report.html

Report generated on 11-Sep-2019 at 23:38:44 by pytest-html v1.22.0

Environment

Packages {'pytest': '3.9.3', 'py': '1.7.0', 'pluggy': '0.8.1'}
Platform Linux-5.2.8-200.fc30.x86_64-x86_64-with-fedora-30-Thirty
Plugins {'metadata': '1.8.0', 'html': '1.22.0', 'sourceorder': '0.5', 'multihost': '3.0'}
Python 3.7.4

Summary

0 tests ran in 491.64 seconds.

0 passed, 0 skipped, 0 failed, 3 errors, 0 expected failures, 0 unexpected passes

Results

Result Test Duration Links
Error test_integration/test_service_permissions.py::TestServicePermissions::()::test_service_as_user_admin::setup 467.12
request = <SubRequest 'mh' for <Function 'test_service_as_user_admin'>>
class_integration_logs = {<ipatests.pytest_ipa.integration.host.Host master.ipa.test (master)>: ['/ipatests/env.sh', '/var/log/dirsrv/slapd-IPA.../access', '/var/log/ipaserver-install.log', '/var/log/ipaserver-uninstall.log', '/var/log/ipaclient-install.log', ...]}

@yield_fixture(scope='class')
def mh(request, class_integration_logs):
"""IPA's multihost fixture object
"""
cls = request.cls

domain_description = {
'type': 'IPA',
'hosts': {
'master': 1,
'replica': cls.num_replicas,
'client': cls.num_clients,
},
}
domain_description['hosts'].update(
{role: 1 for role in cls.required_extra_roles})

domain_descriptions = [domain_description]
for _i in range(cls.num_ad_domains):
domain_descriptions.append({
'type': 'AD',
'hosts': {'ad': 1}
})
for _i in range(cls.num_ad_subdomains):
domain_descriptions.append({
'type': 'AD_SUBDOMAIN',
'hosts': {'ad_subdomain': 1}
})
for _i in range(cls.num_ad_treedomains):
domain_descriptions.append({
'type': 'AD_TREEDOMAIN',
'hosts': {'ad_treedomain': 1}
})

mh = make_multihost_fixture(
request,
domain_descriptions,
config_class=Config,
_config=get_global_config(),
)

mh.domain = mh.config.domains[0]
[mh.master] = mh.domain.hosts_by_role('master')
mh.replicas = mh.domain.hosts_by_role('replica')
mh.clients = mh.domain.hosts_by_role('client')
ad_domains = mh.config.ad_domains
if ad_domains:
mh.ads = []
for domain in ad_domains:
mh.ads.extend(domain.hosts_by_role('ad'))
mh.ad_subdomains = []
for domain in ad_domains:
mh.ad_subdomains.extend(domain.hosts_by_role('ad_subdomain'))
mh.ad_treedomains = []
for domain in ad_domains:
mh.ad_treedomains.extend(domain.hosts_by_role('ad_treedomain'))

cls.logs_to_collect = class_integration_logs

def collect_log(host, filename):
logger.info('Adding %s:%s to list of logs to collect',
host.external_hostname, filename)
class_integration_logs.setdefault(host, []).append(filename)

print(mh.config)
for host in mh.config.get_all_hosts():
host.add_log_collector(collect_log)
logger.info('Preparing host %s', host.hostname)
tasks.prepare_host(host)

setup_class(cls, mh)
mh._pytestmh_request.addfinalizer(lambda: teardown_class(cls))

try:
> yield mh.install()

pytest_ipa/integration/__init__.py:274:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../pytest_multihost/plugin.py:80: in install
cls().install(self)
test_integration/base.py:74: in install
cls.clients, domain_level)
pytest_ipa/integration/tasks.py:1236: in install_topo
setup_kra=setup_replica_kras
pytest_ipa/integration/tasks.py:362: in install_master
stdin_text=stdin_text)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <ipatests.pytest_ipa.integration.host.Host master.ipa.test (master)>
argv = ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', ...]
set_env = True, stdin_text = None, log_stdout = True, raiseonerr = True
cwd = None, bg = False, encoding = 'utf-8', ok_returncode = 0

def run_command(self, argv, set_env=True, stdin_text=None,
log_stdout=True, raiseonerr=True,
cwd=None, bg=False, encoding='utf-8', ok_returncode=0):
"""Wrapper around run_command to log stderr on raiseonerr=True

:param ok_returncode: return code considered to be correct,
you can pass an integer or sequence of integers
"""
result = super().run_command(
argv, set_env=set_env, stdin_text=stdin_text,
log_stdout=log_stdout, raiseonerr=False, cwd=cwd, bg=bg,
encoding=encoding
)
try:
result_ok = result.returncode in ok_returncode
except TypeError:
result_ok = result.returncode == ok_returncode
if not result_ok and raiseonerr:
result.log.error('stderr: %s', result.stderr_text)
raise subprocess.CalledProcessError(
result.returncode, argv,
> result.stdout_text, result.stderr_text
)
E subprocess.CalledProcessError: Command '['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse']' returned non-zero exit status 1.

pytest_ipa/integration/host.py:128: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
<ipatests.pytest_ipa.integration.config.Config object at 0x7fe12857ca10>
---------------------------- Captured stderr setup -----------------------------
[ipatests.pytest_ipa.integration.host.Host.master.cmd13] Done configuring directory server (dirsrv). [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Configuring Kerberos KDC (krb5kdc) [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [1/10]: adding kerberos container to the directory [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [2/10]: configuring KDC [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [3/10]: initialize kerberos container [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [4/10]: adding default ACIs [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [5/10]: creating a keytab for the directory [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [6/10]: creating a keytab for the machine [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [7/10]: adding the password extension to the directory [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [8/10]: creating anonymous principal [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [9/10]: starting the KDC [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [10/10]: configuring KDC to start on boot [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Done configuring Kerberos KDC (krb5kdc). [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Configuring kadmin [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [1/2]: starting kadmin [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [2/2]: configuring kadmin to start on boot [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Done configuring kadmin. [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Configuring ipa-custodia [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [1/5]: Making sure custodia container exists [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [2/5]: Generating ipa-custodia config file [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [3/5]: Generating ipa-custodia keys [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [4/5]: starting ipa-custodia [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [5/5]: configuring ipa-custodia to start on boot [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Done configuring ipa-custodia. [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [1/29]: configuring certificate server instance [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [2/29]: Add ipa-pki-wait-running [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [3/29]: reindex attributes [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [4/29]: exporting Dogtag certificate store pin [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [5/29]: stopping certificate server instance to update CS.cfg [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [6/29]: backing up CS.cfg [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [7/29]: disabling nonces [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [8/29]: set up CRL publishing [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [9/29]: enable PKIX certificate path discovery and validation [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [10/29]: starting certificate server instance [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [11/29]: configure certmonger for renewals [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [12/29]: requesting RA certificate from CA [ipatests.pytest_ipa.integration.host.Host.master.cmd13] [error] RuntimeError: Certificate issuance failed (TIMEOUT: None) [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Certificate issuance failed (TIMEOUT: None) [ipatests.pytest_ipa.integration.host.Host.master.cmd13] The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information [ipatests.pytest_ipa.integration.host.Host.master.cmd13] Exit code: 1 ipa: ERROR: stderr: Checking DNS domain ipa.test, please wait ... Checking DNS domain ipa.test., please wait ... Checking DNS domain 121.168.192.in-addr.arpa., please wait ... Reverse zone 121.168.192.in-addr.arpa. will be created Synchronizing time No SRV records of NTP servers found and no NTP server or pool address was provided. Attempting to sync time with chronyc. Process chronyc waitsync failed to sync time! Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Starting installation... Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket Certificate issuance failed (TIMEOUT: None) The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information
------------------------------ Captured log setup ------------------------------
__init__.py 267 INFO Preparing host master.ipa.test transport.py 1760 INFO Connected (version 2.0, client OpenSSH_8.0) transport.py 247 DEBUG Authenticating with private RSA key using user root transport.py 1760 INFO Authentication (publickey) successful! transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 558 DEBUG -bash: line 1: cd: /ipatests: No such file or directory transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests sftp.py 158 INFO [chan 1] Opened sftp connection (server version 3) transport.py 301 DEBUG STAT / transport.py 312 INFO MKDIR /ipatests transport.py 293 INFO WRITE /ipatests/env.sh __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/errors to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/dirsrv/slapd-IPA-TEST/access to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-conncheck.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipareplica-ca-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaserver-kra-install.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipa-custodia.audit.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipaclient-uninstall.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/iparestore.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/ipabackup.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/kadmind.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/krb5kdc.log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/httpd/error_log to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/pki/ to list of logs to collect __init__.py 261 INFO Adding master.ipa.test:/var/log/audit/audit.log to list of logs to collect transport.py 318 INFO RUN ['true'] transport.py 513 DEBUG RUN ['true'] transport.py 217 DEBUG Exit code: 0 __init__.py 261 INFO Adding master.ipa.test:/ipatests/env.sh to list of logs to collect transport.py 301 DEBUG STAT /ipatests transport.py 293 INFO WRITE /ipatests/env.sh transport.py 301 DEBUG STAT /etc/hostname transport.py 301 DEBUG STAT /ipatests/file_backup/etc transport.py 301 DEBUG STAT /ipatests/file_backup transport.py 301 DEBUG STAT /ipatests transport.py 312 INFO MKDIR /ipatests/file_backup transport.py 312 INFO MKDIR /ipatests/file_backup/etc transport.py 318 INFO RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 513 DEBUG RUN ['cp', '-af', '/etc/hostname', '/ipatests/file_backup/etc/hostname'] transport.py 217 DEBUG Exit code: 0 transport.py 293 INFO WRITE /etc/hostname transport.py 318 INFO RUN ['hostname', 'master.ipa.test'] transport.py 513 DEBUG RUN ['hostname', 'master.ipa.test'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN hostname > '/ipatests/backup_hostname' transport.py 513 DEBUG RUN hostname > '/ipatests/backup_hostname' transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:938 0.0.0.0:* users:(("rpc.statd",pid=2034,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:58439 0.0.0.0:* users:(("rpc.statd",pid=2034,fd=9)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:68 0.0.0.0:* users:(("dhclient",pid=1626,fd=7)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2033,fd=5),("systemd",pid=1,fd=97)) transport.py 558 DEBUG udp UNCONN 0 0 127.0.0.1:323 0.0.0.0:* users:(("chronyd",pid=542,fd=5)) transport.py 558 DEBUG udp UNCONN 0 0 0.0.0.0:59959 0.0.0.0:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:54320 [::]:* users:(("rpc.statd",pid=2034,fd=11)) transport.py 558 DEBUG udp UNCONN 0 0 [::]:38707 [::]:* transport.py 558 DEBUG udp UNCONN 0 0 [::]:111 [::]:* users:(("rpcbind",pid=2033,fd=7),("systemd",pid=1,fd=99)) transport.py 558 DEBUG udp UNCONN 0 0 [::1]:323 [::]:* users:(("chronyd",pid=542,fd=6)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=610,fd=5)) transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:53047 0.0.0.0:* users:(("rpc.statd",pid=2034,fd=10)) transport.py 558 DEBUG tcp LISTEN 0 64 0.0.0.0:39391 0.0.0.0:* transport.py 558 DEBUG tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:(("rpcbind",pid=2033,fd=4),("systemd",pid=1,fd=96)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:60622 129.7.128.189:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:60620 129.7.128.189:80 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:756 192.168.121.1:2049 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:57306 52.219.74.54:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:54914 131.247.253.85:80 transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:60618 129.7.128.189:80 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.1:45038 users:(("sshd",pid=2163,fd=5),("sshd",pid=2161,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:57304 52.219.74.54:80 transport.py 558 DEBUG tcp ESTAB 0 0 192.168.121.79:22 192.168.121.183:45868 users:(("sshd",pid=16355,fd=5),("sshd",pid=16353,fd=5)) transport.py 558 DEBUG tcp TIME-WAIT 0 0 192.168.121.79:57308 52.219.74.54:80 transport.py 558 DEBUG tcp LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=610,fd=7)) transport.py 558 DEBUG tcp LISTEN 0 64 [::]:33655 [::]:* transport.py 558 DEBUG tcp LISTEN 0 128 [::]:38029 [::]:* users:(("rpc.statd",pid=2034,fd=12)) transport.py 558 DEBUG tcp LISTEN 0 128 [::]:111 [::]:* users:(("rpcbind",pid=2033,fd=6),("systemd",pid=1,fd=98)) transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 513 DEBUG RUN ['ss', '--all', '--tcp', '--udp', '--numeric', '--processes', '-o', 'state', 'all', '( sport = :749 or dport = :749 or sport = :464 or dport = :464 )'] transport.py 558 DEBUG Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port transport.py 217 DEBUG Exit code: 0 transport.py 301 DEBUG STAT /bin/systemctl transport.py 318 INFO RUN ['systemctl', 'stop', 'httpd'] transport.py 513 DEBUG RUN ['systemctl', 'stop', 'httpd'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 513 DEBUG RUN for line in `ipcs -s | grep apache | cut -d " " -f 2`; do ipcrm -s $line; done transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'unmask', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'unmask', 'firewalld'] transport.py 558 DEBUG Removed /etc/systemd/system/firewalld.service. transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'enable', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'enable', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['systemctl', 'start', 'firewalld'] transport.py 513 DEBUG RUN ['systemctl', 'start', 'firewalld'] transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 513 DEBUG RUN ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse'] transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG Checking DNS domain ipa.test., please wait ... transport.py 558 DEBUG Checking DNS domain 121.168.192.in-addr.arpa., please wait ... transport.py 558 DEBUG Reverse zone 121.168.192.in-addr.arpa. will be created transport.py 558 DEBUG Synchronizing time transport.py 558 DEBUG No SRV records of NTP servers found and no NTP server or pool address was provided. transport.py 558 DEBUG Attempting to sync time with chronyc. transport.py 558 DEBUG Process chronyc waitsync failed to sync time! transport.py 558 DEBUG Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. transport.py 558 DEBUG Checking DNS domain ipa.test, please wait ... transport.py 558 DEBUG transport.py 558 DEBUG The log file for this installation can be found in /var/log/ipaserver-install.log transport.py 558 DEBUG ============================================================================== transport.py 558 DEBUG This program will set up the FreeIPA Server. transport.py 558 DEBUG Version 4.9.0.dev transport.py 558 DEBUG transport.py 558 DEBUG This includes: transport.py 558 DEBUG * Configure a stand-alone CA (dogtag) for certificate management transport.py 558 DEBUG * Configure the NTP client (chronyd) transport.py 558 DEBUG * Create and configure an instance of Directory Server transport.py 558 DEBUG * Create and configure a Kerberos Key Distribution Center (KDC) transport.py 558 DEBUG * Configure Apache (httpd) transport.py 558 DEBUG * Configure DNS (bind) transport.py 558 DEBUG * Configure the KDC to enable PKINIT transport.py 558 DEBUG transport.py 558 DEBUG Warning: skipping DNS resolution of host master.ipa.test transport.py 558 DEBUG Checking DNS forwarders, please wait ... transport.py 558 DEBUG Using reverse zone(s) 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG The IPA Master Server will be configured with: transport.py 558 DEBUG Hostname: master.ipa.test transport.py 558 DEBUG IP address(es): 192.168.121.79 transport.py 558 DEBUG Domain name: ipa.test transport.py 558 DEBUG Realm name: IPA.TEST transport.py 558 DEBUG transport.py 558 DEBUG The CA will be configured with: transport.py 558 DEBUG Subject DN: CN=Certificate Authority,O=IPA.TEST transport.py 558 DEBUG Subject base: O=IPA.TEST transport.py 558 DEBUG Chaining: self-signed transport.py 558 DEBUG transport.py 558 DEBUG BIND DNS server will be configured to serve IPA domain with: transport.py 558 DEBUG Forwarders: 192.168.121.1 transport.py 558 DEBUG Forward policy: only transport.py 558 DEBUG Reverse zone(s): 121.168.192.in-addr.arpa. transport.py 558 DEBUG transport.py 558 DEBUG Disabled p11-kit-proxy transport.py 558 DEBUG Using default chrony configuration. transport.py 558 DEBUG Warning: IPA was unable to sync time with chrony! transport.py 558 DEBUG Time synchronization is required for IPA to work correctly transport.py 558 DEBUG Configuring directory server (dirsrv). Estimated time: 30 seconds transport.py 558 DEBUG [1/44]: creating directory server instance transport.py 558 DEBUG transport.py 558 DEBUG Starting installation... transport.py 558 DEBUG Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. transport.py 558 DEBUG Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" transport.py 558 DEBUG Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket transport.py 558 DEBUG [2/44]: configure autobind for root transport.py 558 DEBUG [3/44]: stopping directory server transport.py 558 DEBUG [4/44]: updating configuration in dse.ldif transport.py 558 DEBUG [5/44]: starting directory server transport.py 558 DEBUG [6/44]: adding default schema transport.py 558 DEBUG [7/44]: enabling memberof plugin transport.py 558 DEBUG [8/44]: enabling winsync plugin transport.py 558 DEBUG [9/44]: configure password logging transport.py 558 DEBUG [10/44]: configuring replication version plugin transport.py 558 DEBUG [11/44]: enabling IPA enrollment plugin transport.py 558 DEBUG [12/44]: configuring uniqueness plugin transport.py 558 DEBUG [13/44]: configuring uuid plugin transport.py 558 DEBUG [14/44]: configuring modrdn plugin transport.py 558 DEBUG [15/44]: configuring DNS plugin transport.py 558 DEBUG [16/44]: enabling entryUSN plugin transport.py 558 DEBUG [17/44]: configuring lockout plugin transport.py 558 DEBUG [18/44]: configuring topology plugin transport.py 558 DEBUG [19/44]: creating indices transport.py 558 DEBUG [20/44]: enabling referential integrity plugin transport.py 558 DEBUG [21/44]: configuring certmap.conf transport.py 558 DEBUG [22/44]: configure new location for managed entries transport.py 558 DEBUG [23/44]: configure dirsrv ccache and keytab transport.py 558 DEBUG [24/44]: enabling SASL mapping fallback transport.py 558 DEBUG [25/44]: restarting directory server transport.py 558 DEBUG [26/44]: adding sasl mappings to the directory transport.py 558 DEBUG [27/44]: adding default layout transport.py 558 DEBUG [28/44]: adding delegation layout transport.py 558 DEBUG [29/44]: creating container for managed entries transport.py 558 DEBUG [30/44]: configuring user private groups transport.py 558 DEBUG [31/44]: configuring netgroups from hostgroups transport.py 558 DEBUG [32/44]: creating default Sudo bind user transport.py 558 DEBUG [33/44]: creating default Auto Member layout transport.py 558 DEBUG [34/44]: adding range check plugin transport.py 558 DEBUG [35/44]: creating default HBAC rule allow_all transport.py 558 DEBUG [36/44]: adding entries for topology management transport.py 558 DEBUG [37/44]: initializing group membership transport.py 558 DEBUG [38/44]: adding master entry transport.py 558 DEBUG [39/44]: initializing domain level transport.py 558 DEBUG [40/44]: configuring Posix uid/gid generation transport.py 558 DEBUG [41/44]: adding replication acis transport.py 558 DEBUG [42/44]: activating sidgen plugin transport.py 558 DEBUG [43/44]: activating extdom plugin transport.py 558 DEBUG [44/44]: configuring directory to start on boot transport.py 558 DEBUG Done configuring directory server (dirsrv). transport.py 558 DEBUG Configuring Kerberos KDC (krb5kdc) transport.py 558 DEBUG [1/10]: adding kerberos container to the directory transport.py 558 DEBUG [2/10]: configuring KDC transport.py 558 DEBUG [3/10]: initialize kerberos container transport.py 558 DEBUG [4/10]: adding default ACIs transport.py 558 DEBUG [5/10]: creating a keytab for the directory transport.py 558 DEBUG [6/10]: creating a keytab for the machine transport.py 558 DEBUG [7/10]: adding the password extension to the directory transport.py 558 DEBUG [8/10]: creating anonymous principal transport.py 558 DEBUG [9/10]: starting the KDC transport.py 558 DEBUG [10/10]: configuring KDC to start on boot transport.py 558 DEBUG Done configuring Kerberos KDC (krb5kdc). transport.py 558 DEBUG Configuring kadmin transport.py 558 DEBUG [1/2]: starting kadmin transport.py 558 DEBUG [2/2]: configuring kadmin to start on boot transport.py 558 DEBUG Done configuring kadmin. transport.py 558 DEBUG Configuring ipa-custodia transport.py 558 DEBUG [1/5]: Making sure custodia container exists transport.py 558 DEBUG [2/5]: Generating ipa-custodia config file transport.py 558 DEBUG [3/5]: Generating ipa-custodia keys transport.py 558 DEBUG [4/5]: starting ipa-custodia transport.py 558 DEBUG [5/5]: configuring ipa-custodia to start on boot transport.py 558 DEBUG Done configuring ipa-custodia. transport.py 558 DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes transport.py 558 DEBUG [1/29]: configuring certificate server instance transport.py 558 DEBUG [2/29]: Add ipa-pki-wait-running transport.py 558 DEBUG [3/29]: reindex attributes transport.py 558 DEBUG [4/29]: exporting Dogtag certificate store pin transport.py 558 DEBUG [5/29]: stopping certificate server instance to update CS.cfg transport.py 558 DEBUG [6/29]: backing up CS.cfg transport.py 558 DEBUG [7/29]: disabling nonces transport.py 558 DEBUG [8/29]: set up CRL publishing transport.py 558 DEBUG [9/29]: enable PKIX certificate path discovery and validation transport.py 558 DEBUG [10/29]: starting certificate server instance transport.py 558 DEBUG [11/29]: configure certmonger for renewals transport.py 558 DEBUG [12/29]: requesting RA certificate from CA transport.py 558 DEBUG [error] RuntimeError: Certificate issuance failed (TIMEOUT: None) transport.py 558 DEBUG Certificate issuance failed (TIMEOUT: None) transport.py 558 DEBUG The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information transport.py 217 DEBUG Exit code: 1 host.py 125 ERROR stderr: Checking DNS domain ipa.test, please wait ... Checking DNS domain ipa.test., please wait ... Checking DNS domain 121.168.192.in-addr.arpa., please wait ... Reverse zone 121.168.192.in-addr.arpa. will be created Synchronizing time No SRV records of NTP servers found and no NTP server or pool address was provided. Attempting to sync time with chronyc. Process chronyc waitsync failed to sync time! Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Starting installation... Created symlink /etc/systemd/system/multi-user.target.wants/dirsrv@IPA-TEST.service → /usr/lib/systemd/system/dirsrv@.service. Opening SELinux policy "//etc/selinux/targeted/policy/policy.31" Successfully opened SELinux policy "//etc/selinux/targeted/policy/policy.31" Allocate local instance <class 'lib389.DirSrv'> with ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket Certificate issuance failed (TIMEOUT: None) The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information __init__.py 134 INFO Collecting logs from: master.ipa.test transport.py 318 INFO RUN ['mktemp'] transport.py 513 DEBUG RUN ['mktemp'] transport.py 558 DEBUG /tmp/tmp.mBFxGsnxim transport.py 217 DEBUG Exit code: 0 transport.py 318 INFO RUN ['tar', 'cJvf', '/tmp/tmp.mBFxGsnxim', '--ignore-failed-read', '/ipatests/env.sh', '/var/log/dirsrv/slapd-IPA-TEST/errors', '/var/log/dirsrv/slapd-IPA-TEST/access', '/var/log/ipaserver-install.log', '/var/log/ipaserver-uninstall.log', '/var/log/ipaclient-install.log', '/var/log/ipaclient-uninstall.log', '/var/log/ipareplica-install.log', '/var/log/ipareplica-conncheck.log', '/var/log/ipareplica-ca-install.log', '/var/log/ipaserver-kra-install.log', '/var/log/ipa-custodia.audit.log', '/var/log/ipaclient-uninstall.log', '/var/log/iparestore.log', '/var/log/ipabackup.log', '/var/log/kadmind.log', '/var/log/krb5kdc.log', '/var/log/httpd/error_log', '/var/log/pki/', '/var/log/audit/audit.log', '/ipatests/env.sh'] transport.py 513 DEBUG RUN ['tar', 'cJvf', '/tmp/tmp.mBFxGsnxim', '--ignore-failed-read', '/ipatests/env.sh', '/var/log/dirsrv/slapd-IPA-TEST/errors', '/var/log/dirsrv/slapd-IPA-TEST/access', '/var/log/ipaserver-install.log', '/var/log/ipaserver-uninstall.log', '/var/log/ipaclient-install.log', '/var/log/ipaclient-uninstall.log', '/var/log/ipareplica-install.log', '/var/log/ipareplica-conncheck.log', '/var/log/ipareplica-ca-install.log', '/var/log/ipaserver-kra-install.log', '/var/log/ipa-custodia.audit.log', '/var/log/ipaclient-uninstall.log', '/var/log/iparestore.log', '/var/log/ipabackup.log', '/var/log/kadmind.log', '/var/log/krb5kdc.log', '/var/log/httpd/error_log', '/var/log/pki/', '/var/log/audit/audit.log', '/ipatests/env.sh'] transport.py 558 DEBUG tar: Removing leading `/' from member names transport.py 558 DEBUG tar: Removing leading `/' from hard link targets transport.py 558 DEBUG tar: /var/log/ipaserver-uninstall.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipaclient-install.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipaclient-uninstall.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipareplica-install.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipareplica-conncheck.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipareplica-ca-install.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipaserver-kra-install.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipaclient-uninstall.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/iparestore.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/ipabackup.log: Warning: Cannot stat: No such file or directory transport.py 558 DEBUG tar: /var/log/httpd/error_log: Warning: Cannot stat: No such file or directory transport.py 217 DEBUG Exit code: 0 transport.py 284 DEBUG READ /tmp/tmp.mBFxGsnxim transport.py 318 INFO RUN ['rm', '-f', '/tmp/tmp.mBFxGsnxim'] transport.py 513 DEBUG RUN ['rm', '-f', '/tmp/tmp.mBFxGsnxim'] transport.py 217 DEBUG Exit code: 0 __init__.py 90 INFO Collecting journal from: master.ipa.test transport.py 318 INFO RUN ['journalctl', '--since', '-1h'] transport.py 513 DEBUG RUN ['journalctl', '--since', '-1h'] transport.py 217 DEBUG Exit code: 0
Error test_integration/test_service_permissions.py::TestServicePermissions::()::test_service_access::setup 0.00
tp = <class 'subprocess.CalledProcessError'>, value = None, tb = None

def reraise(tp, value, tb=None):
try:
if value is None:
value = tp()
if value.__traceback__ is not tb:
> raise value.with_traceback(tb)

../six.py:692:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
pytest_ipa/integration/__init__.py:274: in mh
yield mh.install()
../pytest_multihost/plugin.py:80: in install
cls().install(self)
test_integration/base.py:74: in install
cls.clients, domain_level)
pytest_ipa/integration/tasks.py:1236: in install_topo
setup_kra=setup_replica_kras
pytest_ipa/integration/tasks.py:362: in install_master
stdin_text=stdin_text)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <ipatests.pytest_ipa.integration.host.Host master.ipa.test (master)>
argv = ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', ...]
set_env = True, stdin_text = None, log_stdout = True, raiseonerr = True
cwd = None, bg = False, encoding = 'utf-8', ok_returncode = 0

def run_command(self, argv, set_env=True, stdin_text=None,
log_stdout=True, raiseonerr=True,
cwd=None, bg=False, encoding='utf-8', ok_returncode=0):
"""Wrapper around run_command to log stderr on raiseonerr=True

:param ok_returncode: return code considered to be correct,
you can pass an integer or sequence of integers
"""
result = super().run_command(
argv, set_env=set_env, stdin_text=stdin_text,
log_stdout=log_stdout, raiseonerr=False, cwd=cwd, bg=bg,
encoding=encoding
)
try:
result_ok = result.returncode in ok_returncode
except TypeError:
result_ok = result.returncode == ok_returncode
if not result_ok and raiseonerr:
result.log.error('stderr: %s', result.stderr_text)
raise subprocess.CalledProcessError(
result.returncode, argv,
> result.stdout_text, result.stderr_text
)
E subprocess.CalledProcessError: Command '['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse']' returned non-zero exit status 1.

pytest_ipa/integration/host.py:128: CalledProcessError
Error test_integration/test_service_permissions.py::TestServicePermissions::()::test_service_del::setup 0.00
tp = <class 'subprocess.CalledProcessError'>, value = None, tb = None

def reraise(tp, value, tb=None):
try:
if value is None:
value = tp()
if value.__traceback__ is not tb:
> raise value.with_traceback(tb)

../six.py:692:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
pytest_ipa/integration/__init__.py:274: in mh
yield mh.install()
../pytest_multihost/plugin.py:80: in install
cls().install(self)
test_integration/base.py:74: in install
cls.clients, domain_level)
pytest_ipa/integration/tasks.py:1236: in install_topo
setup_kra=setup_replica_kras
pytest_ipa/integration/tasks.py:362: in install_master
stdin_text=stdin_text)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <ipatests.pytest_ipa.integration.host.Host master.ipa.test (master)>
argv = ['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', ...]
set_env = True, stdin_text = None, log_stdout = True, raiseonerr = True
cwd = None, bg = False, encoding = 'utf-8', ok_returncode = 0

def run_command(self, argv, set_env=True, stdin_text=None,
log_stdout=True, raiseonerr=True,
cwd=None, bg=False, encoding='utf-8', ok_returncode=0):
"""Wrapper around run_command to log stderr on raiseonerr=True

:param ok_returncode: return code considered to be correct,
you can pass an integer or sequence of integers
"""
result = super().run_command(
argv, set_env=set_env, stdin_text=stdin_text,
log_stdout=log_stdout, raiseonerr=False, cwd=cwd, bg=bg,
encoding=encoding
)
try:
result_ok = result.returncode in ok_returncode
except TypeError:
result_ok = result.returncode == ok_returncode
if not result_ok and raiseonerr:
result.log.error('stderr: %s', result.stderr_text)
raise subprocess.CalledProcessError(
result.returncode, argv,
> result.stdout_text, result.stderr_text
)
E subprocess.CalledProcessError: Command '['ipa-server-install', '-n', 'ipa.test', '-r', 'IPA.TEST', '-p', 'Secret.123', '-a', 'Secret.123', '--domain-level=1', '-U', '--setup-dns', '--forwarder', '192.168.121.1', '--auto-reverse']' returned non-zero exit status 1.

pytest_ipa/integration/host.py:128: CalledProcessError