2014-05-07 94 views
0

我剛剛安裝OpenLDAP和我試圖導入LDIF文件到我的LDAP服務器,但我得到這個消息的錯誤:導入LDIF文件導入OpenLDAP服務器

5369fd49 hdb_db_open: database "dc=04": database already in use. 
5369fd49 backend_startup_one (type=hdb, suffix="dc=04"): bi_db_open failed! (-1) 
slap_startup failed 

這是我的ldif文件:

dn:dc=tpw,dc=uca,dc=ma 
dc: uca 
objectClass: dcObject 
objectClass: top 
objectClass: domain 
structuralObjectClass: domain 
entryUUID: 1857816a-1f80-1032-852e-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312164613Z 
entryCSN: 20130312164613.519557Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312164613Z 

dn: ou=people,dc=tpw,dc=uca,dc=ma 
ou: people 
objectClass: organizationalUnit 
objectClass: top 
structuralObjectClass: organizationalUnit 
entryUUID: 2d4d29b2-1f80-1032-852f-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312164648Z 
entryCSN: 20130312164648.683888Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312164648Z 

dn: ou=groupes,dc=tpw,dc=uca,dc=ma 
ou: groupes 
objectClass: organizationalUnit 
objectClass: top 
structuralObjectClass: organizationalUnit 
entryUUID: 42a4d12a-1f80-1032-8530-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312164724Z 
entryCSN: 20130312164724.490529Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312164724Z 

dn: uid=admin,ou=people,dc=tpw,dc=uca,dc=ma 
uid: admin 
sn: Admin 
cn: Admin 
objectClass: inetOrgPerson 
objectClass: organizationalPerson 
objectClass: person 
objectClass: top 
structuralObjectClass: inetOrgPerson 
entryUUID: 6b1ddf48-1f80-1032-8531-4da7bdf172d2 
creatorsName: cn=Manager,dc=uca,dc=ma 
createTimestamp: 20130312164832Z 
userPassword:: e1NIQX0wRFBpS3VOSXJyVm1EOElVQ3V3MWhReE5xWmM9 
mail: [email protected] 
givenName: admin 
entryCSN: 20130312165133.498240Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312165133Z 

dn: cn=GI,ou=groupes,dc=tpw,dc=uca,dc=ma 
uniquemember: uid=admin,ou=people,dc=tpw,dc=uca,dc=ma 
cn: GI 
objectClass: groupOfUniqueNames 
objectClass: top 
structuralObjectClass: groupOfUniqueNames 
entryUUID: a165e4ec-1f80-1032-8532-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312165003Z 
entryCSN: 20130312165003.461713Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312165003Z 

dn: cn=GP,ou=groupes,dc=tpw,dc=uca,dc=ma 
uniquemember: uid=admin,ou=people,dc=tpw,dc=uca,dc=ma 
cn: GP 
objectClass: groupOfUniqueNames 
objectClass: top 
structuralObjectClass: groupOfNames 
entryUUID: aaf44eb8-1f80-1032-8534-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312165019Z 
entryCSN: 20130312165019.494529Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312165019Z 

dn: cn=GT,ou=groupes,dc=tpw,dc=uca,dc=ma 
uniquemember: uid=admin,ou=people,dc=tpw,dc=uca,dc=ma 
cn: GT 
objectClass: groupOfUniqueNames 
objectClass: top 
structuralObjectClass: groupOfNames 
entryUUID: b09d6660-1f80-1032-8536-4da7bdf172d2 
creatorsName: cn=Manager,dc=tpw,dc=uca,dc=ma 
createTimestamp: 20130312165028Z 
entryCSN: 20130312165028.991299Z#000000#000#000000 
modifiersName: cn=Manager,dc=tpw,dc=uca,dc=ma 
modifyTimestamp: 20130312165028Z 

這是我slapd.conf文件:

# Allow LDAPv2 binds 
allow bind_v2 

# Allow LDAPv2 binds 
# allow bind_v2 

# This is the main slapd configuration file. See slapd.conf(5) for more 
# info on the configuration options. 

####################################################################### 
# Global Directives: 

# Features to permit 
#allow bind_v2 


modulepath  /usr/lib/ldap 
moduleload back_hdb 
#moduleload refint 
#moduleload rwm 

# Schema and objectClass definitions 
include   /etc/ldap/schema/core.schema 
include   /etc/ldap/schema/cosine.schema 
include   /etc/ldap/schema/nis.schema 
include   /etc/ldap/schema/inetorgperson.schema 
include /etc/ldap/schema/openldap.schema 



# Schema check allows for forcing entries to 
# match schemas for their objectClasses's 
#schemacheck  off 

# Where the pid file is put. The init.d script 
# will not stop the server if you change this. 
pidfile   /var/run/slapd/slapd.pid 

# List of arguments that were passed to the server 
argsfile  /var/run/slapd/slapd.args 

# Read slapd.conf(5) for possible values 
#loglevel  65389 


####################################################################### 
# Specific Backend Directives for bdb: 
# Backend specific directives apply to this backend until another 
# 'backend' directive occurs 
backend  hdb 

####################################################################### 
# Specific Backend Directives for 'other': 
# Backend specific directives apply to this backend until another 
# 'backend' directive occurs 
#backend  <other> 

####################################################################### 
# Specific Directives for database #1, of type bdb: 
# Database specific directives apply to this databasse until another 
# 'database' directive occurs 
database  hdb 

# The base of your directory in database #1 
suffix   "dc=tpw,dc=uca,dc=ma" 
checkpoint 512 30 
rootdn  "cn=Manager,dc=tpw,dc=uca,dc=ma" 
rootpw  "admin" 



# Where the database file are physically stored for database #1 
directory  "/var/lib/ldap" 

# Indexing options for database #1 
index   objectClass eq 
index  cn eq 
index  ou eq 

# Save the time that the entry gets modified, for database #1 
lastmod   on 

# Where to store the replica logs for database #1 
# replogfile /var/lib/ldap/replog 

# The userPassword by default can be changed 
# by the entry owning it if they are authenticated. 
# Others should not be able to see it, except the 
# admin entry below 
# These access lines apply to database #1 only 
access to attrs=userPassword 
     by dn="cn=Manager,dc=tpw,dc=uca,dc=ma" write 
     by anonymous auth 
     by self write 
     by * none 

# Ensure read access to the base for things like 
# supportedSASLMechanisms. Without this you may 
# have problems with SASL not knowing what 
# mechanisms are available and the like. 
# Note that this is covered by the 'access to *' 
# ACL below too but if you change that as people 
# are wont to do you'll still need this if you 
# want SASL (and possible other things) to work 
# happily. 
access to dn.base="" by * read 

# The admin dn has full write access, everyone else 
# can read everything. 
access to * 
     by dn="cn=Manager,dc=tpw,dc=uca,dc=ma" write 
     by * read 

# For Netscape Roaming support, each user gets a roaming 
# profile for which they have write access to 
#access to dn=".*,ou=Roaming,o=morsnet" 
#  by dn="cn=Manager,dc=localdomain" write 
#  by dnattr=owner write 

我怎樣才能解決這個問題?

回答

0

看起來您正在嘗試使用slapadd導入LDIF時運行LDAP服務。關閉LDAP,再試一次。