report.html

Report generated on 09-Aug-2018 at 10:58:31 by pytest-html v1.19.0

Environment

Packages {'pytest': '3.4.2', 'py': '1.5.4', 'pluggy': '0.6.0'}
Platform Linux-4.17.7-200.fc28.x86_64-x86_64-with-fedora-28-Twenty_Eight
Plugins {'metadata': '1.7.0', 'html': '1.19.0', 'sourceorder': '0.5', 'multihost': '3.0'}
Python 3.6.6

Summary

3 tests ran in 2692.71 seconds.

3 passed, 0 skipped, 0 failed, 0 errors, 0 expected failures, 0 unexpected passes

Results

Result Test Duration Links
Passed test_replica_promotion.py::TestSubCAkeyReplication::()::test_subca_master 35.92
------------------------------ Captured log setup ------------------------------
__init__.py 250 INFO Preparing host replica0.ipa.test transport.py 1687 INFO Connected (version 2.0, client OpenSSH_7.7) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1687 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 131 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 250 INFO Preparing host master.ipa.test transport.py 1687 INFO Connected (version 2.0, client OpenSSH_7.7) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1687 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 131 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 244 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 244 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG Checking DNS domain ipa.test., please wait ... transport.py 558 DEBUG Checking DNS domain 121.168.192.in-addr.arpa., please wait ... transport.py 558 DEBUG Reverse zone 121.168.192.in-addr.arpa. will be created transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.7.90test transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure DNS (bind) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG Warning: skipping DNS resolution of host master.ipa.test transport.py 558 DEBUG Checking DNS forwarders, please wait ... transport.py 558 DEBUG Using reverse zone(s) 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.192 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG BIND DNS server will be configured to serve IPA domain with: transport.py 558 DEBUG Forwarders: 192.168.121.1 transport.py 558 DEBUG Forward policy: only transport.py 558 DEBUG Reverse zone(s): 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG [2/44]: enabling ldapi transport.py 558 DEBUG [3/44]: configure autobind for root transport.py 558 DEBUG [4/44]: stopping directory server transport.py 558 DEBUG [5/44]: updating configuration in dse.ldif transport.py 558 DEBUG [6/44]: starting directory server transport.py 558 DEBUG [7/44]: adding default schema transport.py 558 DEBUG [8/44]: enabling memberof plugin transport.py 558 DEBUG [9/44]: enabling winsync plugin transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/28]: configuring certificate server instance transport.py 558 DEBUG [2/28]: exporting Dogtag certificate store pin transport.py 558 DEBUG [3/28]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [4/28]: backing up CS.cfg transport.py 558 DEBUG [5/28]: disabling nonces transport.py 558 DEBUG [6/28]: set up CRL publishing transport.py 558 DEBUG [7/28]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [8/28]: starting certificate server instance transport.py 558 DEBUG [9/28]: configure certmonger for renewals transport.py 558 DEBUG [10/28]: requesting RA certificate from CA transport.py 558 DEBUG [11/28]: setting audit signing renewal to 2 years transport.py 558 DEBUG [12/28]: restarting certificate server transport.py 558 DEBUG [13/28]: publishing the CA certificate transport.py 558 DEBUG [14/28]: adding RA agent as a trusted user transport.py 558 DEBUG [15/28]: authorizing RA to modify profiles transport.py 558 DEBUG [16/28]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [17/28]: Ensure lightweight CAs container exists transport.py 558 DEBUG [18/28]: configure certificate renewals transport.py 558 DEBUG [19/28]: configure Server-Cert certificate renewal transport.py 558 DEBUG [20/28]: Configure HTTP to proxy connections transport.py 558 DEBUG [21/28]: restarting certificate server transport.py 558 DEBUG [22/28]: updating IPA configuration transport.py 558 DEBUG [23/28]: enabling CA instance transport.py 558 DEBUG [24/28]: migrating certificate profiles to LDAP transport.py 558 DEBUG [25/28]: importing IPA certificate profiles transport.py 558 DEBUG [26/28]: adding default CA ACL transport.py 558 DEBUG [27/28]: adding 'ipa' CA entry transport.py 558 DEBUG [28/28]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: adding CA certificate entry transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list to TLSv1.0 - TLSv1.2 transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG Configuring DNS (named) transport.py 558 DEBUG [1/12]: generating rndc key file transport.py 558 DEBUG [2/12]: adding DNS container transport.py 558 DEBUG [3/12]: setting up our zone transport.py 558 DEBUG [4/12]: setting up reverse zone transport.py 558 DEBUG [5/12]: setting up our own record transport.py 558 DEBUG [6/12]: setting up records for other masters transport.py 558 DEBUG [7/12]: adding NS record to the zones transport.py 558 DEBUG [8/12]: setting up kerberos principal transport.py 558 DEBUG [9/12]: setting up named.conf transport.py 558 DEBUG [10/12]: setting up server configuration transport.py 558 DEBUG [11/12]: configuring named to start on boot transport.py 558 DEBUG [12/12]: changing resolv.conf to point to ourselves transport.py 558 DEBUG Done configuring DNS (named). transport.py 558 DEBUG Restarting the web server to pick up resolv.conf changes transport.py 558 DEBUG Configuring DNS key synchronization service (ipa-dnskeysyncd) transport.py 558 DEBUG [1/7]: checking status transport.py 558 DEBUG [2/7]: setting up bind-dyndb-ldap working directory transport.py 558 DEBUG [3/7]: setting up kerberos principal transport.py 558 DEBUG [4/7]: setting up SoftHSM transport.py 558 DEBUG [5/7]: adding DNSSEC containers transport.py 558 DEBUG [6/7]: creating replica keys transport.py 558 DEBUG [7/7]: configuring ipa-dnskeysyncd to start on boot transport.py 558 DEBUG Done configuring DNS key synchronization service (ipa-dnskeysyncd). transport.py 558 DEBUG Restarting ipa-dnskeysyncd transport.py 558 DEBUG Restarting named transport.py 558 DEBUG Updating DNS system records transport.py 558 DEBUG Configuring client side components transport.py 558 DEBUG Using existing certificate '/etc/ipa/ca.crt'. transport.py 558 DEBUG Client hostname: master.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Configured sudoers in /etc/nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.7.90test transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG Setup complete transport.py 558 DEBUG transport.py 558 DEBUG Next steps: transport.py 558 DEBUG 1. You must make sure these network ports are open: transport.py 558 DEBUG TCP Ports: transport.py 558 DEBUG * 80, 443: HTTP/HTTPS transport.py 558 DEBUG * 389, 636: LDAP/LDAPS transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG UDP Ports: transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 53: bind transport.py 558 DEBUG * 123: ntp transport.py 558 DEBUG transport.py 558 DEBUG 2. You can now obtain a kerberos ticket using the command: 'kinit admin' transport.py 558 DEBUG This ticket will allow you to use the IPA tools (e.g., ipa user-add) transport.py 558 DEBUG and the web user interface. transport.py 558 DEBUG transport.py 558 DEBUG Be sure to back up the CA certificates stored in /root/cacert.p12 transport.py 558 DEBUG These files are required to create replicas. The password for these transport.py 558 DEBUG files is the Directory Manager password transport.py 217 DEBUG Exit code: 0 tasks.py 259 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123', '-h', 'master.ipa.test'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123', '-h', 'master.ipa.test'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding master.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 513 DEBUG RUN ['ipa', 'dnszone-mod', 'ipa.test', '--default-ttl', '1', '--ttl', '1'] transport.py 558 DEBUG ipa: WARNING: Service named-pkcs11.service requires restart on IPA server <all IPA DNS servers> to apply configuration changes. transport.py 558 DEBUG Zone name: ipa.test. transport.py 558 DEBUG Active zone: TRUE transport.py 558 DEBUG Authoritative nameserver: master.ipa.test. transport.py 558 DEBUG Administrator e-mail address: hostmaster.ipa.test. transport.py 558 DEBUG SOA serial: 1533810371 transport.py 558 DEBUG SOA refresh: 3600 transport.py 558 DEBUG SOA retry: 900 transport.py 558 DEBUG SOA expire: 1209600 transport.py 558 DEBUG SOA minimum: 3600 transport.py 558 DEBUG Time to live: 1 transport.py 558 DEBUG Default time to live: 1 transport.py 558 DEBUG Allow query: any; transport.py 558 DEBUG Allow transfer: none; transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnsrecord-show', 'ipa.test', 'replica0.ipa.test.'] transport.py 513 DEBUG RUN ['ipa', 'dnsrecord-show', 'ipa.test', 'replica0.ipa.test.'] transport.py 558 DEBUG ipa: ERROR: replica0.ipa.test.: DNS resource record not found transport.py 217 DEBUG Exit code: 2 transport.py 318 INFO RUN ['ipa', 'dnsrecord-add', 'ipa.test', 'replica0.ipa.test.', '--a-rec', '192.168.121.169'] transport.py 513 DEBUG RUN ['ipa', 'dnsrecord-add', 'ipa.test', 'replica0.ipa.test.', '--a-rec', '192.168.121.169'] transport.py 558 DEBUG Record name: replica0 transport.py 558 DEBUG A record: 192.168.121.169 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnsrecord-show', 'ipa.test', 'master.ipa.test.'] transport.py 513 DEBUG RUN ['ipa', 'dnsrecord-show', 'ipa.test', 'master.ipa.test.'] transport.py 558 DEBUG Record name: master transport.py 558 DEBUG A record: 192.168.121.192 transport.py 558 DEBUG SSHFP record: 4 1 9CDA9890F233C50B7DE8372CD62EB64924D36D8B, 4 2 1D8FA98880D9CC36730FF66986E45070141859B9B2B4AB6671988A1A 1A95BEEA, 1 1 03DA49777CF21B5C8B69E03FCBF59DEBB834FFD4, 1 2 4766625FA9F65F2AC8FE1C87DD8979ACA540DA6490C0746869AF9397 85F0D46C, 3 1 11AC5B95E2A735C5B6392C355DE3804AA38B3A0D, 3 2 3BF25A9CB5C88A0882F5DDB14C03F0D75BE1F5EB3C1FB9B6093CE58D FE4F1400 transport.py 217 DEBUG Exit code: 0 tasks.py 1088 INFO Installing replica <Host master.ipa.test (master)> from <Host replica0.ipa.test (replica)> transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'domainlevel-get'] transport.py 513 DEBUG RUN ['ipa', 'domainlevel-get'] transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG Current domain level: 1 transport.py 558 DEBUG ----------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'replica0.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'replica0.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 244 INFO Adding replica0.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnsconfig-mod', '--allow-sync-ptr=true'] transport.py 513 DEBUG RUN ['ipa', 'dnsconfig-mod', '--allow-sync-ptr=true'] transport.py 558 DEBUG Allow PTR sync: TRUE transport.py 558 DEBUG IPA DNS servers: master.ipa.test transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnszone-show', 'ipa.test'] transport.py 513 DEBUG RUN ['ipa', 'dnszone-show', 'ipa.test'] transport.py 558 DEBUG Zone name: ipa.test. transport.py 558 DEBUG Active zone: TRUE transport.py 558 DEBUG Authoritative nameserver: master.ipa.test. transport.py 558 DEBUG Administrator e-mail address: hostmaster.ipa.test. transport.py 558 DEBUG SOA serial: 1533810395 transport.py 558 DEBUG SOA refresh: 3600 transport.py 558 DEBUG SOA retry: 900 transport.py 558 DEBUG SOA expire: 1209600 transport.py 558 DEBUG SOA minimum: 3600 transport.py 558 DEBUG Allow query: any; transport.py 558 DEBUG Allow transfer: none; transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/var/log/ipaclient-install.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'replica0.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'replica0.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'dnsconfig-mod', '--allow-sync-ptr=true'] transport.py 513 DEBUG RUN ['ipa', 'dnsconfig-mod', '--allow-sync-ptr=true'] transport.py 558 DEBUG ipa: ERROR: no modifications to be performed transport.py 217 DEBUG Exit code: 1 transport.py 318 INFO RUN ['ipa', 'dnszone-add', '121.168.192.in-addr.arpa.'] transport.py 513 DEBUG RUN ['ipa', 'dnszone-add', '121.168.192.in-addr.arpa.'] transport.py 558 DEBUG ipa: ERROR: DNS zone with name "121.168.192.in-addr.arpa." already exists transport.py 217 DEBUG Exit code: 1 tasks.py 136 WARNING ipa: ERROR: DNS zone with name "121.168.192.in-addr.arpa." already exists transport.py 318 INFO RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test'] transport.py 513 DEBUG RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test'] transport.py 558 DEBUG Client hostname: replica0.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Successfully retrieved CA cert transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Valid From: 2018-08-09 10:18:18 transport.py 558 DEBUG Valid Until: 2038-08-09 10:18:18 transport.py 558 DEBUG transport.py 558 DEBUG Enrolled in IPA realm IPA.TEST transport.py 558 DEBUG Created /etc/ipa/default.conf transport.py 558 DEBUG Configured sudoers in /etc/nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Configured /etc/krb5.conf for IPA realm IPA.TEST transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Hostname (replica0.ipa.test) does not have A/AAAA record. transport.py 558 DEBUG Failed to update DNS records. transport.py 558 DEBUG Missing A/AAAA record(s) for host replica0.ipa.test: 192.168.121.169. transport.py 558 DEBUG Missing reverse record(s) for address(es): 192.168.121.169. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.7.90test transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG Using default chrony configuration. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-replica-install', '-p', 'Secret.123', '-w', 'Secret.123', '-U', '--setup-ca', '--ip-address', '192.168.121.169', '-r', 'IPA.TEST'] transport.py 513 DEBUG RUN ['ipa-replica-install', '-p', 'Secret.123', '-w', 'Secret.123', '-U', '--setup-ca', '--ip-address', '192.168.121.169', '-r', 'IPA.TEST'] transport.py 558 DEBUG ipaserver.install.server.replicainstall: ERROR Reverse DNS resolution of address 192.168.121.169 (replica0.ipa.test) failed. Clients may not function properly. Please check your DNS setup. (Note that this check queries IPA DNS directly and ignores /etc/hosts.) transport.py 558 DEBUG IPA client is already configured on this system, ignoring the --domain, --server, --realm, --hostname, --password and --keytab options. transport.py 558 DEBUG Run connection check to master transport.py 558 DEBUG Connection check OK transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG [1/41]: creating directory server instance transport.py 558 DEBUG [2/41]: enabling ldapi transport.py 558 DEBUG [3/41]: configure autobind for root transport.py 558 DEBUG [4/41]: stopping directory server transport.py 558 DEBUG [5/41]: updating configuration in dse.ldif transport.py 558 DEBUG [6/41]: starting directory server transport.py 558 DEBUG [7/41]: adding default schema transport.py 558 DEBUG [8/41]: enabling memberof plugin transport.py 558 DEBUG [9/41]: enabling winsync plugin transport.py 558 DEBUG [10/41]: configuring replication version plugin transport.py 558 DEBUG [11/41]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/41]: configuring uniqueness plugin transport.py 558 DEBUG [13/41]: configuring uuid plugin transport.py 558 DEBUG [14/41]: configuring modrdn plugin transport.py 558 DEBUG [15/41]: configuring DNS plugin transport.py 558 DEBUG [16/41]: enabling entryUSN plugin transport.py 558 DEBUG [17/41]: configuring lockout plugin transport.py 558 DEBUG [18/41]: configuring topology plugin transport.py 558 DEBUG [19/41]: creating indices transport.py 558 DEBUG [20/41]: enabling referential integrity plugin transport.py 558 DEBUG [21/41]: configuring certmap.conf transport.py 558 DEBUG [22/41]: configure new location for managed entries transport.py 558 DEBUG [23/41]: configure dirsrv ccache transport.py 558 DEBUG [24/41]: enabling SASL mapping fallback transport.py 558 DEBUG [25/41]: restarting directory server transport.py 558 DEBUG [26/41]: creating DS keytab transport.py 558 DEBUG [27/41]: ignore time skew for initial replication transport.py 558 DEBUG [28/41]: setting up initial replication transport.py 558 DEBUG Starting replication, please wait until this has completed. transport.py 558 DEBUG Update in progress, 1 seconds elapsed Update in progress, 2 seconds elapsed Update in progress, 3 seconds elapsed Update in progress, 4 seconds elapsed Update in progress, 5 seconds elapsed Update in progress, 6 seconds elapsed Update in progress, 7 seconds elapsed transport.py 558 DEBUG Update succeeded transport.py 558 DEBUG transport.py 558 DEBUG [29/41]: prevent time skew after initial replication transport.py 558 DEBUG [30/41]: adding sasl mappings to the directory transport.py 558 DEBUG [31/41]: updating schema transport.py 558 DEBUG [32/41]: setting Auto Member configuration transport.py 558 DEBUG [33/41]: enabling S4U2Proxy delegation transport.py 558 DEBUG [34/41]: initializing group membership transport.py 558 DEBUG [35/41]: adding master entry transport.py 558 DEBUG [36/41]: initializing domain level transport.py 558 DEBUG [37/41]: configuring Posix uid/gid generation transport.py 558 DEBUG [38/41]: adding replication acis transport.py 558 DEBUG [39/41]: activating sidgen plugin transport.py 558 DEBUG [40/41]: activating extdom plugin transport.py 558 DEBUG [41/41]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/5]: configuring KDC transport.py 558 DEBUG [2/5]: adding the password extension to the directory transport.py 558 DEBUG [3/5]: creating anonymous principal transport.py 558 DEBUG [4/5]: starting the KDC transport.py 558 DEBUG [5/5]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: importing CA certificates from LDAP transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list to TLSv1.0 - TLSv1.2 transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/4]: Generating ipa-custodia config file transport.py 558 DEBUG [2/4]: Generating ipa-custodia keys transport.py 558 DEBUG [3/4]: starting ipa-custodia transport.py 558 DEBUG [4/4]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/28]: creating certificate server db transport.py 558 DEBUG [2/28]: setting up initial replication transport.py 558 DEBUG Starting replication, please wait until this has completed. transport.py 558 DEBUG Update in progress, 1 seconds elapsed Update in progress, 2 seconds elapsed Update in progress, 3 seconds elapsed Update in progress, 4 seconds elapsed Update in progress, 5 seconds elapsed Update in progress, 6 seconds elapsed Update in progress, 7 seconds elapsed Update in progress, 8 seconds elapsed Update in progress, 9 seconds elapsed transport.py 558 DEBUG Update succeeded transport.py 558 DEBUG transport.py 558 DEBUG [3/28]: creating ACIs for admin transport.py 558 DEBUG [4/28]: creating installation admin user transport.py 558 DEBUG [5/28]: configuring certificate server instance transport.py 558 DEBUG [6/28]: exporting Dogtag certificate store pin transport.py 558 DEBUG [7/28]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [8/28]: backing up CS.cfg transport.py 558 DEBUG [9/28]: disabling nonces transport.py 558 DEBUG [10/28]: set up CRL publishing transport.py 558 DEBUG [11/28]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [12/28]: destroying installation admin user transport.py 558 DEBUG [13/28]: starting certificate server instance transport.py 558 DEBUG [14/28]: Finalize replication settings transport.py 558 DEBUG [15/28]: configure certmonger for renewals transport.py 558 DEBUG [16/28]: Importing RA key transport.py 558 DEBUG [17/28]: setting audit signing renewal to 2 years transport.py 558 DEBUG [18/28]: restarting certificate server transport.py 558 DEBUG [19/28]: authorizing RA to modify profiles transport.py 558 DEBUG [20/28]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [21/28]: Ensure lightweight CAs container exists transport.py 558 DEBUG [22/28]: configure certificate renewals transport.py 558 DEBUG [23/28]: configure Server-Cert certificate renewal transport.py 558 DEBUG [24/28]: Configure HTTP to proxy connections transport.py 558 DEBUG [25/28]: restarting certificate server transport.py 558 DEBUG [26/28]: updating IPA configuration transport.py 558 DEBUG [27/28]: enabling CA instance transport.py 558 DEBUG [28/28]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Full PKINIT configuration did not succeed transport.py 558 DEBUG The setup will only install bits essential to the server functionality transport.py 558 DEBUG You can enable PKINIT after the setup completed using 'ipa-pkinit-manage' transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Finalize replication settings transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG ipaserver.dns_data_management: ERROR unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG ipaserver.dns_data_management: ERROR unable to resolve host name replica0.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 217 DEBUG Exit code: 0 tasks.py 259 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123', '-h', 'replica0.ipa.test'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123', '-h', 'replica0.ipa.test'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 244 INFO Adding replica0.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa', 'ca-add', 'test_subca_master', '--subject', 'cn=test_subca_master', '--desc', 'subca'] transport.py 513 DEBUG RUN ['ipa', 'ca-add', 'test_subca_master', '--subject', 'cn=test_subca_master', '--desc', 'subca'] transport.py 558 DEBUG ------------------------------ transport.py 558 DEBUG Created CA "test_subca_master" transport.py 558 DEBUG ------------------------------ transport.py 558 DEBUG Name: test_subca_master transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG Subject DN: CN=test_subca_master transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: MIIDazCCAlOgAwIBAgIBDjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhJUEEuVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE4MDgwOTEwNTIxNVoXDTM4MDgwOTEwNTIxNVowHDEaMBgGA1UEAwwRdGVzdF9zdWJjYV9tYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5KqZQktlMKtKg5hpeypV81Hj3DVSu7sx+iYWvDwlpcjXW01eZ51naC69IaOhXoQ/piHtePwN84n2yK4OaouJl3y0U4rNVo/+Q2UItKKqy5a1OZ9lNO9Tl9dtyyjAjp0d/t4apbhmVqsrCe/lzbODjtH50biRel3RodukOVFAB1Sp90lram2pxgZiTjIG+BN6wix15q/CTIBuHiV0s+Kz85YPBKSMXP4v4Qe3SVUDJaXlPSbYwz43ATKOuTbt07D5IhjA44e8CwfNzHvxsd6tfU7uF6Ugn/b2BlzPMrb2Tob8sm7eFxEHkBG613CoHfvQ4HuRr/1zcFyOVd8ev6l0jAgMBAAGjgaAwgZ0wHwYDVR0jBBgwFoAU2HyTQIzMrbrSjYA5SYj+EcX/CBUwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0OBBYEFN2t5t9WZsgHdB6E9HP0yYnxAdiYMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5pcGEudGVzdC9jYS9vY3NwMA0GCSqGSIb3DQEBCwUAA4IBAQAEEi0cDtJ8hxKAuff4Y9GkvP1EoWbYJbgtmxSnXeuDmi4JPSwdT+YUhze00jI9U+yJ0lpSDbmC80WrQefvo6zYP319duH6rOjncwVF7oT+zZuw8R07QzWKaapZyALiEvBxG+RJcG4GB41M7Xi1hDquadLUq5jM++y/6awJvgay1XpxbfbsWnF1WVSXM/s++0Y5FOCPjxFe+4NaB1raCdKxYR2qevs2E/K5JkPN1CRwyfOToJOIhV6uTSmqqzDvK9rhYBmkyHwVo4v9gDIfKBihwnjSLVF6pBWbajMhjn0sxVccaHZqFDPW/74/xkPfz18C8R5Azw0tqZ/3YCFtG38K transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'ca-show', 'test_subca_master'] transport.py 513 DEBUG RUN ['ipa', 'ca-show', 'test_subca_master'] transport.py 558 DEBUG Name: test_subca_master transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG Subject DN: CN=test_subca_master transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: MIIDazCCAlOgAwIBAgIBDjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhJUEEuVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE4MDgwOTEwNTIxNVoXDTM4MDgwOTEwNTIxNVowHDEaMBgGA1UEAwwRdGVzdF9zdWJjYV9tYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5KqZQktlMKtKg5hpeypV81Hj3DVSu7sx+iYWvDwlpcjXW01eZ51naC69IaOhXoQ/piHtePwN84n2yK4OaouJl3y0U4rNVo/+Q2UItKKqy5a1OZ9lNO9Tl9dtyyjAjp0d/t4apbhmVqsrCe/lzbODjtH50biRel3RodukOVFAB1Sp90lram2pxgZiTjIG+BN6wix15q/CTIBuHiV0s+Kz85YPBKSMXP4v4Qe3SVUDJaXlPSbYwz43ATKOuTbt07D5IhjA44e8CwfNzHvxsd6tfU7uF6Ugn/b2BlzPMrb2Tob8sm7eFxEHkBG613CoHfvQ4HuRr/1zcFyOVd8ev6l0jAgMBAAGjgaAwgZ0wHwYDVR0jBBgwFoAU2HyTQIzMrbrSjYA5SYj+EcX/CBUwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0OBBYEFN2t5t9WZsgHdB6E9HP0yYnxAdiYMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5pcGEudGVzdC9jYS9vY3NwMA0GCSqGSIb3DQEBCwUAA4IBAQAEEi0cDtJ8hxKAuff4Y9GkvP1EoWbYJbgtmxSnXeuDmi4JPSwdT+YUhze00jI9U+yJ0lpSDbmC80WrQefvo6zYP319duH6rOjncwVF7oT+zZuw8R07QzWKaapZyALiEvBxG+RJcG4GB41M7Xi1hDquadLUq5jM++y/6awJvgay1XpxbfbsWnF1WVSXM/s++0Y5FOCPjxFe+4NaB1raCdKxYR2qevs2E/K5JkPN1CRwyfOToJOIhV6uTSmqqzDvK9rhYBmkyHwVo4v9gDIfKBihwnjSLVF6pBWbajMhjn0sxVccaHZqFDPW/74/xkPfz18C8R5Azw0tqZ/3YCFtG38K transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 558 DEBUG Certificate: transport.py 558 DEBUG Data: transport.py 558 DEBUG Version: 3 (0x2) transport.py 558 DEBUG Serial Number: 14 (0xe) transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Issuer: "CN=Certificate Authority,O=IPA.TEST" transport.py 558 DEBUG Validity: transport.py 558 DEBUG Not Before: Thu Aug 09 10:52:15 2018 transport.py 558 DEBUG Not After : Mon Aug 09 10:52:15 2038 transport.py 558 DEBUG Subject: "CN=test_subca_master" transport.py 558 DEBUG Subject Public Key Info: transport.py 558 DEBUG Public Key Algorithm: PKCS #1 RSA Encryption transport.py 558 DEBUG RSA Public Key: transport.py 558 DEBUG Modulus: transport.py 558 DEBUG b9:2a:a6:50:92:d9:4c:2a:d2:a0:e6:1a:5e:ca:95:7c: transport.py 558 DEBUG d4:78:f7:0d:54:ae:ee:cc:7e:89:85:af:0f:09:69:72: transport.py 558 DEBUG 35:d6:d3:57:99:e7:59:da:0b:af:48:68:e8:57:a1:0f: transport.py 558 DEBUG e9:88:7b:5e:3f:03:7c:e2:7d:b2:2b:83:9a:a2:e2:65: transport.py 558 DEBUG df:2d:14:e2:b3:55:a3:ff:90:d9:42:2d:28:aa:b2:e5: transport.py 558 DEBUG ad:4e:67:d9:4d:3b:d4:e5:f5:db:72:ca:30:23:a7:47: transport.py 558 DEBUG 7f:b7:86:a9:6e:19:95:aa:ca:c2:7b:f9:73:6c:e0:e3: transport.py 558 DEBUG b4:7e:74:6e:24:5e:97:74:68:76:e9:0e:54:50:01:d5: transport.py 558 DEBUG 2a:7d:d2:5a:da:9b:6a:71:81:98:93:8c:81:be:04:de: transport.py 558 DEBUG b0:8b:1d:79:ab:f0:93:20:1b:87:89:5d:2c:f8:ac:fc: transport.py 558 DEBUG e5:83:c1:29:23:17:3f:8b:f8:41:ed:d2:55:40:c9:69: transport.py 558 DEBUG 79:4f:49:b6:30:cf:8d:c0:4c:a3:ae:4d:bb:74:ec:3e: transport.py 558 DEBUG 48:86:30:38:e1:ef:02:c1:f3:73:1e:fc:6c:77:ab:5f: transport.py 558 DEBUG 53:bb:85:e9:48:27:fd:bd:81:97:33:cc:ad:bd:93:a1: transport.py 558 DEBUG bf:2c:9b:b7:85:c4:41:e4:04:6e:b5:dc:2a:07:7e:f4: transport.py 558 DEBUG 38:1e:e4:6b:ff:5c:dc:17:23:95:77:c7:af:ea:5d:23 transport.py 558 DEBUG Exponent: 65537 (0x10001) transport.py 558 DEBUG Signed Extensions: transport.py 558 DEBUG Name: Certificate Authority Key Identifier transport.py 558 DEBUG Key ID: transport.py 558 DEBUG d8:7c:93:40:8c:cc:ad:ba:d2:8d:80:39:49:88:fe:11: transport.py 558 DEBUG c5:ff:08:15 transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Basic Constraints transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Data: Is a CA with no maximum path length. transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Key Usage transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Usages: Digital Signature transport.py 558 DEBUG Non-Repudiation transport.py 558 DEBUG Certificate Signing transport.py 558 DEBUG CRL Signing transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Subject Key ID transport.py 558 DEBUG Data: transport.py 558 DEBUG dd:ad:e6:df:56:66:c8:07:74:1e:84:f4:73:f4:c9:89: transport.py 558 DEBUG f1:01:d8:98 transport.py 558 DEBUG transport.py 558 DEBUG Name: Authority Information Access transport.py 558 DEBUG Method: PKIX Online Certificate Status Protocol transport.py 558 DEBUG Location: transport.py 558 DEBUG URI: "http://ipa-ca.ipa.test/ca/ocsp" transport.py 558 DEBUG transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Signature: transport.py 558 DEBUG 04:12:2d:1c:0e:d2:7c:87:12:80:b9:f7:f8:63:d1:a4: transport.py 558 DEBUG bc:fd:44:a1:66:d8:25:b8:2d:9b:14:a7:5d:eb:83:9a: transport.py 558 DEBUG 2e:09:3d:2c:1d:4f:e6:14:87:37:b4:d2:32:3d:53:ec: transport.py 558 DEBUG 89:d2:5a:52:0d:b9:82:f3:45:ab:41:e7:ef:a3:ac:d8: transport.py 558 DEBUG 3f:7d:7d:76:e1:fa:ac:e8:e7:73:05:45:ee:84:fe:cd: transport.py 558 DEBUG 9b:b0:f1:1d:3b:43:35:8a:69:aa:59:c8:02:e2:12:f0: transport.py 558 DEBUG 71:1b:e4:49:70:6e:06:07:8d:4c:ed:78:b5:84:3a:ae: transport.py 558 DEBUG 69:d2:d4:ab:98:cc:fb:ec:bf:e9:ac:09:be:06:b2:d5: transport.py 558 DEBUG 7a:71:6d:f6:ec:5a:71:75:59:54:97:33:fb:3e:fb:46: transport.py 558 DEBUG 39:14:e0:8f:8f:11:5e:fb:83:5a:07:5a:da:09:d2:b1: transport.py 558 DEBUG 61:1d:aa:7a:fb:36:13:f2:b9:26:43:cd:d4:24:70:c9: transport.py 558 DEBUG f3:93:a0:93:88:85:5e:ae:4d:29:aa:ab:30:ef:2b:da: transport.py 558 DEBUG e1:60:19:a4:c8:7c:15:a3:8b:fd:80:32:1f:28:18:a1: transport.py 558 DEBUG c2:78:d2:2d:51:7a:a4:15:9b:6a:33:21:8e:7d:2c:c5: transport.py 558 DEBUG 57:1c:68:76:6a:14:33:d6:ff:be:3f:c6:43:df:cf:5f: transport.py 558 DEBUG 02:f1:1e:40:cf:0d:2d:a9:9f:f7:60:21:6d:1b:7f:0a transport.py 558 DEBUG Fingerprint (SHA-256): transport.py 558 DEBUG E5:8C:0C:C5:77:15:AB:0A:08:58:EF:34:1C:76:45:A7:CA:A0:6B:17:49:D5:01:6C:4A:DB:F5:34:00:B8:7E:0A transport.py 558 DEBUG Fingerprint (SHA1): transport.py 558 DEBUG DE:96:7C:11:E7:7C:7B:77:37:BF:8E:03:EA:2E:5F:DD:A4:A5:BD:E3 transport.py 558 DEBUG transport.py 558 DEBUG Mozilla-CA-Policy: false (attribute missing) transport.py 558 DEBUG Certificate Trust Flags: transport.py 558 DEBUG SSL Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Email Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Object Signing Flags: transport.py 558 DEBUG User transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'ca-show', 'test_subca_master'] transport.py 513 DEBUG RUN ['ipa', 'ca-show', 'test_subca_master'] transport.py 558 DEBUG Name: test_subca_master transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG Subject DN: CN=test_subca_master transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: 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 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 558 DEBUG Certificate: transport.py 558 DEBUG Data: transport.py 558 DEBUG Version: 3 (0x2) transport.py 558 DEBUG Serial Number: 14 (0xe) transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Issuer: "CN=Certificate Authority,O=IPA.TEST" transport.py 558 DEBUG Validity: transport.py 558 DEBUG Not Before: Thu Aug 09 10:52:15 2018 transport.py 558 DEBUG Not After : Mon Aug 09 10:52:15 2038 transport.py 558 DEBUG Subject: "CN=test_subca_master" transport.py 558 DEBUG Subject Public Key Info: transport.py 558 DEBUG Public Key Algorithm: PKCS #1 RSA Encryption transport.py 558 DEBUG RSA Public Key: transport.py 558 DEBUG Modulus: transport.py 558 DEBUG b9:2a:a6:50:92:d9:4c:2a:d2:a0:e6:1a:5e:ca:95:7c: transport.py 558 DEBUG d4:78:f7:0d:54:ae:ee:cc:7e:89:85:af:0f:09:69:72: transport.py 558 DEBUG 35:d6:d3:57:99:e7:59:da:0b:af:48:68:e8:57:a1:0f: transport.py 558 DEBUG e9:88:7b:5e:3f:03:7c:e2:7d:b2:2b:83:9a:a2:e2:65: transport.py 558 DEBUG df:2d:14:e2:b3:55:a3:ff:90:d9:42:2d:28:aa:b2:e5: transport.py 558 DEBUG ad:4e:67:d9:4d:3b:d4:e5:f5:db:72:ca:30:23:a7:47: transport.py 558 DEBUG 7f:b7:86:a9:6e:19:95:aa:ca:c2:7b:f9:73:6c:e0:e3: transport.py 558 DEBUG b4:7e:74:6e:24:5e:97:74:68:76:e9:0e:54:50:01:d5: transport.py 558 DEBUG 2a:7d:d2:5a:da:9b:6a:71:81:98:93:8c:81:be:04:de: transport.py 558 DEBUG b0:8b:1d:79:ab:f0:93:20:1b:87:89:5d:2c:f8:ac:fc: transport.py 558 DEBUG e5:83:c1:29:23:17:3f:8b:f8:41:ed:d2:55:40:c9:69: transport.py 558 DEBUG 79:4f:49:b6:30:cf:8d:c0:4c:a3:ae:4d:bb:74:ec:3e: transport.py 558 DEBUG 48:86:30:38:e1:ef:02:c1:f3:73:1e:fc:6c:77:ab:5f: transport.py 558 DEBUG 53:bb:85:e9:48:27:fd:bd:81:97:33:cc:ad:bd:93:a1: transport.py 558 DEBUG bf:2c:9b:b7:85:c4:41:e4:04:6e:b5:dc:2a:07:7e:f4: transport.py 558 DEBUG 38:1e:e4:6b:ff:5c:dc:17:23:95:77:c7:af:ea:5d:23 transport.py 558 DEBUG Exponent: 65537 (0x10001) transport.py 558 DEBUG Signed Extensions: transport.py 558 DEBUG Name: Certificate Authority Key Identifier transport.py 558 DEBUG Key ID: transport.py 558 DEBUG d8:7c:93:40:8c:cc:ad:ba:d2:8d:80:39:49:88:fe:11: transport.py 558 DEBUG c5:ff:08:15 transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Basic Constraints transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Data: Is a CA with no maximum path length. transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Key Usage transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Usages: Digital Signature transport.py 558 DEBUG Non-Repudiation transport.py 558 DEBUG Certificate Signing transport.py 558 DEBUG CRL Signing transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Subject Key ID transport.py 558 DEBUG Data: transport.py 558 DEBUG dd:ad:e6:df:56:66:c8:07:74:1e:84:f4:73:f4:c9:89: transport.py 558 DEBUG f1:01:d8:98 transport.py 558 DEBUG transport.py 558 DEBUG Name: Authority Information Access transport.py 558 DEBUG Method: PKIX Online Certificate Status Protocol transport.py 558 DEBUG Location: transport.py 558 DEBUG URI: "http://ipa-ca.ipa.test/ca/ocsp" transport.py 558 DEBUG transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Signature: transport.py 558 DEBUG 04:12:2d:1c:0e:d2:7c:87:12:80:b9:f7:f8:63:d1:a4: transport.py 558 DEBUG bc:fd:44:a1:66:d8:25:b8:2d:9b:14:a7:5d:eb:83:9a: transport.py 558 DEBUG 2e:09:3d:2c:1d:4f:e6:14:87:37:b4:d2:32:3d:53:ec: transport.py 558 DEBUG 89:d2:5a:52:0d:b9:82:f3:45:ab:41:e7:ef:a3:ac:d8: transport.py 558 DEBUG 3f:7d:7d:76:e1:fa:ac:e8:e7:73:05:45:ee:84:fe:cd: transport.py 558 DEBUG 9b:b0:f1:1d:3b:43:35:8a:69:aa:59:c8:02:e2:12:f0: transport.py 558 DEBUG 71:1b:e4:49:70:6e:06:07:8d:4c:ed:78:b5:84:3a:ae: transport.py 558 DEBUG 69:d2:d4:ab:98:cc:fb:ec:bf:e9:ac:09:be:06:b2:d5: transport.py 558 DEBUG 7a:71:6d:f6:ec:5a:71:75:59:54:97:33:fb:3e:fb:46: transport.py 558 DEBUG 39:14:e0:8f:8f:11:5e:fb:83:5a:07:5a:da:09:d2:b1: transport.py 558 DEBUG 61:1d:aa:7a:fb:36:13:f2:b9:26:43:cd:d4:24:70:c9: transport.py 558 DEBUG f3:93:a0:93:88:85:5e:ae:4d:29:aa:ab:30:ef:2b:da: transport.py 558 DEBUG e1:60:19:a4:c8:7c:15:a3:8b:fd:80:32:1f:28:18:a1: transport.py 558 DEBUG c2:78:d2:2d:51:7a:a4:15:9b:6a:33:21:8e:7d:2c:c5: transport.py 558 DEBUG 57:1c:68:76:6a:14:33:d6:ff:be:3f:c6:43:df:cf:5f: transport.py 558 DEBUG 02:f1:1e:40:cf:0d:2d:a9:9f:f7:60:21:6d:1b:7f:0a transport.py 558 DEBUG Fingerprint (SHA-256): transport.py 558 DEBUG E5:8C:0C:C5:77:15:AB:0A:08:58:EF:34:1C:76:45:A7:CA:A0:6B:17:49:D5:01:6C:4A:DB:F5:34:00:B8:7E:0A transport.py 558 DEBUG Fingerprint (SHA1): transport.py 558 DEBUG DE:96:7C:11:E7:7C:7B:77:37:BF:8E:03:EA:2E:5F:DD:A4:A5:BD:E3 transport.py 558 DEBUG transport.py 558 DEBUG Mozilla-CA-Policy: false (attribute missing) transport.py 558 DEBUG Certificate Trust Flags: transport.py 558 DEBUG SSL Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Email Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Object Signing Flags: transport.py 558 DEBUG User transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 217 DEBUG Exit code: 0 transport.py 284 DEBUG READ /var/log/pki/pki-tomcat/ca/debug.2018-08-09.log transport.py 318 INFO RUN ['ipa', 'ca-find', '--desc', 'subca'] transport.py 513 DEBUG RUN ['ipa', 'ca-find', '--desc', 'subca'] transport.py 558 DEBUG ------------ transport.py 558 DEBUG 1 CA matched transport.py 558 DEBUG ------------ transport.py 558 DEBUG Name: test_subca_master transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG Subject DN: CN=test_subca_master transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG ---------------------------- transport.py 558 DEBUG Number of entries returned 1 transport.py 558 DEBUG ---------------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG transport.py 558 DEBUG Certificate Nickname Trust Attributes transport.py 558 DEBUG SSL,S/MIME,JAR/XPI transport.py 558 DEBUG transport.py 558 DEBUG caSigningCert cert-pki-ca CTu,Cu,Cu transport.py 558 DEBUG ocspSigningCert cert-pki-ca u,u,u transport.py 558 DEBUG subsystemCert cert-pki-ca u,u,u transport.py 558 DEBUG auditSigningCert cert-pki-ca u,u,Pu transport.py 558 DEBUG Server-Cert cert-pki-ca u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 u,u,u transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 3286bef26934adc908dc3e057d5d3157bdad7798 NSS Certificate DB:Server-Cert cert-pki-ca transport.py 558 DEBUG < 1> rsa 21380b19361dcb89175c2ab17da4bd29631c94e1 caSigningCert cert-pki-ca transport.py 558 DEBUG < 2> rsa 4d1a5af5351b13b24126bab40d1bfd55714b2a96 ocspSigningCert cert-pki-ca transport.py 558 DEBUG < 3> rsa 82b9debeea9ff0335821c453cf9aee0be89d6c0b subsystemCert cert-pki-ca transport.py 558 DEBUG < 4> rsa a2278433ba6ec0991cb0f3e36b7ed6dfa9b7b185 auditSigningCert cert-pki-ca transport.py 558 DEBUG < 5> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG transport.py 558 DEBUG Certificate Nickname Trust Attributes transport.py 558 DEBUG SSL,S/MIME,JAR/XPI transport.py 558 DEBUG transport.py 558 DEBUG caSigningCert cert-pki-ca CTu,Cu,Cu transport.py 558 DEBUG ocspSigningCert cert-pki-ca u,u,u transport.py 558 DEBUG auditSigningCert cert-pki-ca u,u,Pu transport.py 558 DEBUG subsystemCert cert-pki-ca u,u,u transport.py 558 DEBUG Server-Cert cert-pki-ca u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 u,u,u transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 21380b19361dcb89175c2ab17da4bd29631c94e1 caSigningCert cert-pki-ca transport.py 558 DEBUG < 1> rsa 4d1a5af5351b13b24126bab40d1bfd55714b2a96 ocspSigningCert cert-pki-ca transport.py 558 DEBUG < 2> rsa a2278433ba6ec0991cb0f3e36b7ed6dfa9b7b185 auditSigningCert cert-pki-ca transport.py 558 DEBUG < 3> rsa 82b9debeea9ff0335821c453cf9aee0be89d6c0b subsystemCert cert-pki-ca transport.py 558 DEBUG < 4> rsa 706b37fe3f10c119e78c19531cb96676195418ff NSS Certificate DB:Server-Cert cert-pki-ca transport.py 558 DEBUG < 5> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 217 DEBUG Exit code: 0
Passed test_replica_promotion.py::TestSubCAkeyReplication::()::test_subca_replica 33.86
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa', 'ca-add', 'test_subca_replica', '--subject', 'cn=test_subca_replica', '--desc', 'subca'] transport.py 513 DEBUG RUN ['ipa', 'ca-add', 'test_subca_replica', '--subject', 'cn=test_subca_replica', '--desc', 'subca'] transport.py 558 DEBUG ------------------------------- transport.py 558 DEBUG Created CA "test_subca_replica" transport.py 558 DEBUG ------------------------------- transport.py 558 DEBUG Name: test_subca_replica transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 558 DEBUG Subject DN: CN=test_subca_replica transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: 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 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'ca-show', 'test_subca_replica'] transport.py 513 DEBUG RUN ['ipa', 'ca-show', 'test_subca_replica'] transport.py 558 DEBUG Name: test_subca_replica transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 558 DEBUG Subject DN: CN=test_subca_replica transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: MIIDbzCCAlegAwIBAgIED/8AATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhJUEEuVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE4MDgwOTEwNTMwOFoXDTM4MDgwOTEwNTMwOFowHTEbMBkGA1UEAwwSdGVzdF9zdWJjYV9yZXBsaWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0Bv51Hn5WMB26d2ZTJKcJXQIvTi0OGFHlA+AcGwqwOdQTFZ8/pdeylrpF6T4+X55Pw6+2PfToIELfNpDR7CGskuGNqjfqYFllG6XDQQUiHLTLlklkoQbau5Ih/cSN5JinfoqebcHZEGy/uLYN1PXd3CQ806uVAv+TrlowWw3yWQMT2iaRCQWkZ9NPHOHarj5vPMqJo94HZGEflHnYL0iJ4t5TfYZDAlzPUZQM6MpEIpYpFc78Wd4/LQ2tz2REj97a6vMt+detg8R8moSvlhPXGTGQH7rtMpym0j+6LnX0qK4cMnzuq+xBkK7EhZ8FIfL+rtWqHm9OCMaiLlCTuYD/QIDAQABo4GgMIGdMB8GA1UdIwQYMBaAFNh8k0CMzK260o2AOUmI/hHF/wgVMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgHGMB0GA1UdDgQWBBQEvdppuSiJ58MOWEmGSJRnJdBCwzA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2EuaXBhLnRlc3QvY2Evb2NzcDANBgkqhkiG9w0BAQsFAAOCAQEAWP0SwfShjmkLiSAgklnT7ES095LIddt1e55kwQfX7dWlueYoORllAmJpew2E0Fn0O6JklblG+l8Ob82mBVwyB2XhvRHCG/7Xt5PbirbIpp7QgYbHwYcZNfUjkkCSFJkpivR1VD/2UzFOPIo9Nkeda5p+uAS6RKcPOyPi54nkvRW8ZCJXPwG0UmXKJ3lM2LbSngw1rE8L2PtluOu2DOjW6GFLMzM+LbaK/zTCnjQaLyajsMSPWuA5q/HtFsH8JBqepyf5Uf4/sz+Txdz/QtO2koUi0beaoH78sYlFPpRlXgG0h5ZmW3cMn0bnRQ8Q1nfACIG+fxw5Ml3nIDbxfCmbJQ== transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 558 DEBUG Certificate: transport.py 558 DEBUG Data: transport.py 558 DEBUG Version: 3 (0x2) transport.py 558 DEBUG Serial Number: 268369921 (0xfff0001) transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Issuer: "CN=Certificate Authority,O=IPA.TEST" transport.py 558 DEBUG Validity: transport.py 558 DEBUG Not Before: Thu Aug 09 10:53:08 2018 transport.py 558 DEBUG Not After : Mon Aug 09 10:53:08 2038 transport.py 558 DEBUG Subject: "CN=test_subca_replica" transport.py 558 DEBUG Subject Public Key Info: transport.py 558 DEBUG Public Key Algorithm: PKCS #1 RSA Encryption transport.py 558 DEBUG RSA Public Key: transport.py 558 DEBUG Modulus: transport.py 558 DEBUG d0:1b:f9:d4:79:f9:58:c0:76:e9:dd:99:4c:92:9c:25: transport.py 558 DEBUG 74:08:bd:38:b4:38:61:47:94:0f:80:70:6c:2a:c0:e7: transport.py 558 DEBUG 50:4c:56:7c:fe:97:5e:ca:5a:e9:17:a4:f8:f9:7e:79: transport.py 558 DEBUG 3f:0e:be:d8:f7:d3:a0:81:0b:7c:da:43:47:b0:86:b2: transport.py 558 DEBUG 4b:86:36:a8:df:a9:81:65:94:6e:97:0d:04:14:88:72: transport.py 558 DEBUG d3:2e:59:25:92:84:1b:6a:ee:48:87:f7:12:37:92:62: transport.py 558 DEBUG 9d:fa:2a:79:b7:07:64:41:b2:fe:e2:d8:37:53:d7:77: transport.py 558 DEBUG 70:90:f3:4e:ae:54:0b:fe:4e:b9:68:c1:6c:37:c9:64: transport.py 558 DEBUG 0c:4f:68:9a:44:24:16:91:9f:4d:3c:73:87:6a:b8:f9: transport.py 558 DEBUG bc:f3:2a:26:8f:78:1d:91:84:7e:51:e7:60:bd:22:27: transport.py 558 DEBUG 8b:79:4d:f6:19:0c:09:73:3d:46:50:33:a3:29:10:8a: transport.py 558 DEBUG 58:a4:57:3b:f1:67:78:fc:b4:36:b7:3d:91:12:3f:7b: transport.py 558 DEBUG 6b:ab:cc:b7:e7:5e:b6:0f:11:f2:6a:12:be:58:4f:5c: transport.py 558 DEBUG 64:c6:40:7e:eb:b4:ca:72:9b:48:fe:e8:b9:d7:d2:a2: transport.py 558 DEBUG b8:70:c9:f3:ba:af:b1:06:42:bb:12:16:7c:14:87:cb: transport.py 558 DEBUG fa:bb:56:a8:79:bd:38:23:1a:88:b9:42:4e:e6:03:fd transport.py 558 DEBUG Exponent: 65537 (0x10001) transport.py 558 DEBUG Signed Extensions: transport.py 558 DEBUG Name: Certificate Authority Key Identifier transport.py 558 DEBUG Key ID: transport.py 558 DEBUG d8:7c:93:40:8c:cc:ad:ba:d2:8d:80:39:49:88:fe:11: transport.py 558 DEBUG c5:ff:08:15 transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Basic Constraints transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Data: Is a CA with no maximum path length. transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Key Usage transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Usages: Digital Signature transport.py 558 DEBUG Non-Repudiation transport.py 558 DEBUG Certificate Signing transport.py 558 DEBUG CRL Signing transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Subject Key ID transport.py 558 DEBUG Data: transport.py 558 DEBUG 04:bd:da:69:b9:28:89:e7:c3:0e:58:49:86:48:94:67: transport.py 558 DEBUG 25:d0:42:c3 transport.py 558 DEBUG transport.py 558 DEBUG Name: Authority Information Access transport.py 558 DEBUG Method: PKIX Online Certificate Status Protocol transport.py 558 DEBUG Location: transport.py 558 DEBUG URI: "http://ipa-ca.ipa.test/ca/ocsp" transport.py 558 DEBUG transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Signature: transport.py 558 DEBUG 58:fd:12:c1:f4:a1:8e:69:0b:89:20:20:92:59:d3:ec: transport.py 558 DEBUG 44:b4:f7:92:c8:75:db:75:7b:9e:64:c1:07:d7:ed:d5: transport.py 558 DEBUG a5:b9:e6:28:39:19:65:02:62:69:7b:0d:84:d0:59:f4: transport.py 558 DEBUG 3b:a2:64:95:b9:46:fa:5f:0e:6f:cd:a6:05:5c:32:07: transport.py 558 DEBUG 65:e1:bd:11:c2:1b:fe:d7:b7:93:db:8a:b6:c8:a6:9e: transport.py 558 DEBUG d0:81:86:c7:c1:87:19:35:f5:23:92:40:92:14:99:29: transport.py 558 DEBUG 8a:f4:75:54:3f:f6:53:31:4e:3c:8a:3d:36:47:9d:6b: transport.py 558 DEBUG 9a:7e:b8:04:ba:44:a7:0f:3b:23:e2:e7:89:e4:bd:15: transport.py 558 DEBUG bc:64:22:57:3f:01:b4:52:65:ca:27:79:4c:d8:b6:d2: transport.py 558 DEBUG 9e:0c:35:ac:4f:0b:d8:fb:65:b8:eb:b6:0c:e8:d6:e8: transport.py 558 DEBUG 61:4b:33:33:3e:2d:b6:8a:ff:34:c2:9e:34:1a:2f:26: transport.py 558 DEBUG a3:b0:c4:8f:5a:e0:39:ab:f1:ed:16:c1:fc:24:1a:9e: transport.py 558 DEBUG a7:27:f9:51:fe:3f:b3:3f:93:c5:dc:ff:42:d3:b6:92: transport.py 558 DEBUG 85:22:d1:b7:9a:a0:7e:fc:b1:89:45:3e:94:65:5e:01: transport.py 558 DEBUG b4:87:96:66:5b:77:0c:9f:46:e7:45:0f:10:d6:77:c0: transport.py 558 DEBUG 08:81:be:7f:1c:39:32:5d:e7:20:36:f1:7c:29:9b:25 transport.py 558 DEBUG Fingerprint (SHA-256): transport.py 558 DEBUG 03:C5:20:88:F3:74:56:DC:98:A7:C3:FA:53:DC:E0:97:D1:72:71:80:F3:13:C6:8B:90:C2:1D:73:67:45:A7:D9 transport.py 558 DEBUG Fingerprint (SHA1): transport.py 558 DEBUG 46:99:E6:C7:E3:E9:47:71:20:E3:A0:9B:AF:93:8E:E9:2A:B3:4C:B8 transport.py 558 DEBUG transport.py 558 DEBUG Mozilla-CA-Policy: false (attribute missing) transport.py 558 DEBUG Certificate Trust Flags: transport.py 558 DEBUG SSL Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Email Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Object Signing Flags: transport.py 558 DEBUG User transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 109e16b0c093dcb8b4765eb1207b5d7ca05c8de8 caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'ca-show', 'test_subca_replica'] transport.py 513 DEBUG RUN ['ipa', 'ca-show', 'test_subca_replica'] transport.py 558 DEBUG Name: test_subca_replica transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 558 DEBUG Subject DN: CN=test_subca_replica transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Certificate: MIIDbzCCAlegAwIBAgIED/8AATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhJUEEuVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE4MDgwOTEwNTMwOFoXDTM4MDgwOTEwNTMwOFowHTEbMBkGA1UEAwwSdGVzdF9zdWJjYV9yZXBsaWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0Bv51Hn5WMB26d2ZTJKcJXQIvTi0OGFHlA+AcGwqwOdQTFZ8/pdeylrpF6T4+X55Pw6+2PfToIELfNpDR7CGskuGNqjfqYFllG6XDQQUiHLTLlklkoQbau5Ih/cSN5JinfoqebcHZEGy/uLYN1PXd3CQ806uVAv+TrlowWw3yWQMT2iaRCQWkZ9NPHOHarj5vPMqJo94HZGEflHnYL0iJ4t5TfYZDAlzPUZQM6MpEIpYpFc78Wd4/LQ2tz2REj97a6vMt+detg8R8moSvlhPXGTGQH7rtMpym0j+6LnX0qK4cMnzuq+xBkK7EhZ8FIfL+rtWqHm9OCMaiLlCTuYD/QIDAQABo4GgMIGdMB8GA1UdIwQYMBaAFNh8k0CMzK260o2AOUmI/hHF/wgVMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgHGMB0GA1UdDgQWBBQEvdppuSiJ58MOWEmGSJRnJdBCwzA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2EuaXBhLnRlc3QvY2Evb2NzcDANBgkqhkiG9w0BAQsFAAOCAQEAWP0SwfShjmkLiSAgklnT7ES095LIddt1e55kwQfX7dWlueYoORllAmJpew2E0Fn0O6JklblG+l8Ob82mBVwyB2XhvRHCG/7Xt5PbirbIpp7QgYbHwYcZNfUjkkCSFJkpivR1VD/2UzFOPIo9Nkeda5p+uAS6RKcPOyPi54nkvRW8ZCJXPwG0UmXKJ3lM2LbSngw1rE8L2PtluOu2DOjW6GFLMzM+LbaK/zTCnjQaLyajsMSPWuA5q/HtFsH8JBqepyf5Uf4/sz+Txdz/QtO2koUi0beaoH78sYlFPpRlXgG0h5ZmW3cMn0bnRQ8Q1nfACIG+fxw5Ml3nIDbxfCmbJQ== transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 558 DEBUG Certificate: transport.py 558 DEBUG Data: transport.py 558 DEBUG Version: 3 (0x2) transport.py 558 DEBUG Serial Number: 268369921 (0xfff0001) transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Issuer: "CN=Certificate Authority,O=IPA.TEST" transport.py 558 DEBUG Validity: transport.py 558 DEBUG Not Before: Thu Aug 09 10:53:08 2018 transport.py 558 DEBUG Not After : Mon Aug 09 10:53:08 2038 transport.py 558 DEBUG Subject: "CN=test_subca_replica" transport.py 558 DEBUG Subject Public Key Info: transport.py 558 DEBUG Public Key Algorithm: PKCS #1 RSA Encryption transport.py 558 DEBUG RSA Public Key: transport.py 558 DEBUG Modulus: transport.py 558 DEBUG d0:1b:f9:d4:79:f9:58:c0:76:e9:dd:99:4c:92:9c:25: transport.py 558 DEBUG 74:08:bd:38:b4:38:61:47:94:0f:80:70:6c:2a:c0:e7: transport.py 558 DEBUG 50:4c:56:7c:fe:97:5e:ca:5a:e9:17:a4:f8:f9:7e:79: transport.py 558 DEBUG 3f:0e:be:d8:f7:d3:a0:81:0b:7c:da:43:47:b0:86:b2: transport.py 558 DEBUG 4b:86:36:a8:df:a9:81:65:94:6e:97:0d:04:14:88:72: transport.py 558 DEBUG d3:2e:59:25:92:84:1b:6a:ee:48:87:f7:12:37:92:62: transport.py 558 DEBUG 9d:fa:2a:79:b7:07:64:41:b2:fe:e2:d8:37:53:d7:77: transport.py 558 DEBUG 70:90:f3:4e:ae:54:0b:fe:4e:b9:68:c1:6c:37:c9:64: transport.py 558 DEBUG 0c:4f:68:9a:44:24:16:91:9f:4d:3c:73:87:6a:b8:f9: transport.py 558 DEBUG bc:f3:2a:26:8f:78:1d:91:84:7e:51:e7:60:bd:22:27: transport.py 558 DEBUG 8b:79:4d:f6:19:0c:09:73:3d:46:50:33:a3:29:10:8a: transport.py 558 DEBUG 58:a4:57:3b:f1:67:78:fc:b4:36:b7:3d:91:12:3f:7b: transport.py 558 DEBUG 6b:ab:cc:b7:e7:5e:b6:0f:11:f2:6a:12:be:58:4f:5c: transport.py 558 DEBUG 64:c6:40:7e:eb:b4:ca:72:9b:48:fe:e8:b9:d7:d2:a2: transport.py 558 DEBUG b8:70:c9:f3:ba:af:b1:06:42:bb:12:16:7c:14:87:cb: transport.py 558 DEBUG fa:bb:56:a8:79:bd:38:23:1a:88:b9:42:4e:e6:03:fd transport.py 558 DEBUG Exponent: 65537 (0x10001) transport.py 558 DEBUG Signed Extensions: transport.py 558 DEBUG Name: Certificate Authority Key Identifier transport.py 558 DEBUG Key ID: transport.py 558 DEBUG d8:7c:93:40:8c:cc:ad:ba:d2:8d:80:39:49:88:fe:11: transport.py 558 DEBUG c5:ff:08:15 transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Basic Constraints transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Data: Is a CA with no maximum path length. transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Key Usage transport.py 558 DEBUG Critical: True transport.py 558 DEBUG Usages: Digital Signature transport.py 558 DEBUG Non-Repudiation transport.py 558 DEBUG Certificate Signing transport.py 558 DEBUG CRL Signing transport.py 558 DEBUG transport.py 558 DEBUG Name: Certificate Subject Key ID transport.py 558 DEBUG Data: transport.py 558 DEBUG 04:bd:da:69:b9:28:89:e7:c3:0e:58:49:86:48:94:67: transport.py 558 DEBUG 25:d0:42:c3 transport.py 558 DEBUG transport.py 558 DEBUG Name: Authority Information Access transport.py 558 DEBUG Method: PKIX Online Certificate Status Protocol transport.py 558 DEBUG Location: transport.py 558 DEBUG URI: "http://ipa-ca.ipa.test/ca/ocsp" transport.py 558 DEBUG transport.py 558 DEBUG Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption transport.py 558 DEBUG Signature: transport.py 558 DEBUG 58:fd:12:c1:f4:a1:8e:69:0b:89:20:20:92:59:d3:ec: transport.py 558 DEBUG 44:b4:f7:92:c8:75:db:75:7b:9e:64:c1:07:d7:ed:d5: transport.py 558 DEBUG a5:b9:e6:28:39:19:65:02:62:69:7b:0d:84:d0:59:f4: transport.py 558 DEBUG 3b:a2:64:95:b9:46:fa:5f:0e:6f:cd:a6:05:5c:32:07: transport.py 558 DEBUG 65:e1:bd:11:c2:1b:fe:d7:b7:93:db:8a:b6:c8:a6:9e: transport.py 558 DEBUG d0:81:86:c7:c1:87:19:35:f5:23:92:40:92:14:99:29: transport.py 558 DEBUG 8a:f4:75:54:3f:f6:53:31:4e:3c:8a:3d:36:47:9d:6b: transport.py 558 DEBUG 9a:7e:b8:04:ba:44:a7:0f:3b:23:e2:e7:89:e4:bd:15: transport.py 558 DEBUG bc:64:22:57:3f:01:b4:52:65:ca:27:79:4c:d8:b6:d2: transport.py 558 DEBUG 9e:0c:35:ac:4f:0b:d8:fb:65:b8:eb:b6:0c:e8:d6:e8: transport.py 558 DEBUG 61:4b:33:33:3e:2d:b6:8a:ff:34:c2:9e:34:1a:2f:26: transport.py 558 DEBUG a3:b0:c4:8f:5a:e0:39:ab:f1:ed:16:c1:fc:24:1a:9e: transport.py 558 DEBUG a7:27:f9:51:fe:3f:b3:3f:93:c5:dc:ff:42:d3:b6:92: transport.py 558 DEBUG 85:22:d1:b7:9a:a0:7e:fc:b1:89:45:3e:94:65:5e:01: transport.py 558 DEBUG b4:87:96:66:5b:77:0c:9f:46:e7:45:0f:10:d6:77:c0: transport.py 558 DEBUG 08:81:be:7f:1c:39:32:5d:e7:20:36:f1:7c:29:9b:25 transport.py 558 DEBUG Fingerprint (SHA-256): transport.py 558 DEBUG 03:C5:20:88:F3:74:56:DC:98:A7:C3:FA:53:DC:E0:97:D1:72:71:80:F3:13:C6:8B:90:C2:1D:73:67:45:A7:D9 transport.py 558 DEBUG Fingerprint (SHA1): transport.py 558 DEBUG 46:99:E6:C7:E3:E9:47:71:20:E3:A0:9B:AF:93:8E:E9:2A:B3:4C:B8 transport.py 558 DEBUG transport.py 558 DEBUG Mozilla-CA-Policy: false (attribute missing) transport.py 558 DEBUG Certificate Trust Flags: transport.py 558 DEBUG SSL Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Email Flags: transport.py 558 DEBUG User transport.py 558 DEBUG Object Signing Flags: transport.py 558 DEBUG User transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt', '-K', '-n', 'caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 109e16b0c093dcb8b4765eb1207b5d7ca05c8de8 caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 217 DEBUG Exit code: 0 transport.py 284 DEBUG READ /var/log/pki/pki-tomcat/ca/debug.2018-08-09.log transport.py 318 INFO RUN ['ipa', 'ca-find', '--desc', 'subca'] transport.py 513 DEBUG RUN ['ipa', 'ca-find', '--desc', 'subca'] transport.py 558 DEBUG ------------- transport.py 558 DEBUG 2 CAs matched transport.py 558 DEBUG ------------- transport.py 558 DEBUG Name: test_subca_master transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG Subject DN: CN=test_subca_master transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG Name: test_subca_replica transport.py 558 DEBUG Description: subca transport.py 558 DEBUG Authority ID: b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 558 DEBUG Subject DN: CN=test_subca_replica transport.py 558 DEBUG Issuer DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG ---------------------------- transport.py 558 DEBUG Number of entries returned 2 transport.py 558 DEBUG ---------------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG transport.py 558 DEBUG Certificate Nickname Trust Attributes transport.py 558 DEBUG SSL,S/MIME,JAR/XPI transport.py 558 DEBUG transport.py 558 DEBUG caSigningCert cert-pki-ca CTu,Cu,Cu transport.py 558 DEBUG ocspSigningCert cert-pki-ca u,u,u transport.py 558 DEBUG subsystemCert cert-pki-ca u,u,u transport.py 558 DEBUG auditSigningCert cert-pki-ca u,u,Pu transport.py 558 DEBUG Server-Cert cert-pki-ca u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 u,u,u transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 3286bef26934adc908dc3e057d5d3157bdad7798 NSS Certificate DB:Server-Cert cert-pki-ca transport.py 558 DEBUG < 1> rsa 21380b19361dcb89175c2ab17da4bd29631c94e1 caSigningCert cert-pki-ca transport.py 558 DEBUG < 2> rsa 4d1a5af5351b13b24126bab40d1bfd55714b2a96 ocspSigningCert cert-pki-ca transport.py 558 DEBUG < 3> rsa 82b9debeea9ff0335821c453cf9aee0be89d6c0b subsystemCert cert-pki-ca transport.py 558 DEBUG < 4> rsa a2278433ba6ec0991cb0f3e36b7ed6dfa9b7b185 auditSigningCert cert-pki-ca transport.py 558 DEBUG < 5> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG < 6> rsa 109e16b0c093dcb8b4765eb1207b5d7ca05c8de8 caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-L', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG transport.py 558 DEBUG Certificate Nickname Trust Attributes transport.py 558 DEBUG SSL,S/MIME,JAR/XPI transport.py 558 DEBUG transport.py 558 DEBUG caSigningCert cert-pki-ca CTu,Cu,Cu transport.py 558 DEBUG ocspSigningCert cert-pki-ca u,u,u transport.py 558 DEBUG auditSigningCert cert-pki-ca u,u,Pu transport.py 558 DEBUG subsystemCert cert-pki-ca u,u,u transport.py 558 DEBUG Server-Cert cert-pki-ca u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 u,u,u transport.py 558 DEBUG caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 u,u,u transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 513 DEBUG RUN ['/usr/bin/certutil', '-d', '/etc/pki/pki-tomcat/alias', '-K', '-f', '/etc/pki/pki-tomcat/alias/pwdfile.txt'] transport.py 558 DEBUG certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" transport.py 558 DEBUG < 0> rsa 21380b19361dcb89175c2ab17da4bd29631c94e1 caSigningCert cert-pki-ca transport.py 558 DEBUG < 1> rsa 4d1a5af5351b13b24126bab40d1bfd55714b2a96 ocspSigningCert cert-pki-ca transport.py 558 DEBUG < 2> rsa a2278433ba6ec0991cb0f3e36b7ed6dfa9b7b185 auditSigningCert cert-pki-ca transport.py 558 DEBUG < 3> rsa 82b9debeea9ff0335821c453cf9aee0be89d6c0b subsystemCert cert-pki-ca transport.py 558 DEBUG < 4> rsa 706b37fe3f10c119e78c19531cb96676195418ff NSS Certificate DB:Server-Cert cert-pki-ca transport.py 558 DEBUG < 5> rsa f3d7d80253d4595ac072d3bda7044f95cecc5b48 caSigningCert cert-pki-ca 4a772ddb-b0ba-4bb3-8b4a-7b34ca2274d8 transport.py 558 DEBUG < 6> rsa 109e16b0c093dcb8b4765eb1207b5d7ca05c8de8 caSigningCert cert-pki-ca b1a561c1-949b-4de4-9d4c-733bb3d4acd6 transport.py 217 DEBUG Exit code: 0
Passed test_replica_promotion.py::TestSubCAkeyReplication::()::test_sign_with_subca_on_replica 6.54
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa', 'caacl-add-ca', 'hosts_services_caIPAserviceCert', '--cas', 'test_subca_master'] transport.py 513 DEBUG RUN ['ipa', 'caacl-add-ca', 'hosts_services_caIPAserviceCert', '--cas', 'test_subca_master'] transport.py 558 DEBUG ACL name: hosts_services_caIPAserviceCert transport.py 558 DEBUG Enabled: TRUE transport.py 558 DEBUG Host category: all transport.py 558 DEBUG Service category: all transport.py 558 DEBUG CAs: test_subca_master transport.py 558 DEBUG Profiles: caIPAserviceCert transport.py 558 DEBUG ------------------------- transport.py 558 DEBUG Number of members added 1 transport.py 558 DEBUG ------------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/ipa-getcert', 'request', '-w', '-k', '/etc/pki/tls/private/test_subca.key', '-f', '/etc/pki/tls/private/test_subca.crt', '-X', 'test_subca_master'] transport.py 513 DEBUG RUN ['/usr/bin/ipa-getcert', 'request', '-w', '-k', '/etc/pki/tls/private/test_subca.key', '-f', '/etc/pki/tls/private/test_subca.crt', '-X', 'test_subca_master'] transport.py 558 DEBUG New signing request "20180809105356" added. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['/usr/bin/ipa-getcert', 'status', '-v', '-f', '/etc/pki/tls/private/test_subca.crt'] transport.py 513 DEBUG RUN ['/usr/bin/ipa-getcert', 'status', '-v', '-f', '/etc/pki/tls/private/test_subca.crt'] transport.py 558 DEBUG State MONITORING, stuck: no. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['openssl', 'x509', '-text', '-in', '/etc/pki/tls/private/test_subca.crt'] transport.py 513 DEBUG RUN ['openssl', 'x509', '-text', '-in', '/etc/pki/tls/private/test_subca.crt'] transport.py 558 DEBUG Certificate: transport.py 558 DEBUG Data: transport.py 558 DEBUG Version: 3 (0x2) transport.py 558 DEBUG Serial Number: 268369922 (0xfff0002) transport.py 558 DEBUG Signature Algorithm: sha256WithRSAEncryption transport.py 558 DEBUG Issuer: CN = test_subca_master transport.py 558 DEBUG Validity transport.py 558 DEBUG Not Before: Aug 9 10:53:59 2018 GMT transport.py 558 DEBUG Not After : Aug 9 10:53:59 2020 GMT transport.py 558 DEBUG Subject: O = IPA.TEST, CN = replica0.ipa.test transport.py 558 DEBUG Subject Public Key Info: transport.py 558 DEBUG Public Key Algorithm: rsaEncryption transport.py 558 DEBUG Public-Key: (2048 bit) transport.py 558 DEBUG Modulus: transport.py 558 DEBUG 00:cf:1b:79:1d:87:d4:e7:b3:3c:26:8a:5b:9f:19: transport.py 558 DEBUG 53:0d:3f:f6:9d:90:0e:6c:28:24:9d:ab:eb:7f:42: transport.py 558 DEBUG d3:f4:27:01:eb:31:31:c0:a5:85:da:b8:16:bd:14: transport.py 558 DEBUG 03:a4:bf:e1:c9:85:49:ea:6d:f9:81:53:0a:09:3f: transport.py 558 DEBUG dc:b6:a9:2b:6f:33:87:ad:3d:82:f3:ca:fa:8f:ed: transport.py 558 DEBUG 36:d3:83:07:63:b2:98:28:c0:d6:de:70:85:63:0e: transport.py 558 DEBUG 93:e0:b4:fd:78:a8:bc:6a:ca:c1:4c:9e:13:f2:62: transport.py 558 DEBUG ad:26:d1:ae:98:17:70:98:72:c5:6c:47:96:87:bd: transport.py 558 DEBUG f9:89:d6:62:a5:c5:cc:61:b1:0d:30:c3:cd:18:61: transport.py 558 DEBUG 20:82:19:54:20:6c:0b:b2:49:d9:be:f0:08:b4:00: transport.py 558 DEBUG 50:3e:e7:18:bb:cf:5a:55:46:3b:48:5d:87:50:fc: transport.py 558 DEBUG 4a:50:3c:36:b2:cd:b9:8d:20:ec:e4:97:59:e3:b7: transport.py 558 DEBUG fe:77:69:fb:9c:db:24:27:eb:bb:d1:86:c1:ab:d9: transport.py 558 DEBUG 2f:61:71:fa:42:c5:eb:37:0c:c1:2b:36:08:36:3a: transport.py 558 DEBUG ed:6d:09:23:5b:1b:6b:a2:27:70:52:83:b4:04:74: transport.py 558 DEBUG fa:77:93:0a:ea:b4:b8:48:d2:7f:4f:47:4f:9e:d6: transport.py 558 DEBUG 9d:f1:1a:e5:15:a8:7d:1f:7d:21:5e:b2:69:64:70: transport.py 558 DEBUG 37:21 transport.py 558 DEBUG Exponent: 65537 (0x10001) transport.py 558 DEBUG X509v3 extensions: transport.py 558 DEBUG X509v3 Authority Key Identifier: transport.py 558 DEBUG keyid:DD:AD:E6:DF:56:66:C8:07:74:1E:84:F4:73:F4:C9:89:F1:01:D8:98 transport.py 558 DEBUG transport.py 558 DEBUG Authority Information Access: transport.py 558 DEBUG OCSP - URI:http://ipa-ca.ipa.test/ca/ocsp transport.py 558 DEBUG transport.py 558 DEBUG X509v3 Key Usage: critical transport.py 558 DEBUG Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment transport.py 558 DEBUG X509v3 Extended Key Usage: transport.py 558 DEBUG TLS Web Server Authentication, TLS Web Client Authentication transport.py 558 DEBUG X509v3 CRL Distribution Points: transport.py 558 DEBUG transport.py 558 DEBUG Full Name: transport.py 558 DEBUG URI:http://ipa-ca.ipa.test/ipa/crl/MasterCRL.bin transport.py 558 DEBUG CRL Issuer: transport.py 558 DEBUG DirName:O = ipaca, CN = Certificate Authority transport.py 558 DEBUG transport.py 558 DEBUG X509v3 Subject Key Identifier: transport.py 558 DEBUG 18:3E:79:30:EA:6A:CD:B8:16:94:BB:F8:BC:44:05:7E:17:DB:59:92 transport.py 558 DEBUG X509v3 Subject Alternative Name: transport.py 558 DEBUG DNS:replica0.ipa.test, othername:<unsupported>, othername:<unsupported> transport.py 558 DEBUG Signature Algorithm: sha256WithRSAEncryption transport.py 558 DEBUG 5d:e3:3a:f3:26:ad:1d:99:66:83:d3:69:57:4e:27:58:e7:7d: transport.py 558 DEBUG 88:1a:88:1f:fe:b6:eb:40:62:aa:76:54:3b:7c:1d:52:99:59: transport.py 558 DEBUG b4:3d:08:2e:81:4e:65:c1:63:29:85:ba:c9:dd:a3:51:22:dd: transport.py 558 DEBUG f2:69:a3:f1:48:15:1c:35:fe:39:0c:76:24:f7:47:a4:b0:16: transport.py 558 DEBUG 4c:9b:2e:89:43:44:6e:08:ef:cc:5b:93:0a:43:b4:20:b3:86: transport.py 558 DEBUG a1:ab:8a:84:ab:97:9d:eb:f0:f6:81:57:cb:95:45:2c:6f:b9: transport.py 558 DEBUG f4:54:9e:82:85:e2:43:55:0c:1f:ad:c6:be:ac:67:af:2b:1b: transport.py 558 DEBUG bb:7b:46:91:8a:b7:78:b0:5c:98:12:90:ac:07:97:bb:cf:d4: transport.py 558 DEBUG d2:a6:47:27:1a:90:e7:cf:8b:7c:ea:3f:47:0c:9b:61:8a:60: transport.py 558 DEBUG 3a:70:37:47:65:ed:b9:fb:8d:34:d6:2e:8e:8b:56:6e:13:e2: transport.py 558 DEBUG c5:e4:90:c8:e5:21:0b:17:e0:54:b1:16:ae:aa:ac:73:35:a9: transport.py 558 DEBUG b6:67:8a:9a:e8:e1:e0:a1:45:39:74:90:c3:24:19:3b:d2:49: transport.py 558 DEBUG c8:3e:ed:fb:72:0a:25:33:45:85:6d:5b:4f:c8:c6:da:1e:d8: transport.py 558 DEBUG bc:c1:33:ff:dd:c4:84:e0:c2:20:54:3b:83:41:26:b6:8f:cc: transport.py 558 DEBUG 76:40:48:77 transport.py 558 DEBUG -----BEGIN CERTIFICATE----- transport.py 558 DEBUG MIIEgTCCA2mgAwIBAgIED/8AAjANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDDBF0 transport.py 558 DEBUG ZXN0X3N1YmNhX21hc3RlcjAeFw0xODA4MDkxMDUzNTlaFw0yMDA4MDkxMDUzNTla transport.py 558 DEBUG MC8xETAPBgNVBAoMCElQQS5URVNUMRowGAYDVQQDDBFyZXBsaWNhMC5pcGEudGVz transport.py 558 DEBUG dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM8beR2H1OezPCaKW58Z transport.py 558 DEBUG Uw0/9p2QDmwoJJ2r639C0/QnAesxMcClhdq4Fr0UA6S/4cmFSept+YFTCgk/3Lap transport.py 558 DEBUG K28zh609gvPK+o/tNtODB2OymCjA1t5whWMOk+C0/XiovGrKwUyeE/JirSbRrpgX transport.py 558 DEBUG cJhyxWxHloe9+YnWYqXFzGGxDTDDzRhhIIIZVCBsC7JJ2b7wCLQAUD7nGLvPWlVG transport.py 558 DEBUG O0hdh1D8SlA8NrLNuY0g7OSXWeO3/ndp+5zbJCfru9GGwavZL2Fx+kLF6zcMwSs2 transport.py 558 DEBUG CDY67W0JI1sba6IncFKDtAR0+neTCuq0uEjSf09HT57WnfEa5RWofR99IV6yaWRw transport.py 558 DEBUG NyECAwEAAaOCAbYwggGyMB8GA1UdIwQYMBaAFN2t5t9WZsgHdB6E9HP0yYnxAdiY transport.py 558 DEBUG MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5pcGEu transport.py 558 DEBUG dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD transport.py 558 DEBUG AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5pcGEu transport.py 558 DEBUG dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh transport.py 558 DEBUG MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBg+eTDq transport.py 558 DEBUG as24FpS7+LxEBX4X21mSMIGPBgNVHREEgYcwgYSCEXJlcGxpY2EwLmlwYS50ZXN0 transport.py 558 DEBUG oC8GCisGAQQBgjcUAgOgIQwfaG9zdC9yZXBsaWNhMC5pcGEudGVzdEBJUEEuVEVT transport.py 558 DEBUG VKA+BgYrBgEFAgKgNDAyoAobCElQQS5URVNUoSQwIqADAgEBoRswGRsEaG9zdBsR transport.py 558 DEBUG cmVwbGljYTAuaXBhLnRlc3QwDQYJKoZIhvcNAQELBQADggEBAF3jOvMmrR2ZZoPT transport.py 558 DEBUG aVdOJ1jnfYgaiB/+tutAYqp2VDt8HVKZWbQ9CC6BTmXBYymFusndo1Ei3fJpo/FI transport.py 558 DEBUG FRw1/jkMdiT3R6SwFkybLolDRG4I78xbkwpDtCCzhqGrioSrl53r8PaBV8uVRSxv transport.py 558 DEBUG ufRUnoKF4kNVDB+txr6sZ68rG7t7RpGKt3iwXJgSkKwHl7vP1NKmRycakOfPi3zq transport.py 558 DEBUG P0cMm2GKYDpwN0dl7bn7jTTWLo6LVm4T4sXkkMjlIQsX4FSxFq6qrHM1qbZnipro transport.py 558 DEBUG 4eChRTl0kMMkGTvSScg+7ftyCiUzRYVtW0/Ixtoe2LzBM//dxITgwiBUO4NBJraP transport.py 558 DEBUG zHZASHc= transport.py 558 DEBUG -----END CERTIFICATE----- transport.py 217 DEBUG Exit code: 0