report.html

Report generated on 15-Oct-2019 at 07:12:35 by pytest-html v1.22.0

Environment

Packages {'pytest': '3.9.3', 'py': '1.7.0', 'pluggy': '0.8.1'}
Platform Linux-5.2.8-200.fc30.x86_64-x86_64-with-fedora-30-Thirty
Plugins {'metadata': '1.8.0', 'html': '1.22.0', 'sourceorder': '0.5', 'multihost': '3.0'}
Python 3.7.4

Summary

8 tests ran in 1385.85 seconds.

8 passed, 0 skipped, 0 failed, 0 errors, 0 expected failures, 0 unexpected passes

Results

Result Test Duration Links
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_install_client_no_preconfigured_profile 30.78
---------------------------- Captured stdout setup -----------------------------
<ipatests.pytest_ipa.integration.config.Config object at 0x7f3eb7af2c10>
------------------------------ Captured log setup ------------------------------
__init__.py 267 INFO Preparing host client0.ipa.test transport.py 1760 INFO Connected (version 2.0, client OpenSSH_8.0) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1760 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding client0.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 158 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 267 INFO Preparing host master.ipa.test transport.py 1760 INFO Connected (version 2.0, client OpenSSH_8.0) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1760 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 158 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/audit to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:907 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:46409 0.0.0.0:* transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:50572 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=9)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:68 0.0.0.0:* users:(("dhclient",pid=1637,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2002,fd=5),("systemd",pid=1,fd=57)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:323 0.0.0.0:* users:(("chronyd",pid=524,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:52352 [::]:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:48308 [::]:* users:(("rpc.statd",pid=2003,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:111 [::]:* users:(("rpcbind",pid=2002,fd=7),("systemd",pid=1,fd=59)) transport.py 558 DEBUG udp UNCONN 0 0 [::1]:323 [::]:* users:(("chronyd",pid=524,fd=6)) transport.py 558 DEBUG tcp LISTEN 0 64 0.0.0.0:34605 0.0.0.0:* transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2002,fd=4),("systemd",pid=1,fd=55)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=550,fd=4)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:55359 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=10)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:41674 141.219.188.21:443 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.164:56622 users:(("sshd",pid=16381,fd=5),("sshd",pid=16379,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:33518 52.219.73.106:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:59372 141.219.188.21:80 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:1004 192.168.121.1:2049 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:42292 204.99.128.20:80 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.1:60038 users:(("sshd",pid=2131,fd=5),("sshd",pid=2129,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:59374 141.219.188.21:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:41672 141.219.188.21:443 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:33516 52.219.73.106:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:42290 204.99.128.20:80 transport.py 558 DEBUG tcp LISTEN 0 128 [::]:111 [::]:* users:(("rpcbind",pid=2002,fd=6),("systemd",pid=1,fd=58)) transport.py 558 DEBUG tcp LISTEN 0 64 [::]:33301 [::]:* transport.py 558 DEBUG tcp LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=550,fd=6)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:39193 [::]:* users:(("rpc.statd",pid=2003,fd=12)) transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 558 DEBUG Removed /etc/systemd/system/firewalld.service. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U'] transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.79 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG Starting installation... transport.py 558 DEBUG transport.py 558 DEBUG Disabled p11-kit-proxy transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket transport.py 558 DEBUG [2/44]: configure autobind for root transport.py 558 DEBUG [3/44]: stopping directory server transport.py 558 DEBUG [4/44]: updating configuration in dse.ldif transport.py 558 DEBUG [5/44]: starting directory server transport.py 558 DEBUG [6/44]: adding default schema transport.py 558 DEBUG [7/44]: enabling memberof plugin transport.py 558 DEBUG [8/44]: enabling winsync plugin transport.py 558 DEBUG [9/44]: configure password logging transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache and keytab transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/29]: configuring certificate server instance transport.py 558 DEBUG [2/29]: Add ipa-pki-wait-running transport.py 558 DEBUG [3/29]: reindex attributes transport.py 558 DEBUG [4/29]: exporting Dogtag certificate store pin transport.py 558 DEBUG [5/29]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [6/29]: backing up CS.cfg transport.py 558 DEBUG [7/29]: disabling nonces transport.py 558 DEBUG [8/29]: set up CRL publishing transport.py 558 DEBUG [9/29]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [10/29]: starting certificate server instance transport.py 558 DEBUG [11/29]: configure certmonger for renewals transport.py 558 DEBUG [12/29]: requesting RA certificate from CA transport.py 558 DEBUG [13/29]: setting audit signing renewal to 2 years transport.py 558 DEBUG [14/29]: restarting certificate server transport.py 558 DEBUG [15/29]: publishing the CA certificate transport.py 558 DEBUG [16/29]: adding RA agent as a trusted user transport.py 558 DEBUG [17/29]: authorizing RA to modify profiles transport.py 558 DEBUG [18/29]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [19/29]: Ensure lightweight CAs container exists transport.py 558 DEBUG [20/29]: configure certificate renewals transport.py 558 DEBUG [21/29]: Configure HTTP to proxy connections transport.py 558 DEBUG [22/29]: restarting certificate server transport.py 558 DEBUG [23/29]: updating IPA configuration transport.py 558 DEBUG [24/29]: enabling CA instance transport.py 558 DEBUG [25/29]: migrating certificate profiles to LDAP transport.py 558 DEBUG [26/29]: importing IPA certificate profiles transport.py 558 DEBUG [27/29]: adding default CA ACL transport.py 558 DEBUG [28/29]: adding 'ipa' CA entry transport.py 558 DEBUG [29/29]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: adding CA certificate entry transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG Configuring client side components transport.py 558 DEBUG Using existing certificate '/etc/ipa/ca.crt'. transport.py 558 DEBUG Client hostname: master.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Configured sudoers in /etc/authselect/user-nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG transport.py 558 DEBUG Please add records in this file to your DNS system: /tmp/ipa.system.records.x0ay1mpo.db transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG Setup complete transport.py 558 DEBUG transport.py 558 DEBUG Next steps: transport.py 558 DEBUG 1. You must make sure these network ports are open: transport.py 558 DEBUG TCP Ports: transport.py 558 DEBUG * 80, 443: HTTP/HTTPS transport.py 558 DEBUG * 389, 636: LDAP/LDAPS transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG UDP Ports: transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 123: ntp transport.py 558 DEBUG transport.py 558 DEBUG 2. You can now obtain a kerberos ticket using the command: 'kinit admin' transport.py 558 DEBUG This ticket will allow you to use the IPA tools (e.g., ipa user-add) transport.py 558 DEBUG and the web user interface. transport.py 558 DEBUG transport.py 558 DEBUG Be sure to back up the CA certificates stored in /root/cacert.p12 transport.py 558 DEBUG These files are required to create replicas. The password for these transport.py 558 DEBUG files is the Directory Manager password transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--permanent'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--permanent'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 tasks.py 304 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 tasks.py 320 INFO Set LDAP audit log transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['rm', '-f', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['rm', '-f', '/etc/authselect/authselect.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test'] transport.py 513 DEBUG RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test'] transport.py 558 DEBUG Client hostname: client0.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Successfully retrieved CA cert transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Valid From: 2019-10-15 06:52:19 transport.py 558 DEBUG Valid Until: 2039-10-15 06:52:19 transport.py 558 DEBUG transport.py 558 DEBUG Enrolled in IPA realm IPA.TEST transport.py 558 DEBUG Created /etc/ipa/default.conf transport.py 558 DEBUG Configured sudoers in /etc/authselect/user-nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Configured /etc/krb5.conf for IPA realm IPA.TEST transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Hostname (client0.ipa.test) does not have A/AAAA record. transport.py 558 DEBUG Failed to update DNS records. transport.py 558 DEBUG Missing A/AAAA record(s) for host client0.ipa.test: 192.168.121.166. transport.py 558 DEBUG Missing reverse record(s) for address(es): 192.168.121.166. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG WARNING: The configuration pre-client installation is not managed by authselect and cannot be backed up. Uninstallation may not be able to revert to the original state. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG Using default chrony configuration. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG sssd transport.py 558 DEBUG with-sudo transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_uninstall_client_no_preconfigured_profile 8.51
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 513 DEBUG RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 558 DEBUG Unenrolling client from IPA server transport.py 558 DEBUG Removing Kerberos service principals from /etc/krb5.keytab transport.py 558 DEBUG Disabling client Kerberos and LDAP configurations transport.py 558 DEBUG Restoring user-nsswitch.conf transport.py 558 DEBUG Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted transport.py 558 DEBUG Restoring client configuration files transport.py 558 DEBUG Unconfiguring the NIS domain. transport.py 558 DEBUG nscd daemon is not installed, skip configuration transport.py 558 DEBUG nslcd daemon is not installed, skip configuration transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Client uninstall complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG sssd transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_install_client_preconfigured_profile 31.33
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['authselect', 'select', 'winbind', 'with-fingerprint', '--force'] transport.py 513 DEBUG RUN ['authselect', 'select', 'winbind', 'with-fingerprint', '--force'] transport.py 558 DEBUG Profile "winbind" was selected. transport.py 558 DEBUG The following nsswitch maps are overwritten by the profile: transport.py 558 DEBUG - passwd transport.py 558 DEBUG - group transport.py 558 DEBUG transport.py 558 DEBUG Make sure that winbind service is configured and enabled. See winbind documentation for more information. transport.py 558 DEBUG transport.py 558 DEBUG - with-fingerprint is selected, make sure fprintd service is configured and enabled transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'disable', 'oddjobd', '--now'] transport.py 513 DEBUG RUN ['systemctl', 'disable', 'oddjobd', '--now'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test', '-f', '--mkhomedir'] transport.py 513 DEBUG RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test', '-f', '--mkhomedir'] transport.py 558 DEBUG Client hostname: client0.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Successfully retrieved CA cert transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Valid From: 2019-10-15 06:52:19 transport.py 558 DEBUG Valid Until: 2039-10-15 06:52:19 transport.py 558 DEBUG transport.py 558 DEBUG Enrolled in IPA realm IPA.TEST transport.py 558 DEBUG Created /etc/ipa/default.conf transport.py 558 DEBUG Configured sudoers in /etc/authselect/user-nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Configured /etc/krb5.conf for IPA realm IPA.TEST transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Hostname (client0.ipa.test) does not have A/AAAA record. transport.py 558 DEBUG Failed to update DNS records. transport.py 558 DEBUG Missing A/AAAA record(s) for host client0.ipa.test: 192.168.121.166. transport.py 558 DEBUG Missing reverse record(s) for address(es): 192.168.121.166. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG Using default chrony configuration. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG sssd transport.py 558 DEBUG with-mkhomedir transport.py 558 DEBUG with-sudo transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'status', 'oddjobd'] transport.py 513 DEBUG RUN ['systemctl', 'status', 'oddjobd'] transport.py 558 DEBUG ● oddjobd.service - privileged operations for unprivileged applications transport.py 558 DEBUG Loaded: loaded (/usr/lib/systemd/system/oddjobd.service; enabled; vendor preset: disabled) transport.py 558 DEBUG Active: active (running) since Tue 2019-10-15 07:00:49 UTC; 2s ago transport.py 558 DEBUG Main PID: 17164 (oddjobd) transport.py 558 DEBUG Tasks: 1 (limit: 1407) transport.py 558 DEBUG Memory: 656.0K transport.py 558 DEBUG CGroup: /system.slice/oddjobd.service transport.py 558 DEBUG └─17164 /usr/sbin/oddjobd -n -p /var/run/oddjobd.pid -t 300 transport.py 558 DEBUG transport.py 558 DEBUG Oct 15 07:00:49 client0.ipa.test systemd[1]: Started privileged operations for unprivileged applications. transport.py 558 DEBUG Oct 15 07:00:51 client0.ipa.test systemd[1]: /usr/lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. transport.py 558 DEBUG Oct 15 07:00:51 client0.ipa.test systemd[1]: /usr/lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_uninstall_client_preconfigured_profile 7.61
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 513 DEBUG RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 558 DEBUG Unenrolling client from IPA server transport.py 558 DEBUG Removing Kerberos service principals from /etc/krb5.keytab transport.py 558 DEBUG Disabling client Kerberos and LDAP configurations transport.py 558 DEBUG Restoring user-nsswitch.conf transport.py 558 DEBUG Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted transport.py 558 DEBUG Restoring client configuration files transport.py 558 DEBUG Restoring ipa.test as NIS domain. transport.py 558 DEBUG nscd daemon is not installed, skip configuration transport.py 558 DEBUG nslcd daemon is not installed, skip configuration transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Client uninstall complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG winbind transport.py 558 DEBUG with-fingerprint transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_install_client_no_sudo 30.10
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test', '-f', '--no-sudo'] transport.py 513 DEBUG RUN ['ipa-client-install', '-U', '--domain', 'ipa.test', '--realm', 'IPA.TEST', '-p', 'admin', '-w', 'Secret.123', '--server', 'master.ipa.test', '-f', '--no-sudo'] transport.py 558 DEBUG Client hostname: client0.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Successfully retrieved CA cert transport.py 558 DEBUG Subject: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Issuer: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Valid From: 2019-10-15 06:52:19 transport.py 558 DEBUG Valid Until: 2039-10-15 06:52:19 transport.py 558 DEBUG transport.py 558 DEBUG Enrolled in IPA realm IPA.TEST transport.py 558 DEBUG Created /etc/ipa/default.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Configured /etc/krb5.conf for IPA realm IPA.TEST transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Hostname (client0.ipa.test) does not have A/AAAA record. transport.py 558 DEBUG Failed to update DNS records. transport.py 558 DEBUG Missing A/AAAA record(s) for host client0.ipa.test: 192.168.121.166. transport.py 558 DEBUG Missing reverse record(s) for address(es): 192.168.121.166. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG Using default chrony configuration. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG sssd transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestClientInstallation::()::test_uninstall_wrong_sysrestore 7.20
------------------------------ Captured log call -------------------------------
transport.py 284 DEBUG READ /var/lib/ipa-client/sysrestore/sysrestore.state transport.py 293 INFO WRITE /var/lib/ipa-client/sysrestore/sysrestore.state transport.py 318 INFO RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 513 DEBUG RUN ['ipa-client-install', '--uninstall', '-U'] transport.py 558 DEBUG Unenrolling client from IPA server transport.py 558 DEBUG Removing Kerberos service principals from /etc/krb5.keytab transport.py 558 DEBUG Disabling client Kerberos and LDAP configurations transport.py 558 DEBUG Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted transport.py 558 DEBUG Restoring client configuration files transport.py 558 DEBUG Restoring ipa.test as NIS domain. transport.py 558 DEBUG nscd daemon is not installed, skip configuration transport.py 558 DEBUG nslcd daemon is not installed, skip configuration transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Client uninstall complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestServerInstallation::()::test_install 533.77
---------------------------- Captured stdout setup -----------------------------
<ipatests.pytest_ipa.integration.config.Config object at 0x7f3eb75f4910>
------------------------------ Captured log setup ------------------------------
__init__.py 267 INFO Preparing host master.ipa.test transport.py 1760 INFO Connected (version 2.0, client OpenSSH_8.0) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1760 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 158 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh
------------------------------ Captured log call -------------------------------
transport.py 318 INFO RUN ['authselect', 'select', 'winbind', 'with-fingerprint', '--force'] transport.py 513 DEBUG RUN ['authselect', 'select', 'winbind', 'with-fingerprint', '--force'] transport.py 558 DEBUG Profile "winbind" was selected. transport.py 558 DEBUG The following nsswitch maps are overwritten by the profile: transport.py 558 DEBUG - passwd transport.py 558 DEBUG - group transport.py 558 DEBUG transport.py 558 DEBUG Make sure that winbind service is configured and enabled. See winbind documentation for more information. transport.py 558 DEBUG transport.py 558 DEBUG - with-fingerprint is selected, make sure fprintd service is configured and enabled transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/audit to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:907 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:46409 0.0.0.0:* transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:50572 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=9)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:68 0.0.0.0:* users:(("dhclient",pid=1637,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2002,fd=5),("systemd",pid=1,fd=53)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:323 0.0.0.0:* users:(("chronyd",pid=16782,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:52352 [::]:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:48308 [::]:* users:(("rpc.statd",pid=2003,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:111 [::]:* users:(("rpcbind",pid=2002,fd=7),("systemd",pid=1,fd=55)) transport.py 558 DEBUG udp UNCONN 0 0 [::1]:323 [::]:* users:(("chronyd",pid=16782,fd=8)) transport.py 558 DEBUG tcp LISTEN 0 64 0.0.0.0:34605 0.0.0.0:* transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2002,fd=4),("systemd",pid=1,fd=52)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=21748,fd=3)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:55359 0.0.0.0:* users:(("rpc.statd",pid=2003,fd=10)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:60718 192.168.121.79:389 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.164:56636 users:(("sshd",pid=22079,fd=4),("sshd",pid=22077,fd=4)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52436 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.79:59274 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52450 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.79:59264 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52442 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.164:56622 users:(("sshd",pid=16381,fd=5),("sshd",pid=16379,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.79:59278 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52452 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.79:59270 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52446 transport.py 558 DEBUG tcp TIME-WAIT 0 0 127.0.0.1:41606 127.0.0.1:8009 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.79:59268 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:60732 192.168.121.79:389 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52444 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:88 192.168.121.166:52438 transport.py 558 DEBUG tcp LISTEN 0 128 [::]:111 [::]:* users:(("rpcbind",pid=2002,fd=6),("systemd",pid=1,fd=54)) transport.py 558 DEBUG tcp LISTEN 0 64 [::]:33301 [::]:* transport.py 558 DEBUG tcp LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=21748,fd=4)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:39193 [::]:* users:(("rpc.statd",pid=2003,fd=12)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:127.0.0.1]:8009 [::ffff:127.0.0.1]:41680 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.79]:389 [::ffff:192.168.121.166]:51394 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::1]:8080 [::1]:52142 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::1]:8443 [::1]:41678 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:127.0.0.1]:39870 [::ffff:127.0.0.1]:8005 transport.py 558 DEBUG tcp TIME-WAIT 0 0 [::ffff:192.168.121.79]:389 [::ffff:192.168.121.79]:60632 transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U'] transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.79 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG Disabled p11-kit-proxy transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG transport.py 558 DEBUG Starting installation... transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket transport.py 558 DEBUG [2/44]: configure autobind for root transport.py 558 DEBUG [3/44]: stopping directory server transport.py 558 DEBUG [4/44]: updating configuration in dse.ldif transport.py 558 DEBUG [5/44]: starting directory server transport.py 558 DEBUG [6/44]: adding default schema transport.py 558 DEBUG [7/44]: enabling memberof plugin transport.py 558 DEBUG [8/44]: enabling winsync plugin transport.py 558 DEBUG [9/44]: configure password logging transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache and keytab transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/29]: configuring certificate server instance transport.py 558 DEBUG [2/29]: Add ipa-pki-wait-running transport.py 558 DEBUG [3/29]: reindex attributes transport.py 558 DEBUG [4/29]: exporting Dogtag certificate store pin transport.py 558 DEBUG [5/29]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [6/29]: backing up CS.cfg transport.py 558 DEBUG [7/29]: disabling nonces transport.py 558 DEBUG [8/29]: set up CRL publishing transport.py 558 DEBUG [9/29]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [10/29]: starting certificate server instance transport.py 558 DEBUG [11/29]: configure certmonger for renewals transport.py 558 DEBUG [12/29]: requesting RA certificate from CA transport.py 558 DEBUG [13/29]: setting audit signing renewal to 2 years transport.py 558 DEBUG [14/29]: restarting certificate server transport.py 558 DEBUG [15/29]: publishing the CA certificate transport.py 558 DEBUG [16/29]: adding RA agent as a trusted user transport.py 558 DEBUG [17/29]: authorizing RA to modify profiles transport.py 558 DEBUG [18/29]: authorizing RA to manage lightweight CAs transport.py 558 DEBUG [19/29]: Ensure lightweight CAs container exists transport.py 558 DEBUG [20/29]: configure certificate renewals transport.py 558 DEBUG [21/29]: Configure HTTP to proxy connections transport.py 558 DEBUG [22/29]: restarting certificate server transport.py 558 DEBUG [23/29]: updating IPA configuration transport.py 558 DEBUG [24/29]: enabling CA instance transport.py 558 DEBUG [25/29]: migrating certificate profiles to LDAP transport.py 558 DEBUG [26/29]: importing IPA certificate profiles transport.py 558 DEBUG [27/29]: adding default CA ACL transport.py 558 DEBUG [28/29]: adding 'ipa' CA entry transport.py 558 DEBUG [29/29]: configuring certmonger renewal for lightweight CAs transport.py 558 DEBUG Done configuring certificate server (pki-tomcatd). transport.py 558 DEBUG Configuring directory server (dirsrv) transport.py 558 DEBUG [1/3]: configuring TLS for DS instance transport.py 558 DEBUG [2/3]: adding CA certificate entry transport.py 558 DEBUG [3/3]: restarting directory server transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring ipa-otpd transport.py 558 DEBUG [1/2]: starting ipa-otpd transport.py 558 DEBUG [2/2]: configuring ipa-otpd to start on boot transport.py 558 DEBUG Done configuring ipa-otpd. transport.py 558 DEBUG Configuring the web interface (httpd) transport.py 558 DEBUG [1/21]: stopping httpd transport.py 558 DEBUG [2/21]: backing up ssl.conf transport.py 558 DEBUG [3/21]: disabling nss.conf transport.py 558 DEBUG [4/21]: configuring mod_ssl certificate paths transport.py 558 DEBUG [5/21]: setting mod_ssl protocol list transport.py 558 DEBUG [6/21]: configuring mod_ssl log directory transport.py 558 DEBUG [7/21]: disabling mod_ssl OCSP transport.py 558 DEBUG [8/21]: adding URL rewriting rules transport.py 558 DEBUG [9/21]: configuring httpd transport.py 558 DEBUG [10/21]: setting up httpd keytab transport.py 558 DEBUG [11/21]: configuring Gssproxy transport.py 558 DEBUG [12/21]: setting up ssl transport.py 558 DEBUG [13/21]: configure certmonger for renewals transport.py 558 DEBUG [14/21]: publish CA cert transport.py 558 DEBUG [15/21]: clean up any existing httpd ccaches transport.py 558 DEBUG [16/21]: configuring SELinux for httpd transport.py 558 DEBUG [17/21]: create KDC proxy config transport.py 558 DEBUG [18/21]: enable KDC proxy transport.py 558 DEBUG [19/21]: starting httpd transport.py 558 DEBUG [20/21]: configuring httpd to start on boot transport.py 558 DEBUG [21/21]: enabling oddjobd transport.py 558 DEBUG Done configuring the web interface (httpd). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/1]: installing X509 Certificate for PKINIT transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Applying LDAP updates transport.py 558 DEBUG Upgrading IPA:. Estimated time: 1 minute 30 seconds transport.py 558 DEBUG [1/11]: stopping directory server transport.py 558 DEBUG [2/11]: saving configuration transport.py 558 DEBUG [3/11]: disabling listeners transport.py 558 DEBUG [4/11]: enabling DS global lock transport.py 558 DEBUG [5/11]: disabling Schema Compat transport.py 558 DEBUG [6/11]: starting directory server transport.py 558 DEBUG [7/11]: updating schema transport.py 558 DEBUG [8/11]: upgrading server transport.py 558 DEBUG [9/11]: stopping directory server transport.py 558 DEBUG [10/11]: restoring configuration transport.py 558 DEBUG [11/11]: starting directory server transport.py 558 DEBUG Done. transport.py 558 DEBUG Restarting the KDC transport.py 558 DEBUG Configuring client side components transport.py 558 DEBUG Using existing certificate '/etc/ipa/ca.crt'. transport.py 558 DEBUG Client hostname: master.ipa.test transport.py 558 DEBUG Realm: IPA.TEST transport.py 558 DEBUG DNS Domain: ipa.test transport.py 558 DEBUG IPA Server: master.ipa.test transport.py 558 DEBUG BaseDN: dc=ipa,dc=test transport.py 558 DEBUG Configured sudoers in /etc/authselect/user-nsswitch.conf transport.py 558 DEBUG Configured /etc/sssd/sssd.conf transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub transport.py 558 DEBUG Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub transport.py 558 DEBUG Could not update DNS SSHFP records. transport.py 558 DEBUG SSSD enabled transport.py 558 DEBUG Configured /etc/openldap/ldap.conf transport.py 558 DEBUG Configured /etc/ssh/ssh_config transport.py 558 DEBUG Configured /etc/ssh/sshd_config transport.py 558 DEBUG Configuring ipa.test as NIS domain. transport.py 558 DEBUG Client configuration complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG This program will set up FreeIPA client. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG transport.py 558 DEBUG unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG unable to resolve host name master.ipa.test. to IP address, ipa-ca DNS record will be incomplete transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG transport.py 558 DEBUG Please add records in this file to your DNS system: /tmp/ipa.system.records.6o29jph6.db transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG Setup complete transport.py 558 DEBUG transport.py 558 DEBUG Next steps: transport.py 558 DEBUG 1. You must make sure these network ports are open: transport.py 558 DEBUG TCP Ports: transport.py 558 DEBUG * 80, 443: HTTP/HTTPS transport.py 558 DEBUG * 389, 636: LDAP/LDAPS transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG UDP Ports: transport.py 558 DEBUG * 88, 464: kerberos transport.py 558 DEBUG * 123: ntp transport.py 558 DEBUG transport.py 558 DEBUG 2. You can now obtain a kerberos ticket using the command: 'kinit admin' transport.py 558 DEBUG This ticket will allow you to use the IPA tools (e.g., ipa user-add) transport.py 558 DEBUG and the web user interface. transport.py 558 DEBUG transport.py 558 DEBUG Be sure to back up the CA certificates stored in /root/cacert.p12 transport.py 558 DEBUG These files are required to create replicas. The password for these transport.py 558 DEBUG files is the Directory Manager password transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--permanent'] transport.py 513 DEBUG RUN ['firewall-cmd', '--add-service', 'freeipa-ldap', '--add-service', 'freeipa-ldaps', '--permanent'] transport.py 558 DEBUG success transport.py 217 DEBUG Exit code: 0 tasks.py 304 INFO Set LDAP debug level transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 tasks.py 320 INFO Set LDAP audit log transport.py 318 INFO RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 513 DEBUG RUN ['ldapmodify', '-x', '-D', 'cn=Directory Manager', '-w', 'Secret.123'] transport.py 558 DEBUG modifying entry "cn=config" transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/debug_level = 7/d', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 513 DEBUG RUN ['sed', '-i', '/\\[*\\]/ a\\debug_level = 7', '/etc/sssd/sssd.conf'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/var/log/sssd to list of logs to collect transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/db -name '*.ldb' | xargs rm -fv transport.py 558 DEBUG removed '/var/lib/sss/db/config.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/timestamps_implicit_files.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/cache_ipa.test.ldb' transport.py 558 DEBUG removed '/var/lib/sss/db/sssd.ldb' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/group'] transport.py 558 DEBUG removed '/var/lib/sss/mc/group' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 513 DEBUG RUN ['rm', '-fv', '/var/lib/sss/mc/passwd'] transport.py 558 DEBUG removed '/var/lib/sss/mc/passwd' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'sssd'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'sssd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG sssd transport.py 558 DEBUG with-sudo transport.py 217 DEBUG Exit code: 0
Passed test_integration/test_authselect.py::TestServerInstallation::()::test_uninstall 47.89
------------------------------ Captured log call -------------------------------
__init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect transport.py 318 INFO RUN ['kinit', 'admin'] transport.py 513 DEBUG RUN ['kinit', 'admin'] transport.py 558 DEBUG Password for admin@IPA.TEST: transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa', 'domainlevel-get'] transport.py 513 DEBUG RUN ['ipa', 'domainlevel-get'] transport.py 558 DEBUG ----------------------- transport.py 558 DEBUG Current domain level: 1 transport.py 558 DEBUG ----------------------- transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '--uninstall', '-U', '--ignore-topology-disconnect', '--ignore-last-of-role'] transport.py 513 DEBUG RUN ['ipa-server-install', '--uninstall', '-U', '--ignore-topology-disconnect', '--ignore-last-of-role'] transport.py 558 DEBUG Forcing removal of master.ipa.test transport.py 558 DEBUG Ignoring topology connectivity errors. transport.py 558 DEBUG Failed to cleanup master.ipa.test DNS entries: no such entry transport.py 558 DEBUG You may need to manually remove them from the tree transport.py 558 DEBUG ------------------------------------ transport.py 558 DEBUG Deleted IPA server "master.ipa.test" transport.py 558 DEBUG ------------------------------------ transport.py 558 DEBUG Shutting down all IPA services transport.py 558 DEBUG Unconfiguring CA transport.py 558 DEBUG Unconfiguring web server transport.py 558 DEBUG Unconfiguring krb5kdc transport.py 558 DEBUG Unconfiguring kadmin transport.py 558 DEBUG Unconfiguring directory server transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with None transport.py 558 DEBUG Removed /etc/systemd/system/dirsrv.target.wants/dirsrv@IPA-TEST.service. transport.py 558 DEBUG Removed /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Unconfiguring ipa-custodia transport.py 558 DEBUG Unconfiguring ipa-otpd transport.py 558 DEBUG Removing Kerberos service principals from /etc/krb5.keytab transport.py 558 DEBUG Disabling client Kerberos and LDAP configurations transport.py 558 DEBUG Restoring user-nsswitch.conf transport.py 558 DEBUG Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted transport.py 558 DEBUG Restoring client configuration files transport.py 558 DEBUG Restoring ipa.test as NIS domain. transport.py 558 DEBUG nscd daemon is not installed, skip configuration transport.py 558 DEBUG nslcd daemon is not installed, skip configuration transport.py 558 DEBUG Systemwide CA database updated. transport.py 558 DEBUG Client uninstall complete. transport.py 558 DEBUG The ipa-client-install command was successful transport.py 558 DEBUG The ipa-server-install command was successful transport.py 558 DEBUG Removing IPA client configuration transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--remove-service', 'freeipa-ldap', '--remove-service', 'freeipa-ldaps', '--remove-service', 'freeipa-trust', '--remove-service', 'dns'] transport.py 513 DEBUG RUN ['firewall-cmd', '--remove-service', 'freeipa-ldap', '--remove-service', 'freeipa-ldaps', '--remove-service', 'freeipa-trust', '--remove-service', 'dns'] transport.py 558 DEBUG success transport.py 558 DEBUG Warning: NOT_ENABLED: 'freeipa-trust' not in 'public' transport.py 558 DEBUG Warning: NOT_ENABLED: 'dns' not in 'public' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['firewall-cmd', '--remove-service', 'freeipa-ldap', '--remove-service', 'freeipa-ldaps', '--remove-service', 'freeipa-trust', '--remove-service', 'dns', '--permanent'] transport.py 513 DEBUG RUN ['firewall-cmd', '--remove-service', 'freeipa-ldap', '--remove-service', 'freeipa-ldaps', '--remove-service', 'freeipa-trust', '--remove-service', 'dns', '--permanent'] transport.py 558 DEBUG success transport.py 558 DEBUG Warning: NOT_ENABLED: freeipa-trust transport.py 558 DEBUG Warning: NOT_ENABLED: dns transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['pkidestroy', '-s', 'CA', '-i', 'pki-tomcat'] transport.py 513 DEBUG RUN ['pkidestroy', '-s', 'CA', '-i', 'pki-tomcat'] transport.py 558 DEBUG ERROR: PKI instance '/var/lib/pki/pki-tomcat' does NOT exist! transport.py 558 DEBUG transport.py 217 DEBUG Exit code: 255 transport.py 318 INFO RUN ['rm', '-rf', '/var/log/pki/pki-tomcat', '/etc/sysconfig/pki-tomcat', '/etc/sysconfig/pki/tomcat/pki-tomcat', '/var/lib/pki/pki-tomcat', '/etc/pki/pki-tomcat', '/var/run/ipa/renewal.lock', '/var/lib/ipa/replica-info-master.ipa.test.gpg'] transport.py 513 DEBUG RUN ['rm', '-rf', '/var/log/pki/pki-tomcat', '/etc/sysconfig/pki-tomcat', '/etc/sysconfig/pki/tomcat/pki-tomcat', '/var/lib/pki/pki-tomcat', '/etc/pki/pki-tomcat', '/var/run/ipa/renewal.lock', '/var/lib/ipa/replica-info-master.ipa.test.gpg'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /var/lib/sss/keytabs -name '*.keytab' | xargs rm -fv transport.py 513 DEBUG RUN find /var/lib/sss/keytabs -name '*.keytab' | xargs rm -fv transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN find /run/ipa -name 'krb5*' | xargs rm -fv transport.py 513 DEBUG RUN find /run/ipa -name 'krb5*' | xargs rm -fv transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN if [ -d '/ipatests/file_backup'/ ]; then cp -arvf '/ipatests/file_backup'/* /; fi ; (find /ipatests/file_backup | sed 's/\/ipatests\/file_backup//g' | sed '/^$/d' | xargs -d ' ' /sbin/restorecon -v ||:) transport.py 513 DEBUG RUN if [ -d '/ipatests/file_backup'/ ]; then cp -arvf '/ipatests/file_backup'/* /; fi ; (find /ipatests/file_backup | sed 's/\/ipatests\/file_backup//g' | sed '/^$/d' | xargs -d ' ' /sbin/restorecon -v ||:) transport.py 558 DEBUG '/ipatests/file_backup/etc/hostname' -> '/etc/hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['xargs', '-d', '\\n', '-a', '/ipatests/file_remove', 'rm', '-vf'] transport.py 513 DEBUG RUN ['xargs', '-d', '\\n', '-a', '/ipatests/file_remove', 'rm', '-vf'] transport.py 558 DEBUG xargs: Cannot open input file ‘/ipatests/file_remove’: No such file or directory transport.py 217 DEBUG Exit code: 1 transport.py 318 INFO RUN ['rm', '-rvf', '/ipatests/file_backup', '/ipatests/file_remove'] transport.py 513 DEBUG RUN ['rm', '-rvf', '/ipatests/file_backup', '/ipatests/file_remove'] transport.py 558 DEBUG removed '/ipatests/file_backup/etc/hostname' transport.py 558 DEBUG removed directory '/ipatests/file_backup/etc' transport.py 558 DEBUG removed directory '/ipatests/file_backup' transport.py 217 DEBUG Exit code: 0 transport.py 284 DEBUG READ /ipatests/backup_hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '/ipatests/backup_hostname'] transport.py 513 DEBUG RUN ['rm', '/ipatests/backup_hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['kdestroy', '-A'] transport.py 513 DEBUG RUN ['kdestroy', '-A'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['rm', '-rvf', '/ipatests'] transport.py 513 DEBUG RUN ['rm', '-rvf', '/ipatests'] transport.py 558 DEBUG removed '/ipatests/env.sh' transport.py 558 DEBUG removed directory '/ipatests' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 513 DEBUG RUN ['cat', '/etc/authselect/authselect.conf'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 558 DEBUG -bash: line 2: /ipatests/env.sh: No such file or directory transport.py 558 DEBUG winbind transport.py 558 DEBUG with-fingerprint transport.py 217 DEBUG Exit code: 0