report.html

Report generated on 25-Jul-2019 at 00:46:41 by pytest-html v1.21.1

Environment

Packages {'pytest': '3.9.3', 'py': '1.7.0', 'pluggy': '0.8.1'}
Platform Linux-5.1.15-300.fc30.x86_64-x86_64-with-fedora-30-Thirty
Plugins {'metadata': '1.8.0', 'html': '1.21.1', 'sourceorder': '0.5', 'multihost': '3.0'}
Python 3.7.3

Summary

1 tests ran in 1688.83 seconds.

1 passed, 0 skipped, 0 failed, 0 errors, 0 expected failures, 0 unexpected passes

Results

Result Test Duration Links
Passed test_integration/test_backup_and_restore.py::TestBackupReinstallRestoreWithKRA::()::test_full_backup_reinstall_restore_with_vault 851.31
---------------------------- Captured stdout setup -----------------------------
<ipatests.pytest_ipa.integration.config.Config object at 0x7f3c468540b8> ------------------------------ Captured log setup ------------------------------
__init__.py 267 INFO Preparing host master.ipa.test transport.py 1760 INFO Connected (version 2.0, client OpenSSH_8.0) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1760 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 158 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:323 0.0.0.0:* users:(("chronyd",pid=535,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:935 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:48183 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=9)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:5355 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=12)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=17)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:68 0.0.0.0:* users:(("dhclient",pid=1606,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2030,fd=5),("systemd",pid=1,fd=96)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:34950 0.0.0.0:* transport.py 558 DEBUG udp UNCONN 0 0 [::1]:323 [::]:* users:(("chronyd",pid=535,fd=6)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:35721 [::]:* users:(("rpc.statd",pid=2031,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:5355 [::]:* users:(("systemd-resolve",pid=589,fd=14)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:46651 [::]:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:111 [::]:* users:(("rpcbind",pid=2030,fd=7),("systemd",pid=1,fd=98)) transport.py 558 DEBUG tcp LISTEN 0 64 0.0.0.0:46791 0.0.0.0:* transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:5355 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=13)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2030,fd=4),("systemd",pid=1,fd=95)) transport.py 558 DEBUG tcp LISTEN 0 128 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=18)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=570,fd=3)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:38265 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=10)) transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.17:966 192.168.121.1:2049 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.17:22 192.168.121.18:51704 users:(("sshd",pid=16353,fd=5),("sshd",pid=16351,fd=5)) transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.17:22 192.168.121.1:34708 users:(("sshd",pid=15772,fd=5),("sshd",pid=15770,fd=5)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:5355 [::]:* users:(("systemd-resolve",pid=589,fd=15)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:38767 [::]:* users:(("rpc.statd",pid=2031,fd=12)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:111 [::]:* users:(("rpcbind",pid=2030,fd=6),("systemd",pid=1,fd=97)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=570,fd=4)) transport.py 558 DEBUG tcp LISTEN 0 64 [::]:43005 [::]:* transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 558 DEBUG Removed /etc/systemd/system/firewalld.service. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse', '--setup-kra'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse', '--setup-kra'] transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG Checking DNS domain ipa.test., please wait ... transport.py 558 DEBUG Checking DNS domain 121.168.192.in-addr.arpa., please wait ... transport.py 558 DEBUG Reverse zone 121.168.192.in-addr.arpa. will be created transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure KRA (dogtag) for secret management transport.py 558 DEBUG * Configure DNS (bind) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG Warning: skipping DNS resolution of host master.ipa.test transport.py 558 DEBUG Checking DNS forwarders, please wait ... transport.py 558 DEBUG Using reverse zone(s) 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.17 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG Starting installation... transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG BIND DNS server will be configured to serve IPA domain with: transport.py 558 DEBUG Forwarders: 192.168.121.1 transport.py 558 DEBUG Forward policy: only transport.py 558 DEBUG Reverse zone(s): 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG Disabled p11-kit-proxy transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket transport.py 558 DEBUG [2/44]: configure autobind for root transport.py 558 DEBUG [3/44]: stopping directory server transport.py 558 DEBUG [4/44]: updating configuration in dse.ldif transport.py 558 DEBUG [5/44]: starting directory server transport.py 558 DEBUG [6/44]: adding default schema transport.py 558 DEBUG [7/44]: enabling memberof plugin transport.py 558 DEBUG [8/44]: enabling winsync plugin transport.py 558 DEBUG [9/44]: configure password logging transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache and keytab transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/29]: configuring certificate server instance transport.py 558 DEBUG [2/29]: Add ipa-pki-wait-running transport.py 558 DEBUG [3/29]: reindex attributes transport.py 558 DEBUG [4/29]: exporting Dogtag certificate store pin transport.py 558 DEBUG [5/29]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [6/29]: backing up CS.cfg transport.py 558 DEBUG [7/29]: disabling nonces transport.py 558 DEBUG [8/29]: set up CRL publishing transport.py 558 DEBUG [9/29]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [10/29]: starting certificate server instance transport.py 558 DEBUG [11/29]: configure certmonger for renewals transport.py 558 DEBUG [12/29]: requesting RA certificate from CA transport.py 558 DEBUG [13/29]: setting audit signing renewal to 2 years transport.py 558 DEBUG [14/29]: restarting certificate server transport.py 558 DEBUG [15/29]: publishing the CA certificate transport.py 558 DEBUG [16/29]: adding RA agent as a trusted user transport.py 558 DEBUG [17/29]: authorizing RA to modify profiles transport.py 558 DEBUG [18/29]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [19/29]: Ensure lightweight CAs container exists transport.py 558 DEBUG [20/29]: configure certificate renewals transport.py 558 DEBUG [21/29]: Configure HTTP to proxy connections transport.py 558 DEBUG [22/29]: restarting certificate server transport.py 558 DEBUG [23/29]: updating IPA configuration transport.py 558 DEBUG [24/29]: enabling CA instance transport.py 558 DEBUG [25/29]: migrating certificate profiles to LDAP transport.py 558 DEBUG [26/29]: importing IPA certificate profiles transport.py 558 DEBUG [27/29]: adding default CA ACL transport.py 558 DEBUG [28/29]: adding 'ipa' CA entry transport.py 558 DEBUG [29/29]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: adding CA certificate entry transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG Configuring KRA server (pki-tomcatd). Estimated time: 2 minutes transport.py 558 DEBUG [1/10]: configuring KRA instance transport.py 558 DEBUG [2/10]: create KRA agent transport.py 558 DEBUG [3/10]: enabling ephemeral requests transport.py 558 DEBUG [4/10]: restarting KRA transport.py 558 DEBUG [5/10]: configure certmonger for renewals transport.py 558 DEBUG [6/10]: configure certificate renewals transport.py 558 DEBUG [7/10]: configure HTTP to proxy connections transport.py 558 DEBUG [8/10]: add vault container transport.py 558 DEBUG [9/10]: apply LDAP updates transport.py 558 DEBUG [10/10]: enabling KRA instance transport.py 558 DEBUG Done configuring KRA server (pki-tomcatd). transport.py 558 DEBUG Restarting the directory server transport.py 558 DEBUG Configuring DNS (named) transport.py 558 DEBUG [1/12]: generating rndc key file transport.py 558 DEBUG [2/12]: adding DNS container transport.py 558 DEBUG [3/12]: setting up our zone transport.py 558 DEBUG [4/12]: setting up reverse zone transport.py 558 DEBUG [5/12]: setting up our own record transport.py 558 DEBUG [6/12]: setting up records for other masters transport.py 558 DEBUG [7/12]: adding NS record to the zones transport.py 558 DEBUG [8/12]: setting up kerberos principal transport.py 558 DEBUG [9/12]: setting up named.conf transport.py 558 DEBUG [10/12]: setting up server configuration transport.py 558 DEBUG [11/12]: configuring named to start on boot transport.py 558 DEBUG [12/12]: changing resolv.conf to point to ourselves transport.py 558 DEBUG Done configuring DNS (named). transport.py 558 DEBUG Restarting the web server to pick up resolv.conf changes transport.py 558 DEBUG Configuring DNS key synchronization service (ipa-dnskeysyncd) transport.py 558 DEBUG [1/7]: checking status transport.py 558 DEBUG [2/7]: setting up bind-dyndb-ldap working directory transport.py 558 DEBUG [3/7]: setting up kerberos principal transport.py 558 DEBUG [4/7]: setting up SoftHSM transport.py 558 DEBUG [5/7]: adding DNSSEC containers transport.py 558 DEBUG [6/7]: creating replica keys transport.py 558 DEBUG [7/7]: configuring ipa-dnskeysyncd to start on boot transport.py 558 DEBUG Done configuring DNS key synchronization service (ipa-dnskeysyncd). transport.py 558 DEBUG Restarting ipa-dnskeysyncd transport.py 558 DEBUG Restarting named transport.py 558 DEBUG Updating DNS system records transport.py 558 DEBUG Configuring client side components transport.py 558 DEBUG Using existing certificate '/etc/ipa/ca.crt'. transport.py 558 DEBUG Client hostname: master.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Configured sudoers in /etc/nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG Setup complete transport.py 558 DEBUG transport.py 558 DEBUG Next steps: transport.py 558 DEBUG 1. You must make sure these network ports are open: transport.py 558 DEBUG TCP Ports: transport.py 558 DEBUG * 80, 443: HTTP/HTTPS transport.py 558 DEBUG * 389, 636: LDAP/LDAPS transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG UDP Ports: transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG * 123: ntp transport.py 558 DEBUG transport.py 558 DEBUG 2. You can now obtain a kerberos ticket using the command: 'kinit admin' transport.py 558 DEBUG This ticket will allow you to use the IPA tools (e.g., ipa user-add) transport.py 558 DEBUG and the web user interface. transport.py 558 DEBUG transport.py 558 DEBUG Be sure to back up the CA certificates stored in /root/cacert.p12 transport.py 558 DEBUG These files are required to create replicas. The password for these transport.py 558 DEBUG files is the Directory Manager password transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns', '--permanent'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns', '--permanent'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 tasks.py 300 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 513 DEBUG RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 558 DEBUG ipa: WARNING: Service named-pkcs11.service requires restart on IPA server <all IPA DNS servers> to apply configuration changes. transport.py 558 DEBUG Zone name: ipa.test. transport.py 558 DEBUG Active zone: TRUE transport.py 558 DEBUG Authoritative nameserver: master.ipa.test. transport.py 558 DEBUG Administrator e-mail address: hostmaster.ipa.test. transport.py 558 DEBUG SOA serial: 1564014553 transport.py 558 DEBUG SOA refresh: 3600 transport.py 558 DEBUG SOA retry: 900 transport.py 558 DEBUG SOA expire: 1209600 transport.py 558 DEBUG SOA minimum: 3600 transport.py 558 DEBUG Time to live: 1 transport.py 558 DEBUG Default time to live: 1 transport.py 558 DEBUG Allow query: any; transport.py 558 DEBUG Allow transfer: none; transport.py 217 DEBUG Exit code: 0----------------------------- Captured stdout call -----------------------------
LDAPEntry(ipapython.dn.DN('uid=admin,cn=users,cn=accounts,dc=ipa,dc=test'), {'objectClass': [b'top', b'person', b'posixaccount', b'krbprincipalaux', b'krbticketpolicyaux', b'inetuser', b'ipaobject', b'ipasshuser', b'ipaSshGroupOfPubKeys'], 'uid': [b'admin'], 'krbPrincipalName': [b'admin@IPA.TEST'], 'cn': [b'Administrator'], 'sn': [b'Administrator'], 'uidNumber': [b'323600000'], 'gidNumber': [b'323600000'], 'homeDirectory': [b'/home/admin'], 'loginShell': [b'/bin/bash'], 'gecos': [b'Administrator'], 'ipaUniqueID': [b'db07bfca-ae71-11e9-a1cd-5254003401ab'], 'memberOf': [b'cn=admins,cn=groups,cn=accounts,dc=ipa,dc=test', b'cn=Replication Administrators,cn=privileges,cn=pbac,dc=ipa,dc=test', b'cn=Add Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify DNA Range,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read PassSync Managers Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify PassSync Managers Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read LDBM Database Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Add Configuration Sub-Entries,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read DNA Range,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Host Enrollment,cn=privileges,cn=pbac,dc=ipa,dc=test', b'cn=System: Add krbPrincipalName to a Host,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Enroll a Host,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Certificates,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Enrollment Password,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Keytab,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Principals,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=trust admins,cn=groups,cn=accounts,dc=ipa,dc=test'], 'krbPrincipalKey': [b'0\x81\xde\xa0\x03\x02\x01\x01\xa1\x03\x02\x01\x01\xa2\x03\x02\x01\x01\xa3\x03\x02\x01\x01\xa4\x81\xc70\x81\xc40h\xa0\x1b0\x19\xa0\x03\x02\x01\x04\xa1\x12\x04\x10NS\'<qYY^v{;A75XJ\xa1I0G\xa0\x03\x02\x01\x12\xa1@\x04> \x00\x8e^\xcd+\x87\xa5\x95\xf7GHvJ\x9b\xcb\xb6\\l\x9du_\xb3%\x1c\xcb\xa8[\r\xf5\x89+3:\xa2\xd3e\xc7\xb2zm2"L\xf9%\xfe\x91\xc2\x97X,\xa9OP5\xe2\r\xf6\xf6\xa8\xc80X\xa0\x1b0\x19\xa0\x03\x02\x01\x04\xa1\x12\x04\x10(<pF-wJ3,1A2#^u]\xa1907\xa0\x03\x02\x01\x11\xa10\x04.\x10\x00\xd7,\x03\x8a\x92\xad\x05\\\xae:\xb8\x1e\xefgb\x0b\xda\x98\xf3\xbc\x98\x84\x04\xb9\xb7\x07[$\xc9\x14\xa2\xbb\\\x1e\x93\xee\xe0\xf0\xd7\x08\xd7\n\x95\xad'], 'krbLastPwdChange': [b'20190725002843Z'], 'krbPasswordExpiration': [b'20191023002843Z'], 'userPassword': [b'{PBKDF2_SHA256}AAAIAAlL5fLseXxsnBHZNu6CiiqLovlf+ntV3ITWEseUy5bM7Dc90eQXsiTav0JLlYKkDf0oQqtabL/jh38wdQ5nmo0+K/zv70Gjo7U/lY6c8+ZPXBPDkIVMsMKoDjyzFAecUTk0GSyyLXwKf53KK3Z0zPU9/nXSUjFuQLJO46IAxSfnz8bdaczr30DTZvQwwwA4LcSbWg4WGKTEQY3tAxolcietO06ybp8qHh87I1ZCV3vTvq/EqHHUE7UNfdrASiKpHasx+bOOtrxvSYmRh6Z1R5/JXVCXVLMoDXyPT1OtqC9YbcOQ14yb/Co9X0KDSGOhzuImV6yhzRcC1xdCwl+XUYybJR7F/Whjz26tA1K2SpiapoWcVIjOTxypMnCTXLYrBaOaSaGlybcCf64DscJIH3JdrZrl5VCHh36P01GTE6Cx'], 'krbExtraData': [b'\x00\x02\xbb\xf78]root/admin@IPA.TEST\x00']}) LDAPEntry(ipapython.dn.DN('uid=admin,cn=users,cn=accounts,dc=ipa,dc=test'), {'cn': [b'Administrator'], 'gecos': [b'Administrator'], 'gidNumber': [b'323600000'], 'homeDirectory': [b'/home/admin'], 'ipaUniqueID': [b'db07bfca-ae71-11e9-a1cd-5254003401ab'], 'krbExtraData': [b'\x00\x02\xbb\xf78]root/admin@IPA.TEST\x00'], 'krbLastPwdChange': [b'20190725002843Z'], 'krbPasswordExpiration': [b'20191023002843Z'], 'krbPrincipalKey': [b'0\x81\xde\xa0\x03\x02\x01\x01\xa1\x03\x02\x01\x01\xa2\x03\x02\x01\x01\xa3\x03\x02\x01\x01\xa4\x81\xc70\x81\xc40h\xa0\x1b0\x19\xa0\x03\x02\x01\x04\xa1\x12\x04\x10NS\'<qYY^v{;A75XJ\xa1I0G\xa0\x03\x02\x01\x12\xa1@\x04> \x00\x8e^\xcd+\x87\xa5\x95\xf7GHvJ\x9b\xcb\xb6\\l\x9du_\xb3%\x1c\xcb\xa8[\r\xf5\x89+3:\xa2\xd3e\xc7\xb2zm2"L\xf9%\xfe\x91\xc2\x97X,\xa9OP5\xe2\r\xf6\xf6\xa8\xc80X\xa0\x1b0\x19\xa0\x03\x02\x01\x04\xa1\x12\x04\x10(<pF-wJ3,1A2#^u]\xa1907\xa0\x03\x02\x01\x11\xa10\x04.\x10\x00\xd7,\x03\x8a\x92\xad\x05\\\xae:\xb8\x1e\xefgb\x0b\xda\x98\xf3\xbc\x98\x84\x04\xb9\xb7\x07[$\xc9\x14\xa2\xbb\\\x1e\x93\xee\xe0\xf0\xd7\x08\xd7\n\x95\xad'], 'krbPrincipalName': [b'admin@IPA.TEST'], 'loginShell': [b'/bin/bash'], 'memberOf': [b'cn=admins,cn=groups,cn=accounts,dc=ipa,dc=test', b'cn=Replication Administrators,cn=privileges,cn=pbac,dc=ipa,dc=test', b'cn=Add Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify DNA Range,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read PassSync Managers Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Modify PassSync Managers Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read LDBM Database Configuration,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Add Configuration Sub-Entries,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Read DNA Range,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=Host Enrollment,cn=privileges,cn=pbac,dc=ipa,dc=test', b'cn=System: Add krbPrincipalName to a Host,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Enroll a Host,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Certificates,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Enrollment Password,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Keytab,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=System: Manage Host Principals,cn=permissions,cn=pbac,dc=ipa,dc=test', b'cn=trust admins,cn=groups,cn=accounts,dc=ipa,dc=test'], 'objectClass': [b'top', b'person', b'posixaccount', b'krbprincipalaux', b'krbticketpolicyaux', b'inetuser', b'ipaobject', b'ipasshuser', b'ipaSshGroupOfPubKeys'], 'sn': [b'Administrator'], 'uid': [b'admin'], 'uidNumber': [b'323600000'], 'userPassword': [b'{PBKDF2_SHA256}AAAIAAlL5fLseXxsnBHZNu6CiiqLovlf+ntV3ITWEseUy5bM7Dc90eQXsiTav0JLlYKkDf0oQqtabL/jh38wdQ5nmo0+K/zv70Gjo7U/lY6c8+ZPXBPDkIVMsMKoDjyzFAecUTk0GSyyLXwKf53KK3Z0zPU9/nXSUjFuQLJO46IAxSfnz8bdaczr30DTZvQwwwA4LcSbWg4WGKTEQY3tAxolcietO06ybp8qHh87I1ZCV3vTvq/EqHHUE7UNfdrASiKpHasx+bOOtrxvSYmRh6Z1R5/JXVCXVLMoDXyPT1OtqC9YbcOQ14yb/Co9X0KDSGOhzuImV6yhzRcC1xdCwl+XUYybJR7F/Whjz26tA1K2SpiapoWcVIjOTxypMnCTXLYrBaOaSaGlybcCf64DscJIH3JdrZrl5VCHh36P01GTE6Cx']}) ------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_admin_in_ldap host.py 77 INFO Connecting to LDAP at master.ipa.test transport.py 284 DEBUG READ /etc/ipa/ca.crt host.py 90 INFO LDAP bind as cn=Directory Manager test_backup_and_restore.py 136 INFO Storing result for check_admin_in_cli transport.py 318 INFO RUN ['ipa', 'user-show', 'admin'] transport.py 513 DEBUG RUN ['ipa', 'user-show', 'admin'] transport.py 558 DEBUG User login: admin transport.py 558 DEBUG Last name: Administrator transport.py 558 DEBUG Home directory: /home/admin transport.py 558 DEBUG Login shell: /bin/bash transport.py 558 DEBUG Principal alias: admin@IPA.TEST transport.py 558 DEBUG UID: 323600000 transport.py 558 DEBUG GID: 323600000 transport.py 558 DEBUG Account disabled: False transport.py 558 DEBUG Password: True transport.py 558 DEBUG Member of groups: admins, trust admins transport.py 558 DEBUG Kerberos keys available: True transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_admin_in_id transport.py 318 INFO RUN ['id', 'admin'] transport.py 513 DEBUG RUN ['id', 'admin'] transport.py 558 DEBUG uid=323600000(admin) gid=323600000(admins) groups=323600000(admins) transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_certs transport.py 318 INFO RUN ['ipa', 'cert-find'] transport.py 513 DEBUG RUN ['ipa', 'cert-find'] transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG 14 certificates matched transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:56 2019 UTC transport.py 558 DEBUG Not After: Mon Jul 25 00:20:56 2039 UTC transport.py 558 DEBUG Serial number: 1 transport.py 558 DEBUG Serial number (hex): 0x1 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=OCSP Subsystem,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 2 transport.py 558 DEBUG Serial number (hex): 0x2 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 3 transport.py 558 DEBUG Serial number (hex): 0x3 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=CA Subsystem,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 4 transport.py 558 DEBUG Serial number (hex): 0x4 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=CA Audit,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:58 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:58 2021 UTC transport.py 558 DEBUG Serial number: 5 transport.py 558 DEBUG Serial number (hex): 0x5 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=ipa-ca-agent,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:59 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:59 2021 UTC transport.py 558 DEBUG Serial number: 6 transport.py 558 DEBUG Serial number (hex): 0x6 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=IPA RA,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:21:47 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:21:47 2021 UTC transport.py 558 DEBUG Serial number: 7 transport.py 558 DEBUG Serial number (hex): 0x7 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:23:37 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:23:37 2021 UTC transport.py 558 DEBUG Serial number: 8 transport.py 558 DEBUG Serial number (hex): 0x8 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:24:16 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:24:16 2021 UTC transport.py 558 DEBUG Serial number: 9 transport.py 558 DEBUG Serial number (hex): 0x9 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:24:26 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:24:26 2021 UTC transport.py 558 DEBUG Serial number: 10 transport.py 558 DEBUG Serial number (hex): 0xA transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Transport Certificate,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:12 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:12 2021 UTC transport.py 558 DEBUG Serial number: 11 transport.py 558 DEBUG Serial number (hex): 0xB transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Storage Certificate,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:12 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:12 2021 UTC transport.py 558 DEBUG Serial number: 12 transport.py 558 DEBUG Serial number (hex): 0xC transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Audit,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:13 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:13 2021 UTC transport.py 558 DEBUG Serial number: 13 transport.py 558 DEBUG Serial number (hex): 0xD transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=ipa-ca-agent,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:14 2019 UTC transport.py 558 DEBUG Not After: Fri Jul 24 00:27:14 2020 UTC transport.py 558 DEBUG Serial number: 14 transport.py 558 DEBUG Serial number (hex): 0xE transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG ----------------------------- transport.py 558 DEBUG Number of entries returned 14 transport.py 558 DEBUG ----------------------------- transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_dns transport.py 318 INFO RUN ['host', 'master.ipa.test', 'localhost'] transport.py 513 DEBUG RUN ['host', 'master.ipa.test', 'localhost'] transport.py 558 DEBUG Using domain server: transport.py 558 DEBUG Name: localhost transport.py 558 DEBUG Address: ::1#53 transport.py 558 DEBUG Aliases: transport.py 558 DEBUG transport.py 558 DEBUG master.ipa.test has address 192.168.121.17 transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_kinit transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 136 INFO Storing result for check_custodia_files transport.py 301 DEBUG STAT /etc/ipa/custodia/server.keys transport.py 301 DEBUG STAT /etc/ipa/custodia/custodia.conf transport.py 318 INFO RUN ['ipa', 'vault-add', 'ci_test_vault', '--password', 'password', '--type', 'symmetric'] transport.py 513 DEBUG RUN ['ipa', 'vault-add', 'ci_test_vault', '--password', 'password', '--type', 'symmetric'] transport.py 558 DEBUG --------------------------- transport.py 558 DEBUG Added vault "ci_test_vault" transport.py 558 DEBUG --------------------------- transport.py 558 DEBUG Vault name: ci_test_vault transport.py 558 DEBUG Type: symmetric transport.py 558 DEBUG Salt: d0mbrU8HnCUOFwj18X9IfQ== transport.py 558 DEBUG Owner users: admin transport.py 558 DEBUG Vault user: admin transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'vault-archive', 'ci_test_vault', '--password', 'password', '--data', 'SSBsb3ZlIENJIHRlc3RzCg=='] transport.py 513 DEBUG RUN ['ipa', 'vault-archive', 'ci_test_vault', '--password', 'password', '--data', 'SSBsb3ZlIENJIHRlc3RzCg=='] transport.py 558 DEBUG ---------------------------------------- transport.py 558 DEBUG Archived data into vault "ci_test_vault" transport.py 558 DEBUG ---------------------------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'vault-retrieve', 'ci_test_vault', '--password', 'password'] transport.py 513 DEBUG RUN ['ipa', 'vault-retrieve', 'ci_test_vault', '--password', 'password'] transport.py 558 DEBUG ----------------------------------------- transport.py 558 DEBUG Retrieved data from vault "ci_test_vault" transport.py 558 DEBUG ----------------------------------------- transport.py 558 DEBUG Data: SSBsb3ZlIENJIHRlc3RzCg== transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-backup', '-v'] transport.py 513 DEBUG RUN ['ipa-backup', '-v'] transport.py 558 DEBUG ipalib.install.sysrestore: DEBUG: Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index' transport.py 558 DEBUG ipapython.admintool: DEBUG: Logging to /var/log/ipabackup.log transport.py 558 DEBUG ipapython.admintool: DEBUG: ipa-backup was invoked with arguments [] and options: {'verbose': True, 'quiet': False, 'log_file': None, 'gpg_keyring': None, 'gpg': False, 'data_only': False, 'logs': False, 'online': False} transport.py 558 DEBUG ipapython.admintool: DEBUG: IPA version 4.9.0.dev-0.fc30 transport.py 558 DEBUG ipalib.plugable: DEBUG: importing all plugin modules in ipaserver.plugins... transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.aci transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.automember transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.automount transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.baseldap transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.baseldap is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.baseuser transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.batch transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.ca transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.caacl transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.cert transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.certmap transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.certprofile transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.config transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.delegation transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.deskprofile transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.dns transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.dnsserver transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.dogtag transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.domainlevel transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.group transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hbac transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.hbac is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hbacrule transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hbacsvc transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hbacsvcgroup transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hbactest transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.host transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.hostgroup transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.idrange transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.idviews transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.internal transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.join transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.krbtpolicy transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.ldap2 transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.location transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.migration transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.misc transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.netgroup transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.otp transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.otp is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.otpconfig transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.otptoken transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.passwd transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.permission transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.ping transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.pkinit transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.privilege transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.pwpolicy transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.rabase transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.rabase is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.radiusproxy transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.realmdomains transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.role transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.schema transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.selfservice transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.selinuxusermap transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.server transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.serverrole transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.serverroles transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.service transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.servicedelegation transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.session transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.stageuser transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.sudo transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.sudo is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.sudocmd transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.sudocmdgroup transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.sudorule transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.topology transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.trust transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.user transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.vault transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.virtual transport.py 558 DEBUG ipalib.plugable: DEBUG: ipaserver.plugins.virtual is not a valid plugin module transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.whoami transport.py 558 DEBUG ipalib.plugable: DEBUG: importing plugin module ipaserver.plugins.xmlserver transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Preparing backup on master.ipa.test transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/bin/systemctl', 'start', 'dirsrv@IPA-TEST.service'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/bin/systemctl', 'is-active', 'dirsrv@IPA-TEST.service'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=active transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr= transport.py 558 DEBUG ipapython.ipautil: DEBUG: wait_for_open_ports: localhost [389] timeout 120 transport.py 558 DEBUG ipapython.ipautil: DEBUG: waiting for port: 389 transport.py 558 DEBUG ipapython.ipautil: DEBUG: SUCCESS: port: 389 transport.py 558 DEBUG ipaplatform.base.services: DEBUG: Start of dirsrv@IPA-TEST.service complete transport.py 558 DEBUG ipapython.ipaldap: DEBUG: retrieving schema for SchemaCache url=ldapi://%2Fvar%2Frun%2Fslapd-IPA-TEST.socket conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7f7059c12828> transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Stopping IPA services transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/sbin/ipactl', 'stop'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=Stopping ipa-dnskeysyncd Service transport.py 558 DEBUG Stopping ipa-otpd Service transport.py 558 DEBUG Stopping pki-tomcatd Service transport.py 558 DEBUG Stopping ipa-custodia Service transport.py 558 DEBUG Stopping httpd Service transport.py 558 DEBUG Stopping named Service transport.py 558 DEBUG Stopping kadmin Service transport.py 558 DEBUG Stopping krb5kdc Service transport.py 558 DEBUG Stopping Directory Service transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=ipa: INFO: The ipactl command was successful transport.py 558 DEBUG transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Backing up ipaca in IPA-TEST to LDIF transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/sbin/dsctl', 'IPA-TEST', 'db2ldif', '--replication', 'ipaca', '/var/lib/dirsrv/slapd-IPA-TEST/ldif/IPA-TEST-ipaca.ldif'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=db2ldif successful transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=ldiffile: /var/lib/dirsrv/slapd-IPA-TEST/ldif/IPA-TEST-ipaca.ldif transport.py 558 DEBUG transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Backing up userRoot in IPA-TEST to LDIF transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/sbin/dsctl', 'IPA-TEST', 'db2ldif', '--replication', 'userRoot', '/var/lib/dirsrv/slapd-IPA-TEST/ldif/IPA-TEST-userRoot.ldif'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=db2ldif successful transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=ldiffile: /var/lib/dirsrv/slapd-IPA-TEST/ldif/IPA-TEST-userRoot.ldif transport.py 558 DEBUG transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Backing up IPA-TEST transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/sbin/dsctl', 'IPA-TEST', 'db2bak', '/var/lib/dirsrv/slapd-IPA-TEST/bak/IPA-TEST'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=db2bak successful transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr= transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/bin/authselect', 'current', '--raw'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=sssd with-sudo transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr= transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Backing up files transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['tar', '--exclude=/var/lib/ipa/backup', '--xattrs', '--selinux', '-cf', '/tmp/tmp_flsor5pipa/ipa/files.tar', '/usr/share/ipa/html', '/etc/pki/pki-tomcat', '/etc/sysconfig/pki', '/var/lib/pki', '/var/lib/ipa/sysrestore', '/var/lib/ipa-client/sysrestore', '/var/lib/ipa/dnssec', '/var/lib/sss/pubconf/krb5.include.d/', '/var/lib/certmonger', '/var/lib/ipa', '/var/run/dirsrv', '/var/lock/dirsrv', '/etc/dirsrv/slapd-IPA-TEST', '/var/lib/dirsrv/slapd-IPA-TEST', '/etc/named.conf', '/etc/named.keytab', '/etc/resolv.conf', '/etc/sysconfig/pki-tomcat', '/etc/sysconfig/krb5kdc', '/etc/sysconfig/ipa-dnskeysyncd', '/etc/sysconfig/ipa-ods-exporter', '/etc/sysconfig/named', '/etc/sysconfig/ods', '/etc/sysconfig/authconfig', '/etc/ipa/nssdb/pwdfile.txt', '/etc/pki/ca-trust/source/ipa.p11-kit', '/etc/nsswitch.conf', '/etc/krb5.keytab', '/etc/sssd/sssd.conf', '/etc/openldap/ldap.conf', '/etc/security/limits.conf', '/var/lib/ipa/gssproxy/http.keytab', '/etc/ipa/kdcproxy/ipa-kdc-proxy.conf', '/etc/httpd/conf.d/ipa-pki-proxy.conf', '/etc/httpd/conf.d/ipa-rewrite.conf', '/etc/httpd/conf.d/ssl.conf', '/etc/httpd/conf.d/ssl.conf', '/var/lib/ipa/certs/httpd.crt', '/var/lib/ipa/private/httpd.key', '/etc/httpd/conf.d/ipa.conf', '/etc/ssh/sshd_config', '/etc/ssh/ssh_config', '/etc/krb5.conf', '/var/lib/ipa-client/pki/kdc-ca-bundle.pem', '/var/lib/ipa-client/pki/ca-bundle.pem', '/etc/ipa/ca.crt', '/etc/ipa/default.conf', '/etc/dirsrv/ds.keytab', '/etc/chrony.conf', '/etc/samba/smb.conf', '/root/ca-agent.p12', '/var/lib/ipa/ra-agent.pem', '/var/lib/ipa/ra-agent.key', '/root/cacert.p12', '/root/kracert.p12', '/var/kerberos/krb5kdc/kdc.conf', '/var/kerberos/krb5kdc/kdc.crt', '/var/kerberos/krb5kdc/kdc.key', '/var/kerberos/krb5kdc/cacert.pem', '/etc/systemd/system/multi-user.target.wants/ipa.service', '/etc/systemd/system/httpd.service.d/ipa.conf', '/etc/systemd/system/multi-user.target.wants/sssd.service', '/etc/systemd/system/multi-user.target.wants/certmonger.service', '/etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd@pki-tomcat.service', '/etc/opendnssec/conf.xml', '/etc/opendnssec/kasp.xml', '/etc/opendnssec/zonelist.xml', '/var/opendnssec/kasp.db', '/etc/ipa/dnssec/softhsm2.conf', '/etc/ipa/dnssec/softhsm_pin_so', '/etc/ipa/dnssec/ipa-dnskeysyncd.keytab', '/etc/ipa/custodia/server.keys', '/etc/ipa/custodia/custodia.conf', '/etc/gssproxy/10-ipa.conf', '/etc/hosts', '/etc/systemd/system/pki-tomcatd@pki-tomcat.service.d/ipa.conf', '/etc/ipa/nssdb/cert9.db', '/etc/ipa/nssdb/key4.db', '/etc/ipa/nssdb/pkcs11.txt', '/etc/tmpfiles.d/dirsrv-IPA-TEST.conf', '/etc/systemd/system/dirsrv@IPA-TEST.service.d/ipa-env.conf', '/var/lib/ipa/passwds/master.ipa.test-443-RSA'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout= transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=tar: Removing leading `/' from member names transport.py 558 DEBUG tar: Removing leading `/' from hard link targets transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['tar', '--exclude=/var/lib/ipa/backup', '--xattrs', '--selinux', '--no-recursion', '-rf', '/tmp/tmp_flsor5pipa/ipa/files.tar', '/var/log/pki/pki-tomcat', '/var/log/pki/pki-tomcat/ca', '/var/log/pki/pki-tomcat/ca/signedAudit', '/var/log/pki/pki-tomcat/ca/archive', '/var/log/pki/pki-tomcat/kra', '/var/log/pki/pki-tomcat/kra/signedAudit', '/var/log/pki/pki-tomcat/kra/archive'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout= transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=tar: Removing leading `/' from member names transport.py 558 DEBUG transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Starting IPA service transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/usr/sbin/ipactl', 'start'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout=Starting Directory Service transport.py 558 DEBUG Starting krb5kdc Service transport.py 558 DEBUG Starting kadmin Service transport.py 558 DEBUG Starting named Service transport.py 558 DEBUG Starting httpd Service transport.py 558 DEBUG Starting ipa-custodia Service transport.py 558 DEBUG Starting pki-tomcatd Service transport.py 558 DEBUG Starting ipa-otpd Service transport.py 558 DEBUG Starting ipa-dnskeysyncd Service transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr=ipa: INFO: The ipactl command was successful transport.py 558 DEBUG transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['/bin/gzip', '/tmp/tmp_flsor5pipa/ipa/files.tar'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout= transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr= transport.py 558 DEBUG ipapython.ipautil: DEBUG: Starting external process transport.py 558 DEBUG ipapython.ipautil: DEBUG: args=['tar', '--xattrs', '--selinux', '-czf', '/var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18/ipa-full.tar', '.'] transport.py 558 DEBUG ipapython.ipautil: DEBUG: Process finished, return code=0 transport.py 558 DEBUG ipapython.ipautil: DEBUG: stdout= transport.py 558 DEBUG ipapython.ipautil: DEBUG: stderr= transport.py 558 DEBUG ipaserver.install.ipa_backup: INFO: Backed up to /var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18 transport.py 558 DEBUG ipapython.admintool: INFO: The ipa-backup command was successful transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 164 INFO Backup path for master.ipa.test is /var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18 transport.py 318 INFO RUN ['ipa-server-install', '--uninstall', '-U'] transport.py 513 DEBUG RUN ['ipa-server-install', '--uninstall', '-U'] transport.py 558 DEBUG Updating DNS system records transport.py 558 DEBUG unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG Forcing removal of master.ipa.test transport.py 558 DEBUG ------------------------------------ transport.py 558 DEBUG Deleted IPA server "master.ipa.test" transport.py 558 DEBUG ------------------------------------ transport.py 558 DEBUG Shutting down all IPA services transport.py 558 DEBUG Unconfiguring KRA transport.py 558 DEBUG failed to uninstall KRA instance CalledProcessError(Command ['/usr/sbin/pkidestroy', '-i', 'pki-tomcat', '-s', 'KRA'] returned non-zero exit status 1: 'pkihelper : ERROR unable to access security domain. Continuing .. HTTPSConnectionPool(host=\'master.ipa.test\', port=443): Max retries exceeded with url: /ca/rest/securityDomain/domainInfo (Caused by NewConnectionError(\'<urllib3.connection.VerifiedHTTPSConnection object at 0x7fd2a2ba08d0>: Failed to establish a new connection: [Errno 111] Connection refused\')) \npkihelper : WARNING this \'KRA\' entry will NOT be deleted from security domain \'IPA\'!\npkihelper : WARNING security domain \'IPA\' may be offline or unreachable!\npkihelper : ERROR subprocess.CalledProcessError: Command \'[\'/usr/bin/sslget\', \'-n\', \'subsystemCert cert-pki-ca\', \'-p\', \'1Mg.Je+f:HNZP3kpbk6wrw|GP6-y1Ox((J2KhFUO0\', \'-d\', \'/etc/pki/pki-tomcat/alias\', \'-e\', \'name="/var/lib/pki/pki-tomcat"&type=KRA&list=kraList&host=master.ipa.test&sport=443&ncsport=443&adminsport=443&agentsport=443&operation=remove\', \'-v\', \'-r\', \'/ca/agent/ca/updateDomainXML\', \'master.ipa.test:443\']\' returned non-zero exit status 6.!\nJob for pki-tomcatd@pki-tomcat.service failed because a timeout was exceeded.\nSee "systemctl status pki-tomcatd@pki-tomcat.service" and "journalctl -xe" for details.\npkihelper : ERROR subprocess.CalledProcessError: Command \'[\'systemctl\', \'start\', \'pki-tomcatd@pki-tomcat.service\']\' returned non-zero exit status 1.!\npkidestroy : ERROR CalledProcessError: Command \'[\'systemctl\', \'start\', \'pki-tomcatd@pki-tomcat.service\']\' returned non-zero exit status 1.\n File "/usr/lib/python3.7/site-packages/pki/server/pkidestroy.py", line 268, in main\n scriptlet.destroy(deployer)\n File "/usr/lib/python3.7/site-packages/pki/server/deployment/scriptlets/finalization.py", line 84, in destroy\n deployer.systemd.start()\n File "/usr/lib/python3.7/site-packages/pki/server/deployment/pkihelper.py", line 3325, in start\n subprocess.check_call(command)\n File "/usr/lib64/python3.7/subprocess.py", line 347, in check_call\n raise CalledProcessError(retcode, cmd)\n\n') transport.py 558 DEBUG Unconfiguring CA transport.py 558 DEBUG Unconfiguring named transport.py 558 DEBUG Unconfiguring ipa-dnskeysyncd transport.py 558 DEBUG Unconfiguring web server transport.py 558 DEBUG Unconfiguring krb5kdc transport.py 558 DEBUG Unconfiguring kadmin transport.py 558 DEBUG Unconfiguring directory server transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with None transport.py 558 DEBUG Removed /etc/systemd/system/dirsrv.target.wants/dirsrv@IPA-TEST.service. transport.py 558 DEBUG Removed /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Unconfiguring ipa-custodia transport.py 558 DEBUG Unconfiguring ipa-otpd transport.py 558 DEBUG Removing Kerberos service principals from /etc/krb5.keytab transport.py 558 DEBUG Disabling client Kerberos and LDAP configurations transport.py 558 DEBUG Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted transport.py 558 DEBUG Restoring client configuration files transport.py 558 DEBUG Unconfiguring the NIS domain. transport.py 558 DEBUG nscd daemon is not installed, skip configuration transport.py 558 DEBUG nslcd daemon is not installed, skip configuration transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Client uninstall complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG Removing IPA client configuration transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:323 0.0.0.0:* users:(("chronyd",pid=16745,fd=7)) transport.py 558 DEBUG udp ESTAB 0 0 192.168.121.17:56036 138.197.105.238:123 users:(("chronyd",pid=16745,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:935 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:48183 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=9)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:5355 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=12)) transport.py 558 DEBUG udp ESTAB 0 0 192.168.121.17:44850 198.255.68.106:123 users:(("chronyd",pid=16745,fd=12)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=17)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:68 0.0.0.0:* users:(("dhclient",pid=1606,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2030,fd=5),("systemd",pid=1,fd=74)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:34950 0.0.0.0:* transport.py 558 DEBUG udp ESTAB 0 0 192.168.121.17:45228 96.8.121.205:123 users:(("chronyd",pid=16745,fd=10)) transport.py 558 DEBUG udp UNCONN 0 0 [::1]:323 [::]:* users:(("chronyd",pid=16745,fd=8)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:35721 [::]:* users:(("rpc.statd",pid=2031,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:5355 [::]:* users:(("systemd-resolve",pid=589,fd=14)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:46651 [::]:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:111 [::]:* users:(("rpcbind",pid=2030,fd=7),("systemd",pid=1,fd=78)) transport.py 558 DEBUG tcp LISTEN 0 64 0.0.0.0:46791 0.0.0.0:* transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:5355 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=13)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2030,fd=4),("systemd",pid=1,fd=73)) transport.py 558 DEBUG tcp LISTEN 0 128 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=589,fd=18)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=25299,fd=3)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:38265 0.0.0.0:* users:(("rpc.statd",pid=2031,fd=10)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54556 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54514 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54528 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54554 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54538 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54532 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54548 192.168.121.17:8080 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.17:22 192.168.121.18:51704 users:(("sshd",pid=16353,fd=5),("sshd",pid=16351,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54510 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54524 192.168.121.17:8080 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.17:54498 192.168.121.17:8080 transport.py 558 DEBUG tcp LISTEN 0 128 [::]:5355 [::]:* users:(("systemd-resolve",pid=589,fd=15)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:38767 [::]:* users:(("rpc.statd",pid=2031,fd=12)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:111 [::]:* users:(("rpcbind",pid=2030,fd=6),("systemd",pid=1,fd=77)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=25299,fd=4)) transport.py 558 DEBUG tcp LISTEN 0 64 [::]:43005 [::]:* transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54516 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54526 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54502 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54518 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:127.0.0.1]:59574 [::ffff:127.0.0.1]:8009 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54566 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54512 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54500 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54560 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54520 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54522 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54506 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54564 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54552 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54536 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54530 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::1]:44242 [::1]:8443 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54550 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54508 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54540 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54534 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54494 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54492 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54562 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54544 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54542 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::1]:8080 [::1]:37978 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54496 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54546 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54504 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54558 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.17]:8080 [::ffff:192.168.121.17]:54568 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG Checking DNS domain ipa.test., please wait ... transport.py 558 DEBUG Checking DNS domain 121.168.192.in-addr.arpa., please wait ... transport.py 558 DEBUG Reverse zone 121.168.192.in-addr.arpa. will be created transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure DNS (bind) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG Warning: skipping DNS resolution of host master.ipa.test transport.py 558 DEBUG Checking DNS forwarders, please wait ... transport.py 558 DEBUG Using reverse zone(s) 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.17 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG BIND DNS server will be configured to serve IPA domain with: transport.py 558 DEBUG Forwarders: 192.168.121.1 transport.py 558 DEBUG Forward policy: only transport.py 558 DEBUG Reverse zone(s): 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG Disabled p11-kit-proxy transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG transport.py 558 DEBUG Starting installation... transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket transport.py 558 DEBUG [2/44]: configure autobind for root transport.py 558 DEBUG [3/44]: stopping directory server transport.py 558 DEBUG [4/44]: updating configuration in dse.ldif transport.py 558 DEBUG [5/44]: starting directory server transport.py 558 DEBUG [6/44]: adding default schema transport.py 558 DEBUG [7/44]: enabling memberof plugin transport.py 558 DEBUG [8/44]: enabling winsync plugin transport.py 558 DEBUG [9/44]: configure password logging transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache and keytab transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/29]: configuring certificate server instance transport.py 558 DEBUG [2/29]: Add ipa-pki-wait-running transport.py 558 DEBUG [3/29]: reindex attributes transport.py 558 DEBUG [4/29]: exporting Dogtag certificate store pin transport.py 558 DEBUG [5/29]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [6/29]: backing up CS.cfg transport.py 558 DEBUG [7/29]: disabling nonces transport.py 558 DEBUG [8/29]: set up CRL publishing transport.py 558 DEBUG [9/29]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [10/29]: starting certificate server instance transport.py 558 DEBUG [11/29]: configure certmonger for renewals transport.py 558 DEBUG [12/29]: requesting RA certificate from CA transport.py 558 DEBUG [13/29]: setting audit signing renewal to 2 years transport.py 558 DEBUG [14/29]: restarting certificate server transport.py 558 DEBUG [15/29]: publishing the CA certificate transport.py 558 DEBUG [16/29]: adding RA agent as a trusted user transport.py 558 DEBUG [17/29]: authorizing RA to modify profiles transport.py 558 DEBUG [18/29]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [19/29]: Ensure lightweight CAs container exists transport.py 558 DEBUG [20/29]: configure certificate renewals transport.py 558 DEBUG [21/29]: Configure HTTP to proxy connections transport.py 558 DEBUG [22/29]: restarting certificate server transport.py 558 DEBUG [23/29]: updating IPA configuration transport.py 558 DEBUG [24/29]: enabling CA instance transport.py 558 DEBUG [25/29]: migrating certificate profiles to LDAP transport.py 558 DEBUG [26/29]: importing IPA certificate profiles transport.py 558 DEBUG [27/29]: adding default CA ACL transport.py 558 DEBUG [28/29]: adding 'ipa' CA entry transport.py 558 DEBUG [29/29]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: adding CA certificate entry transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG Configuring DNS (named) transport.py 558 DEBUG [1/12]: generating rndc key file transport.py 558 DEBUG [2/12]: adding DNS container transport.py 558 DEBUG [3/12]: setting up our zone transport.py 558 DEBUG [4/12]: setting up reverse zone transport.py 558 DEBUG [5/12]: setting up our own record transport.py 558 DEBUG [6/12]: setting up records for other masters transport.py 558 DEBUG [7/12]: adding NS record to the zones transport.py 558 DEBUG [8/12]: setting up kerberos principal transport.py 558 DEBUG [9/12]: setting up named.conf transport.py 558 DEBUG [10/12]: setting up server configuration transport.py 558 DEBUG [11/12]: configuring named to start on boot transport.py 558 DEBUG [12/12]: changing resolv.conf to point to ourselves transport.py 558 DEBUG Done configuring DNS (named). transport.py 558 DEBUG Restarting the web server to pick up resolv.conf changes transport.py 558 DEBUG Configuring DNS key synchronization service (ipa-dnskeysyncd) transport.py 558 DEBUG [1/7]: checking status transport.py 558 DEBUG [2/7]: setting up bind-dyndb-ldap working directory transport.py 558 DEBUG [3/7]: setting up kerberos principal transport.py 558 DEBUG [4/7]: setting up SoftHSM transport.py 558 DEBUG [5/7]: adding DNSSEC containers transport.py 558 DEBUG [6/7]: creating replica keys transport.py 558 DEBUG [7/7]: configuring ipa-dnskeysyncd to start on boot transport.py 558 DEBUG Done configuring DNS key synchronization service (ipa-dnskeysyncd). transport.py 558 DEBUG Restarting ipa-dnskeysyncd transport.py 558 DEBUG Restarting named transport.py 558 DEBUG Updating DNS system records transport.py 558 DEBUG Configuring client side components transport.py 558 DEBUG Using existing certificate '/etc/ipa/ca.crt'. transport.py 558 DEBUG Client hostname: master.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Configured sudoers in /etc/nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG Setup complete transport.py 558 DEBUG transport.py 558 DEBUG Next steps: transport.py 558 DEBUG 1. You must make sure these network ports are open: transport.py 558 DEBUG TCP Ports: transport.py 558 DEBUG * 80, 443: HTTP/HTTPS transport.py 558 DEBUG * 389, 636: LDAP/LDAPS transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG UDP Ports: transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG * 123: ntp transport.py 558 DEBUG transport.py 558 DEBUG 2. You can now obtain a kerberos ticket using the command: 'kinit admin' transport.py 558 DEBUG This ticket will allow you to use the IPA tools (e.g., ipa user-add) transport.py 558 DEBUG and the web user interface. transport.py 558 DEBUG transport.py 558 DEBUG Be sure to back up the CA certificates stored in /root/cacert.p12 transport.py 558 DEBUG These files are required to create replicas. The password for these transport.py 558 DEBUG files is the Directory Manager password transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns'] transport.py 558 DEBUG Warning: ALREADY_ENABLED: 'freeipa-ldap' already in 'public' transport.py 558 DEBUG Warning: ALREADY_ENABLED: 'freeipa-ldaps' already in 'public' transport.py 558 DEBUG Warning: ALREADY_ENABLED: 'dns' already in 'public' transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns', '--permanent'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--add-service', 'dns', '--permanent'] transport.py 558 DEBUG success transport.py 558 DEBUG Warning: ALREADY_ENABLED: freeipa-ldap transport.py 558 DEBUG Warning: ALREADY_ENABLED: freeipa-ldaps transport.py 558 DEBUG Warning: ALREADY_ENABLED: dns transport.py 217 DEBUG Exit code: 0 tasks.py 300 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 513 DEBUG RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 558 DEBUG Zone name: ipa.test. transport.py 558 DEBUG Active zone: TRUE transport.py 558 DEBUG Authoritative nameserver: master.ipa.test. transport.py 558 DEBUG Administrator e-mail address: hostmaster.ipa.test. transport.py 558 DEBUG SOA serial: 1564015290 transport.py 558 DEBUG SOA refresh: 3600 transport.py 558 DEBUG SOA retry: 900 transport.py 558 DEBUG SOA expire: 1209600 transport.py 558 DEBUG SOA minimum: 3600 transport.py 558 DEBUG Time to live: 1 transport.py 558 DEBUG Default time to live: 1 transport.py 558 DEBUG Allow query: any; transport.py 558 DEBUG Allow transfer: none; transport.py 558 DEBUG ipa: WARNING: Service named-pkcs11.service requires restart on IPA server <all IPA DNS servers> to apply configuration changes. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-restore', '/var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18'] transport.py 513 DEBUG RUN ['ipa-restore', '/var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18'] transport.py 558 DEBUG Preparing restore from /var/lib/ipa/backup/ipa-full-2019-07-25-00-31-18 on master.ipa.test transport.py 558 DEBUG Performing FULL restore from FULL backup transport.py 558 DEBUG Temporary setting umask to 022 transport.py 558 DEBUG Directory Manager (existing master) password: transport.py 558 DEBUG Each master will individually need to be re-initialized or transport.py 558 DEBUG re-created from this one. The replication agreements on transport.py 558 DEBUG masters running IPA 3.1 or earlier will need to be manually transport.py 558 DEBUG re-enabled. See the man page for details. transport.py 558 DEBUG Disabling all replication. transport.py 558 DEBUG Stopping IPA services transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Restoring files transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Restoring from userRoot in IPA-TEST transport.py 558 DEBUG Restoring from ipaca in IPA-TEST transport.py 558 DEBUG Restarting GSS-proxy transport.py 558 DEBUG Starting IPA services transport.py 558 DEBUG Restarting SSSD transport.py 558 DEBUG Restarting oddjobd transport.py 558 DEBUG Restoring umask to 18 transport.py 558 DEBUG The ipa-restore command was successful transport.py 558 DEBUG Restoring data will overwrite existing live data. Continue to restore? [no]: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'vault-retrieve', 'ci_test_vault', '--password', 'password'] transport.py 513 DEBUG RUN ['ipa', 'vault-retrieve', 'ci_test_vault', '--password', 'password'] transport.py 558 DEBUG ----------------------------------------- transport.py 558 DEBUG Retrieved data from vault "ci_test_vault" transport.py 558 DEBUG ----------------------------------------- transport.py 558 DEBUG Data: SSBsb3ZlIENJIHRlc3RzCg== transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_admin_in_ldap host.py 77 INFO Connecting to LDAP at master.ipa.test transport.py 284 DEBUG READ /etc/ipa/ca.crt host.py 90 INFO LDAP bind as cn=Directory Manager test_backup_and_restore.py 144 INFO Checking result for check_admin_in_cli transport.py 318 INFO RUN ['ipa', 'user-show', 'admin'] transport.py 513 DEBUG RUN ['ipa', 'user-show', 'admin'] transport.py 558 DEBUG User login: admin transport.py 558 DEBUG Last name: Administrator transport.py 558 DEBUG Home directory: /home/admin transport.py 558 DEBUG Login shell: /bin/bash transport.py 558 DEBUG Principal alias: admin@IPA.TEST transport.py 558 DEBUG UID: 323600000 transport.py 558 DEBUG GID: 323600000 transport.py 558 DEBUG Account disabled: False transport.py 558 DEBUG Password: True transport.py 558 DEBUG Member of groups: trust admins, admins transport.py 558 DEBUG Kerberos keys available: True transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_admin_in_id transport.py 318 INFO RUN ['id', 'admin'] transport.py 513 DEBUG RUN ['id', 'admin'] transport.py 558 DEBUG uid=323600000(admin) gid=323600000(admins) groups=323600000(admins) transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_certs transport.py 318 INFO RUN ['ipa', 'cert-find'] transport.py 513 DEBUG RUN ['ipa', 'cert-find'] transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG 14 certificates matched transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:56 2019 UTC transport.py 558 DEBUG Not After: Mon Jul 25 00:20:56 2039 UTC transport.py 558 DEBUG Serial number: 1 transport.py 558 DEBUG Serial number (hex): 0x1 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=OCSP Subsystem,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 2 transport.py 558 DEBUG Serial number (hex): 0x2 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 3 transport.py 558 DEBUG Serial number (hex): 0x3 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=CA Subsystem,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:57 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:57 2021 UTC transport.py 558 DEBUG Serial number: 4 transport.py 558 DEBUG Serial number (hex): 0x4 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=CA Audit,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:58 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:58 2021 UTC transport.py 558 DEBUG Serial number: 5 transport.py 558 DEBUG Serial number (hex): 0x5 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=ipa-ca-agent,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:20:59 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:20:59 2021 UTC transport.py 558 DEBUG Serial number: 6 transport.py 558 DEBUG Serial number (hex): 0x6 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=IPA RA,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:21:47 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:21:47 2021 UTC transport.py 558 DEBUG Serial number: 7 transport.py 558 DEBUG Serial number (hex): 0x7 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:23:37 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:23:37 2021 UTC transport.py 558 DEBUG Serial number: 8 transport.py 558 DEBUG Serial number (hex): 0x8 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:24:16 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:24:16 2021 UTC transport.py 558 DEBUG Serial number: 9 transport.py 558 DEBUG Serial number (hex): 0x9 transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=master.ipa.test,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:24:26 2019 UTC transport.py 558 DEBUG Not After: Sun Jul 25 00:24:26 2021 UTC transport.py 558 DEBUG Serial number: 10 transport.py 558 DEBUG Serial number (hex): 0xA transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Transport Certificate,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:12 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:12 2021 UTC transport.py 558 DEBUG Serial number: 11 transport.py 558 DEBUG Serial number (hex): 0xB transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Storage Certificate,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:12 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:12 2021 UTC transport.py 558 DEBUG Serial number: 12 transport.py 558 DEBUG Serial number (hex): 0xC transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=KRA Audit,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:13 2019 UTC transport.py 558 DEBUG Not After: Wed Jul 14 00:27:13 2021 UTC transport.py 558 DEBUG Serial number: 13 transport.py 558 DEBUG Serial number (hex): 0xD transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG transport.py 558 DEBUG Issuing CA: ipa transport.py 558 DEBUG Subject: CN=ipa-ca-agent,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Not Before: Thu Jul 25 00:27:14 2019 UTC transport.py 558 DEBUG Not After: Fri Jul 24 00:27:14 2020 UTC transport.py 558 DEBUG Serial number: 14 transport.py 558 DEBUG Serial number (hex): 0xE transport.py 558 DEBUG Status: VALID transport.py 558 DEBUG Revoked: False transport.py 558 DEBUG ----------------------------- transport.py 558 DEBUG Number of entries returned 14 transport.py 558 DEBUG ----------------------------- transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_dns transport.py 318 INFO RUN ['host', 'master.ipa.test', 'localhost'] transport.py 513 DEBUG RUN ['host', 'master.ipa.test', 'localhost'] transport.py 558 DEBUG Using domain server: transport.py 558 DEBUG Name: localhost transport.py 558 DEBUG Address: ::1#53 transport.py 558 DEBUG Aliases: transport.py 558 DEBUG transport.py 558 DEBUG master.ipa.test has address 192.168.121.17 transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_kinit transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 test_backup_and_restore.py 144 INFO Checking result for check_custodia_files transport.py 301 DEBUG STAT /etc/ipa/custodia/server.keys transport.py 301 DEBUG STAT /etc/ipa/custodia/custodia.conf