#1601 Possible LDAP connection leak
Closed: migrated 3 years ago by dmoluguw. Opened 8 years ago by edewata.

This issue was originally raised by aleksy.chudov@gmail.com:

Accessing /ca/rest/securityDomain/domainInfo seems to cause LDAP connection leak (see https://www.redhat.com/archives/pki-users/2015-August/msg00009.html).

Steps to reproduce:
1. Install CA
2. Check the number of established LDAP connections with this command:

$ ss -ant state established sport = :389 | wc -l
  1. Open the above URL with this command:
$ curl http://localhost:8080/ca/rest/securityDomain/domainInfo
  1. Repeat #2 and #3.

Actual result: The number of connections keeps increasing.

Expected result: The number of connections should have an upper bound.

Note: Other URLs do not cause the number of connections to increase.


Per CS/DS Meeting of 09/14/2015 - 10.3

Metadata Update from @edewata:
- Issue set to the milestone: UNTRIAGED

7 years ago

Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new
issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.

This issue has been cloned to GitHub and is available here:
https://github.com/dogtagpki/pki/issues/2160

If you want to receive further updates on the issue, please navigate to the
GitHub issue and click on Subscribe button.

Thank you for understanding, and we apologize for any inconvenience.

Metadata Update from @dmoluguw:
- Issue close_status updated to: migrated
- Issue status updated to: Closed (was: Open)

3 years ago

Login to comment on this ticket.

Metadata