:de:a1:d6:7c:fd:9d:78:5f:db:3b:4f:55:d8:d5
+	9f:86:b1:19:69:08:2f:6f:0c:b0:93:d9:62:5e:74:de
+	ec:0f:d5:3a:8b:f2:89:7f:c9:8f:c0:8a:b6:18:7c:38
+	97:e3:2f:70:69:2c:17:70:ad:1f:2d:4f:a1:a1:d0:44
+	63:
+
+coefficient:
+	47:2e:aa:3a:f4:90:4f:38:31:1e:3c:eb:80:8e:e8:f2
+	d7:32:23:9c:41:b3:e6:8a:09:8d:39:a8:dd:bd:63:61
+	80:02:14:5a:89:f2:6d:20:4e:0e:c7:16:1c:a5:f8:d9
+	1c:8f:a0:ea:1a:3b:e0:6f:17:e3:7e:f5:df:d7:f8:c8
+	7a:aa:cc:86:d8:45:f6:b9:4c:10:73:d7:17:85:45:af
+	6c:27:82:86:9a:d7:b8:98:78:6a:8e:e1:92:a7:62:ed
+	ba:6e:06:b7:15:33:0b:52:6d:a1:2a:89:da:5b:93:87
+	da:b1:3b:4e:6c:4a:d9:ee:10:9f:0e:45:8a:35:e3:8e
+	0f:2a:f3:14:f2:57:6e:ba:e9:79:76:1b:6b:c9:9c:bf
+	99:8f:c8:60:dd:83:29:64:cc:d4:f5:7d:b7:41:70:dc
+	aa:1d:38:d3:a2:a2:d5:0d:d7:a4:a6:de:cb:58:09:14
+	a1:b6:e6:16:fe:74:f7:6d:9f:f5:d0:f0:6f:e1:bb:36
+	
+
+exp1:
+	00:89:ab:e3:ac:00:d4:ae:9a:2d:66:f4:db:52:c6:95
+	62:04:2e:68:65:bb:68:4d:65:7d:a1:9b:44:86:47:db
+	da:17:85:18:ad:73:7d:cf:13:4b:4d:fc:c3:c4:5d:d0
+	97:87:90:51:b1:d4:c8:50:e5:ad:fa:bb:70:3a:4c:7c
+	83:03:83:2a:59:4d:ac:ff:93:5a:ef:2e:ce:89:38:db
+	cf:d5:dc:87:b0:f5:1b:aa:d2:78:0d:96:e1:bf:b3:ff
+	c9:c6:ae:b1:a2:aa:92:24:aa:12:ef:bd:31:19:30:5d
+	95:2f:a9:00:d9:70:a1:32:3c:7a:97:9c:20:bc:33:65
+	38:48:db:c1:2a:bc:6c:bd:49:f2:86:32:23:b6:d3:7d
+	eb:64:bc:f7:59:e0:e0:00:a1:c0:0b:a4:27:5b:6f:2d
+	30:60:cd:31:6c:e4:85:6e:40:0b:4a:fb:9e:ef:64:47
+	bd:ad:25:f0:a4:0d:1c:36:ae:1d:1c:34:9e:e5:d8:ad
+	79:
+
+exp2:
+	00:d9:e7:3a:fa:88:36:07:a5:8d:12:d1:55:52:56:9f
+	c3:34:50:80:73:af:d6:78:3b:a2:36:e7:71:c5:5a:05
+	be:aa:a2:cc:5a:e1:fd:35:59:6b:3b:44:ef:53:57:5f
+	d8:6d:2b:5a:c5:92:6b:1d:8a:5c:45:8f:41:dc:a1:25
+	d2:bd:a9:34:59:37:e9:93:59:cf:e2:af:b7:8b:68:e4
+	2f:ce:47:34:3a:ee:d4:94:47:8f:c3:75:05:fb:22:41
+	13:15:4a:df:e9:2b:99:dd:a3:b0:44:58:1c:61:67:af
+	55:93:ed:4d:79:e1:e5:9f:14:3d:ef:1f:fe:35:c9:65
+	33:55:0c:20:05:09:ce:b5:33:ec:62:41:1b:9f:aa:e8
+	e0:6e:d9:06:9c:5f:3d:c9:45:53:3d:00:e1:66:eb:09
+	5a:91:ae:cc:0e:06:e9:08:de:76:9e:05:96:7a:34:0e
+	f5:45:b3:d1:15:c7:68:22:79:1f:07:5d:5e:69:71:ec
+	4f:
+
+
+Public Key ID:
+	sha256:FC:45:0A:2D:46:F8:AC:2C:C9:A7:B9:03:E8:2B:38:25:85:B5:46:28:7C:16:49:0B:DE:D3:65:70:96:B8:8A:96
+	sha1:FA:37:98:62:7D:AF:F8:FE:C7:FE:C2:14:63:3A:53:FB:27:76:A5:AA
+Public key's random art:
++--[ RSA 3072]----+
+|                 |
+|                 |
+|                 |
+|              =  |
+|        S    + + |
+|       .    + o .|
+|      .. o   * o.|
+|      o.+.+   O +|
+|     . .o=E*+=.=o|
++-----------------+
+
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----

+ 13 - 0
ssl/tls.ldif

@@ -0,0 +1,13 @@
+dn: cn=config
+changetype: modify
+add: olcTLSCipherSuite
+olcTLSCipherSuite: HIGH
+-
+add: olcTLSCertificateFile
+olcTLSCertificateFile: /etc/openldap/ssl/ldap.slurm.ch.crt
+-
+add: olcTLSCertificateKeyFile
+olcTLSCertificateKeyFile: /etc/openldap/ssl/ldap.slurm.ch.key
+-
+add: olcTLSCACertificateFile
+olcTLSCACertificateFile: /etc/openldap/ssl/slurm.ch-rootCA.crt

+ 249 - 0
start.sh

@@ -0,0 +1,249 @@
+#!/bin/sh -e
+
+function error() {
+    echo "ERROR: $*" 1>&2
+    exit
+}
+
+# variables
+DATE=$(date '+%Y%m%d%H%m')
+if test -z "${DOMAIN}"; then
+    error "Specifying a domain is mandatory, use -e DOMAIN=example.org"
+fi
+if test -z "${ORGANIZATION}"; then
+    error "Specifying an organization is mandatory, use -e ORGANIZATION=\"Example Organization\""
+fi
+if test -z "${PASSWORD}"; then
+    if test -e /etc/ldap/password; then
+        export PASSWORD="$(cat /etc/ldap/password)"
+    else
+        export PASSWORD=$(pwgen 20 1)
+	echo "password: $PASSWORD"
+        echo "$PASSWORD" > /etc/ldap/password
+	chmod go= /etc/ldap/password
+    fi
+fi
+export BASEDN="dc=${DOMAIN//./,dc=}"
+export PASSWD="$(slappasswd -h {SSHA} -s ${PASSWORD})"
+
+# configure
+cat > /tmp/update-config.sed <<EOF
+/^\s*suffix\b/csuffix\t\t"${BASEDN}"
+/^\s*rootdn\b/crootdn\t\t"cn=admin,${BASEDN}"
+/^\s*rootpw\b/crootpw\t\t${PASSWD}
+/^\s*directory\b/cdirectory /var/lib/ldap
+s/^\s*access/# &/
+s/# \?\(\s*\(access to \*\|by self write\|by users read\|by anonymous auth\)\)/\1/
+EOF
+sed -f /tmp/update-config.sed /etc/openldap/slapd.conf > /etc/ldap/slapd.conf
+if test "$MEMBEROF" -eq 1; then
+    cat >> /etc/ldap/slapd.conf <<EOF
+moduleload refint
+overlay refint
+refint_attributes member
+refint_nothing "cn=admin,${BASEDN}"
+moduleload memberof
+overlay memberof
+memberof-group-oc groupOfNames
+memberof-member-ad member
+memberof-memberof-ad memberOf
+memberof-refint true
+EOF
+fi
+rm /tmp/update-config.sed
+for schema in $SCHEMAS; do
+    echo "include /etc/openldap/schema/${schema}.schema" >> /etc/ldap/slapd.conf
+done
+if test -e /ssl/live/${DOMAIN}/chain.pem \
+        -a -e /ssl/live/${DOMAIN}/privkey.pem \
+        -a -e /ssl/live/${DOMAIN}/cert.pem; then
+    cat >> /etc/ldap/slapd.conf <<EOF
+TLSCipherSuite HIGH:MEDIUM:-SSLv2:-SSLv3
+TLSCertificateFile /ssl/live/${DOMAIN}/cert.pem
+TLSCertificateKeyFile /ssl/live/${DOMAIN}/privkey.pem
+TLSCACertificateFile /ssl/live/${DOMAIN}/chain.pem
+# apk add ca-certificates +:
+#TLSCACertificatePath /usr/share/ca-certificates/mozilla
+EOF
+    SSL_HOSTS=" ldaps:/// ldapi:///"
+else
+    SSL_HOSTS=""
+fi
+
+# backup status quo
+if test -n "$(ls -A /var/lib/ldap)"; then
+    slapcat -f /etc/ldap/slapd.conf > /var/backups/${DATE}-startup-data.ldif
+fi
+
+# restore if required
+if test -e /var/restore/*data.ldif; then
+    rm -r /var/lib/ldap/* || true
+    slapadd -f /etc/ldap/slapd.conf -l /var/restore/*data.ldif 2> /dev/null
+    mv /var/restore/*data.ldif /var/backups/${DATE}-restored-data.ldif
+fi
+
+# run
+chown -R ${USER}.${GROUP} /var/lib/ldap /etc/ldap
+chmod 700 /var/lib/ldap
+/usr/sbin/slapd -u $USER -g $GROUP -d ${DEBUG} -h "ldap:///${SSL_HOSTS}" -f /etc/ldap/slapd.conf
+
+function multimaster() {
+    if test -z "$MULTI_MASTER_REPLICATION"; then
+        return
+    fi
+    if test -z "$SERVER_NAME" || ! [[ " ${MULTI_MASTER_REPLICATION} " =~ " ${SERVER_NAME} " ]];  then
+        error "SERVER_NAME must be one of ${MULTI_MASTER_REPLICATION} in MULTI_MASTER_REPLICATION"
+    fi
+    log "  --> multimaster ... "
+    # load module
+    log "module "
+    ldapadd -c -Y external -H ldapi:/// > /dev/null 2> /dev/null <<EOF
+dn: cn=module,cn=config
+objectClass: olcModuleList
+cn: module
+olcModulePath: /usr/lib/ldap
+olcModuleLoad: syncprov.la
+EOF
+    # config replication
+    local masters=( ${MULTI_MASTER_REPLICATION} )
+    local serverid=
+    for ((i=0; i<${#masters[@]}; ++i)); do
+        if test "${masters[$i]}" == "${SERVER_NAME}"; then
+            serverid=$((i+1))
+            break;
+        fi
+    done
+    test -n "$serverid"
+    log "config for ${SERVER_NAME} as $serverid "
+    log "first "
+    ldapmodify -Y EXTERNAL -H ldapi:/// <<EOF
+dn: cn=config
+changetype: modify
+add: olcServerID
+olcServerID: ${serverid}
+EOF
+    log "second "
+    ldapmodify -Y EXTERNAL -H ldapi:/// <<EOF
+dn: cn=config
+changetype: modify
+replace: olcServerID
+$(
+    for ((i=0; i<${#masters[@]}; ++i)); do
+      echo "olcServerID: $((i+1)) ldap://${masters[$i]}"
+    done
+)
+
+dn: olcOverlay=syncprov,olcDatabase={0}config,cn=config
+changetype: add
+objectClass: olcOverlayConfig
+objectClass: olcSyncProvConfig
+
+dn: olcDatabase={0}config,cn=config
+changetype: modify
+add: olcSyncRepl
+$(
+    for ((i=0; i<${#masters[@]}; ++i)); do
+      printf 'olcSyncRepl: rid=%03d provider=ldap://%s binddn="cn=config"\n' $((i+1)) ${masters[$i]};
+      echo '  bindmethod=simple credentials=x searchbase="cn=config"'
+      echo '  type=refreshAndPersist retry="5 5 300 5" timeout=1'
+    done
+)
+-
+add: olcMirrorMode
+olcMirrorMode: TRUE
+
+EOF
+    # database replication
+    log "data "
+    log "first "
+    ldapmodify -Y EXTERNAL -H ldapi:/// <<EOF
+dn: olcOverlay=syncprov,olcDatabase={1}hdb,cn=config
+changetype: add
+objectClass: olcOverlayConfig
+objectClass: olcSyncProvConfig
+olcOverlay: syncprov
+EOF
+    log "second "
+    ldapmodify -Y EXTERNAL  -H ldapi:/// <<EOF
+dn: olcDatabase={1}hdb,cn=config
+changetype: modify
+replace: olcSuffix
+olcSuffix: dc=itzgeek,dc=local
+-
+replace: olcRootDN
+olcRootDN: cn=ldapadm,dc=itzgeek,dc=local
+-
+replace: olcRootPW
+olcRootPW: {SSHA}xtbbtC/1pJclCPzo1n3Szac9jqavSphk
+-
+add: olcSyncRepl
+$(
+    for ((i=0; i<${#masters[@]}; ++i)); do
+      printf 'olcSyncRepl: rid=%03d provider=ldap://%s binddn="cn=admin,${BASEDN}"\n' $((i+1)) ${masters[$i]};
+      echo '  credentials=x searchbase="${BASEDN}" type=refreshOnly'
+      echo '  interval=00:00:00:10 retry="5 5 300 5" timeout=1'
+    done
+)
+-
+add: olcDbIndex
+olcDbIndex: entryUUID  eq
+-
+add: olcDbIndex
+olcDbIndex: entryCSN  eq
+-
+add: olcMirrorMode
+olcMirrorMode: TRUE
+EOF
+    log "access "
+    ldapmodify -Y EXTERNAL -H ldapi:/// <<EOF
+dn: olcDatabase={1}monitor,cn=config
+changetype: modify
+replace: olcAccess
+olcAccess: {0}to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external, cn=auth" read by dn.base="cn=admin,${BASEDN}" read by * none
+EOF
+    logdone
+}
+
+function memberof() {
+    log "  --> memberof ... "
+    if ! ldapsearch -Q -LLL -Y EXTERNAL -H ldapi:/// -b olcOverlay={0}memberof,olcDatabase={1}hdb,cn=config 2> /dev/null > /dev/null; then
+        log "module "
+        ldapadd -c -Y external -H ldapi:/// > /dev/null 2> /dev/null <<EOF
+dn: cn=module,cn=config
+cn: module
+objectClass: olcModuleList
+olcModuleLoad: memberof
+olcModulePath: /usr/lib/ldap
+
+dn: olcOverlay={0}memberof,olcDatabase={1}hdb,cn=config
+objectClass: olcConfig
+objectClass: olcMemberOf
+objectClass: olcOverlayConfig
+objectClass: top
+olcOverlay: memberof
+olcMemberOfDangling: ignore
+olcMemberOfRefInt: TRUE
+olcMemberOfGroupOC: groupOfNames
+olcMemberOfMemberAD: member
+olcMemberOfMemberOfAD: memberOf
+EOF
+        log "refint "
+        ldapmodify -Y EXTERNAL -H ldapi:/// <<EOF
+dn: cn=module{1},cn=config
+add: olcmoduleload
+olcmoduleload: refint
+EOF
+        ldapadd -c -Y external -H ldapi:/// > /dev/null 2> /dev/null <<EOF
+dn: olcOverlay={1}refint,olcDatabase={1}hdb,cn=config
+objectClass: olcConfig
+objectClass: olcOverlayConfig
+objectClass: olcRefintConfig
+objectClass: top
+olcOverlay: {1}refint
+olcRefintAttribute: memberof member manager owner
+EOF
+        logdone
+    else
+        logdone "already configured"
+    fi
+}