Nomadadon

ipaserver-install.log

May 10th, 2017
1,018
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.39 MB | None | 0 0
  1. 2017-05-11T02:28:22Z DEBUG Logging to /var/log/ipaserver-install.log
  2. 2017-05-11T02:28:22Z DEBUG ipa-server-install was invoked with arguments [] and options: {'no_dns_sshfp': None, 'ignore_topology_disconnect': None, 'verbose': False, 'ip_addresses': None, 'domainlevel': None, 'mkhomedir': None, 'http_cert_files': None, 'no_ntp': None, 'reverse_zones': None, 'no_forwarders': None, 'external_ca_type': None, 'ssh_trust_dns': None, 'domain_name': None, 'idmax': None, 'http_cert_name': None, 'dirsrv_cert_files': None, 'no_dnssec_validation': None, 'ca_signing_algorithm': None, 'no_reverse': None, 'subject': None, 'unattended': False, 'auto_reverse': None, 'auto_forwarders': None, 'no_host_dns': None, 'no_sshd': None, 'no_ui_redirect': None, 'ignore_last_of_role': None, 'realm_name': None, 'forwarders': None, 'idstart': None, 'external_ca': None, 'no_ssh': None, 'external_cert_files': None, 'no_hbac_allow': None, 'forward_policy': None, 'dirsrv_cert_name': None, 'ca_cert_files': None, 'zonemgr': None, 'quiet': False, 'setup_dns': None, 'host_name': None, 'dirsrv_config_file': None, 'log_file': None, 'allow_zone_overlap': None, 'uninstall': False}
  3. 2017-05-11T02:28:22Z DEBUG IPA version 4.4.0-14.el7.centos.7
  4. 2017-05-11T02:28:22Z DEBUG Starting external process
  5. 2017-05-11T02:28:22Z DEBUG args=/usr/sbin/selinuxenabled
  6. 2017-05-11T02:28:22Z DEBUG Process finished, return code=0
  7. 2017-05-11T02:28:22Z DEBUG stdout=
  8. 2017-05-11T02:28:22Z DEBUG stderr=
  9. 2017-05-11T02:28:22Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  10. 2017-05-11T02:28:22Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  11. 2017-05-11T02:28:22Z DEBUG httpd is not configured
  12. 2017-05-11T02:28:22Z DEBUG kadmin is not configured
  13. 2017-05-11T02:28:22Z DEBUG dirsrv is not configured
  14. 2017-05-11T02:28:22Z DEBUG pki-tomcatd is not configured
  15. 2017-05-11T02:28:22Z DEBUG install is not configured
  16. 2017-05-11T02:28:22Z DEBUG krb5kdc is not configured
  17. 2017-05-11T02:28:22Z DEBUG ntpd is not configured
  18. 2017-05-11T02:28:22Z DEBUG named is not configured
  19. 2017-05-11T02:28:22Z DEBUG ipa_memcached is not configured
  20. 2017-05-11T02:28:22Z DEBUG filestore is tracking no files
  21. 2017-05-11T02:28:22Z DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index'
  22. 2017-05-11T02:28:22Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  23. 2017-05-11T02:28:22Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  24. 2017-05-11T02:28:22Z DEBUG Starting external process
  25. 2017-05-11T02:28:22Z DEBUG args=/bin/systemctl is-enabled chronyd.service
  26. 2017-05-11T02:28:22Z DEBUG Process finished, return code=1
  27. 2017-05-11T02:28:22Z DEBUG stdout=
  28. 2017-05-11T02:28:22Z DEBUG stderr=Failed to get unit file state for chronyd.service: No such file or directory
  29.  
  30. 2017-05-11T02:28:22Z DEBUG Starting external process
  31. 2017-05-11T02:28:22Z DEBUG args=/bin/systemctl is-active chronyd.service
  32. 2017-05-11T02:28:22Z DEBUG Process finished, return code=3
  33. 2017-05-11T02:28:22Z DEBUG stdout=unknown
  34.  
  35. 2017-05-11T02:28:22Z DEBUG stderr=
  36. 2017-05-11T02:28:22Z DEBUG Starting external process
  37. 2017-05-11T02:28:22Z DEBUG args=/usr/sbin/httpd -t -D DUMP_VHOSTS
  38. 2017-05-11T02:28:23Z DEBUG Process finished, return code=1
  39. 2017-05-11T02:28:23Z DEBUG stdout=
  40. 2017-05-11T02:28:23Z DEBUG stderr=AH00544: httpd: bad group name apache
  41.  
  42. 2017-05-11T02:28:23Z DEBUG WARNING: cannot check if port 443 is already configured
  43. 2017-05-11T02:28:23Z DEBUG httpd returned error when checking: Command '/usr/sbin/httpd -t -D DUMP_VHOSTS' returned non-zero exit status 1
  44. 2017-05-11T02:28:28Z DEBUG Check if ipa.rdlg.net is a primary hostname for localhost
  45. 2017-05-11T02:28:28Z DEBUG Primary hostname for localhost: ipa.rdlg.net
  46. 2017-05-11T02:28:28Z DEBUG Search DNS for ipa.rdlg.net
  47. 2017-05-11T02:28:28Z DEBUG Check if ipa.rdlg.net is not a CNAME
  48. 2017-05-11T02:28:28Z DEBUG Check reverse address of 172.20.0.200
  49. 2017-05-11T02:28:28Z DEBUG Found reverse name: ipa.rdlg.net
  50. 2017-05-11T02:28:28Z DEBUG will use host_name: ipa.rdlg.net
  51.  
  52. 2017-05-11T02:28:29Z DEBUG read domain_name: rdlg.net
  53.  
  54. 2017-05-11T02:28:29Z DEBUG read realm_name: RDLG.NET
  55.  
  56. 2017-05-11T02:28:48Z DEBUG importing all plugin modules in ipaserver.plugins...
  57. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.aci
  58. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.automember
  59. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.automount
  60. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.baseldap
  61. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.baseldap is not a valid plugin module
  62. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.baseuser
  63. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.batch
  64. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.ca
  65. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.caacl
  66. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.cert
  67. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.certprofile
  68. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.config
  69. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.delegation
  70. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.dns
  71. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.dnsserver
  72. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.dogtag
  73. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.domainlevel
  74. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.group
  75. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hbac
  76. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.hbac is not a valid plugin module
  77. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hbacrule
  78. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hbacsvc
  79. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hbacsvcgroup
  80. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hbactest
  81. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.host
  82. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.hostgroup
  83. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.idrange
  84. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.idviews
  85. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.internal
  86. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.join
  87. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.krbtpolicy
  88. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.ldap2
  89. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.location
  90. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.migration
  91. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.misc
  92. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.netgroup
  93. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.otp
  94. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.otp is not a valid plugin module
  95. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.otpconfig
  96. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.otptoken
  97. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.passwd
  98. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.permission
  99. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.ping
  100. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.pkinit
  101. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.pkinit is not a valid plugin module
  102. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.privilege
  103. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.pwpolicy
  104. 2017-05-11T02:28:48Z DEBUG Starting external process
  105. 2017-05-11T02:28:48Z DEBUG args=klist -V
  106. 2017-05-11T02:28:48Z DEBUG Process finished, return code=0
  107. 2017-05-11T02:28:48Z DEBUG stdout=Kerberos 5 version 1.14.1
  108.  
  109. 2017-05-11T02:28:48Z DEBUG stderr=
  110. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.rabase
  111. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.rabase is not a valid plugin module
  112. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.radiusproxy
  113. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.realmdomains
  114. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.role
  115. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.schema
  116. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.selfservice
  117. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.selinuxusermap
  118. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.server
  119. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.serverrole
  120. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.serverroles
  121. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.service
  122. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.servicedelegation
  123. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.session
  124. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.stageuser
  125. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.sudo
  126. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.sudo is not a valid plugin module
  127. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.sudocmd
  128. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.sudocmdgroup
  129. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.sudorule
  130. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.topology
  131. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.trust
  132. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.user
  133. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.vault
  134. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.virtual
  135. 2017-05-11T02:28:48Z DEBUG ipaserver.plugins.virtual is not a valid plugin module
  136. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.plugins.xmlserver
  137. 2017-05-11T02:28:48Z DEBUG importing all plugin modules in ipaserver.install.plugins...
  138. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.adtrust
  139. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.ca_renewal_master
  140. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.dns
  141. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.fix_replica_agreements
  142. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.rename_managed
  143. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_ca_topology
  144. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_idranges
  145. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_managed_permissions
  146. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_nis
  147. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_pacs
  148. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_passsync
  149. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_referint
  150. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_services
  151. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.update_uniqueness
  152. 2017-05-11T02:28:48Z DEBUG importing plugin module ipaserver.install.plugins.upload_cacrt
  153. 2017-05-11T02:28:49Z DEBUG Name ipa.rdlg.net. resolved to set([UnsafeIPAddress('2001:470:4b:57c::200'), UnsafeIPAddress('172.20.0.200')])
  154. 2017-05-11T02:28:49Z WARNING Invalid IP address 2001:470:4b:57c::200 for ipa.rdlg.net: no network interface matches the IP address and netmask 2001:470:4b:57c::200
  155. 2017-05-11T02:28:53Z DEBUG group dirsrv exists
  156. 2017-05-11T02:28:53Z DEBUG user dirsrv exists
  157. 2017-05-11T02:28:53Z DEBUG Starting external process
  158. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl is-enabled chronyd.service
  159. 2017-05-11T02:28:53Z DEBUG Process finished, return code=1
  160. 2017-05-11T02:28:53Z DEBUG stdout=
  161. 2017-05-11T02:28:53Z DEBUG stderr=Failed to get unit file state for chronyd.service: No such file or directory
  162.  
  163. 2017-05-11T02:28:53Z DEBUG Starting external process
  164. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl is-active chronyd.service
  165. 2017-05-11T02:28:53Z DEBUG Process finished, return code=3
  166. 2017-05-11T02:28:53Z DEBUG stdout=unknown
  167.  
  168. 2017-05-11T02:28:53Z DEBUG stderr=
  169. 2017-05-11T02:28:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  170. 2017-05-11T02:28:53Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  171. 2017-05-11T02:28:53Z DEBUG Configuring NTP daemon (ntpd)
  172. 2017-05-11T02:28:53Z DEBUG [1/4]: stopping ntpd
  173. 2017-05-11T02:28:53Z DEBUG Starting external process
  174. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl is-active ntpd.service
  175. 2017-05-11T02:28:53Z DEBUG Process finished, return code=3
  176. 2017-05-11T02:28:53Z DEBUG stdout=unknown
  177.  
  178. 2017-05-11T02:28:53Z DEBUG stderr=
  179. 2017-05-11T02:28:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  180. 2017-05-11T02:28:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  181. 2017-05-11T02:28:53Z DEBUG Starting external process
  182. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl stop ntpd.service
  183. 2017-05-11T02:28:53Z DEBUG Process finished, return code=0
  184. 2017-05-11T02:28:53Z DEBUG stdout=
  185. 2017-05-11T02:28:53Z DEBUG stderr=
  186. 2017-05-11T02:28:53Z DEBUG duration: 0 seconds
  187. 2017-05-11T02:28:53Z DEBUG [2/4]: writing configuration
  188. 2017-05-11T02:28:53Z DEBUG Backing up system configuration file '/etc/ntp.conf'
  189. 2017-05-11T02:28:53Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  190. 2017-05-11T02:28:53Z DEBUG Backing up system configuration file '/etc/sysconfig/ntpd'
  191. 2017-05-11T02:28:53Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  192. 2017-05-11T02:28:53Z DEBUG duration: 0 seconds
  193. 2017-05-11T02:28:53Z DEBUG [3/4]: configuring ntpd to start on boot
  194. 2017-05-11T02:28:53Z DEBUG Starting external process
  195. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl is-enabled ntpd.service
  196. 2017-05-11T02:28:53Z DEBUG Process finished, return code=1
  197. 2017-05-11T02:28:53Z DEBUG stdout=disabled
  198.  
  199. 2017-05-11T02:28:53Z DEBUG stderr=
  200. 2017-05-11T02:28:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  201. 2017-05-11T02:28:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  202. 2017-05-11T02:28:53Z DEBUG Starting external process
  203. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl enable ntpd.service
  204. 2017-05-11T02:28:53Z DEBUG Process finished, return code=0
  205. 2017-05-11T02:28:53Z DEBUG stdout=
  206. 2017-05-11T02:28:53Z DEBUG stderr=Created symlink from /etc/systemd/system/multi-user.target.wants/ntpd.service to /usr/lib/systemd/system/ntpd.service.
  207.  
  208. 2017-05-11T02:28:53Z DEBUG duration: 0 seconds
  209. 2017-05-11T02:28:53Z DEBUG [4/4]: starting ntpd
  210. 2017-05-11T02:28:53Z DEBUG Starting external process
  211. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl start ntpd.service
  212. 2017-05-11T02:28:53Z DEBUG Process finished, return code=0
  213. 2017-05-11T02:28:53Z DEBUG stdout=
  214. 2017-05-11T02:28:53Z DEBUG stderr=
  215. 2017-05-11T02:28:53Z DEBUG Starting external process
  216. 2017-05-11T02:28:53Z DEBUG args=/bin/systemctl is-active ntpd.service
  217. 2017-05-11T02:28:53Z DEBUG Process finished, return code=0
  218. 2017-05-11T02:28:53Z DEBUG stdout=active
  219.  
  220. 2017-05-11T02:28:53Z DEBUG stderr=
  221. 2017-05-11T02:28:53Z DEBUG duration: 0 seconds
  222. 2017-05-11T02:28:53Z DEBUG Done configuring NTP daemon (ntpd).
  223. 2017-05-11T02:28:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  224. 2017-05-11T02:28:53Z DEBUG Configuring directory server (dirsrv). Estimated time: 1 minute
  225. 2017-05-11T02:28:53Z DEBUG [1/47]: creating directory server user
  226. 2017-05-11T02:28:53Z DEBUG group dirsrv exists
  227. 2017-05-11T02:28:53Z DEBUG user dirsrv exists
  228. 2017-05-11T02:28:53Z DEBUG duration: 0 seconds
  229. 2017-05-11T02:28:53Z DEBUG [2/47]: creating directory server instance
  230. 2017-05-11T02:28:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  231. 2017-05-11T02:28:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  232. 2017-05-11T02:28:53Z DEBUG Backing up system configuration file '/etc/sysconfig/dirsrv'
  233. 2017-05-11T02:28:53Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  234. 2017-05-11T02:28:53Z DEBUG
  235. dn: dc=rdlg,dc=net
  236. objectClass: top
  237. objectClass: domain
  238. objectClass: pilotObject
  239. dc: rdlg
  240. info: IPA V2.0
  241.  
  242. 2017-05-11T02:28:53Z DEBUG writing inf template
  243. 2017-05-11T02:28:53Z DEBUG
  244. [General]
  245. FullMachineName= ipa.rdlg.net
  246. SuiteSpotUserID= dirsrv
  247. SuiteSpotGroup= dirsrv
  248. ServerRoot= /usr/lib64/dirsrv
  249. [slapd]
  250. ServerPort= 389
  251. ServerIdentifier= RDLG-NET
  252. Suffix= dc=rdlg,dc=net
  253. RootDN= cn=Directory Manager
  254. InstallLdifFile= /var/lib/dirsrv/boot.ldif
  255. inst_dir= /var/lib/dirsrv/scripts-RDLG-NET
  256.  
  257. 2017-05-11T02:28:53Z DEBUG calling setup-ds.pl
  258. 2017-05-11T02:28:53Z DEBUG Starting external process
  259. 2017-05-11T02:28:53Z DEBUG args=/usr/sbin/setup-ds.pl --silent --logfile - -f /tmp/tmpmiLtpo
  260. 2017-05-11T02:28:56Z DEBUG Process finished, return code=0
  261. 2017-05-11T02:28:56Z DEBUG stdout=[17/05/10:20:28:56] - [Setup] Info Your new DS instance 'RDLG-NET' was successfully created.
  262. Your new DS instance 'RDLG-NET' was successfully created.
  263. [17/05/10:20:28:56] - [Setup] Success Exiting . . .
  264. Log file is '-'
  265.  
  266. Exiting . . .
  267. Log file is '-'
  268.  
  269.  
  270. 2017-05-11T02:28:56Z DEBUG stderr=
  271. 2017-05-11T02:28:56Z DEBUG completed creating ds instance
  272. 2017-05-11T02:28:56Z DEBUG duration: 2 seconds
  273. 2017-05-11T02:28:56Z DEBUG [3/47]: updating configuration in dse.ldif
  274. 2017-05-11T02:28:56Z DEBUG Starting external process
  275. 2017-05-11T02:28:56Z DEBUG args=/bin/systemctl stop [email protected]
  276. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  277. 2017-05-11T02:28:57Z DEBUG stdout=
  278. 2017-05-11T02:28:57Z DEBUG stderr=
  279. 2017-05-11T02:28:57Z DEBUG duration: 1 seconds
  280. 2017-05-11T02:28:57Z DEBUG [4/47]: restarting directory server
  281. 2017-05-11T02:28:57Z DEBUG Starting external process
  282. 2017-05-11T02:28:57Z DEBUG args=/bin/systemctl --system daemon-reload
  283. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  284. 2017-05-11T02:28:57Z DEBUG stdout=
  285. 2017-05-11T02:28:57Z DEBUG stderr=
  286. 2017-05-11T02:28:57Z DEBUG Starting external process
  287. 2017-05-11T02:28:57Z DEBUG args=/bin/systemctl restart [email protected]
  288. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  289. 2017-05-11T02:28:57Z DEBUG stdout=
  290. 2017-05-11T02:28:57Z DEBUG stderr=
  291. 2017-05-11T02:28:57Z DEBUG Starting external process
  292. 2017-05-11T02:28:57Z DEBUG args=/bin/systemctl is-active [email protected]
  293. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  294. 2017-05-11T02:28:57Z DEBUG stdout=active
  295.  
  296. 2017-05-11T02:28:57Z DEBUG stderr=
  297. 2017-05-11T02:28:57Z DEBUG wait_for_open_ports: localhost [389] timeout 300
  298. 2017-05-11T02:28:57Z DEBUG Starting external process
  299. 2017-05-11T02:28:57Z DEBUG args=/bin/systemctl is-active [email protected]
  300. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  301. 2017-05-11T02:28:57Z DEBUG stdout=active
  302.  
  303. 2017-05-11T02:28:57Z DEBUG stderr=
  304. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  305. 2017-05-11T02:28:57Z DEBUG [5/47]: adding default schema
  306. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  307. 2017-05-11T02:28:57Z DEBUG [6/47]: enabling memberof plugin
  308. 2017-05-11T02:28:57Z DEBUG Starting external process
  309. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/memberof-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpKgPX2M
  310. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  311. 2017-05-11T02:28:57Z DEBUG stdout=replace nsslapd-pluginenabled:
  312. on
  313. add memberofgroupattr:
  314. memberUser
  315. add memberofgroupattr:
  316. memberHost
  317. modifying entry "cn=MemberOf Plugin,cn=plugins,cn=config"
  318. modify complete
  319.  
  320.  
  321. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  322.  
  323. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  324. 2017-05-11T02:28:57Z DEBUG [7/47]: enabling winsync plugin
  325. 2017-05-11T02:28:57Z DEBUG Starting external process
  326. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/ipa-winsync-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpF3BdZ4
  327. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  328. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  329. top
  330. nsSlapdPlugin
  331. extensibleObject
  332. add cn:
  333. ipa-winsync
  334. add nsslapd-pluginpath:
  335. libipa_winsync
  336. add nsslapd-plugininitfunc:
  337. ipa_winsync_plugin_init
  338. add nsslapd-pluginDescription:
  339. Allows IPA to work with the DS windows sync feature
  340. add nsslapd-pluginid:
  341. ipa-winsync
  342. add nsslapd-pluginversion:
  343. 1.0
  344. add nsslapd-pluginvendor:
  345. Red Hat
  346. add nsslapd-plugintype:
  347. preoperation
  348. add nsslapd-pluginenabled:
  349. on
  350. add nsslapd-plugin-depends-on-type:
  351. database
  352. add ipaWinSyncRealmFilter:
  353. (objectclass=krbRealmContainer)
  354. add ipaWinSyncRealmAttr:
  355. cn
  356. add ipaWinSyncNewEntryFilter:
  357. (cn=ipaConfig)
  358. add ipaWinSyncNewUserOCAttr:
  359. ipauserobjectclasses
  360. add ipaWinSyncUserFlatten:
  361. true
  362. add ipaWinsyncHomeDirAttr:
  363. ipaHomesRootDir
  364. add ipaWinsyncLoginShellAttr:
  365. ipaDefaultLoginShell
  366. add ipaWinSyncDefaultGroupAttr:
  367. ipaDefaultPrimaryGroup
  368. add ipaWinSyncDefaultGroupFilter:
  369. (gidNumber=*)(objectclass=posixGroup)(objectclass=groupOfNames)
  370. add ipaWinSyncAcctDisable:
  371. both
  372. add ipaWinSyncForceSync:
  373. true
  374. add ipaWinSyncUserAttr:
  375. uidNumber -1
  376. gidNumber -1
  377. adding new entry "cn=ipa-winsync,cn=plugins,cn=config"
  378. modify complete
  379.  
  380.  
  381. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  382.  
  383. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  384. 2017-05-11T02:28:57Z DEBUG [8/47]: configuring replication version plugin
  385. 2017-05-11T02:28:57Z DEBUG Starting external process
  386. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/version-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpqxOMrO
  387. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  388. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  389. top
  390. nsSlapdPlugin
  391. extensibleObject
  392. add cn:
  393. IPA Version Replication
  394. add nsslapd-pluginpath:
  395. libipa_repl_version
  396. add nsslapd-plugininitfunc:
  397. repl_version_plugin_init
  398. add nsslapd-plugintype:
  399. preoperation
  400. add nsslapd-pluginenabled:
  401. off
  402. add nsslapd-pluginid:
  403. ipa_repl_version
  404. add nsslapd-pluginversion:
  405. 1.0
  406. add nsslapd-pluginvendor:
  407. Red Hat, Inc.
  408. add nsslapd-plugindescription:
  409. IPA Replication version plugin
  410. add nsslapd-plugin-depends-on-type:
  411. database
  412. add nsslapd-plugin-depends-on-named:
  413. Multimaster Replication Plugin
  414. adding new entry "cn=IPA Version Replication,cn=plugins,cn=config"
  415. modify complete
  416.  
  417.  
  418. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  419.  
  420. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  421. 2017-05-11T02:28:57Z DEBUG [9/47]: enabling IPA enrollment plugin
  422. 2017-05-11T02:28:57Z DEBUG Starting external process
  423. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp09vPNA -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpErHyRi
  424. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  425. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  426. top
  427. nsSlapdPlugin
  428. extensibleObject
  429. add cn:
  430. ipa_enrollment_extop
  431. add nsslapd-pluginpath:
  432. libipa_enrollment_extop
  433. add nsslapd-plugininitfunc:
  434. ipaenrollment_init
  435. add nsslapd-plugintype:
  436. extendedop
  437. add nsslapd-pluginenabled:
  438. on
  439. add nsslapd-pluginid:
  440. ipa_enrollment_extop
  441. add nsslapd-pluginversion:
  442. 1.0
  443. add nsslapd-pluginvendor:
  444. RedHat
  445. add nsslapd-plugindescription:
  446. Enroll hosts into the IPA domain
  447. add nsslapd-plugin-depends-on-type:
  448. database
  449. add nsslapd-realmTree:
  450. dc=rdlg,dc=net
  451. adding new entry "cn=ipa_enrollment_extop,cn=plugins,cn=config"
  452. modify complete
  453.  
  454.  
  455. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  456.  
  457. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  458. 2017-05-11T02:28:57Z DEBUG [10/47]: enabling ldapi
  459. 2017-05-11T02:28:57Z DEBUG Starting external process
  460. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpSGtAJI -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp2x05Y4
  461. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  462. 2017-05-11T02:28:57Z DEBUG stdout=replace nsslapd-ldapilisten:
  463. on
  464. modifying entry "cn=config"
  465. modify complete
  466.  
  467.  
  468. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  469.  
  470. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  471. 2017-05-11T02:28:57Z DEBUG [11/47]: configuring uniqueness plugin
  472. 2017-05-11T02:28:57Z DEBUG Starting external process
  473. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpsHfFGc -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpW0Bzu0
  474. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  475. 2017-05-11T02:28:57Z DEBUG stdout=add objectClass:
  476. top
  477. nsSlapdPlugin
  478. extensibleObject
  479. add cn:
  480. krbPrincipalName uniqueness
  481. add nsslapd-pluginPath:
  482. libattr-unique-plugin
  483. add nsslapd-pluginInitfunc:
  484. NSUniqueAttr_Init
  485. add nsslapd-pluginType:
  486. preoperation
  487. add nsslapd-pluginEnabled:
  488. on
  489. add uniqueness-attribute-name:
  490. krbPrincipalName
  491. add nsslapd-plugin-depends-on-type:
  492. database
  493. add nsslapd-pluginId:
  494. NSUniqueAttr
  495. add nsslapd-pluginVersion:
  496. 1.1.0
  497. add nsslapd-pluginVendor:
  498. Fedora Project
  499. add nsslapd-pluginDescription:
  500. Enforce unique attribute values
  501. add uniqueness-subtrees:
  502. dc=rdlg,dc=net
  503. add uniqueness-exclude-subtrees:
  504. cn=staged users,cn=accounts,cn=provisioning,dc=rdlg,dc=net
  505. add uniqueness-across-all-subtrees:
  506. on
  507. adding new entry "cn=krbPrincipalName uniqueness,cn=plugins,cn=config"
  508. modify complete
  509.  
  510. add objectClass:
  511. top
  512. nsSlapdPlugin
  513. extensibleObject
  514. add cn:
  515. krbCanonicalName uniqueness
  516. add nsslapd-pluginPath:
  517. libattr-unique-plugin
  518. add nsslapd-pluginInitfunc:
  519. NSUniqueAttr_Init
  520. add nsslapd-pluginType:
  521. preoperation
  522. add nsslapd-pluginEnabled:
  523. on
  524. add uniqueness-attribute-name:
  525. krbCanonicalName
  526. add nsslapd-plugin-depends-on-type:
  527. database
  528. add nsslapd-pluginId:
  529. NSUniqueAttr
  530. add nsslapd-pluginVersion:
  531. 1.1.0
  532. add nsslapd-pluginVendor:
  533. Fedora Project
  534. add nsslapd-pluginDescription:
  535. Enforce unique attribute values
  536. add uniqueness-subtrees:
  537. dc=rdlg,dc=net
  538. add uniqueness-exclude-subtrees:
  539. cn=staged users,cn=accounts,cn=provisioning,dc=rdlg,dc=net
  540. add uniqueness-across-all-subtrees:
  541. on
  542. adding new entry "cn=krbCanonicalName uniqueness,cn=plugins,cn=config"
  543. modify complete
  544.  
  545. add objectClass:
  546. top
  547. nsSlapdPlugin
  548. extensibleObject
  549. add cn:
  550. netgroup uniqueness
  551. add nsslapd-pluginPath:
  552. libattr-unique-plugin
  553. add nsslapd-pluginInitfunc:
  554. NSUniqueAttr_Init
  555. add nsslapd-pluginType:
  556. preoperation
  557. add nsslapd-pluginEnabled:
  558. on
  559. add uniqueness-attribute-name:
  560. cn
  561. add uniqueness-subtrees:
  562. cn=ng,cn=alt,dc=rdlg,dc=net
  563. add nsslapd-plugin-depends-on-type:
  564. database
  565. add nsslapd-pluginId:
  566. NSUniqueAttr
  567. add nsslapd-pluginVersion:
  568. 1.1.0
  569. add nsslapd-pluginVendor:
  570. Fedora Project
  571. add nsslapd-pluginDescription:
  572. Enforce unique attribute values
  573. adding new entry "cn=netgroup uniqueness,cn=plugins,cn=config"
  574. modify complete
  575.  
  576. add objectClass:
  577. top
  578. nsSlapdPlugin
  579. extensibleObject
  580. add cn:
  581. ipaUniqueID uniqueness
  582. add nsslapd-pluginPath:
  583. libattr-unique-plugin
  584. add nsslapd-pluginInitfunc:
  585. NSUniqueAttr_Init
  586. add nsslapd-pluginType:
  587. preoperation
  588. add nsslapd-pluginEnabled:
  589. on
  590. add uniqueness-attribute-name:
  591. ipaUniqueID
  592. add nsslapd-plugin-depends-on-type:
  593. database
  594. add nsslapd-pluginId:
  595. NSUniqueAttr
  596. add nsslapd-pluginVersion:
  597. 1.1.0
  598. add nsslapd-pluginVendor:
  599. Fedora Project
  600. add nsslapd-pluginDescription:
  601. Enforce unique attribute values
  602. add uniqueness-subtrees:
  603. dc=rdlg,dc=net
  604. add uniqueness-exclude-subtrees:
  605. cn=staged users,cn=accounts,cn=provisioning,dc=rdlg,dc=net
  606. add uniqueness-across-all-subtrees:
  607. on
  608. adding new entry "cn=ipaUniqueID uniqueness,cn=plugins,cn=config"
  609. modify complete
  610.  
  611. add objectClass:
  612. top
  613. nsSlapdPlugin
  614. extensibleObject
  615. add cn:
  616. sudorule name uniqueness
  617. add nsslapd-pluginDescription:
  618. Enforce unique attribute values
  619. add nsslapd-pluginPath:
  620. libattr-unique-plugin
  621. add nsslapd-pluginInitfunc:
  622. NSUniqueAttr_Init
  623. add nsslapd-pluginType:
  624. preoperation
  625. add nsslapd-pluginEnabled:
  626. on
  627. add uniqueness-attribute-name:
  628. cn
  629. add uniqueness-subtrees:
  630. cn=sudorules,cn=sudo,dc=rdlg,dc=net
  631. add nsslapd-plugin-depends-on-type:
  632. database
  633. add nsslapd-pluginId:
  634. NSUniqueAttr
  635. add nsslapd-pluginVersion:
  636. 1.1.0
  637. add nsslapd-pluginVendor:
  638. Fedora Project
  639. adding new entry "cn=sudorule name uniqueness,cn=plugins,cn=config"
  640. modify complete
  641.  
  642.  
  643. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  644.  
  645. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  646. 2017-05-11T02:28:57Z DEBUG [12/47]: configuring uuid plugin
  647. 2017-05-11T02:28:57Z DEBUG Starting external process
  648. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/uuid-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpL6kr5k
  649. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  650. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  651. top
  652. nsSlapdPlugin
  653. extensibleObject
  654. add cn:
  655. IPA UUID
  656. add nsslapd-pluginpath:
  657. libipa_uuid
  658. add nsslapd-plugininitfunc:
  659. ipauuid_init
  660. add nsslapd-plugintype:
  661. preoperation
  662. add nsslapd-pluginenabled:
  663. on
  664. add nsslapd-pluginid:
  665. ipauuid_version
  666. add nsslapd-pluginversion:
  667. 1.0
  668. add nsslapd-pluginvendor:
  669. Red Hat, Inc.
  670. add nsslapd-plugindescription:
  671. IPA UUID plugin
  672. add nsslapd-plugin-depends-on-type:
  673. database
  674. adding new entry "cn=IPA UUID,cn=plugins,cn=config"
  675. modify complete
  676.  
  677.  
  678. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  679.  
  680. 2017-05-11T02:28:57Z DEBUG Starting external process
  681. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp14Pbo1 -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp7aYOtv
  682. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  683. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  684. top
  685. extensibleObject
  686. add cn:
  687. IPA Unique IDs
  688. add ipaUuidAttr:
  689. ipaUniqueID
  690. add ipaUuidMagicRegen:
  691. autogenerate
  692. add ipaUuidFilter:
  693. (|(objectclass=ipaObject)(objectclass=ipaAssociation))
  694. add ipaUuidScope:
  695. dc=rdlg,dc=net
  696. add ipaUuidEnforce:
  697. TRUE
  698. adding new entry "cn=IPA Unique IDs,cn=IPA UUID,cn=plugins,cn=config"
  699. modify complete
  700.  
  701. add objectclass:
  702. top
  703. extensibleObject
  704. add cn:
  705. IPK11 Unique IDs
  706. add ipaUuidAttr:
  707. ipk11UniqueID
  708. add ipaUuidMagicRegen:
  709. autogenerate
  710. add ipaUuidFilter:
  711. (objectclass=ipk11Object)
  712. add ipaUuidScope:
  713. dc=rdlg,dc=net
  714. add ipaUuidEnforce:
  715. FALSE
  716. adding new entry "cn=IPK11 Unique IDs,cn=IPA UUID,cn=plugins,cn=config"
  717. modify complete
  718.  
  719.  
  720. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  721.  
  722. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  723. 2017-05-11T02:28:57Z DEBUG [13/47]: configuring modrdn plugin
  724. 2017-05-11T02:28:57Z DEBUG Starting external process
  725. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/modrdn-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp36QY6G
  726. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  727. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  728. top
  729. nsSlapdPlugin
  730. extensibleObject
  731. add cn:
  732. IPA MODRDN
  733. add nsslapd-pluginpath:
  734. libipa_modrdn
  735. add nsslapd-plugininitfunc:
  736. ipamodrdn_init
  737. add nsslapd-plugintype:
  738. betxnpostoperation
  739. add nsslapd-pluginenabled:
  740. on
  741. add nsslapd-pluginid:
  742. ipamodrdn_version
  743. add nsslapd-pluginversion:
  744. 1.0
  745. add nsslapd-pluginvendor:
  746. Red Hat, Inc.
  747. add nsslapd-plugindescription:
  748. IPA MODRDN plugin
  749. add nsslapd-plugin-depends-on-type:
  750. database
  751. add nsslapd-pluginPrecedence:
  752. 60
  753. adding new entry "cn=IPA MODRDN,cn=plugins,cn=config"
  754. modify complete
  755.  
  756.  
  757. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  758.  
  759. 2017-05-11T02:28:57Z DEBUG Starting external process
  760. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp6u9s0U -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpr8Hixk
  761. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  762. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  763. top
  764. extensibleObject
  765. add cn:
  766. Kerberos Principal Name
  767. add ipaModRDNsourceAttr:
  768. uid
  769. add ipaModRDNtargetAttr:
  770. krbPrincipalName
  771. add ipaModRDNsuffix:
  772. @RDLG.NET
  773. add ipaModRDNfilter:
  774. (&(objectclass=posixaccount)(objectclass=krbPrincipalAux))
  775. add ipaModRDNscope:
  776. dc=rdlg,dc=net
  777. adding new entry "cn=Kerberos Principal Name,cn=IPA MODRDN,cn=plugins,cn=config"
  778. modify complete
  779.  
  780. add objectclass:
  781. top
  782. extensibleObject
  783. add cn:
  784. Kerberos Canonical Name
  785. add ipaModRDNsourceAttr:
  786. uid
  787. add ipaModRDNtargetAttr:
  788. krbCanonicalName
  789. add ipaModRDNsuffix:
  790. @RDLG.NET
  791. add ipaModRDNfilter:
  792. (&(objectclass=posixaccount)(objectclass=krbPrincipalAux))
  793. add ipaModRDNscope:
  794. dc=rdlg,dc=net
  795. adding new entry "cn=Kerberos Canonical Name,cn=IPA MODRDN,cn=plugins,cn=config"
  796. modify complete
  797.  
  798.  
  799. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  800.  
  801. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  802. 2017-05-11T02:28:57Z DEBUG [14/47]: configuring DNS plugin
  803. 2017-05-11T02:28:57Z DEBUG Starting external process
  804. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/ipa-dns-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpgHSP8_
  805. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  806. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  807. top
  808. nsslapdPlugin
  809. extensibleObject
  810. add cn:
  811. IPA DNS
  812. add nsslapd-plugindescription:
  813. IPA DNS support plugin
  814. add nsslapd-pluginenabled:
  815. on
  816. add nsslapd-pluginid:
  817. ipa_dns
  818. add nsslapd-plugininitfunc:
  819. ipadns_init
  820. add nsslapd-pluginpath:
  821. libipa_dns.so
  822. add nsslapd-plugintype:
  823. preoperation
  824. add nsslapd-pluginvendor:
  825. Red Hat, Inc.
  826. add nsslapd-pluginversion:
  827. 1.0
  828. add nsslapd-plugin-depends-on-type:
  829. database
  830. adding new entry "cn=IPA DNS,cn=plugins,cn=config"
  831. modify complete
  832.  
  833.  
  834. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  835.  
  836. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  837. 2017-05-11T02:28:57Z DEBUG [15/47]: enabling entryUSN plugin
  838. 2017-05-11T02:28:57Z DEBUG Starting external process
  839. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/entryusn.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp7MjKP0
  840. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  841. 2017-05-11T02:28:57Z DEBUG stdout=replace nsslapd-entryusn-global:
  842. on
  843. modifying entry "cn=config"
  844. modify complete
  845.  
  846. replace nsslapd-entryusn-import-initval:
  847. next
  848. modifying entry "cn=config"
  849. modify complete
  850.  
  851. replace nsslapd-pluginenabled:
  852. on
  853. modifying entry "cn=USN,cn=plugins,cn=config"
  854. modify complete
  855.  
  856.  
  857. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  858.  
  859. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  860. 2017-05-11T02:28:57Z DEBUG [16/47]: configuring lockout plugin
  861. 2017-05-11T02:28:57Z DEBUG Starting external process
  862. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/lockout-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmptvr5Cq
  863. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  864. 2017-05-11T02:28:57Z DEBUG stdout=add objectclass:
  865. top
  866. nsSlapdPlugin
  867. extensibleObject
  868. add cn:
  869. IPA Lockout
  870. add nsslapd-pluginpath:
  871. libipa_lockout
  872. add nsslapd-plugininitfunc:
  873. ipalockout_init
  874. add nsslapd-plugintype:
  875. object
  876. add nsslapd-pluginenabled:
  877. on
  878. add nsslapd-pluginid:
  879. ipalockout_version
  880. add nsslapd-pluginversion:
  881. 1.0
  882. add nsslapd-pluginvendor:
  883. Red Hat, Inc.
  884. add nsslapd-plugindescription:
  885. IPA Lockout plugin
  886. add nsslapd-plugin-depends-on-type:
  887. database
  888. adding new entry "cn=IPA Lockout,cn=plugins,cn=config"
  889. modify complete
  890.  
  891.  
  892. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  893.  
  894. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  895. 2017-05-11T02:28:57Z DEBUG [17/47]: configuring topology plugin
  896. 2017-05-11T02:28:57Z DEBUG Starting external process
  897. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpy6J5zd -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmphMR5dA
  898. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  899. 2017-05-11T02:28:57Z DEBUG stdout=add objectClass:
  900. top
  901. nsSlapdPlugin
  902. extensibleObject
  903. add cn:
  904. IPA Topology Configuration
  905. add nsslapd-pluginPath:
  906. libtopology
  907. add nsslapd-pluginInitfunc:
  908. ipa_topo_init
  909. add nsslapd-pluginType:
  910. object
  911. add nsslapd-pluginEnabled:
  912. on
  913. add nsslapd-topo-plugin-shared-config-base:
  914. cn=ipa,cn=etc,dc=rdlg,dc=net
  915. add nsslapd-topo-plugin-shared-replica-root:
  916. dc=rdlg,dc=net
  917. o=ipaca
  918. add nsslapd-topo-plugin-shared-binddngroup:
  919. cn=replication managers,cn=sysaccounts,cn=etc,dc=rdlg,dc=net
  920. add nsslapd-topo-plugin-startup-delay:
  921. 20
  922. add nsslapd-pluginId:
  923. none
  924. add nsslapd-plugin-depends-on-named:
  925. ldbm database
  926. Multimaster Replication Plugin
  927. add nsslapd-pluginVersion:
  928. 1.0
  929. add nsslapd-pluginVendor:
  930. none
  931. add nsslapd-pluginDescription:
  932. none
  933. adding new entry "cn=IPA Topology Configuration,cn=plugins,cn=config"
  934. modify complete
  935.  
  936.  
  937. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  938.  
  939. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  940. 2017-05-11T02:28:57Z DEBUG [18/47]: creating indices
  941. 2017-05-11T02:28:57Z DEBUG Starting external process
  942. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/indices.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmplvya6u
  943. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  944. 2017-05-11T02:28:57Z DEBUG stdout=add objectClass:
  945. top
  946. nsIndex
  947. add cn:
  948. krbPrincipalName
  949. add nsSystemIndex:
  950. false
  951. add nsIndexType:
  952. eq
  953. sub
  954. add nsMatchingRule:
  955. caseIgnoreIA5Match
  956. caseExactIA5Match
  957. adding new entry "cn=krbPrincipalName,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  958. modify complete
  959.  
  960. add objectClass:
  961. top
  962. nsIndex
  963. add cn:
  964. ou
  965. add nsSystemIndex:
  966. false
  967. add nsIndexType:
  968. eq
  969. sub
  970. adding new entry "cn=ou,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  971. modify complete
  972.  
  973. add objectClass:
  974. top
  975. nsIndex
  976. add cn:
  977. carLicense
  978. add nsSystemIndex:
  979. false
  980. add nsIndexType:
  981. eq
  982. sub
  983. adding new entry "cn=carLicense,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  984. modify complete
  985.  
  986. add objectClass:
  987. top
  988. nsIndex
  989. add cn:
  990. title
  991. add nsSystemIndex:
  992. false
  993. add nsIndexType:
  994. eq
  995. sub
  996. adding new entry "cn=title,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  997. modify complete
  998.  
  999. add objectClass:
  1000. top
  1001. nsIndex
  1002. add cn:
  1003. manager
  1004. add nsSystemIndex:
  1005. false
  1006. add nsIndexType:
  1007. eq
  1008. pres
  1009. sub
  1010. adding new entry "cn=manager,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1011. modify complete
  1012.  
  1013. add objectClass:
  1014. top
  1015. nsIndex
  1016. add cn:
  1017. secretary
  1018. add nsSystemIndex:
  1019. false
  1020. add nsIndexType:
  1021. eq
  1022. pres
  1023. sub
  1024. adding new entry "cn=secretary,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1025. modify complete
  1026.  
  1027. add objectClass:
  1028. top
  1029. nsIndex
  1030. add cn:
  1031. displayname
  1032. add nsSystemIndex:
  1033. false
  1034. add nsIndexType:
  1035. eq
  1036. sub
  1037. adding new entry "cn=displayname,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1038. modify complete
  1039.  
  1040. add nsIndexType:
  1041. sub
  1042. modifying entry "cn=uid,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1043. modify complete
  1044.  
  1045. add objectClass:
  1046. top
  1047. nsIndex
  1048. add cn:
  1049. uidnumber
  1050. add nsSystemIndex:
  1051. false
  1052. add nsIndexType:
  1053. eq
  1054. add nsMatchingRule:
  1055. integerOrderingMatch
  1056. adding new entry "cn=uidnumber,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1057. modify complete
  1058.  
  1059. add objectClass:
  1060. top
  1061. nsIndex
  1062. add cn:
  1063. gidnumber
  1064. add nsSystemIndex:
  1065. false
  1066. add nsIndexType:
  1067. eq
  1068. add nsMatchingRule:
  1069. integerOrderingMatch
  1070. adding new entry "cn=gidnumber,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1071. modify complete
  1072.  
  1073. replace nsIndexType:
  1074. eq
  1075. pres
  1076. modifying entry "cn=ntUniqueId,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1077. modify complete
  1078.  
  1079. replace nsIndexType:
  1080. eq
  1081. pres
  1082. modifying entry "cn=ntUserDomainId,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1083. modify complete
  1084.  
  1085. add ObjectClass:
  1086. top
  1087. nsIndex
  1088. add cn:
  1089. fqdn
  1090. add nsSystemIndex:
  1091. false
  1092. add nsIndexType:
  1093. eq
  1094. pres
  1095. adding new entry "cn=fqdn,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1096. modify complete
  1097.  
  1098. add ObjectClass:
  1099. top
  1100. nsIndex
  1101. add cn:
  1102. macAddress
  1103. add nsSystemIndex:
  1104. false
  1105. add nsIndexType:
  1106. eq
  1107. pres
  1108. adding new entry "cn=macAddress,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1109. modify complete
  1110.  
  1111. add cn:
  1112. memberHost
  1113. add ObjectClass:
  1114. top
  1115. nsIndex
  1116. add nsSystemIndex:
  1117. false
  1118. add nsIndexType:
  1119. eq
  1120. pres
  1121. sub
  1122. adding new entry "cn=memberHost,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1123. modify complete
  1124.  
  1125. add cn:
  1126. memberUser
  1127. add ObjectClass:
  1128. top
  1129. nsIndex
  1130. add nsSystemIndex:
  1131. false
  1132. add nsIndexType:
  1133. eq
  1134. pres
  1135. sub
  1136. adding new entry "cn=memberUser,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1137. modify complete
  1138.  
  1139. add cn:
  1140. sourcehost
  1141. add ObjectClass:
  1142. top
  1143. nsIndex
  1144. add nsSystemIndex:
  1145. false
  1146. add nsIndexType:
  1147. eq
  1148. pres
  1149. sub
  1150. adding new entry "cn=sourcehost,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1151. modify complete
  1152.  
  1153. add cn:
  1154. memberservice
  1155. add ObjectClass:
  1156. top
  1157. nsIndex
  1158. add nsSystemIndex:
  1159. false
  1160. add nsIndexType:
  1161. eq
  1162. pres
  1163. sub
  1164. adding new entry "cn=memberservice,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1165. modify complete
  1166.  
  1167. add cn:
  1168. managedby
  1169. add ObjectClass:
  1170. top
  1171. nsIndex
  1172. add nsSystemIndex:
  1173. false
  1174. add nsIndexType:
  1175. eq
  1176. pres
  1177. sub
  1178. adding new entry "cn=managedby,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1179. modify complete
  1180.  
  1181. add cn:
  1182. memberallowcmd
  1183. add ObjectClass:
  1184. top
  1185. nsIndex
  1186. add nsSystemIndex:
  1187. false
  1188. add nsIndexType:
  1189. eq
  1190. pres
  1191. sub
  1192. adding new entry "cn=memberallowcmd,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1193. modify complete
  1194.  
  1195. add cn:
  1196. memberdenycmd
  1197. add ObjectClass:
  1198. top
  1199. nsIndex
  1200. add nsSystemIndex:
  1201. false
  1202. add nsIndexType:
  1203. eq
  1204. pres
  1205. sub
  1206. adding new entry "cn=memberdenycmd,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1207. modify complete
  1208.  
  1209. add cn:
  1210. ipasudorunas
  1211. add ObjectClass:
  1212. top
  1213. nsIndex
  1214. add nsSystemIndex:
  1215. false
  1216. add nsIndexType:
  1217. eq
  1218. pres
  1219. sub
  1220. adding new entry "cn=ipasudorunas,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1221. modify complete
  1222.  
  1223. add cn:
  1224. ipasudorunasgroup
  1225. add ObjectClass:
  1226. top
  1227. nsIndex
  1228. add nsSystemIndex:
  1229. false
  1230. add nsIndexType:
  1231. eq
  1232. pres
  1233. sub
  1234. adding new entry "cn=ipasudorunasgroup,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1235. modify complete
  1236.  
  1237. add cn:
  1238. automountkey
  1239. add ObjectClass:
  1240. top
  1241. nsIndex
  1242. add nsSystemIndex:
  1243. false
  1244. add nsIndexType:
  1245. eq
  1246. adding new entry "cn=automountkey,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1247. modify complete
  1248.  
  1249. add cn:
  1250. ipakrbprincipalalias
  1251. add ObjectClass:
  1252. top
  1253. nsIndex
  1254. add nsSystemIndex:
  1255. false
  1256. add nsIndexType:
  1257. eq
  1258. adding new entry "cn=ipakrbprincipalalias,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1259. modify complete
  1260.  
  1261. add cn:
  1262. ipauniqueid
  1263. add ObjectClass:
  1264. top
  1265. nsIndex
  1266. add nsSystemIndex:
  1267. false
  1268. add nsIndexType:
  1269. eq
  1270. adding new entry "cn=ipauniqueid,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1271. modify complete
  1272.  
  1273. add cn:
  1274. ipaMemberCa
  1275. add ObjectClass:
  1276. top
  1277. nsIndex
  1278. add nsSystemIndex:
  1279. false
  1280. add nsIndexType:
  1281. eq
  1282. pres
  1283. sub
  1284. adding new entry "cn=ipaMemberCa,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1285. modify complete
  1286.  
  1287. add cn:
  1288. ipaMemberCertProfile
  1289. add ObjectClass:
  1290. top
  1291. nsIndex
  1292. add nsSystemIndex:
  1293. false
  1294. add nsIndexType:
  1295. eq
  1296. pres
  1297. sub
  1298. adding new entry "cn=ipaMemberCertProfile,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1299. modify complete
  1300.  
  1301. add cn:
  1302. userCertificate
  1303. add ObjectClass:
  1304. top
  1305. nsIndex
  1306. add nsSystemIndex:
  1307. false
  1308. add nsIndexType:
  1309. eq
  1310. pres
  1311. adding new entry "cn=userCertificate,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1312. modify complete
  1313.  
  1314. add cn:
  1315. ipalocation
  1316. add ObjectClass:
  1317. top
  1318. nsIndex
  1319. add nsSystemIndex:
  1320. false
  1321. add nsIndexType:
  1322. eq
  1323. pres
  1324. adding new entry "cn=ipalocation,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1325. modify complete
  1326.  
  1327. add cn:
  1328. krbCanonicalName
  1329. add objectClass:
  1330. top
  1331. nsIndex
  1332. add nsSystemIndex:
  1333. false
  1334. add nsIndexType:
  1335. eq
  1336. sub
  1337. adding new entry "cn=krbCanonicalName,cn=index,cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  1338. modify complete
  1339.  
  1340.  
  1341. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  1342.  
  1343. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1344. 2017-05-11T02:28:57Z DEBUG [19/47]: enabling referential integrity plugin
  1345. 2017-05-11T02:28:57Z DEBUG Starting external process
  1346. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/referint-conf.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpsyAn3i
  1347. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1348. 2017-05-11T02:28:57Z DEBUG stdout=replace nsslapd-pluginenabled:
  1349. on
  1350. modifying entry "cn=referential integrity postoperation,cn=plugins,cn=config"
  1351. modify complete
  1352.  
  1353.  
  1354. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  1355.  
  1356. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1357. 2017-05-11T02:28:57Z DEBUG [20/47]: configuring certmap.conf
  1358. 2017-05-11T02:28:57Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  1359. 2017-05-11T02:28:57Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  1360. 2017-05-11T02:28:57Z DEBUG Saving StateFile to '/var/lib/ipa/sysupgrade/sysupgrade.state'
  1361. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1362. 2017-05-11T02:28:57Z DEBUG [21/47]: configure autobind for root
  1363. 2017-05-11T02:28:57Z DEBUG Starting external process
  1364. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /usr/share/ipa/root-autobind.ldif -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpevzBjs
  1365. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1366. 2017-05-11T02:28:57Z DEBUG stdout=add objectClass:
  1367. extensibleObject
  1368. top
  1369. add cn:
  1370. root-autobind
  1371. add uidNumber:
  1372. 0
  1373. add gidNumber:
  1374. 0
  1375. adding new entry "cn=root-autobind,cn=config"
  1376. modify complete
  1377.  
  1378. replace nsslapd-ldapiautobind:
  1379. on
  1380. modifying entry "cn=config"
  1381. modify complete
  1382.  
  1383. replace nsslapd-ldapimaptoentries:
  1384. on
  1385. modifying entry "cn=config"
  1386. modify complete
  1387.  
  1388.  
  1389. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  1390.  
  1391. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1392. 2017-05-11T02:28:57Z DEBUG [22/47]: configure new location for managed entries
  1393. 2017-05-11T02:28:57Z DEBUG Starting external process
  1394. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpTpoIdR -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpQxJNCc
  1395. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1396. 2017-05-11T02:28:57Z DEBUG stdout=add nsslapd-pluginConfigArea:
  1397. cn=Definitions,cn=Managed Entries,cn=etc,dc=rdlg,dc=net
  1398. modifying entry "cn=Managed Entries,cn=plugins,cn=config"
  1399. modify complete
  1400.  
  1401.  
  1402. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  1403.  
  1404. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1405. 2017-05-11T02:28:57Z DEBUG [23/47]: configure dirsrv ccache
  1406. 2017-05-11T02:28:57Z DEBUG Backing up system configuration file '/etc/sysconfig/dirsrv'
  1407. 2017-05-11T02:28:57Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  1408. 2017-05-11T02:28:57Z DEBUG Starting external process
  1409. 2017-05-11T02:28:57Z DEBUG args=/usr/sbin/selinuxenabled
  1410. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1411. 2017-05-11T02:28:57Z DEBUG stdout=
  1412. 2017-05-11T02:28:57Z DEBUG stderr=
  1413. 2017-05-11T02:28:57Z DEBUG Starting external process
  1414. 2017-05-11T02:28:57Z DEBUG args=/sbin/restorecon /etc/sysconfig/dirsrv
  1415. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1416. 2017-05-11T02:28:57Z DEBUG stdout=
  1417. 2017-05-11T02:28:57Z DEBUG stderr=
  1418. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1419. 2017-05-11T02:28:57Z DEBUG [24/47]: enabling SASL mapping fallback
  1420. 2017-05-11T02:28:57Z DEBUG Starting external process
  1421. 2017-05-11T02:28:57Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpJa50kq -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp2pg802
  1422. 2017-05-11T02:28:57Z DEBUG Process finished, return code=0
  1423. 2017-05-11T02:28:57Z DEBUG stdout=replace nsslapd-sasl-mapping-fallback:
  1424. on
  1425. modifying entry "cn=config"
  1426. modify complete
  1427.  
  1428.  
  1429. 2017-05-11T02:28:57Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  1430.  
  1431. 2017-05-11T02:28:57Z DEBUG duration: 0 seconds
  1432. 2017-05-11T02:28:57Z DEBUG [25/47]: restarting directory server
  1433. 2017-05-11T02:28:57Z DEBUG Starting external process
  1434. 2017-05-11T02:28:57Z DEBUG args=/bin/systemctl --system daemon-reload
  1435. 2017-05-11T02:28:58Z DEBUG Process finished, return code=0
  1436. 2017-05-11T02:28:58Z DEBUG stdout=
  1437. 2017-05-11T02:28:58Z DEBUG stderr=
  1438. 2017-05-11T02:28:58Z DEBUG Starting external process
  1439. 2017-05-11T02:28:58Z DEBUG args=/bin/systemctl restart [email protected]
  1440. 2017-05-11T02:28:58Z DEBUG Process finished, return code=0
  1441. 2017-05-11T02:28:58Z DEBUG stdout=
  1442. 2017-05-11T02:28:58Z DEBUG stderr=
  1443. 2017-05-11T02:28:58Z DEBUG Starting external process
  1444. 2017-05-11T02:28:58Z DEBUG args=/bin/systemctl is-active [email protected]
  1445. 2017-05-11T02:28:58Z DEBUG Process finished, return code=0
  1446. 2017-05-11T02:28:58Z DEBUG stdout=active
  1447.  
  1448. 2017-05-11T02:28:58Z DEBUG stderr=
  1449. 2017-05-11T02:28:58Z DEBUG wait_for_open_ports: localhost [389] timeout 300
  1450. 2017-05-11T02:28:58Z DEBUG Starting external process
  1451. 2017-05-11T02:28:58Z DEBUG args=/bin/systemctl is-active [email protected]
  1452. 2017-05-11T02:28:58Z DEBUG Process finished, return code=0
  1453. 2017-05-11T02:28:58Z DEBUG stdout=active
  1454.  
  1455. 2017-05-11T02:28:58Z DEBUG stderr=
  1456. 2017-05-11T02:28:58Z DEBUG duration: 0 seconds
  1457. 2017-05-11T02:28:58Z DEBUG [26/47]: adding sasl mappings to the directory
  1458. 2017-05-11T02:28:58Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  1459. 2017-05-11T02:28:58Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4d16ea8>
  1460. 2017-05-11T02:28:59Z DEBUG duration: 0 seconds
  1461. 2017-05-11T02:28:59Z DEBUG [27/47]: adding default layout
  1462. 2017-05-11T02:28:59Z DEBUG Starting external process
  1463. 2017-05-11T02:28:59Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpBcGnPg -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpGryqyO
  1464. 2017-05-11T02:28:59Z DEBUG Process finished, return code=0
  1465. 2017-05-11T02:28:59Z DEBUG stdout=add objectClass:
  1466. top
  1467. nsContainer
  1468. add cn:
  1469. accounts
  1470. adding new entry "cn=accounts,dc=rdlg,dc=net"
  1471. modify complete
  1472.  
  1473. add objectClass:
  1474. top
  1475. nsContainer
  1476. add cn:
  1477. users
  1478. adding new entry "cn=users,cn=accounts,dc=rdlg,dc=net"
  1479. modify complete
  1480.  
  1481. add objectClass:
  1482. top
  1483. nsContainer
  1484. add cn:
  1485. groups
  1486. adding new entry "cn=groups,cn=accounts,dc=rdlg,dc=net"
  1487. modify complete
  1488.  
  1489. add objectClass:
  1490. top
  1491. nsContainer
  1492. add cn:
  1493. services
  1494. adding new entry "cn=services,cn=accounts,dc=rdlg,dc=net"
  1495. modify complete
  1496.  
  1497. add objectClass:
  1498. top
  1499. nsContainer
  1500. add cn:
  1501. computers
  1502. adding new entry "cn=computers,cn=accounts,dc=rdlg,dc=net"
  1503. modify complete
  1504.  
  1505. add objectClass:
  1506. top
  1507. nsContainer
  1508. add cn:
  1509. hostgroups
  1510. adding new entry "cn=hostgroups,cn=accounts,dc=rdlg,dc=net"
  1511. modify complete
  1512.  
  1513. add objectClass:
  1514. nsContainer
  1515. add cn:
  1516. alt
  1517. adding new entry "cn=alt,dc=rdlg,dc=net"
  1518. modify complete
  1519.  
  1520. add objectClass:
  1521. nsContainer
  1522. add cn:
  1523. ng
  1524. adding new entry "cn=ng,cn=alt,dc=rdlg,dc=net"
  1525. modify complete
  1526.  
  1527. add objectClass:
  1528. nsContainer
  1529. add cn:
  1530. automount
  1531. adding new entry "cn=automount,dc=rdlg,dc=net"
  1532. modify complete
  1533.  
  1534. add objectClass:
  1535. nsContainer
  1536. add cn:
  1537. default
  1538. adding new entry "cn=default,cn=automount,dc=rdlg,dc=net"
  1539. modify complete
  1540.  
  1541. add objectClass:
  1542. automountMap
  1543. add automountMapName:
  1544. auto.master
  1545. adding new entry "automountmapname=auto.master,cn=default,cn=automount,dc=rdlg,dc=net"
  1546. modify complete
  1547.  
  1548. add objectClass:
  1549. automountMap
  1550. add automountMapName:
  1551. auto.direct
  1552. adding new entry "automountmapname=auto.direct,cn=default,cn=automount,dc=rdlg,dc=net"
  1553. modify complete
  1554.  
  1555. add objectClass:
  1556. automount
  1557. add automountKey:
  1558. /-
  1559. add automountInformation:
  1560. auto.direct
  1561. add description:
  1562. /- auto.direct
  1563. adding new entry "description=/- auto.direct,automountmapname=auto.master,cn=default,cn=automount,dc=rdlg,dc=net"
  1564. modify complete
  1565.  
  1566. add objectClass:
  1567. top
  1568. nsContainer
  1569. add cn:
  1570. hbac
  1571. adding new entry "cn=hbac,dc=rdlg,dc=net"
  1572. modify complete
  1573.  
  1574. add objectClass:
  1575. top
  1576. nsContainer
  1577. add cn:
  1578. hbacservices
  1579. adding new entry "cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1580. modify complete
  1581.  
  1582. add objectClass:
  1583. top
  1584. nsContainer
  1585. add cn:
  1586. hbacservicegroups
  1587. adding new entry "cn=hbacservicegroups,cn=hbac,dc=rdlg,dc=net"
  1588. modify complete
  1589.  
  1590. add objectClass:
  1591. top
  1592. nsContainer
  1593. add cn:
  1594. sudo
  1595. adding new entry "cn=sudo,dc=rdlg,dc=net"
  1596. modify complete
  1597.  
  1598. add objectClass:
  1599. top
  1600. nsContainer
  1601. add cn:
  1602. sudocmds
  1603. adding new entry "cn=sudocmds,cn=sudo,dc=rdlg,dc=net"
  1604. modify complete
  1605.  
  1606. add objectClass:
  1607. top
  1608. nsContainer
  1609. add cn:
  1610. sudocmdgroups
  1611. adding new entry "cn=sudocmdgroups,cn=sudo,dc=rdlg,dc=net"
  1612. modify complete
  1613.  
  1614. add objectClass:
  1615. top
  1616. nsContainer
  1617. add cn:
  1618. sudorules
  1619. adding new entry "cn=sudorules,cn=sudo,dc=rdlg,dc=net"
  1620. modify complete
  1621.  
  1622. add objectClass:
  1623. nsContainer
  1624. top
  1625. add cn:
  1626. etc
  1627. adding new entry "cn=etc,dc=rdlg,dc=net"
  1628. modify complete
  1629.  
  1630. add objectClass:
  1631. nsContainer
  1632. top
  1633. add cn:
  1634. locations
  1635. adding new entry "cn=locations,cn=etc,dc=rdlg,dc=net"
  1636. modify complete
  1637.  
  1638. add objectClass:
  1639. nsContainer
  1640. top
  1641. add cn:
  1642. sysaccounts
  1643. adding new entry "cn=sysaccounts,cn=etc,dc=rdlg,dc=net"
  1644. modify complete
  1645.  
  1646. add objectClass:
  1647. nsContainer
  1648. top
  1649. add cn:
  1650. ipa
  1651. adding new entry "cn=ipa,cn=etc,dc=rdlg,dc=net"
  1652. modify complete
  1653.  
  1654. add objectClass:
  1655. nsContainer
  1656. top
  1657. add cn:
  1658. masters
  1659. adding new entry "cn=masters,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1660. modify complete
  1661.  
  1662. add objectClass:
  1663. nsContainer
  1664. top
  1665. add cn:
  1666. replicas
  1667. adding new entry "cn=replicas,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1668. modify complete
  1669.  
  1670. add objectClass:
  1671. nsContainer
  1672. top
  1673. add cn:
  1674. dna
  1675. adding new entry "cn=dna,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1676. modify complete
  1677.  
  1678. add objectClass:
  1679. nsContainer
  1680. top
  1681. add cn:
  1682. posix-ids
  1683. adding new entry "cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1684. modify complete
  1685.  
  1686. add objectClass:
  1687. nsContainer
  1688. top
  1689. add cn:
  1690. ca_renewal
  1691. adding new entry "cn=ca_renewal,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1692. modify complete
  1693.  
  1694. add objectClass:
  1695. nsContainer
  1696. top
  1697. add cn:
  1698. certificates
  1699. adding new entry "cn=certificates,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1700. modify complete
  1701.  
  1702. add objectClass:
  1703. nsContainer
  1704. top
  1705. add cn:
  1706. custodia
  1707. adding new entry "cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1708. modify complete
  1709.  
  1710. add objectClass:
  1711. nsContainer
  1712. top
  1713. add cn:
  1714. dogtag
  1715. adding new entry "cn=dogtag,cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net"
  1716. modify complete
  1717.  
  1718. add objectClass:
  1719. nsContainer
  1720. top
  1721. add cn:
  1722. s4u2proxy
  1723. adding new entry "cn=s4u2proxy,cn=etc,dc=rdlg,dc=net"
  1724. modify complete
  1725.  
  1726. add objectClass:
  1727. ipaKrb5DelegationACL
  1728. groupOfPrincipals
  1729. top
  1730. add cn:
  1731. ipa-http-delegation
  1732. add memberPrincipal:
  1733. add ipaAllowedTarget:
  1734. cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=rdlg,dc=net
  1735. cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=rdlg,dc=net
  1736. adding new entry "cn=ipa-http-delegation,cn=s4u2proxy,cn=etc,dc=rdlg,dc=net"
  1737. modify complete
  1738.  
  1739. add objectClass:
  1740. groupOfPrincipals
  1741. top
  1742. add cn:
  1743. ipa-ldap-delegation-targets
  1744. add memberPrincipal:
  1745. adding new entry "cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=rdlg,dc=net"
  1746. modify complete
  1747.  
  1748. add objectClass:
  1749. groupOfPrincipals
  1750. top
  1751. add cn:
  1752. ipa-cifs-delegation-targets
  1753. adding new entry "cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=rdlg,dc=net"
  1754. modify complete
  1755.  
  1756. add objectClass:
  1757. top
  1758. person
  1759. posixaccount
  1760. krbprincipalaux
  1761. krbticketpolicyaux
  1762. inetuser
  1763. ipaobject
  1764. ipasshuser
  1765. add uid:
  1766. admin
  1767. add krbPrincipalName:
  1768. add cn:
  1769. Administrator
  1770. add sn:
  1771. Administrator
  1772. add uidNumber:
  1773. 1085800000
  1774. add gidNumber:
  1775. 1085800000
  1776. add homeDirectory:
  1777. /home/admin
  1778. add loginShell:
  1779. /bin/bash
  1780. add gecos:
  1781. Administrator
  1782. add nsAccountLock:
  1783. FALSE
  1784. add ipaUniqueID:
  1785. autogenerate
  1786. adding new entry "uid=admin,cn=users,cn=accounts,dc=rdlg,dc=net"
  1787. modify complete
  1788.  
  1789. add objectClass:
  1790. top
  1791. groupofnames
  1792. posixgroup
  1793. ipausergroup
  1794. ipaobject
  1795. add cn:
  1796. admins
  1797. add description:
  1798. Account administrators group
  1799. add gidNumber:
  1800. 1085800000
  1801. add member:
  1802. uid=admin,cn=users,cn=accounts,dc=rdlg,dc=net
  1803. add nsAccountLock:
  1804. FALSE
  1805. add ipaUniqueID:
  1806. autogenerate
  1807. adding new entry "cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net"
  1808. modify complete
  1809.  
  1810. add objectClass:
  1811. top
  1812. groupofnames
  1813. nestedgroup
  1814. ipausergroup
  1815. ipaobject
  1816. add description:
  1817. Default group for all users
  1818. add cn:
  1819. ipausers
  1820. add ipaUniqueID:
  1821. autogenerate
  1822. adding new entry "cn=ipausers,cn=groups,cn=accounts,dc=rdlg,dc=net"
  1823. modify complete
  1824.  
  1825. add objectClass:
  1826. top
  1827. groupofnames
  1828. posixgroup
  1829. ipausergroup
  1830. ipaobject
  1831. add gidNumber:
  1832. 1085800002
  1833. add description:
  1834. Limited admins who can edit other users
  1835. add cn:
  1836. editors
  1837. add ipaUniqueID:
  1838. autogenerate
  1839. adding new entry "cn=editors,cn=groups,cn=accounts,dc=rdlg,dc=net"
  1840. modify complete
  1841.  
  1842. add objectClass:
  1843. top
  1844. groupOfNames
  1845. nestedGroup
  1846. ipaobject
  1847. ipahostgroup
  1848. add description:
  1849. IPA server hosts
  1850. add cn:
  1851. ipaservers
  1852. add ipaUniqueID:
  1853. autogenerate
  1854. adding new entry "cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net"
  1855. modify complete
  1856.  
  1857. add objectclass:
  1858. ipahbacservice
  1859. ipaobject
  1860. add cn:
  1861. sshd
  1862. add description:
  1863. sshd
  1864. add ipauniqueid:
  1865. autogenerate
  1866. adding new entry "cn=sshd,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1867. modify complete
  1868.  
  1869. add objectclass:
  1870. ipahbacservice
  1871. ipaobject
  1872. add cn:
  1873. ftp
  1874. add description:
  1875. ftp
  1876. add ipauniqueid:
  1877. autogenerate
  1878. adding new entry "cn=ftp,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1879. modify complete
  1880.  
  1881. add objectclass:
  1882. ipahbacservice
  1883. ipaobject
  1884. add cn:
  1885. su
  1886. add description:
  1887. su
  1888. add ipauniqueid:
  1889. autogenerate
  1890. adding new entry "cn=su,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1891. modify complete
  1892.  
  1893. add objectclass:
  1894. ipahbacservice
  1895. ipaobject
  1896. add cn:
  1897. login
  1898. add description:
  1899. login
  1900. add ipauniqueid:
  1901. autogenerate
  1902. adding new entry "cn=login,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1903. modify complete
  1904.  
  1905. add objectclass:
  1906. ipahbacservice
  1907. ipaobject
  1908. add cn:
  1909. su-l
  1910. add description:
  1911. su with login shell
  1912. add ipauniqueid:
  1913. autogenerate
  1914. adding new entry "cn=su-l,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1915. modify complete
  1916.  
  1917. add objectclass:
  1918. ipahbacservice
  1919. ipaobject
  1920. add cn:
  1921. sudo
  1922. add description:
  1923. sudo
  1924. add ipauniqueid:
  1925. autogenerate
  1926. adding new entry "cn=sudo,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1927. modify complete
  1928.  
  1929. add objectclass:
  1930. ipahbacservice
  1931. ipaobject
  1932. add cn:
  1933. sudo-i
  1934. add description:
  1935. sudo-i
  1936. add ipauniqueid:
  1937. autogenerate
  1938. adding new entry "cn=sudo-i,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1939. modify complete
  1940.  
  1941. add objectclass:
  1942. ipahbacservice
  1943. ipaobject
  1944. add cn:
  1945. gdm
  1946. add description:
  1947. gdm
  1948. add ipauniqueid:
  1949. autogenerate
  1950. adding new entry "cn=gdm,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1951. modify complete
  1952.  
  1953. add objectclass:
  1954. ipahbacservice
  1955. ipaobject
  1956. add cn:
  1957. gdm-password
  1958. add description:
  1959. gdm-password
  1960. add ipauniqueid:
  1961. autogenerate
  1962. adding new entry "cn=gdm-password,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1963. modify complete
  1964.  
  1965. add objectclass:
  1966. ipahbacservice
  1967. ipaobject
  1968. add cn:
  1969. kdm
  1970. add description:
  1971. kdm
  1972. add ipauniqueid:
  1973. autogenerate
  1974. adding new entry "cn=kdm,cn=hbacservices,cn=hbac,dc=rdlg,dc=net"
  1975. modify complete
  1976.  
  1977. add objectClass:
  1978. ipaobject
  1979. ipahbacservicegroup
  1980. nestedGroup
  1981. groupOfNames
  1982. top
  1983. add cn:
  1984. Sudo
  1985. add ipauniqueid:
  1986. autogenerate
  1987. add description:
  1988. Default group of Sudo related services
  1989. add member:
  1990. cn=sudo,cn=hbacservices,cn=hbac,dc=rdlg,dc=net
  1991. cn=sudo-i,cn=hbacservices,cn=hbac,dc=rdlg,dc=net
  1992. adding new entry "cn=Sudo,cn=hbacservicegroups,cn=hbac,dc=rdlg,dc=net"
  1993. modify complete
  1994.  
  1995. add objectClass:
  1996. nsContainer
  1997. top
  1998. ipaGuiConfig
  1999. ipaConfigObject
  2000. add ipaUserSearchFields:
  2001. uid,givenname,sn,telephonenumber,ou,title
  2002. add ipaGroupSearchFields:
  2003. cn,description
  2004. add ipaSearchTimeLimit:
  2005. 2
  2006. add ipaSearchRecordsLimit:
  2007. 100
  2008. add ipaHomesRootDir:
  2009. /home
  2010. add ipaDefaultLoginShell:
  2011. /bin/sh
  2012. add ipaDefaultPrimaryGroup:
  2013. ipausers
  2014. add ipaMaxUsernameLength:
  2015. 32
  2016. add ipaPwdExpAdvNotify:
  2017. 4
  2018. add ipaGroupObjectClasses:
  2019. top
  2020. groupofnames
  2021. nestedgroup
  2022. ipausergroup
  2023. ipaobject
  2024. add ipaUserObjectClasses:
  2025. top
  2026. person
  2027. organizationalperson
  2028. inetorgperson
  2029. inetuser
  2030. posixaccount
  2031. krbprincipalaux
  2032. krbticketpolicyaux
  2033. ipaobject
  2034. ipasshuser
  2035. add ipaDefaultEmailDomain:
  2036. rdlg.net
  2037. add ipaMigrationEnabled:
  2038. FALSE
  2039. add ipaConfigString:
  2040. AllowNThash
  2041. add ipaSELinuxUserMapOrder:
  2042. guest_u:s0$xguest_u:s0$user_u:s0$staff_u:s0-s0:c0.c1023$unconfined_u:s0-s0:c0.c1023
  2043. add ipaSELinuxUserMapDefault:
  2044. unconfined_u:s0-s0:c0.c1023
  2045. adding new entry "cn=ipaConfig,cn=etc,dc=rdlg,dc=net"
  2046. modify complete
  2047.  
  2048. add objectclass:
  2049. top
  2050. nsContainer
  2051. add cn:
  2052. cosTemplates
  2053. adding new entry "cn=cosTemplates,cn=accounts,dc=rdlg,dc=net"
  2054. modify complete
  2055.  
  2056. add description:
  2057. Password Policy based on group membership
  2058. add objectClass:
  2059. top
  2060. ldapsubentry
  2061. cosSuperDefinition
  2062. cosClassicDefinition
  2063. add cosTemplateDn:
  2064. cn=cosTemplates,cn=accounts,dc=rdlg,dc=net
  2065. add cosAttribute:
  2066. krbPwdPolicyReference override
  2067. add cosSpecifier:
  2068. memberOf
  2069. adding new entry "cn=Password Policy,cn=accounts,dc=rdlg,dc=net"
  2070. modify complete
  2071.  
  2072. add objectClass:
  2073. top
  2074. nsContainer
  2075. add cn:
  2076. selinux
  2077. adding new entry "cn=selinux,dc=rdlg,dc=net"
  2078. modify complete
  2079.  
  2080. add objectClass:
  2081. top
  2082. nsContainer
  2083. add cn:
  2084. usermap
  2085. adding new entry "cn=usermap,cn=selinux,dc=rdlg,dc=net"
  2086. modify complete
  2087.  
  2088. add objectClass:
  2089. top
  2090. nsContainer
  2091. add cn:
  2092. ranges
  2093. adding new entry "cn=ranges,cn=etc,dc=rdlg,dc=net"
  2094. modify complete
  2095.  
  2096. add objectClass:
  2097. top
  2098. ipaIDrange
  2099. ipaDomainIDRange
  2100. add cn:
  2101. RDLG.NET_id_range
  2102. add ipaBaseID:
  2103. 1085800000
  2104. add ipaIDRangeSize:
  2105. 200000
  2106. add ipaRangeType:
  2107. ipa-local
  2108. adding new entry "cn=RDLG.NET_id_range,cn=ranges,cn=etc,dc=rdlg,dc=net"
  2109. modify complete
  2110.  
  2111. add objectClass:
  2112. nsContainer
  2113. top
  2114. add cn:
  2115. ca
  2116. adding new entry "cn=ca,dc=rdlg,dc=net"
  2117. modify complete
  2118.  
  2119. add objectClass:
  2120. nsContainer
  2121. top
  2122. add cn:
  2123. certprofiles
  2124. adding new entry "cn=certprofiles,cn=ca,dc=rdlg,dc=net"
  2125. modify complete
  2126.  
  2127. add objectClass:
  2128. nsContainer
  2129. top
  2130. add cn:
  2131. caacls
  2132. adding new entry "cn=caacls,cn=ca,dc=rdlg,dc=net"
  2133. modify complete
  2134.  
  2135. add objectClass:
  2136. nsContainer
  2137. top
  2138. add cn:
  2139. cas
  2140. adding new entry "cn=cas,cn=ca,dc=rdlg,dc=net"
  2141. modify complete
  2142.  
  2143.  
  2144. 2017-05-11T02:28:59Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2145.  
  2146. 2017-05-11T02:28:59Z DEBUG duration: 0 seconds
  2147. 2017-05-11T02:28:59Z DEBUG [28/47]: adding delegation layout
  2148. 2017-05-11T02:28:59Z DEBUG Starting external process
  2149. 2017-05-11T02:28:59Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpcwd9Yk -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp4mvX3j
  2150. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2151. 2017-05-11T02:29:00Z DEBUG stdout=add objectClass:
  2152. top
  2153. nsContainer
  2154. add cn:
  2155. roles
  2156. adding new entry "cn=roles,cn=accounts,dc=rdlg,dc=net"
  2157. modify complete
  2158.  
  2159. add objectClass:
  2160. top
  2161. nsContainer
  2162. add cn:
  2163. pbac
  2164. adding new entry "cn=pbac,dc=rdlg,dc=net"
  2165. modify complete
  2166.  
  2167. add objectClass:
  2168. top
  2169. nsContainer
  2170. add cn:
  2171. privileges
  2172. adding new entry "cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2173. modify complete
  2174.  
  2175. add objectClass:
  2176. top
  2177. nsContainer
  2178. add cn:
  2179. permissions
  2180. adding new entry "cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2181. modify complete
  2182.  
  2183. add objectClass:
  2184. top
  2185. groupofnames
  2186. nestedgroup
  2187. add cn:
  2188. helpdesk
  2189. add description:
  2190. Helpdesk
  2191. adding new entry "cn=helpdesk,cn=roles,cn=accounts,dc=rdlg,dc=net"
  2192. modify complete
  2193.  
  2194. add objectClass:
  2195. top
  2196. groupofnames
  2197. nestedgroup
  2198. add cn:
  2199. User Administrators
  2200. add description:
  2201. User Administrators
  2202. adding new entry "cn=User Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2203. modify complete
  2204.  
  2205. add objectClass:
  2206. top
  2207. groupofnames
  2208. nestedgroup
  2209. add cn:
  2210. Group Administrators
  2211. add description:
  2212. Group Administrators
  2213. adding new entry "cn=Group Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2214. modify complete
  2215.  
  2216. add objectClass:
  2217. top
  2218. groupofnames
  2219. nestedgroup
  2220. add cn:
  2221. Host Administrators
  2222. add description:
  2223. Host Administrators
  2224. adding new entry "cn=Host Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2225. modify complete
  2226.  
  2227. add objectClass:
  2228. top
  2229. groupofnames
  2230. nestedgroup
  2231. add cn:
  2232. Host Group Administrators
  2233. add description:
  2234. Host Group Administrators
  2235. adding new entry "cn=Host Group Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2236. modify complete
  2237.  
  2238. add objectClass:
  2239. top
  2240. groupofnames
  2241. nestedgroup
  2242. add cn:
  2243. Delegation Administrator
  2244. add description:
  2245. Role administration
  2246. adding new entry "cn=Delegation Administrator,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2247. modify complete
  2248.  
  2249. add objectClass:
  2250. top
  2251. groupofnames
  2252. nestedgroup
  2253. add cn:
  2254. DNS Administrators
  2255. add description:
  2256. DNS Administrators
  2257. adding new entry "cn=DNS Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2258. modify complete
  2259.  
  2260. add objectClass:
  2261. top
  2262. groupofnames
  2263. nestedgroup
  2264. add cn:
  2265. DNS Servers
  2266. add description:
  2267. DNS Servers
  2268. adding new entry "cn=DNS Servers,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2269. modify complete
  2270.  
  2271. add objectClass:
  2272. top
  2273. groupofnames
  2274. nestedgroup
  2275. add cn:
  2276. Service Administrators
  2277. add description:
  2278. Service Administrators
  2279. adding new entry "cn=Service Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2280. modify complete
  2281.  
  2282. add objectClass:
  2283. top
  2284. groupofnames
  2285. nestedgroup
  2286. add cn:
  2287. Automount Administrators
  2288. add description:
  2289. Automount Administrators
  2290. adding new entry "cn=Automount Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2291. modify complete
  2292.  
  2293. add objectClass:
  2294. top
  2295. groupofnames
  2296. nestedgroup
  2297. add cn:
  2298. Netgroups Administrators
  2299. add description:
  2300. Netgroups Administrators
  2301. adding new entry "cn=Netgroups Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2302. modify complete
  2303.  
  2304. add objectClass:
  2305. top
  2306. groupofnames
  2307. nestedgroup
  2308. add cn:
  2309. Certificate Administrators
  2310. add description:
  2311. Certificate Administrators
  2312. adding new entry "cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2313. modify complete
  2314.  
  2315. add objectClass:
  2316. top
  2317. groupofnames
  2318. nestedgroup
  2319. add cn:
  2320. Replication Administrators
  2321. add description:
  2322. Replication Administrators
  2323. add member:
  2324. cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net
  2325. adding new entry "cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2326. modify complete
  2327.  
  2328. add objectClass:
  2329. top
  2330. groupofnames
  2331. nestedgroup
  2332. add cn:
  2333. Host Enrollment
  2334. add description:
  2335. Host Enrollment
  2336. adding new entry "cn=Host Enrollment,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2337. modify complete
  2338.  
  2339. add objectClass:
  2340. top
  2341. groupofnames
  2342. nestedgroup
  2343. add cn:
  2344. Stage User Administrators
  2345. add description:
  2346. Stage User Administrators
  2347. adding new entry "cn=Stage User Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2348. modify complete
  2349.  
  2350. add objectClass:
  2351. top
  2352. groupofnames
  2353. nestedgroup
  2354. add cn:
  2355. Stage User Provisioning
  2356. add description:
  2357. Stage User Provisioning
  2358. adding new entry "cn=Stage User Provisioning,cn=privileges,cn=pbac,dc=rdlg,dc=net"
  2359. modify complete
  2360.  
  2361. add objectClass:
  2362. top
  2363. groupofnames
  2364. ipapermission
  2365. add cn:
  2366. Add Replication Agreements
  2367. add ipapermissiontype:
  2368. SYSTEM
  2369. add member:
  2370. cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2371. adding new entry "cn=Add Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2372. modify complete
  2373.  
  2374. add objectClass:
  2375. top
  2376. groupofnames
  2377. ipapermission
  2378. add cn:
  2379. Modify Replication Agreements
  2380. add ipapermissiontype:
  2381. SYSTEM
  2382. add member:
  2383. cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2384. adding new entry "cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2385. modify complete
  2386.  
  2387. add objectClass:
  2388. top
  2389. groupofnames
  2390. ipapermission
  2391. add cn:
  2392. Read Replication Agreements
  2393. add ipapermissiontype:
  2394. SYSTEM
  2395. add member:
  2396. cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2397. adding new entry "cn=Read Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2398. modify complete
  2399.  
  2400. add objectClass:
  2401. top
  2402. groupofnames
  2403. ipapermission
  2404. add cn:
  2405. Remove Replication Agreements
  2406. add ipapermissiontype:
  2407. SYSTEM
  2408. add member:
  2409. cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2410. adding new entry "cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2411. modify complete
  2412.  
  2413. add objectClass:
  2414. top
  2415. groupofnames
  2416. ipapermission
  2417. add cn:
  2418. Modify DNA Range
  2419. add ipapermissiontype:
  2420. SYSTEM
  2421. add member:
  2422. cn=Replication Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2423. adding new entry "cn=Modify DNA Range,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2424. modify complete
  2425.  
  2426. add objectClass:
  2427. top
  2428. nsContainer
  2429. add cn:
  2430. virtual operations
  2431. adding new entry "cn=virtual operations,cn=etc,dc=rdlg,dc=net"
  2432. modify complete
  2433.  
  2434. add objectClass:
  2435. top
  2436. groupofnames
  2437. ipapermission
  2438. add cn:
  2439. Retrieve Certificates from the CA
  2440. add member:
  2441. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2442. adding new entry "cn=Retrieve Certificates from the CA,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2443. modify complete
  2444.  
  2445. add aci:
  2446. (targetattr = "objectclass")(target = "ldap:///cn=retrieve certificate,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Retrieve Certificates from the CA" ; allow (write) groupdn = "ldap:///cn=Retrieve Certificates from the CA,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2447. modifying entry "dc=rdlg,dc=net"
  2448. modify complete
  2449.  
  2450. add objectClass:
  2451. top
  2452. groupofnames
  2453. ipapermission
  2454. add cn:
  2455. Request Certificate
  2456. add member:
  2457. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2458. adding new entry "cn=Request Certificate,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2459. modify complete
  2460.  
  2461. add aci:
  2462. (targetattr = "objectclass")(target = "ldap:///cn=request certificate,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Request Certificate" ; allow (write) groupdn = "ldap:///cn=Request Certificate,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2463. modifying entry "dc=rdlg,dc=net"
  2464. modify complete
  2465.  
  2466. add objectClass:
  2467. top
  2468. groupofnames
  2469. ipapermission
  2470. add cn:
  2471. Request Certificates from a different host
  2472. add member:
  2473. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2474. adding new entry "cn=Request Certificates from a different host,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2475. modify complete
  2476.  
  2477. add aci:
  2478. (targetattr = "objectclass")(target = "ldap:///cn=request certificate different host,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Request Certificates from a different host" ; allow (write) groupdn = "ldap:///cn=Request Certificates from a different host,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2479. modifying entry "dc=rdlg,dc=net"
  2480. modify complete
  2481.  
  2482. add objectClass:
  2483. top
  2484. groupofnames
  2485. ipapermission
  2486. add cn:
  2487. Get Certificates status from the CA
  2488. add member:
  2489. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2490. adding new entry "cn=Get Certificates status from the CA,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2491. modify complete
  2492.  
  2493. add aci:
  2494. (targetattr = "objectclass")(target = "ldap:///cn=certificate status,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Get Certificates status from the CA" ; allow (write) groupdn = "ldap:///cn=Get Certificates status from the CA,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2495. modifying entry "dc=rdlg,dc=net"
  2496. modify complete
  2497.  
  2498. add objectClass:
  2499. top
  2500. groupofnames
  2501. ipapermission
  2502. add cn:
  2503. Revoke Certificate
  2504. add member:
  2505. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2506. adding new entry "cn=Revoke Certificate,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2507. modify complete
  2508.  
  2509. add aci:
  2510. (targetattr = "objectclass")(target = "ldap:///cn=revoke certificate,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Revoke Certificate"; allow (write) groupdn = "ldap:///cn=Revoke Certificate,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2511. modifying entry "dc=rdlg,dc=net"
  2512. modify complete
  2513.  
  2514. add objectClass:
  2515. top
  2516. groupofnames
  2517. ipapermission
  2518. add cn:
  2519. Certificate Remove Hold
  2520. add member:
  2521. cn=Certificate Administrators,cn=privileges,cn=pbac,dc=rdlg,dc=net
  2522. adding new entry "cn=Certificate Remove Hold,cn=permissions,cn=pbac,dc=rdlg,dc=net"
  2523. modify complete
  2524.  
  2525. add aci:
  2526. (targetattr = "objectclass")(target = "ldap:///cn=certificate remove hold,cn=virtual operations,cn=etc,dc=rdlg,dc=net" )(version 3.0 ; acl "permission:Certificate Remove Hold"; allow (write) groupdn = "ldap:///cn=Certificate Remove Hold,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2527. modifying entry "dc=rdlg,dc=net"
  2528. modify complete
  2529.  
  2530.  
  2531. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2532.  
  2533. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2534. 2017-05-11T02:29:00Z DEBUG [29/47]: creating container for managed entries
  2535. 2017-05-11T02:29:00Z DEBUG Starting external process
  2536. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpRPkTox -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp9026yu
  2537. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2538. 2017-05-11T02:29:00Z DEBUG stdout=add objectClass:
  2539. nsContainer
  2540. top
  2541. add cn:
  2542. Managed Entries
  2543. adding new entry "cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2544. modify complete
  2545.  
  2546. add objectClass:
  2547. nsContainer
  2548. top
  2549. add cn:
  2550. Templates
  2551. adding new entry "cn=Templates,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2552. modify complete
  2553.  
  2554. add objectClass:
  2555. nsContainer
  2556. top
  2557. add cn:
  2558. Definitions
  2559. adding new entry "cn=Definitions,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2560. modify complete
  2561.  
  2562.  
  2563. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2564.  
  2565. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2566. 2017-05-11T02:29:00Z DEBUG [30/47]: configuring user private groups
  2567. 2017-05-11T02:29:00Z DEBUG Starting external process
  2568. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmprRUrdz -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpHiFznN
  2569. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2570. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2571. mepTemplateEntry
  2572. add cn:
  2573. UPG Template
  2574. add mepRDNAttr:
  2575. cn
  2576. add mepStaticAttr:
  2577. objectclass: posixgroup
  2578. objectclass: ipaobject
  2579. ipaUniqueId: autogenerate
  2580. add mepMappedAttr:
  2581. cn: $uid
  2582. gidNumber: $uidNumber
  2583. description: User private group for $uid
  2584. adding new entry "cn=UPG Template,cn=Templates,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2585. modify complete
  2586.  
  2587. add objectclass:
  2588. extensibleObject
  2589. add cn:
  2590. UPG Definition
  2591. add originScope:
  2592. cn=users,cn=accounts,dc=rdlg,dc=net
  2593. add originFilter:
  2594. (&(objectclass=posixAccount)(!(description=__no_upg__)))
  2595. add managedBase:
  2596. cn=groups,cn=accounts,dc=rdlg,dc=net
  2597. add managedTemplate:
  2598. cn=UPG Template,cn=Templates,cn=Managed Entries,cn=etc,dc=rdlg,dc=net
  2599. adding new entry "cn=UPG Definition,cn=Definitions,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2600. modify complete
  2601.  
  2602.  
  2603. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2604.  
  2605. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2606. 2017-05-11T02:29:00Z DEBUG [31/47]: configuring netgroups from hostgroups
  2607. 2017-05-11T02:29:00Z DEBUG Starting external process
  2608. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpM1KV9g -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpNcDh6U
  2609. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2610. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2611. mepTemplateEntry
  2612. add cn:
  2613. NGP HGP Template
  2614. add mepRDNAttr:
  2615. cn
  2616. add mepStaticAttr:
  2617. ipaUniqueId: autogenerate
  2618. objectclass: ipanisnetgroup
  2619. objectclass: ipaobject
  2620. nisDomainName: rdlg.net
  2621. add mepMappedAttr:
  2622. cn: $cn
  2623. memberHost: $dn
  2624. description: ipaNetgroup $cn
  2625. adding new entry "cn=NGP HGP Template,cn=Templates,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2626. modify complete
  2627.  
  2628. add objectclass:
  2629. extensibleObject
  2630. add cn:
  2631. NGP Definition
  2632. add originScope:
  2633. cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  2634. add originFilter:
  2635. objectclass=ipahostgroup
  2636. add managedBase:
  2637. cn=ng,cn=alt,dc=rdlg,dc=net
  2638. add managedTemplate:
  2639. cn=NGP HGP Template,cn=Templates,cn=Managed Entries,cn=etc,dc=rdlg,dc=net
  2640. adding new entry "cn=NGP Definition,cn=Definitions,cn=Managed Entries,cn=etc,dc=rdlg,dc=net"
  2641. modify complete
  2642.  
  2643.  
  2644. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2645.  
  2646. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2647. 2017-05-11T02:29:00Z DEBUG [32/47]: creating default Sudo bind user
  2648. 2017-05-11T02:29:00Z DEBUG Starting external process
  2649. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpr1dlvx -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpmNC9FF
  2650. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2651. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2652. account
  2653. simplesecurityobject
  2654. add uid:
  2655. sudo
  2656. add userPassword:
  2657. XXXXXXXX
  2658. add passwordExpirationTime:
  2659. 20380119031407Z
  2660. add nsIdleTimeout:
  2661. 0
  2662. adding new entry "uid=sudo,cn=sysaccounts,cn=etc,dc=rdlg,dc=net"
  2663. modify complete
  2664.  
  2665.  
  2666. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2667.  
  2668. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2669. 2017-05-11T02:29:00Z DEBUG [33/47]: creating default Auto Member layout
  2670. 2017-05-11T02:29:00Z DEBUG Starting external process
  2671. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpGFzo_h -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmplPB7jz
  2672. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2673. 2017-05-11T02:29:00Z DEBUG stdout=add nsslapd-pluginConfigArea:
  2674. cn=automember,cn=etc,dc=rdlg,dc=net
  2675. modifying entry "cn=Auto Membership Plugin,cn=plugins,cn=config"
  2676. modify complete
  2677.  
  2678. add objectClass:
  2679. top
  2680. nsContainer
  2681. add cn:
  2682. automember
  2683. adding new entry "cn=automember,cn=etc,dc=rdlg,dc=net"
  2684. modify complete
  2685.  
  2686. add objectclass:
  2687. autoMemberDefinition
  2688. add cn:
  2689. Hostgroup
  2690. add autoMemberScope:
  2691. cn=computers,cn=accounts,dc=rdlg,dc=net
  2692. add autoMemberFilter:
  2693. objectclass=ipaHost
  2694. add autoMemberGroupingAttr:
  2695. member:dn
  2696. adding new entry "cn=Hostgroup,cn=automember,cn=etc,dc=rdlg,dc=net"
  2697. modify complete
  2698.  
  2699. add objectclass:
  2700. autoMemberDefinition
  2701. add cn:
  2702. Group
  2703. add autoMemberScope:
  2704. cn=users,cn=accounts,dc=rdlg,dc=net
  2705. add autoMemberFilter:
  2706. objectclass=posixAccount
  2707. add autoMemberGroupingAttr:
  2708. member:dn
  2709. adding new entry "cn=Group,cn=automember,cn=etc,dc=rdlg,dc=net"
  2710. modify complete
  2711.  
  2712.  
  2713. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2714.  
  2715. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2716. 2017-05-11T02:29:00Z DEBUG [34/47]: adding range check plugin
  2717. 2017-05-11T02:29:00Z DEBUG Starting external process
  2718. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp2BYVEM -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpsawBXG
  2719. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2720. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2721. top
  2722. nsSlapdPlugin
  2723. extensibleObject
  2724. add cn:
  2725. IPA Range-Check
  2726. add nsslapd-pluginpath:
  2727. libipa_range_check
  2728. add nsslapd-plugininitfunc:
  2729. ipa_range_check_init
  2730. add nsslapd-plugintype:
  2731. preoperation
  2732. add nsslapd-pluginenabled:
  2733. on
  2734. add nsslapd-pluginid:
  2735. ipa_range_check_version
  2736. add nsslapd-pluginversion:
  2737. 1.0
  2738. add nsslapd-pluginvendor:
  2739. Red Hat, Inc.
  2740. add nsslapd-plugindescription:
  2741. IPA Range-Check plugin
  2742. add nsslapd-plugin-depends-on-type:
  2743. database
  2744. add nsslapd-basedn:
  2745. dc=rdlg,dc=net
  2746. adding new entry "cn=IPA Range-Check,cn=plugins,cn=config"
  2747. modify complete
  2748.  
  2749.  
  2750. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2751.  
  2752. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2753. 2017-05-11T02:29:00Z DEBUG [35/47]: creating default HBAC rule allow_all
  2754. 2017-05-11T02:29:00Z DEBUG Starting external process
  2755. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpEN3WMi -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp41X3u2
  2756. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2757. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2758. ipaassociation
  2759. ipahbacrule
  2760. add cn:
  2761. allow_all
  2762. add accessruletype:
  2763. allow
  2764. add usercategory:
  2765. all
  2766. add hostcategory:
  2767. all
  2768. add servicecategory:
  2769. all
  2770. add ipaenabledflag:
  2771. TRUE
  2772. add description:
  2773. Allow all users to access any host from any host
  2774. add ipauniqueid:
  2775. autogenerate
  2776. adding new entry "ipauniqueid=autogenerate,cn=hbac,dc=rdlg,dc=net"
  2777. modify complete
  2778.  
  2779.  
  2780. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2781.  
  2782. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2783. 2017-05-11T02:29:00Z DEBUG [36/47]: adding sasl mappings to the directory
  2784. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2785. 2017-05-11T02:29:00Z DEBUG [37/47]: adding entries for topology management
  2786. 2017-05-11T02:29:00Z DEBUG Starting external process
  2787. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpKv6j0X -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmptjsce1
  2788. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2789. 2017-05-11T02:29:00Z DEBUG stdout=add objectclass:
  2790. top
  2791. nsContainer
  2792. add cn:
  2793. topology
  2794. adding new entry "cn=topology,cn=ipa,cn=etc,dc=rdlg,dc=net"
  2795. modify complete
  2796.  
  2797. add objectclass:
  2798. top
  2799. iparepltopoconf
  2800. add ipaReplTopoConfRoot:
  2801. dc=rdlg,dc=net
  2802. add nsDS5ReplicatedAttributeList:
  2803. (objectclass=*) $ EXCLUDE memberof idnssoaserial entryusn krblastsuccessfulauth krblastfailedauth krbloginfailedcount
  2804. add nsDS5ReplicatedAttributeListTotal:
  2805. (objectclass=*) $ EXCLUDE entryusn krblastsuccessfulauth krblastfailedauth krbloginfailedcount
  2806. add nsds5ReplicaStripAttrs:
  2807. modifiersName modifyTimestamp internalModifiersName internalModifyTimestamp
  2808. add cn:
  2809. domain
  2810. adding new entry "cn=domain,cn=topology,cn=ipa,cn=etc,dc=rdlg,dc=net"
  2811. modify complete
  2812.  
  2813.  
  2814. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2815.  
  2816. 2017-05-11T02:29:00Z DEBUG duration: 0 seconds
  2817. 2017-05-11T02:29:00Z DEBUG [38/47]: initializing group membership
  2818. 2017-05-11T02:29:00Z DEBUG Starting external process
  2819. 2017-05-11T02:29:00Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpYkSjyh -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpvOr2_r
  2820. 2017-05-11T02:29:00Z DEBUG Process finished, return code=0
  2821. 2017-05-11T02:29:00Z DEBUG stdout=add objectClass:
  2822. top
  2823. extensibleObject
  2824. add cn:
  2825. IPA install
  2826. add basedn:
  2827. dc=rdlg,dc=net
  2828. add filter:
  2829. (objectclass=*)
  2830. add ttl:
  2831. 10
  2832. adding new entry "cn=IPA install 1494469733, cn=memberof task, cn=tasks, cn=config"
  2833. modify complete
  2834.  
  2835.  
  2836. 2017-05-11T02:29:00Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2837.  
  2838. 2017-05-11T02:29:00Z DEBUG Waiting for memberof task to complete.
  2839. 2017-05-11T02:29:01Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  2840. 2017-05-11T02:29:01Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4f6d950>
  2841. 2017-05-11T02:29:01Z DEBUG duration: 1 seconds
  2842. 2017-05-11T02:29:01Z DEBUG [39/47]: adding master entry
  2843. 2017-05-11T02:29:01Z DEBUG Starting external process
  2844. 2017-05-11T02:29:01Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpi89o8U -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmps96QVi
  2845. 2017-05-11T02:29:01Z DEBUG Process finished, return code=0
  2846. 2017-05-11T02:29:01Z DEBUG stdout=add objectclass:
  2847. top
  2848. nsContainer
  2849. ipaReplTopoManagedServer
  2850. ipaConfigObject
  2851. ipaSupportedDomainLevelConfig
  2852. add cn:
  2853. ipa.rdlg.net
  2854. add ipaReplTopoManagedSuffix:
  2855. dc=rdlg,dc=net
  2856. add ipaMinDomainLevel:
  2857. 0
  2858. add ipaMaxDomainLevel:
  2859. 1
  2860. adding new entry "cn=ipa.rdlg.net,cn=masters,cn=ipa,cn=etc,dc=rdlg,dc=net"
  2861. modify complete
  2862.  
  2863.  
  2864. 2017-05-11T02:29:01Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2865.  
  2866. 2017-05-11T02:29:01Z DEBUG duration: 0 seconds
  2867. 2017-05-11T02:29:01Z DEBUG [40/47]: initializing domain level
  2868. 2017-05-11T02:29:01Z DEBUG Starting external process
  2869. 2017-05-11T02:29:01Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpCg4qWX -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpTT6Qep
  2870. 2017-05-11T02:29:01Z DEBUG Process finished, return code=0
  2871. 2017-05-11T02:29:01Z DEBUG stdout=add objectClass:
  2872. top
  2873. nsContainer
  2874. ipaDomainLevelConfig
  2875. add ipaDomainLevel:
  2876. 1
  2877. adding new entry "cn=Domain Level,cn=ipa,cn=etc,dc=rdlg,dc=net"
  2878. modify complete
  2879.  
  2880.  
  2881. 2017-05-11T02:29:01Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2882.  
  2883. 2017-05-11T02:29:01Z DEBUG duration: 0 seconds
  2884. 2017-05-11T02:29:01Z DEBUG [41/47]: configuring Posix uid/gid generation
  2885. 2017-05-11T02:29:01Z DEBUG Starting external process
  2886. 2017-05-11T02:29:01Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpehxGyr -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp_YSRW_
  2887. 2017-05-11T02:29:01Z DEBUG Process finished, return code=0
  2888. 2017-05-11T02:29:01Z DEBUG stdout=add objectclass:
  2889. top
  2890. extensibleObject
  2891. add cn:
  2892. Posix IDs
  2893. add dnaType:
  2894. uidNumber
  2895. gidNumber
  2896. add dnaNextValue:
  2897. 1085800000
  2898. add dnaMaxValue:
  2899. 1085999999
  2900. add dnaMagicRegen:
  2901. -1
  2902. add dnaFilter:
  2903. (|(objectClass=posixAccount)(objectClass=posixGroup)(objectClass=ipaIDobject))
  2904. add dnaScope:
  2905. dc=rdlg,dc=net
  2906. add dnaThreshold:
  2907. 500
  2908. add dnaSharedCfgDN:
  2909. cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=rdlg,dc=net
  2910. adding new entry "cn=Posix IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config"
  2911. modify complete
  2912.  
  2913.  
  2914. 2017-05-11T02:29:01Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2915.  
  2916. 2017-05-11T02:29:01Z DEBUG duration: 0 seconds
  2917. 2017-05-11T02:29:01Z DEBUG [42/47]: adding replication acis
  2918. 2017-05-11T02:29:01Z DEBUG Starting external process
  2919. 2017-05-11T02:29:01Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpLa4Yeh -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpw3a1qa
  2920. 2017-05-11T02:29:01Z DEBUG Process finished, return code=0
  2921. 2017-05-11T02:29:01Z DEBUG stdout=add aci:
  2922. (targetattr = "cn || createtimestamp || description || entryusn || modifytimestamp || nsds50ruv || nsds5beginreplicarefresh || nsds5debugreplicatimeout || nsds5flags || nsds5replicaabortcleanruv || nsds5replicaautoreferral || nsds5replicabackoffmax || nsds5replicabackoffmin || nsds5replicabinddn || nsds5replicabindmethod || nsds5replicabusywaittime || nsds5replicachangecount || nsds5replicachangessentsincestartup || nsds5replicacleanruv || nsds5replicacleanruvnotified || nsds5replicacredentials || nsds5replicaenabled || nsds5replicahost || nsds5replicaid || nsds5replicalastinitend || nsds5replicalastinitstart || nsds5replicalastinitstatus || nsds5replicalastupdateend || nsds5replicalastupdatestart || nsds5replicalastupdatestatus || nsds5replicalegacyconsumer || nsds5replicaname || nsds5replicaport || nsds5replicaprotocoltimeout || nsds5replicapurgedelay || nsds5replicareferral || nsds5replicaroot || nsds5replicasessionpausetime || nsds5replicastripattrs || nsds5replicatedattributelist || nsds5replicatedattributelisttotal || nsds5replicatimeout || nsds5replicatombstonepurgeinterval || nsds5replicatransportinfo || nsds5replicatype || nsds5replicaupdateinprogress || nsds5replicaupdateschedule || nsds5task || nsds7directoryreplicasubtree || nsds7dirsynccookie || nsds7newwingroupsyncenabled || nsds7newwinusersyncenabled || nsds7windowsdomain || nsds7windowsreplicasubtree || nsruvreplicalastmodified || nsstate || objectclass || onewaysync || winsyncdirectoryfilter || winsyncinterval || winsyncmoveaction || winsyncsubtreepair || winsyncwindowsfilter")(targetfilter = "(|(objectclass=nsds5Replica)(objectclass=nsds5replicationagreement)(objectclass=nsDSWindowsReplicationAgreement)(objectClass=nsMappingTree))")(version 3.0;acl "permission:Read Replication Agreements";allow (compare,read,search) groupdn = "ldap:///cn=Read Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2923. modifying entry "cn=mapping tree,cn=config"
  2924. modify complete
  2925.  
  2926. add aci:
  2927. (targetattr=*)(version 3.0;acl "permission:Add Replication Agreements";allow (add) groupdn = "ldap:///cn=Add Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2928. modifying entry "cn=mapping tree,cn=config"
  2929. modify complete
  2930.  
  2931. add aci:
  2932. (targetattr=*)(targetfilter="(|(objectclass=nsds5Replica)(objectclass=nsds5replicationagreement)(objectclass=nsDSWindowsReplicationAgreement)(objectClass=nsMappingTree))")(version 3.0; acl "permission:Modify Replication Agreements"; allow (read, write, search) groupdn = "ldap:///cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2933. modifying entry "cn=mapping tree,cn=config"
  2934. modify complete
  2935.  
  2936. add aci:
  2937. (targetattr=*)(targetfilter="(|(objectclass=nsds5replicationagreement)(objectclass=nsDSWindowsReplicationAgreement))")(version 3.0;acl "permission:Remove Replication Agreements";allow (delete) groupdn = "ldap:///cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2938. modifying entry "cn=mapping tree,cn=config"
  2939. modify complete
  2940.  
  2941. add aci:
  2942. (targetattr=dnaNextRange || dnaNextValue || dnaMaxValue)(version 3.0;acl "permission:Modify DNA Range";allow (write) groupdn = "ldap:///cn=Modify DNA Range,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2943. modifying entry "cn=Posix IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config"
  2944. modify complete
  2945.  
  2946. add aci:
  2947. (targetattr=nsslapd-readonly)(version 3.0; acl "Allow marking the database readonly"; allow (write) groupdn = "ldap:///cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2948. modifying entry "cn=userRoot,cn=ldbm database,cn=plugins,cn=config"
  2949. modify complete
  2950.  
  2951. add aci:
  2952. (targetattr=*)(version 3.0; acl "Run tasks after replica re-initialization"; allow (add) groupdn = "ldap:///cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=rdlg,dc=net";)
  2953. modifying entry "cn=tasks,cn=config"
  2954. modify complete
  2955.  
  2956.  
  2957. 2017-05-11T02:29:01Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  2958.  
  2959. 2017-05-11T02:29:01Z DEBUG duration: 0 seconds
  2960. 2017-05-11T02:29:01Z DEBUG [43/47]: enabling compatibility plugin
  2961. 2017-05-11T02:29:01Z DEBUG importing all plugin modules in ipaserver.plugins...
  2962. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.aci
  2963. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.automember
  2964. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.automount
  2965. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.baseldap
  2966. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.baseldap is not a valid plugin module
  2967. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.baseuser
  2968. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.batch
  2969. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.ca
  2970. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.caacl
  2971. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.cert
  2972. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.certprofile
  2973. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.config
  2974. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.delegation
  2975. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.dns
  2976. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.dnsserver
  2977. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.dogtag
  2978. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.domainlevel
  2979. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.group
  2980. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hbac
  2981. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.hbac is not a valid plugin module
  2982. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hbacrule
  2983. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hbacsvc
  2984. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hbacsvcgroup
  2985. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hbactest
  2986. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.host
  2987. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.hostgroup
  2988. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.idrange
  2989. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.idviews
  2990. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.internal
  2991. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.join
  2992. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.krbtpolicy
  2993. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.ldap2
  2994. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.location
  2995. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.migration
  2996. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.misc
  2997. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.netgroup
  2998. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.otp
  2999. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.otp is not a valid plugin module
  3000. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.otpconfig
  3001. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.otptoken
  3002. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.passwd
  3003. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.permission
  3004. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.ping
  3005. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.pkinit
  3006. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.pkinit is not a valid plugin module
  3007. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.privilege
  3008. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.pwpolicy
  3009. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.rabase
  3010. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.rabase is not a valid plugin module
  3011. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.radiusproxy
  3012. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.realmdomains
  3013. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.role
  3014. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.schema
  3015. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.selfservice
  3016. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.selinuxusermap
  3017. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.server
  3018. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.serverrole
  3019. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.serverroles
  3020. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.service
  3021. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.servicedelegation
  3022. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.session
  3023. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.stageuser
  3024. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.sudo
  3025. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.sudo is not a valid plugin module
  3026. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.sudocmd
  3027. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.sudocmdgroup
  3028. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.sudorule
  3029. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.topology
  3030. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.trust
  3031. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.user
  3032. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.vault
  3033. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.virtual
  3034. 2017-05-11T02:29:01Z DEBUG ipaserver.plugins.virtual is not a valid plugin module
  3035. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.plugins.xmlserver
  3036. 2017-05-11T02:29:01Z DEBUG importing all plugin modules in ipaserver.install.plugins...
  3037. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.adtrust
  3038. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.ca_renewal_master
  3039. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.dns
  3040. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.fix_replica_agreements
  3041. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.rename_managed
  3042. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_ca_topology
  3043. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_idranges
  3044. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_managed_permissions
  3045. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_nis
  3046. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_pacs
  3047. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_passsync
  3048. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_referint
  3049. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_services
  3050. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.update_uniqueness
  3051. 2017-05-11T02:29:01Z DEBUG importing plugin module ipaserver.install.plugins.upload_cacrt
  3052. 2017-05-11T02:29:02Z DEBUG Created connection context.ldap2_89920016
  3053. 2017-05-11T02:29:02Z DEBUG Destroyed connection context.ldap2_89920016
  3054. 2017-05-11T02:29:02Z DEBUG Created connection context.ldap2_89920016
  3055. 2017-05-11T02:29:02Z DEBUG Parsing update file '/usr/share/ipa/schema_compat.uldif'
  3056. 2017-05-11T02:29:02Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  3057. 2017-05-11T02:29:02Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x716bcf8>
  3058. 2017-05-11T02:29:02Z DEBUG New entry: cn=Schema Compatibility,cn=plugins,cn=config
  3059. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3060. 2017-05-11T02:29:02Z DEBUG Initial value
  3061. 2017-05-11T02:29:02Z DEBUG dn: cn=Schema Compatibility,cn=plugins,cn=config
  3062. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginid:
  3063. 2017-05-11T02:29:02Z DEBUG schema-compat-plugin
  3064. 2017-05-11T02:29:02Z DEBUG cn:
  3065. 2017-05-11T02:29:02Z DEBUG Schema Compatibility
  3066. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginbetxn:
  3067. 2017-05-11T02:29:02Z DEBUG on
  3068. 2017-05-11T02:29:02Z DEBUG objectclass:
  3069. 2017-05-11T02:29:02Z DEBUG top
  3070. 2017-05-11T02:29:02Z DEBUG nsSlapdPlugin
  3071. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3072. 2017-05-11T02:29:02Z DEBUG nsslapd-plugindescription:
  3073. 2017-05-11T02:29:02Z DEBUG Schema Compatibility Plugin
  3074. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginenabled:
  3075. 2017-05-11T02:29:02Z DEBUG on
  3076. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginpath:
  3077. 2017-05-11T02:29:02Z DEBUG /usr/lib64/dirsrv/plugins/schemacompat-plugin.so
  3078. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginversion:
  3079. 2017-05-11T02:29:02Z DEBUG 0.8
  3080. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginvendor:
  3081. 2017-05-11T02:29:02Z DEBUG redhat.com
  3082. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginprecedence:
  3083. 2017-05-11T02:29:02Z DEBUG 40
  3084. 2017-05-11T02:29:02Z DEBUG nsslapd-plugintype:
  3085. 2017-05-11T02:29:02Z DEBUG object
  3086. 2017-05-11T02:29:02Z DEBUG nsslapd-plugininitfunc:
  3087. 2017-05-11T02:29:02Z DEBUG schema_compat_plugin_init
  3088. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3089. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3090. 2017-05-11T02:29:02Z DEBUG dn: cn=Schema Compatibility,cn=plugins,cn=config
  3091. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginid:
  3092. 2017-05-11T02:29:02Z DEBUG schema-compat-plugin
  3093. 2017-05-11T02:29:02Z DEBUG cn:
  3094. 2017-05-11T02:29:02Z DEBUG Schema Compatibility
  3095. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginbetxn:
  3096. 2017-05-11T02:29:02Z DEBUG on
  3097. 2017-05-11T02:29:02Z DEBUG objectclass:
  3098. 2017-05-11T02:29:02Z DEBUG top
  3099. 2017-05-11T02:29:02Z DEBUG nsSlapdPlugin
  3100. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3101. 2017-05-11T02:29:02Z DEBUG nsslapd-plugindescription:
  3102. 2017-05-11T02:29:02Z DEBUG Schema Compatibility Plugin
  3103. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginenabled:
  3104. 2017-05-11T02:29:02Z DEBUG on
  3105. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginpath:
  3106. 2017-05-11T02:29:02Z DEBUG /usr/lib64/dirsrv/plugins/schemacompat-plugin.so
  3107. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginversion:
  3108. 2017-05-11T02:29:02Z DEBUG 0.8
  3109. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginvendor:
  3110. 2017-05-11T02:29:02Z DEBUG redhat.com
  3111. 2017-05-11T02:29:02Z DEBUG nsslapd-pluginprecedence:
  3112. 2017-05-11T02:29:02Z DEBUG 40
  3113. 2017-05-11T02:29:02Z DEBUG nsslapd-plugintype:
  3114. 2017-05-11T02:29:02Z DEBUG object
  3115. 2017-05-11T02:29:02Z DEBUG nsslapd-plugininitfunc:
  3116. 2017-05-11T02:29:02Z DEBUG schema_compat_plugin_init
  3117. 2017-05-11T02:29:02Z DEBUG New entry: cn=users,cn=Schema Compatibility,cn=plugins,cn=config
  3118. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3119. 2017-05-11T02:29:02Z DEBUG Initial value
  3120. 2017-05-11T02:29:02Z DEBUG dn: cn=users,cn=Schema Compatibility,cn=plugins,cn=config
  3121. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3122. 2017-05-11T02:29:02Z DEBUG %ifeq("ipaanchoruuid","%{ipaanchoruuid}","objectclass=ipaOverrideTarget","")
  3123. 2017-05-11T02:29:02Z DEBUG cn=%{cn}
  3124. 2017-05-11T02:29:02Z DEBUG objectclass=posixAccount
  3125. 2017-05-11T02:29:02Z DEBUG gidNumber=%{gidNumber}
  3126. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","ipaanchoruuid=:IPA:rdlg.net:%{ipauniqueid}","")
  3127. 2017-05-11T02:29:02Z DEBUG gecos=%{cn}
  3128. 2017-05-11T02:29:02Z DEBUG ipaanchoruuid=%{ipaanchoruuid}
  3129. 2017-05-11T02:29:02Z DEBUG uidNumber=%{uidNumber}
  3130. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","objectclass=ipaOverrideTarget","")
  3131. 2017-05-11T02:29:02Z DEBUG loginShell=%{loginShell}
  3132. 2017-05-11T02:29:02Z DEBUG homeDirectory=%{homeDirectory}
  3133. 2017-05-11T02:29:02Z DEBUG cn:
  3134. 2017-05-11T02:29:02Z DEBUG users
  3135. 2017-05-11T02:29:02Z DEBUG objectClass:
  3136. 2017-05-11T02:29:02Z DEBUG top
  3137. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3138. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3139. 2017-05-11T02:29:02Z DEBUG objectclass=posixAccount
  3140. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3141. 2017-05-11T02:29:02Z DEBUG cn=users
  3142. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3143. 2017-05-11T02:29:02Z DEBUG uid=%{uid}
  3144. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3145. 2017-05-11T02:29:02Z DEBUG cn=users, cn=accounts, dc=rdlg,dc=net
  3146. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3147. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3148. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3149. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3150. 2017-05-11T02:29:02Z DEBUG dn: cn=users,cn=Schema Compatibility,cn=plugins,cn=config
  3151. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3152. 2017-05-11T02:29:02Z DEBUG %ifeq("ipaanchoruuid","%{ipaanchoruuid}","objectclass=ipaOverrideTarget","")
  3153. 2017-05-11T02:29:02Z DEBUG cn=%{cn}
  3154. 2017-05-11T02:29:02Z DEBUG objectclass=posixAccount
  3155. 2017-05-11T02:29:02Z DEBUG gidNumber=%{gidNumber}
  3156. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","ipaanchoruuid=:IPA:rdlg.net:%{ipauniqueid}","")
  3157. 2017-05-11T02:29:02Z DEBUG gecos=%{cn}
  3158. 2017-05-11T02:29:02Z DEBUG ipaanchoruuid=%{ipaanchoruuid}
  3159. 2017-05-11T02:29:02Z DEBUG uidNumber=%{uidNumber}
  3160. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","objectclass=ipaOverrideTarget","")
  3161. 2017-05-11T02:29:02Z DEBUG loginShell=%{loginShell}
  3162. 2017-05-11T02:29:02Z DEBUG homeDirectory=%{homeDirectory}
  3163. 2017-05-11T02:29:02Z DEBUG cn:
  3164. 2017-05-11T02:29:02Z DEBUG users
  3165. 2017-05-11T02:29:02Z DEBUG objectClass:
  3166. 2017-05-11T02:29:02Z DEBUG top
  3167. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3168. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3169. 2017-05-11T02:29:02Z DEBUG objectclass=posixAccount
  3170. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3171. 2017-05-11T02:29:02Z DEBUG cn=users
  3172. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3173. 2017-05-11T02:29:02Z DEBUG uid=%{uid}
  3174. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3175. 2017-05-11T02:29:02Z DEBUG cn=users, cn=accounts, dc=rdlg,dc=net
  3176. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3177. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3178. 2017-05-11T02:29:02Z DEBUG New entry: cn=groups,cn=Schema Compatibility,cn=plugins,cn=config
  3179. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3180. 2017-05-11T02:29:02Z DEBUG Initial value
  3181. 2017-05-11T02:29:02Z DEBUG dn: cn=groups,cn=Schema Compatibility,cn=plugins,cn=config
  3182. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3183. 2017-05-11T02:29:02Z DEBUG %ifeq("ipaanchoruuid","%{ipaanchoruuid}","objectclass=ipaOverrideTarget","")
  3184. 2017-05-11T02:29:02Z DEBUG gidNumber=%{gidNumber}
  3185. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","ipaanchoruuid=:IPA:rdlg.net:%{ipauniqueid}","")
  3186. 2017-05-11T02:29:02Z DEBUG memberUid=%deref_r("member","uid")
  3187. 2017-05-11T02:29:02Z DEBUG objectclass=posixGroup
  3188. 2017-05-11T02:29:02Z DEBUG memberUid=%{memberUid}
  3189. 2017-05-11T02:29:02Z DEBUG ipaanchoruuid=%{ipaanchoruuid}
  3190. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","objectclass=ipaOverrideTarget","")
  3191. 2017-05-11T02:29:02Z DEBUG cn:
  3192. 2017-05-11T02:29:02Z DEBUG groups
  3193. 2017-05-11T02:29:02Z DEBUG objectClass:
  3194. 2017-05-11T02:29:02Z DEBUG top
  3195. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3196. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3197. 2017-05-11T02:29:02Z DEBUG objectclass=posixGroup
  3198. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3199. 2017-05-11T02:29:02Z DEBUG cn=groups
  3200. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3201. 2017-05-11T02:29:02Z DEBUG cn=%{cn}
  3202. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3203. 2017-05-11T02:29:02Z DEBUG cn=groups, cn=accounts, dc=rdlg,dc=net
  3204. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3205. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3206. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3207. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3208. 2017-05-11T02:29:02Z DEBUG dn: cn=groups,cn=Schema Compatibility,cn=plugins,cn=config
  3209. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3210. 2017-05-11T02:29:02Z DEBUG %ifeq("ipaanchoruuid","%{ipaanchoruuid}","objectclass=ipaOverrideTarget","")
  3211. 2017-05-11T02:29:02Z DEBUG gidNumber=%{gidNumber}
  3212. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","ipaanchoruuid=:IPA:rdlg.net:%{ipauniqueid}","")
  3213. 2017-05-11T02:29:02Z DEBUG memberUid=%deref_r("member","uid")
  3214. 2017-05-11T02:29:02Z DEBUG objectclass=posixGroup
  3215. 2017-05-11T02:29:02Z DEBUG memberUid=%{memberUid}
  3216. 2017-05-11T02:29:02Z DEBUG ipaanchoruuid=%{ipaanchoruuid}
  3217. 2017-05-11T02:29:02Z DEBUG %ifeq("ipauniqueid","%{ipauniqueid}","objectclass=ipaOverrideTarget","")
  3218. 2017-05-11T02:29:02Z DEBUG cn:
  3219. 2017-05-11T02:29:02Z DEBUG groups
  3220. 2017-05-11T02:29:02Z DEBUG objectClass:
  3221. 2017-05-11T02:29:02Z DEBUG top
  3222. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3223. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3224. 2017-05-11T02:29:02Z DEBUG objectclass=posixGroup
  3225. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3226. 2017-05-11T02:29:02Z DEBUG cn=groups
  3227. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3228. 2017-05-11T02:29:02Z DEBUG cn=%{cn}
  3229. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3230. 2017-05-11T02:29:02Z DEBUG cn=groups, cn=accounts, dc=rdlg,dc=net
  3231. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3232. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3233. 2017-05-11T02:29:02Z DEBUG New entry: cn=ng,cn=Schema Compatibility,cn=plugins,cn=config
  3234. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3235. 2017-05-11T02:29:02Z DEBUG Initial value
  3236. 2017-05-11T02:29:02Z DEBUG dn: cn=ng,cn=Schema Compatibility,cn=plugins,cn=config
  3237. 2017-05-11T02:29:02Z DEBUG add: 'top' to objectClass, current value []
  3238. 2017-05-11T02:29:02Z DEBUG add: updated value ['top']
  3239. 2017-05-11T02:29:02Z DEBUG add: 'extensibleObject' to objectClass, current value ['top']
  3240. 2017-05-11T02:29:02Z DEBUG add: updated value ['top', 'extensibleObject']
  3241. 2017-05-11T02:29:02Z DEBUG add: 'ng' to cn, current value []
  3242. 2017-05-11T02:29:02Z DEBUG add: updated value ['ng']
  3243. 2017-05-11T02:29:02Z DEBUG add: 'cn=compat, dc=rdlg,dc=net' to schema-compat-container-group, current value []
  3244. 2017-05-11T02:29:02Z DEBUG add: updated value ['cn=compat, dc=rdlg,dc=net']
  3245. 2017-05-11T02:29:02Z DEBUG add: 'cn=ng' to schema-compat-container-rdn, current value []
  3246. 2017-05-11T02:29:02Z DEBUG add: updated value ['cn=ng']
  3247. 2017-05-11T02:29:02Z DEBUG add: 'yes' to schema-compat-check-access, current value []
  3248. 2017-05-11T02:29:02Z DEBUG add: updated value ['yes']
  3249. 2017-05-11T02:29:02Z DEBUG add: 'cn=ng, cn=alt, dc=rdlg,dc=net' to schema-compat-search-base, current value []
  3250. 2017-05-11T02:29:02Z DEBUG add: updated value ['cn=ng, cn=alt, dc=rdlg,dc=net']
  3251. 2017-05-11T02:29:02Z DEBUG add: '(objectclass=ipaNisNetgroup)' to schema-compat-search-filter, current value []
  3252. 2017-05-11T02:29:02Z DEBUG add: updated value ['(objectclass=ipaNisNetgroup)']
  3253. 2017-05-11T02:29:02Z DEBUG add: 'cn=%{cn}' to schema-compat-entry-rdn, current value []
  3254. 2017-05-11T02:29:02Z DEBUG add: updated value ['cn=%{cn}']
  3255. 2017-05-11T02:29:02Z DEBUG add: 'objectclass=nisNetgroup' to schema-compat-entry-attribute, current value []
  3256. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=nisNetgroup']
  3257. 2017-05-11T02:29:02Z DEBUG add: 'memberNisNetgroup=%deref_r("member","cn")' to schema-compat-entry-attribute, current value ['objectclass=nisNetgroup']
  3258. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=nisNetgroup', 'memberNisNetgroup=%deref_r("member","cn")']
  3259. 2017-05-11T02:29:02Z DEBUG add: 'nisNetgroupTriple=(%link("%ifeq(\"hostCategory\",\"all\",\"\",\"%collect(\\\"%{externalHost}\\\",\\\"%deref(\\\\\\\"memberHost\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"member\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"memberHost\\\\\\\",\\\\\\\"member\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\")\")","-",",","%ifeq(\"userCategory\",\"all\",\"\",\"%collect(\\\"%deref(\\\\\\\"memberUser\\\\\\\",\\\\\\\"uid\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"member\\\\\\\",\\\\\\\"uid\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"memberUser\\\\\\\",\\\\\\\"member\\\\\\\",\\\\\\\"uid\\\\\\\")\\\")\")","-"),%{nisDomainName:-})' to schema-compat-entry-attribute, current value ['memberNisNetgroup=%deref_r("member","cn")', 'objectclass=nisNetgroup']
  3260. 2017-05-11T02:29:02Z DEBUG add: updated value ['memberNisNetgroup=%deref_r("member","cn")', 'objectclass=nisNetgroup', 'nisNetgroupTriple=(%link("%ifeq(\\"hostCategory\\",\\"all\\",\\"\\",\\"%collect(\\\\\\"%{externalHost}\\\\\\",\\\\\\"%deref(\\\\\\\\\\\\\\"memberHost\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"fqdn\\\\\\\\\\\\\\")\\\\\\",\\\\\\"%deref_r(\\\\\\\\\\\\\\"member\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"fqdn\\\\\\\\\\\\\\")\\\\\\",\\\\\\"%deref_r(\\\\\\\\\\\\\\"memberHost\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"member\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"fqdn\\\\\\\\\\\\\\")\\\\\\")\\")","-",",","%ifeq(\\"userCategory\\",\\"all\\",\\"\\",\\"%collect(\\\\\\"%deref(\\\\\\\\\\\\\\"memberUser\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"uid\\\\\\\\\\\\\\")\\\\\\",\\\\\\"%deref_r(\\\\\\\\\\\\\\"member\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"uid\\\\\\\\\\\\\\")\\\\\\",\\\\\\"%deref_r(\\\\\\\\\\\\\\"memberUser\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"member\\\\\\\\\\\\\\",\\\\\\\\\\\\\\"uid\\\\\\\\\\\\\\")\\\\\\")\\")","-"),%{nisDomainName:-})']
  3261. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3262. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3263. 2017-05-11T02:29:02Z DEBUG dn: cn=ng,cn=Schema Compatibility,cn=plugins,cn=config
  3264. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3265. 2017-05-11T02:29:02Z DEBUG memberNisNetgroup=%deref_r("member","cn")
  3266. 2017-05-11T02:29:02Z DEBUG objectclass=nisNetgroup
  3267. 2017-05-11T02:29:02Z DEBUG nisNetgroupTriple=(%link("%ifeq(\"hostCategory\",\"all\",\"\",\"%collect(\\\"%{externalHost}\\\",\\\"%deref(\\\\\\\"memberHost\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"member\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"memberHost\\\\\\\",\\\\\\\"member\\\\\\\",\\\\\\\"fqdn\\\\\\\")\\\")\")","-",",","%ifeq(\"userCategory\",\"all\",\"\",\"%collect(\\\"%deref(\\\\\\\"memberUser\\\\\\\",\\\\\\\"uid\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"member\\\\\\\",\\\\\\\"uid\\\\\\\")\\\",\\\"%deref_r(\\\\\\\"memberUser\\\\\\\",\\\\\\\"member\\\\\\\",\\\\\\\"uid\\\\\\\")\\\")\")","-"),%{nisDomainName:-})
  3268. 2017-05-11T02:29:02Z DEBUG schema-compat-check-access:
  3269. 2017-05-11T02:29:02Z DEBUG yes
  3270. 2017-05-11T02:29:02Z DEBUG cn:
  3271. 2017-05-11T02:29:02Z DEBUG ng
  3272. 2017-05-11T02:29:02Z DEBUG objectClass:
  3273. 2017-05-11T02:29:02Z DEBUG top
  3274. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3275. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3276. 2017-05-11T02:29:02Z DEBUG (objectclass=ipaNisNetgroup)
  3277. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3278. 2017-05-11T02:29:02Z DEBUG cn=ng
  3279. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3280. 2017-05-11T02:29:02Z DEBUG cn=%{cn}
  3281. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3282. 2017-05-11T02:29:02Z DEBUG cn=ng, cn=alt, dc=rdlg,dc=net
  3283. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3284. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3285. 2017-05-11T02:29:02Z DEBUG New entry: cn=sudoers,cn=Schema Compatibility,cn=plugins,cn=config
  3286. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3287. 2017-05-11T02:29:02Z DEBUG Initial value
  3288. 2017-05-11T02:29:02Z DEBUG dn: cn=sudoers,cn=Schema Compatibility,cn=plugins,cn=config
  3289. 2017-05-11T02:29:02Z DEBUG add: 'top' to objectClass, current value []
  3290. 2017-05-11T02:29:02Z DEBUG add: updated value ['top']
  3291. 2017-05-11T02:29:02Z DEBUG add: 'extensibleObject' to objectClass, current value ['top']
  3292. 2017-05-11T02:29:02Z DEBUG add: updated value ['top', 'extensibleObject']
  3293. 2017-05-11T02:29:02Z DEBUG add: 'sudoers' to cn, current value []
  3294. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoers']
  3295. 2017-05-11T02:29:02Z DEBUG add: 'ou=SUDOers, dc=rdlg,dc=net' to schema-compat-container-group, current value []
  3296. 2017-05-11T02:29:02Z DEBUG add: updated value ['ou=SUDOers, dc=rdlg,dc=net']
  3297. 2017-05-11T02:29:02Z DEBUG add: 'cn=sudorules, cn=sudo, dc=rdlg,dc=net' to schema-compat-search-base, current value []
  3298. 2017-05-11T02:29:02Z DEBUG add: updated value ['cn=sudorules, cn=sudo, dc=rdlg,dc=net']
  3299. 2017-05-11T02:29:02Z DEBUG add: '(&(objectclass=ipaSudoRule)(!(compatVisible=FALSE))(!(ipaEnabledFlag=FALSE)))' to schema-compat-search-filter, current value []
  3300. 2017-05-11T02:29:02Z DEBUG add: updated value ['(&(objectclass=ipaSudoRule)(!(compatVisible=FALSE))(!(ipaEnabledFlag=FALSE)))']
  3301. 2017-05-11T02:29:02Z DEBUG add: '%ifeq("ipaEnabledFlag", "FALSE", "DISABLED", "cn=%{cn}")' to schema-compat-entry-rdn, current value []
  3302. 2017-05-11T02:29:02Z DEBUG add: updated value ['%ifeq("ipaEnabledFlag", "FALSE", "DISABLED", "cn=%{cn}")']
  3303. 2017-05-11T02:29:02Z DEBUG add: 'objectclass=sudoRole' to schema-compat-entry-attribute, current value []
  3304. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=sudoRole']
  3305. 2017-05-11T02:29:02Z DEBUG add: 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")' to schema-compat-entry-attribute, current value ['objectclass=sudoRole']
  3306. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")']
  3307. 2017-05-11T02:29:02Z DEBUG add: 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\"memberUser\",\"(objectclass=posixAccount)\",\"uid\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole']
  3308. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")']
  3309. 2017-05-11T02:29:02Z DEBUG add: 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\"memberUser\",\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\",\"member\",\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\",\"uid\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")']
  3310. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")']
  3311. 2017-05-11T02:29:02Z DEBUG add: 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\"memberUser\",\"(objectclass=posixGroup)\",\"cn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")']
  3312. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")']
  3313. 2017-05-11T02:29:02Z DEBUG add: 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\"memberUser\",\"(objectclass=ipaNisNetgroup)\",\"cn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")']
  3314. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")']
  3315. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole']
  3316. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")']
  3317. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\"memberHost\",\"(objectclass=ipaHost)\",\"fqdn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole']
  3318. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")']
  3319. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\"memberHost\",\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\",\"member\",\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\",\"fqdn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole']
  3320. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")']
  3321. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\"memberHost\",\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\",\"cn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole']
  3322. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")']
  3323. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\"memberHost\",\"(objectclass=ipaNisNetgroup)\",\"cn\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole']
  3324. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")']
  3325. 2017-05-11T02:29:02Z DEBUG add: 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole']
  3326. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")']
  3327. 2017-05-11T02:29:02Z DEBUG add: 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\"memberAllowCmd\",\"sudoCmd\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole']
  3328. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")']
  3329. 2017-05-11T02:29:02Z DEBUG add: 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\"memberAllowCmd\",\"member\",\"sudoCmd\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole']
  3330. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")']
  3331. 2017-05-11T02:29:02Z DEBUG add: 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")']
  3332. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")']
  3333. 2017-05-11T02:29:02Z DEBUG add: 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")']
  3334. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")']
  3335. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")']
  3336. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")']
  3337. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")']
  3338. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")']
  3339. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\"ipaSudoRunAs\",\"(objectclass=posixAccount)\",\"uid\")")' to schema-compat-entry-attribute, current value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")']
  3340. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'objectclass=sudoRole', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")']
  3341. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\"ipaSudoRunAs\",\"(objectclass=posixGroup)\",\"cn\")")' to schema-compat-entry-attribute, current value ['objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")']
  3342. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")']
  3343. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")' to schema-compat-entry-attribute, current value ['objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")']
  3344. 2017-05-11T02:29:02Z DEBUG add: updated value ['objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")']
  3345. 2017-05-11T02:29:02Z DEBUG add: 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%deref_f(\"ipaSudoRunAsGroup\",\"(objectclass=posixGroup)\",\"cn\")")' to schema-compat-entry-attribute, current value ['sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")']
  3346. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%deref_f(\\"ipaSudoRunAsGroup\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")']
  3347. 2017-05-11T02:29:02Z DEBUG add: 'sudoOption=%{ipaSudoOpt}' to schema-compat-entry-attribute, current value ['sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%deref_f(\\"ipaSudoRunAsGroup\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")']
  3348. 2017-05-11T02:29:02Z DEBUG add: updated value ['sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")', 'sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\\",\\"member\\",\\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\\",\\"fqdn\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\\"memberUser\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\\",\\"cn\\")")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\\"memberUser\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")', 'sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%deref_f(\\"ipaSudoRunAsGroup\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\\"memberHost\\",\\"(objectclass=ipaHost)\\",\\"fqdn\\")")', 'objectclass=sudoRole', 'sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\\"memberUser\\",\\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\\",\\"member\\",\\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\\",\\"uid\\")")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\\"memberAllowCmd\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixAccount)\\",\\"uid\\")")', 'sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\\"memberUser\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\\"ipaSudoRunAs\\",\\"(objectclass=posixGroup)\\",\\"cn\\")")', 'sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")', 'sudoCommand=!%deref("memberDenyCmd","sudoCmd")', 'sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")', 'sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\\"memberAllowCmd\\",\\"member\\",\\"sudoCmd\\")")', 'sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\\"memberHost\\",\\"(objectclass=ipaNisNetgroup)\\",\\"cn\\")")', 'sudoOption=%{ipaSudoOpt}']
  3349. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3350. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3351. 2017-05-11T02:29:02Z DEBUG dn: cn=sudoers,cn=Schema Compatibility,cn=plugins,cn=config
  3352. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3353. 2017-05-11T02:29:02Z DEBUG sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%{ipaSudoRunAsExtUserGroup}")
  3354. 2017-05-11T02:29:02Z DEBUG sudoUser=%ifeq("userCategory","all","ALL","%{externalUser}")
  3355. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","%deref_rf(\"memberHost\",\"(&(objectclass=ipaHostGroup)(!(objectclass=mepOriginEntry)))\",\"member\",\"(|(objectclass=ipaHostGroup)(objectclass=ipaHost))\",\"fqdn\")")
  3356. 2017-05-11T02:29:02Z DEBUG sudoUser=%ifeq("userCategory","all","ALL","%%%deref_f(\"memberUser\",\"(objectclass=posixGroup)\",\"cn\")")
  3357. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\"memberHost\",\"(&(objectclass=ipaHostGroup)(objectclass=mepOriginEntry))\",\"cn\")")
  3358. 2017-05-11T02:29:02Z DEBUG sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%{ipaSudoRunAsExtGroup}")
  3359. 2017-05-11T02:29:02Z DEBUG sudoUser=%ifeq("userCategory","all","ALL","%deref_f(\"memberUser\",\"(objectclass=posixAccount)\",\"uid\")")
  3360. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","+%deref_f(\"memberHost\",\"(objectclass=ipaNisNetgroup)\",\"cn\")")
  3361. 2017-05-11T02:29:02Z DEBUG sudoRunAsGroup=%ifeq("ipaSudoRunAsGroupCategory","all","ALL","%deref_f(\"ipaSudoRunAsGroup\",\"(objectclass=posixGroup)\",\"cn\")")
  3362. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","%deref_f(\"memberHost\",\"(objectclass=ipaHost)\",\"fqdn\")")
  3363. 2017-05-11T02:29:02Z DEBUG objectclass=sudoRole
  3364. 2017-05-11T02:29:02Z DEBUG sudoOption=%{ipaSudoOpt}
  3365. 2017-05-11T02:29:02Z DEBUG sudoUser=%ifeq("userCategory","all","ALL","%deref_rf(\"memberUser\",\"(&(objectclass=ipaUserGroup)(!(objectclass=posixGroup)))\",\"member\",\"(|(objectclass=ipaUserGroup)(objectclass=posixAccount))\",\"uid\")")
  3366. 2017-05-11T02:29:02Z DEBUG sudoCommand=%ifeq("cmdCategory","all","ALL","%deref(\"memberAllowCmd\",\"sudoCmd\")")
  3367. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","%{hostMask}")
  3368. 2017-05-11T02:29:02Z DEBUG sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%deref_f(\"ipaSudoRunAs\",\"(objectclass=posixAccount)\",\"uid\")")
  3369. 2017-05-11T02:29:02Z DEBUG sudoUser=%ifeq("userCategory","all","ALL","+%deref_f(\"memberUser\",\"(objectclass=ipaNisNetgroup)\",\"cn\")")
  3370. 2017-05-11T02:29:02Z DEBUG sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%%%deref_f(\"ipaSudoRunAs\",\"(objectclass=posixGroup)\",\"cn\")")
  3371. 2017-05-11T02:29:02Z DEBUG sudoRunAsUser=%ifeq("ipaSudoRunAsUserCategory","all","ALL","%{ipaSudoRunAsExtUser}")
  3372. 2017-05-11T02:29:02Z DEBUG sudoCommand=!%deref("memberDenyCmd","sudoCmd")
  3373. 2017-05-11T02:29:02Z DEBUG sudoCommand=!%deref_r("memberDenyCmd","member","sudoCmd")
  3374. 2017-05-11T02:29:02Z DEBUG sudoCommand=%ifeq("cmdCategory","all","ALL","%deref_r(\"memberAllowCmd\",\"member\",\"sudoCmd\")")
  3375. 2017-05-11T02:29:02Z DEBUG sudoHost=%ifeq("hostCategory","all","ALL","%{externalHost}")
  3376. 2017-05-11T02:29:02Z DEBUG cn:
  3377. 2017-05-11T02:29:02Z DEBUG sudoers
  3378. 2017-05-11T02:29:02Z DEBUG objectClass:
  3379. 2017-05-11T02:29:02Z DEBUG top
  3380. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3381. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3382. 2017-05-11T02:29:02Z DEBUG (&(objectclass=ipaSudoRule)(!(compatVisible=FALSE))(!(ipaEnabledFlag=FALSE)))
  3383. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3384. 2017-05-11T02:29:02Z DEBUG %ifeq("ipaEnabledFlag", "FALSE", "DISABLED", "cn=%{cn}")
  3385. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3386. 2017-05-11T02:29:02Z DEBUG cn=sudorules, cn=sudo, dc=rdlg,dc=net
  3387. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3388. 2017-05-11T02:29:02Z DEBUG ou=SUDOers, dc=rdlg,dc=net
  3389. 2017-05-11T02:29:02Z DEBUG New entry: cn=computers,cn=Schema Compatibility,cn=plugins,cn=config
  3390. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3391. 2017-05-11T02:29:02Z DEBUG Initial value
  3392. 2017-05-11T02:29:02Z DEBUG dn: cn=computers,cn=Schema Compatibility,cn=plugins,cn=config
  3393. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3394. 2017-05-11T02:29:02Z DEBUG objectclass=device
  3395. 2017-05-11T02:29:02Z DEBUG cn=%{fqdn}
  3396. 2017-05-11T02:29:02Z DEBUG macAddress=%{macAddress}
  3397. 2017-05-11T02:29:02Z DEBUG objectclass=ieee802Device
  3398. 2017-05-11T02:29:02Z DEBUG cn:
  3399. 2017-05-11T02:29:02Z DEBUG computers
  3400. 2017-05-11T02:29:02Z DEBUG objectClass:
  3401. 2017-05-11T02:29:02Z DEBUG top
  3402. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3403. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3404. 2017-05-11T02:29:02Z DEBUG (&(macAddress=*)(fqdn=*)(objectClass=ipaHost))
  3405. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3406. 2017-05-11T02:29:02Z DEBUG cn=computers
  3407. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3408. 2017-05-11T02:29:02Z DEBUG cn=%first("%{fqdn}")
  3409. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3410. 2017-05-11T02:29:02Z DEBUG cn=computers, cn=accounts, dc=rdlg,dc=net
  3411. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3412. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3413. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3414. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3415. 2017-05-11T02:29:02Z DEBUG dn: cn=computers,cn=Schema Compatibility,cn=plugins,cn=config
  3416. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-attribute:
  3417. 2017-05-11T02:29:02Z DEBUG objectclass=device
  3418. 2017-05-11T02:29:02Z DEBUG cn=%{fqdn}
  3419. 2017-05-11T02:29:02Z DEBUG macAddress=%{macAddress}
  3420. 2017-05-11T02:29:02Z DEBUG objectclass=ieee802Device
  3421. 2017-05-11T02:29:02Z DEBUG cn:
  3422. 2017-05-11T02:29:02Z DEBUG computers
  3423. 2017-05-11T02:29:02Z DEBUG objectClass:
  3424. 2017-05-11T02:29:02Z DEBUG top
  3425. 2017-05-11T02:29:02Z DEBUG extensibleObject
  3426. 2017-05-11T02:29:02Z DEBUG schema-compat-search-filter:
  3427. 2017-05-11T02:29:02Z DEBUG (&(macAddress=*)(fqdn=*)(objectClass=ipaHost))
  3428. 2017-05-11T02:29:02Z DEBUG schema-compat-container-rdn:
  3429. 2017-05-11T02:29:02Z DEBUG cn=computers
  3430. 2017-05-11T02:29:02Z DEBUG schema-compat-entry-rdn:
  3431. 2017-05-11T02:29:02Z DEBUG cn=%first("%{fqdn}")
  3432. 2017-05-11T02:29:02Z DEBUG schema-compat-search-base:
  3433. 2017-05-11T02:29:02Z DEBUG cn=computers, cn=accounts, dc=rdlg,dc=net
  3434. 2017-05-11T02:29:02Z DEBUG schema-compat-container-group:
  3435. 2017-05-11T02:29:02Z DEBUG cn=compat, dc=rdlg,dc=net
  3436. 2017-05-11T02:29:02Z DEBUG Updating existing entry: oid=2.16.840.1.113730.3.4.9,cn=features,cn=config
  3437. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3438. 2017-05-11T02:29:02Z DEBUG Initial value
  3439. 2017-05-11T02:29:02Z DEBUG dn: oid=2.16.840.1.113730.3.4.9,cn=features,cn=config
  3440. 2017-05-11T02:29:02Z DEBUG objectClass:
  3441. 2017-05-11T02:29:02Z DEBUG top
  3442. 2017-05-11T02:29:02Z DEBUG directoryServerFeature
  3443. 2017-05-11T02:29:02Z DEBUG aci:
  3444. 2017-05-11T02:29:02Z DEBUG (targetattr != "aci")(version 3.0; acl "VLV Request Control"; allow( read, search, compare, proxy ) userdn = "ldap:///all";)
  3445. 2017-05-11T02:29:02Z DEBUG oid:
  3446. 2017-05-11T02:29:02Z DEBUG 2.16.840.1.113730.3.4.9
  3447. 2017-05-11T02:29:02Z DEBUG cn:
  3448. 2017-05-11T02:29:02Z DEBUG VLV Request Control
  3449. 2017-05-11T02:29:02Z DEBUG only: set aci to '(targetattr !="aci")(version 3.0; acl "VLV Request Control"; allow (read, search, compare, proxy) userdn = "ldap:///anyone"; )', current value ['(targetattr != "aci")(version 3.0; acl "VLV Request Control"; allow( read, search, compare, proxy ) userdn = "ldap:///all";)']
  3450. 2017-05-11T02:29:02Z DEBUG only: updated value ['(targetattr !="aci")(version 3.0; acl "VLV Request Control"; allow (read, search, compare, proxy) userdn = "ldap:///anyone"; )']
  3451. 2017-05-11T02:29:02Z DEBUG ---------------------------------------------
  3452. 2017-05-11T02:29:02Z DEBUG Final value after applying updates
  3453. 2017-05-11T02:29:02Z DEBUG dn: oid=2.16.840.1.113730.3.4.9,cn=features,cn=config
  3454. 2017-05-11T02:29:02Z DEBUG objectClass:
  3455. 2017-05-11T02:29:02Z DEBUG top
  3456. 2017-05-11T02:29:02Z DEBUG directoryServerFeature
  3457. 2017-05-11T02:29:02Z DEBUG aci:
  3458. 2017-05-11T02:29:02Z DEBUG (targetattr !="aci")(version 3.0; acl "VLV Request Control"; allow (read, search, compare, proxy) userdn = "ldap:///anyone"; )
  3459. 2017-05-11T02:29:02Z DEBUG oid:
  3460. 2017-05-11T02:29:02Z DEBUG 2.16.840.1.113730.3.4.9
  3461. 2017-05-11T02:29:02Z DEBUG cn:
  3462. 2017-05-11T02:29:02Z DEBUG VLV Request Control
  3463. 2017-05-11T02:29:02Z DEBUG [(0, u'aci', ['(targetattr !="aci")(version 3.0; acl "VLV Request Control"; allow (read, search, compare, proxy) userdn = "ldap:///anyone"; )']), (1, u'aci', ['(targetattr != "aci")(version 3.0; acl "VLV Request Control"; allow( read, search, compare, proxy ) userdn = "ldap:///all";)'])]
  3464. 2017-05-11T02:29:02Z DEBUG Updated 1
  3465. 2017-05-11T02:29:02Z DEBUG Done
  3466. 2017-05-11T02:29:02Z DEBUG Destroyed connection context.ldap2_89920016
  3467. 2017-05-11T02:29:02Z DEBUG duration: 1 seconds
  3468. 2017-05-11T02:29:02Z DEBUG [44/47]: activating sidgen plugin
  3469. 2017-05-11T02:29:02Z DEBUG Starting external process
  3470. 2017-05-11T02:29:02Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpcrxD4O -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmpKPxyGP
  3471. 2017-05-11T02:29:02Z DEBUG Process finished, return code=0
  3472. 2017-05-11T02:29:02Z DEBUG stdout=add objectclass:
  3473. top
  3474. nsSlapdPlugin
  3475. extensibleObject
  3476. add cn:
  3477. IPA SIDGEN
  3478. add nsslapd-pluginpath:
  3479. libipa_sidgen
  3480. add nsslapd-plugininitfunc:
  3481. ipa_sidgen_init
  3482. add nsslapd-plugintype:
  3483. postoperation
  3484. add nsslapd-pluginenabled:
  3485. on
  3486. add nsslapd-pluginid:
  3487. ipa_sidgen_postop
  3488. add nsslapd-pluginversion:
  3489. 1.0
  3490. add nsslapd-pluginvendor:
  3491. Red Hat, Inc.
  3492. add nsslapd-plugindescription:
  3493. IPA SIDGEN post operation
  3494. add nsslapd-plugin-depends-on-type:
  3495. database
  3496. add nsslapd-basedn:
  3497. dc=rdlg,dc=net
  3498. adding new entry "cn=IPA SIDGEN,cn=plugins,cn=config"
  3499. modify complete
  3500.  
  3501.  
  3502. 2017-05-11T02:29:02Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  3503.  
  3504. 2017-05-11T02:29:02Z DEBUG duration: 0 seconds
  3505. 2017-05-11T02:29:02Z DEBUG [45/47]: activating extdom plugin
  3506. 2017-05-11T02:29:02Z DEBUG Starting external process
  3507. 2017-05-11T02:29:02Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmprEAnAv -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp2hBUWd
  3508. 2017-05-11T02:29:03Z DEBUG Process finished, return code=0
  3509. 2017-05-11T02:29:03Z DEBUG stdout=add objectclass:
  3510. top
  3511. nsSlapdPlugin
  3512. extensibleObject
  3513. add cn:
  3514. ipa_extdom_extop
  3515. add nsslapd-pluginpath:
  3516. libipa_extdom_extop
  3517. add nsslapd-plugininitfunc:
  3518. ipa_extdom_init
  3519. add nsslapd-plugintype:
  3520. extendedop
  3521. add nsslapd-pluginenabled:
  3522. on
  3523. add nsslapd-pluginid:
  3524. ipa_extdom_extop
  3525. add nsslapd-pluginversion:
  3526. 1.0
  3527. add nsslapd-pluginvendor:
  3528. RedHat
  3529. add nsslapd-plugindescription:
  3530. Support resolving IDs in trusted domains to names and back
  3531. add nsslapd-plugin-depends-on-type:
  3532. database
  3533. add nsslapd-basedn:
  3534. dc=rdlg,dc=net
  3535. adding new entry "cn=ipa_extdom_extop,cn=plugins,cn=config"
  3536. modify complete
  3537.  
  3538.  
  3539. 2017-05-11T02:29:03Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  3540.  
  3541. 2017-05-11T02:29:03Z DEBUG duration: 0 seconds
  3542. 2017-05-11T02:29:03Z DEBUG [46/47]: tuning directory server
  3543. 2017-05-11T02:29:03Z DEBUG Starting external process
  3544. 2017-05-11T02:29:03Z DEBUG args=/usr/sbin/selinuxenabled
  3545. 2017-05-11T02:29:03Z DEBUG Process finished, return code=0
  3546. 2017-05-11T02:29:03Z DEBUG stdout=
  3547. 2017-05-11T02:29:03Z DEBUG stderr=
  3548. 2017-05-11T02:29:03Z DEBUG Starting external process
  3549. 2017-05-11T02:29:03Z DEBUG args=/sbin/restorecon /etc/sysconfig/dirsrv.systemd
  3550. 2017-05-11T02:29:03Z DEBUG Process finished, return code=0
  3551. 2017-05-11T02:29:03Z DEBUG stdout=
  3552. 2017-05-11T02:29:03Z DEBUG stderr=
  3553. 2017-05-11T02:29:03Z DEBUG Starting external process
  3554. 2017-05-11T02:29:03Z DEBUG args=/bin/systemctl --system daemon-reload
  3555. 2017-05-11T02:29:03Z DEBUG Process finished, return code=0
  3556. 2017-05-11T02:29:03Z DEBUG stdout=
  3557. 2017-05-11T02:29:03Z DEBUG stderr=
  3558. 2017-05-11T02:29:03Z DEBUG Starting external process
  3559. 2017-05-11T02:29:03Z DEBUG args=/bin/systemctl --system daemon-reload
  3560. 2017-05-11T02:29:03Z DEBUG Process finished, return code=0
  3561. 2017-05-11T02:29:03Z DEBUG stdout=
  3562. 2017-05-11T02:29:03Z DEBUG stderr=
  3563. 2017-05-11T02:29:03Z DEBUG Starting external process
  3564. 2017-05-11T02:29:03Z DEBUG args=/bin/systemctl restart [email protected]
  3565. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3566. 2017-05-11T02:29:04Z DEBUG stdout=
  3567. 2017-05-11T02:29:04Z DEBUG stderr=
  3568. 2017-05-11T02:29:04Z DEBUG Starting external process
  3569. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl is-active [email protected]
  3570. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3571. 2017-05-11T02:29:04Z DEBUG stdout=active
  3572.  
  3573. 2017-05-11T02:29:04Z DEBUG stderr=
  3574. 2017-05-11T02:29:04Z DEBUG wait_for_open_ports: localhost [389] timeout 300
  3575. 2017-05-11T02:29:04Z DEBUG Starting external process
  3576. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl is-active [email protected]
  3577. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3578. 2017-05-11T02:29:04Z DEBUG stdout=active
  3579.  
  3580. 2017-05-11T02:29:04Z DEBUG stderr=
  3581. 2017-05-11T02:29:04Z DEBUG Starting external process
  3582. 2017-05-11T02:29:04Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpxGj6jQ -H ldap://ipa.rdlg.net:389 -x -D cn=Directory Manager -y /tmp/tmp43ffA4
  3583. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3584. 2017-05-11T02:29:04Z DEBUG stdout=replace nsslapd-maxdescriptors:
  3585. 8192
  3586. replace nsslapd-reservedescriptors:
  3587. 64
  3588. modifying entry "cn=config"
  3589. modify complete
  3590.  
  3591.  
  3592. 2017-05-11T02:29:04Z DEBUG stderr=ldap_initialize( ldap://ipa.rdlg.net:389/??base )
  3593.  
  3594. 2017-05-11T02:29:04Z DEBUG duration: 1 seconds
  3595. 2017-05-11T02:29:04Z DEBUG [47/47]: configuring directory to start on boot
  3596. 2017-05-11T02:29:04Z DEBUG Starting external process
  3597. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl is-enabled [email protected]
  3598. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3599. 2017-05-11T02:29:04Z DEBUG stdout=enabled
  3600.  
  3601. 2017-05-11T02:29:04Z DEBUG stderr=
  3602. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  3603. 2017-05-11T02:29:04Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  3604. 2017-05-11T02:29:04Z DEBUG Starting external process
  3605. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl disable [email protected]
  3606. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3607. 2017-05-11T02:29:04Z DEBUG stdout=
  3608. 2017-05-11T02:29:04Z DEBUG stderr=Removed symlink /etc/systemd/system/dirsrv.target.wants/[email protected].
  3609.  
  3610. 2017-05-11T02:29:04Z DEBUG duration: 0 seconds
  3611. 2017-05-11T02:29:04Z DEBUG Done configuring directory server (dirsrv).
  3612. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  3613. 2017-05-11T02:29:04Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  3614. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  3615. 2017-05-11T02:29:04Z DEBUG Starting external process
  3616. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl is-active ntpd.service
  3617. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3618. 2017-05-11T02:29:04Z DEBUG stdout=active
  3619.  
  3620. 2017-05-11T02:29:04Z DEBUG stderr=
  3621. 2017-05-11T02:29:04Z DEBUG Starting external process
  3622. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl disable ntpd.service
  3623. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3624. 2017-05-11T02:29:04Z DEBUG stdout=
  3625. 2017-05-11T02:29:04Z DEBUG stderr=Removed symlink /etc/systemd/system/multi-user.target.wants/ntpd.service.
  3626.  
  3627. 2017-05-11T02:29:04Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  3628. 2017-05-11T02:29:04Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x34c0ef0>
  3629. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  3630. 2017-05-11T02:29:04Z DEBUG Saving StateFile to '/var/lib/ipa/sysupgrade/sysupgrade.state'
  3631. 2017-05-11T02:29:04Z DEBUG Starting external process
  3632. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl start ntpd.service
  3633. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3634. 2017-05-11T02:29:04Z DEBUG stdout=
  3635. 2017-05-11T02:29:04Z DEBUG stderr=
  3636. 2017-05-11T02:29:04Z DEBUG Starting external process
  3637. 2017-05-11T02:29:04Z DEBUG args=/bin/systemctl is-active ntpd.service
  3638. 2017-05-11T02:29:04Z DEBUG Process finished, return code=0
  3639. 2017-05-11T02:29:04Z DEBUG stdout=active
  3640.  
  3641. 2017-05-11T02:29:04Z DEBUG stderr=
  3642. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  3643. 2017-05-11T02:29:04Z DEBUG Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes 30 seconds
  3644. 2017-05-11T02:29:04Z DEBUG [1/31]: creating certificate server user
  3645. 2017-05-11T02:29:04Z DEBUG group pkiuser exists
  3646. 2017-05-11T02:29:04Z DEBUG user pkiuser exists
  3647. 2017-05-11T02:29:04Z DEBUG duration: 0 seconds
  3648. 2017-05-11T02:29:04Z DEBUG [2/31]: configuring certificate server instance
  3649. 2017-05-11T02:29:04Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  3650. 2017-05-11T02:29:04Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  3651. 2017-05-11T02:29:04Z DEBUG Contents of pkispawn configuration file (/tmp/tmpBfvvBv):
  3652. [CA]
  3653. pki_security_domain_name = IPA
  3654. pki_enable_proxy = True
  3655. pki_restart_configured_instance = False
  3656. pki_backup_keys = True
  3657. pki_backup_password = XXXXXXXX
  3658. pki_profiles_in_ldap = True
  3659. pki_default_ocsp_uri = http://ipa-ca.rdlg.net/ca/ocsp
  3660. pki_client_database_dir = /tmp/tmp-2dhsv2
  3661. pki_client_database_password = XXXXXXXX
  3662. pki_client_database_purge = False
  3663. pki_client_pkcs12_password = XXXXXXXX
  3664. pki_admin_name = admin
  3665. pki_admin_uid = admin
  3666. pki_admin_email = root@localhost
  3667. pki_admin_password = XXXXXXXX
  3668. pki_admin_nickname = ipa-ca-agent
  3669. pki_admin_subject_dn = cn=ipa-ca-agent,O=RDLG.NET
  3670. pki_client_admin_cert_p12 = /root/ca-agent.p12
  3671. pki_ds_ldap_port = 389
  3672. pki_ds_password = XXXXXXXX
  3673. pki_ds_base_dn = o=ipaca
  3674. pki_ds_database = ipaca
  3675. pki_subsystem_subject_dn = cn=CA Subsystem,O=RDLG.NET
  3676. pki_ocsp_signing_subject_dn = cn=OCSP Subsystem,O=RDLG.NET
  3677. pki_ssl_server_subject_dn = cn=ipa.rdlg.net,O=RDLG.NET
  3678. pki_audit_signing_subject_dn = cn=CA Audit,O=RDLG.NET
  3679. pki_ca_signing_subject_dn = cn=Certificate Authority,O=RDLG.NET
  3680. pki_subsystem_nickname = subsystemCert cert-pki-ca
  3681. pki_ocsp_signing_nickname = ocspSigningCert cert-pki-ca
  3682. pki_ssl_server_nickname = Server-Cert cert-pki-ca
  3683. pki_audit_signing_nickname = auditSigningCert cert-pki-ca
  3684. pki_ca_signing_nickname = caSigningCert cert-pki-ca
  3685. pki_ca_signing_key_algorithm = SHA256withRSA
  3686.  
  3687.  
  3688. 2017-05-11T02:29:04Z DEBUG Starting external process
  3689. 2017-05-11T02:29:04Z DEBUG args=/usr/sbin/pkispawn -s CA -f /tmp/tmpBfvvBv
  3690. 2017-05-11T02:30:01Z DEBUG Process finished, return code=0
  3691. 2017-05-11T02:30:01Z DEBUG stdout=Log file: /var/log/pki/pki-ca-spawn.20170510202904.log
  3692. Loading deployment configuration from /tmp/tmpBfvvBv.
  3693. Installing CA into /var/lib/pki/pki-tomcat.
  3694. Storing deployment configuration into /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg.
  3695.  
  3696. ==========================================================================
  3697. INSTALLATION SUMMARY
  3698. ==========================================================================
  3699.  
  3700. Administrator's username: admin
  3701. Administrator's PKCS #12 file:
  3702. /root/ca-agent.p12
  3703.  
  3704. Administrator's certificate nickname:
  3705. ipa-ca-agent
  3706. Administrator's certificate database:
  3707. /tmp/tmp-2dhsv2
  3708.  
  3709. To check the status of the subsystem:
  3710. systemctl status [email protected]
  3711.  
  3712. To restart the subsystem:
  3713. systemctl restart [email protected]
  3714.  
  3715. The URL for the subsystem is:
  3716. https://ipa.rdlg.net:8443/ca
  3717.  
  3718. PKI instances will be enabled upon system boot
  3719.  
  3720. ==========================================================================
  3721.  
  3722.  
  3723. 2017-05-11T02:30:01Z DEBUG stderr=Notice: Trust flag u is set automatically if the private key is present.
  3724. Created symlink from /etc/systemd/system/multi-user.target.wants/pki-tomcatd.target to /usr/lib/systemd/system/pki-tomcatd.target.
  3725.  
  3726. 2017-05-11T02:30:01Z DEBUG completed creating ca instance
  3727. 2017-05-11T02:30:01Z DEBUG duration: 56 seconds
  3728. 2017-05-11T02:30:01Z DEBUG [3/31]: stopping certificate server instance to update CS.cfg
  3729. 2017-05-11T02:30:01Z DEBUG Starting external process
  3730. 2017-05-11T02:30:01Z DEBUG args=/bin/systemctl stop [email protected]
  3731. 2017-05-11T02:30:02Z DEBUG Process finished, return code=0
  3732. 2017-05-11T02:30:02Z DEBUG stdout=
  3733. 2017-05-11T02:30:02Z DEBUG stderr=
  3734. 2017-05-11T02:30:02Z DEBUG duration: 0 seconds
  3735. 2017-05-11T02:30:02Z DEBUG [4/31]: backing up CS.cfg
  3736. 2017-05-11T02:30:02Z DEBUG Starting external process
  3737. 2017-05-11T02:30:02Z DEBUG args=/bin/systemctl is-active [email protected]
  3738. 2017-05-11T02:30:02Z DEBUG Process finished, return code=3
  3739. 2017-05-11T02:30:02Z DEBUG stdout=inactive
  3740.  
  3741. 2017-05-11T02:30:02Z DEBUG stderr=
  3742. 2017-05-11T02:30:02Z DEBUG duration: 0 seconds
  3743. 2017-05-11T02:30:02Z DEBUG [5/31]: disabling nonces
  3744. 2017-05-11T02:30:02Z DEBUG duration: 0 seconds
  3745. 2017-05-11T02:30:02Z DEBUG [6/31]: set up CRL publishing
  3746. 2017-05-11T02:30:02Z DEBUG Starting external process
  3747. 2017-05-11T02:30:02Z DEBUG args=/usr/sbin/selinuxenabled
  3748. 2017-05-11T02:30:02Z DEBUG Process finished, return code=0
  3749. 2017-05-11T02:30:02Z DEBUG stdout=
  3750. 2017-05-11T02:30:02Z DEBUG stderr=
  3751. 2017-05-11T02:30:02Z DEBUG Starting external process
  3752. 2017-05-11T02:30:02Z DEBUG args=/sbin/restorecon /var/lib/ipa/pki-ca/publish
  3753. 2017-05-11T02:30:02Z DEBUG Process finished, return code=0
  3754. 2017-05-11T02:30:02Z DEBUG stdout=
  3755. 2017-05-11T02:30:02Z DEBUG stderr=
  3756. 2017-05-11T02:30:02Z DEBUG duration: 0 seconds
  3757. 2017-05-11T02:30:02Z DEBUG [7/31]: enable PKIX certificate path discovery and validation
  3758. 2017-05-11T02:30:02Z DEBUG duration: 0 seconds
  3759. 2017-05-11T02:30:02Z DEBUG [8/31]: starting certificate server instance
  3760. 2017-05-11T02:30:02Z DEBUG Starting external process
  3761. 2017-05-11T02:30:02Z DEBUG args=/bin/systemctl start [email protected]
  3762. 2017-05-11T02:30:02Z DEBUG Process finished, return code=0
  3763. 2017-05-11T02:30:02Z DEBUG stdout=
  3764. 2017-05-11T02:30:02Z DEBUG stderr=
  3765. 2017-05-11T02:30:02Z DEBUG Starting external process
  3766. 2017-05-11T02:30:02Z DEBUG args=/bin/systemctl is-active [email protected]
  3767. 2017-05-11T02:30:02Z DEBUG Process finished, return code=0
  3768. 2017-05-11T02:30:02Z DEBUG stdout=active
  3769.  
  3770. 2017-05-11T02:30:02Z DEBUG stderr=
  3771. 2017-05-11T02:30:02Z DEBUG wait_for_open_ports: localhost [8080, 8443] timeout 300
  3772. 2017-05-11T02:30:04Z DEBUG Waiting until the CA is running
  3773. 2017-05-11T02:30:04Z DEBUG request POST http://ipa.rdlg.net:8080/ca/admin/ca/getStatus
  3774. 2017-05-11T02:30:04Z DEBUG request body ''
  3775. 2017-05-11T02:30:12Z DEBUG response status 200
  3776. 2017-05-11T02:30:12Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:12 GMT', 'content-length': '170', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  3777. 2017-05-11T02:30:12Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><State>1</State><Type>CA</Type><Status>running</Status><Version>10.3.3-18.el7_3</Version></XMLResponse>'
  3778. 2017-05-11T02:30:12Z DEBUG The CA status is: running
  3779. 2017-05-11T02:30:12Z DEBUG duration: 10 seconds
  3780. 2017-05-11T02:30:12Z DEBUG [9/31]: creating RA agent certificate database
  3781. 2017-05-11T02:30:12Z DEBUG Starting external process
  3782. 2017-05-11T02:30:12Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -f XXXXXXXX -N
  3783. 2017-05-11T02:30:12Z DEBUG Process finished, return code=0
  3784. 2017-05-11T02:30:12Z DEBUG stdout=
  3785. 2017-05-11T02:30:12Z DEBUG stderr=
  3786. 2017-05-11T02:30:12Z DEBUG duration: 0 seconds
  3787. 2017-05-11T02:30:12Z DEBUG [10/31]: importing CA chain to RA certificate database
  3788. 2017-05-11T02:30:12Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  3789. 2017-05-11T02:30:12Z DEBUG Starting external process
  3790. 2017-05-11T02:30:12Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L
  3791. 2017-05-11T02:30:12Z DEBUG Process finished, return code=0
  3792. 2017-05-11T02:30:12Z DEBUG stdout=
  3793. Certificate Nickname Trust Attributes
  3794. SSL,S/MIME,JAR/XPI
  3795.  
  3796.  
  3797. 2017-05-11T02:30:12Z DEBUG stderr=
  3798. 2017-05-11T02:30:12Z DEBUG Starting external process
  3799. 2017-05-11T02:30:12Z DEBUG args=/usr/bin/openssl pkcs7 -inform DER -print_certs
  3800. 2017-05-11T02:30:12Z DEBUG Process finished, return code=0
  3801. 2017-05-11T02:30:12Z DEBUG stdout=subject=/O=RDLG.NET/CN=Certificate Authority
  3802. issuer=/O=RDLG.NET/CN=Certificate Authority
  3803. -----BEGIN CERTIFICATE-----
  3804. MIIDgjCCAmqgAwIBAgIBATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  3805. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  3806. Mjk1NloXDTM3MDUxMTAyMjk1NlowMzERMA8GA1UECgwIUkRMRy5ORVQxHjAcBgNV
  3807. BAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  3808. ADCCAQoCggEBAL7p94qOWxiCMRT+Engmh3SKl6MFWOgXWnYfZYd8DikRR+Lhstl0
  3809. LYHb9OEbJW7VjhHu6TYfAyunXx1i/FWbDQy+5H/qWUZDUPNeg6D7HsJOnWjEpWsf
  3810. 0Y8IR4dqb0nsbvscGZOY6IfxWBvTcoUpb6fATZnjJYJEXKvbwk3Fnedb/yt3Xu4j
  3811. mPa59Ey0M43q2oRtgwZKyxn2Jjqkoze27Q6sdvCeHOlFy3kX5tzoTtmQ1moZlkYY
  3812. a5crBdiZjG+PIv3VocYU2RzA4/r08Cs173Qpe1TLou/4zJ4Ru7qq1gbWHIN0ZDXB
  3813. eO/CGO4iutUTzFZmrKh/eGr5l1EAXEQry+0CAwEAAaOBoDCBnTAfBgNVHSMEGDAW
  3814. gBTKFHJz+E5g4+IfmXy8Iq2YQzXe8zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB
  3815. /wQEAwIBxjAdBgNVHQ4EFgQUyhRyc/hOYOPiH5l8vCKtmEM13vMwOgYIKwYBBQUH
  3816. AQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLnJkbGcubmV0L2NhL29j
  3817. c3AwDQYJKoZIhvcNAQELBQADggEBAAe2GwBcMyjzUn24OAMxBSDmJTr49ByS4+zu
  3818. 7Y7gXVuS5lvMOm+DaM9UZXkQtvPwB3XtOrhX0USUhq1uhDuh2bYfkxKekGPWYyo0
  3819. 1jDpvBp8IQaD9tcAJcc+KcAmdN2hV5r372xhWosMlT+gkqNm1tpQ15kzrHJHgGRy
  3820. 243aRtXVr1RdTCNOm7Qplj5+xXtFyElcSFkrsqvoQrKnp0GY81zw6OmdQaC4GYAv
  3821. uZazc5OlNNpGLDYtN5iT4VR4fIdYkfi174VtNlR1O9ZGZ+on863r9CTUhHmnzz5I
  3822. /EfCR4uOA6jCe2XbGJMVhdZzMFWKH1ddo6WHyuzBQANOuqlAt5E=
  3823. -----END CERTIFICATE-----
  3824.  
  3825.  
  3826. 2017-05-11T02:30:12Z DEBUG stderr=
  3827. 2017-05-11T02:30:12Z DEBUG Starting external process
  3828. 2017-05-11T02:30:12Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -f XXXXXXXX -A -t CT,C,C -n RDLG.NET IPA CA -a -i /tmp/tmpcz6QUn
  3829. 2017-05-11T02:30:12Z DEBUG Process finished, return code=0
  3830. 2017-05-11T02:30:12Z DEBUG stdout=
  3831. 2017-05-11T02:30:12Z DEBUG stderr=
  3832. 2017-05-11T02:30:12Z DEBUG duration: 0 seconds
  3833. 2017-05-11T02:30:12Z DEBUG [11/31]: fixing RA database permissions
  3834. 2017-05-11T02:30:12Z DEBUG duration: 0 seconds
  3835. 2017-05-11T02:30:12Z DEBUG [12/31]: setting up signing cert profile
  3836. 2017-05-11T02:30:12Z DEBUG duration: 0 seconds
  3837. 2017-05-11T02:30:12Z DEBUG [13/31]: setting audit signing renewal to 2 years
  3838. 2017-05-11T02:30:12Z DEBUG caSignedLogCert.cfg profile validity range is 720
  3839. 2017-05-11T02:30:12Z DEBUG duration: 0 seconds
  3840. 2017-05-11T02:30:12Z DEBUG [14/31]: restarting certificate server
  3841. 2017-05-11T02:30:12Z DEBUG Starting external process
  3842. 2017-05-11T02:30:12Z DEBUG args=/bin/systemctl restart [email protected]
  3843. 2017-05-11T02:30:13Z DEBUG Process finished, return code=0
  3844. 2017-05-11T02:30:13Z DEBUG stdout=
  3845. 2017-05-11T02:30:13Z DEBUG stderr=
  3846. 2017-05-11T02:30:13Z DEBUG Starting external process
  3847. 2017-05-11T02:30:13Z DEBUG args=/bin/systemctl is-active [email protected]
  3848. 2017-05-11T02:30:13Z DEBUG Process finished, return code=0
  3849. 2017-05-11T02:30:13Z DEBUG stdout=active
  3850.  
  3851. 2017-05-11T02:30:13Z DEBUG stderr=
  3852. 2017-05-11T02:30:13Z DEBUG wait_for_open_ports: localhost [8080, 8443] timeout 300
  3853. 2017-05-11T02:30:15Z DEBUG Waiting until the CA is running
  3854. 2017-05-11T02:30:15Z DEBUG request POST http://ipa.rdlg.net:8080/ca/admin/ca/getStatus
  3855. 2017-05-11T02:30:15Z DEBUG request body ''
  3856. 2017-05-11T02:30:23Z DEBUG response status 200
  3857. 2017-05-11T02:30:23Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:23 GMT', 'content-length': '170', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  3858. 2017-05-11T02:30:23Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><State>1</State><Type>CA</Type><Status>running</Status><Version>10.3.3-18.el7_3</Version></XMLResponse>'
  3859. 2017-05-11T02:30:23Z DEBUG The CA status is: running
  3860. 2017-05-11T02:30:23Z DEBUG duration: 10 seconds
  3861. 2017-05-11T02:30:23Z DEBUG [15/31]: requesting RA certificate from CA
  3862. 2017-05-11T02:30:23Z DEBUG Starting external process
  3863. 2017-05-11T02:30:23Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -f XXXXXXXX -R -k rsa -g 2048 -s CN=IPA RA,O=RDLG.NET -z /tmp/tmpHaL6YB -a
  3864. 2017-05-11T02:30:23Z DEBUG Process finished, return code=0
  3865. 2017-05-11T02:30:23Z DEBUG stdout=
  3866. Certificate request generated by Netscape certutil
  3867. Phone: (not specified)
  3868.  
  3869. Common Name: IPA RA
  3870. Email: (not specified)
  3871. Organization: RDLG.NET
  3872. State: (not specified)
  3873. Country: (not specified)
  3874.  
  3875. -----BEGIN NEW CERTIFICATE REQUEST-----
  3876. MIICaTCCAVECAQAwJDERMA8GA1UEChMIUkRMRy5ORVQxDzANBgNVBAMTBklQQSBS
  3877. QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMlu5e8Xc+VhRyyy8agF
  3878. WShlsQoyoSUww/uGjgh4vwV6gMFKxaM6US49Y9EdunpJdPgPQLjn98r/bTjapGgb
  3879. Hxz27dVGLEbH6K/eNFRGBhAqGhekCa2/9abQh3TRFJoR5vyhKg5tyVkw+qceyp2p
  3880. xcLS1XfVTmhDILu+0drTA2XBO7oQEwNKuOBfORxYoxo43WA7ijkwz5gz0Wr4LVGW
  3881. Kn+sCtN7nY1Xi+R/B8Z9QkYrRXdg8uk+SbHgSFCadyTvgrD/F/LTFt3rK/P/HCMc
  3882. lK8MSB4uv1ZZSw5XvjLBPzZykalxOPU+KjHxYlNGjUsF2TGo0LwB1FL573wK717+
  3883. Ke0CAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQCcjwvNBRYY9ssiXkZ5DUKluWIz
  3884. 2ppI50X5LNlUAcvWAc5S6ncQ09R/8K/6fSrCb37ur12fhFtgRdrBNvKJudDBBmNu
  3885. JYt3DOGo8dQhyG9Oz3kU0gdOnhCVcAF2bsTcyjKcZk9M/SCRd3QViXApOf+BXw/s
  3886. 4H/LKpqEBeMdEypRIZ3QGDl+fhUBAg7mcvFmgBSodYymAePxc4DAx7O2No9/M4Bj
  3887. Dj7Tr/7hyXWaU/rb1Or30xunW7doxIzO7sfix9PbdQSqVjrBGxrw2xOu+lc4DpAU
  3888. Sre49sLKmW4LEP0+ar/vpg6rWm13bEbG0VtfxQWplUbCz0V8OmB9E4dBPeS1
  3889. -----END NEW CERTIFICATE REQUEST-----
  3890.  
  3891. 2017-05-11T02:30:23Z DEBUG stderr=
  3892.  
  3893. Generating key. This may take a few moments...
  3894.  
  3895.  
  3896. 2017-05-11T02:30:23Z DEBUG duration: 0 seconds
  3897. 2017-05-11T02:30:23Z DEBUG [16/31]: issuing RA agent certificate
  3898. 2017-05-11T02:30:23Z DEBUG Starting external process
  3899. 2017-05-11T02:30:23Z DEBUG args=/usr/bin/certutil -d /tmp/tmp-2dhsv2 -O -n ipa-ca-agent
  3900. 2017-05-11T02:30:23Z DEBUG Process finished, return code=0
  3901. 2017-05-11T02:30:23Z DEBUG stdout="ipa-ca-agent" [CN=ipa-ca-agent,O=RDLG.NET]
  3902.  
  3903.  
  3904. 2017-05-11T02:30:23Z DEBUG stderr=
  3905. 2017-05-11T02:30:23Z DEBUG Starting external process
  3906. 2017-05-11T02:30:23Z DEBUG args=/usr/bin/sslget -v -n ipa-ca-agent -p XXXXXXXX -d /tmp/tmp-2dhsv2 -r /ca/agent/ca/profileReview?requestId=7 ipa.rdlg.net:8443
  3907. 2017-05-11T02:30:24Z DEBUG Process finished, return code=0
  3908. 2017-05-11T02:30:24Z DEBUG stdout=HTTP/1.1 200 OK
  3909. Server: Apache-Coyote/1.1
  3910. Content-Type: text/html;charset=UTF-8
  3911. Date: Thu, 11 May 2017 02:30:23 GMT
  3912. Connection: close
  3913.  
  3914. <!-- --- BEGIN COPYRIGHT BLOCK ---
  3915. This program is free software; you can redistribute it and/or modify
  3916. it under the terms of the GNU General Public License as published by
  3917. the Free Software Foundation; version 2 of the License.
  3918.  
  3919. This program is distributed in the hope that it will be useful,
  3920. but WITHOUT ANY WARRANTY; without even the implied warranty of
  3921. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  3922. GNU General Public License for more details.
  3923.  
  3924. You should have received a copy of the GNU General Public License along
  3925. with this program; if not, write to the Free Software Foundation, Inc.,
  3926. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  3927.  
  3928. Copyright (C) 2007 Red Hat, Inc.
  3929. All rights reserved.
  3930. --- END COPYRIGHT BLOCK --- -->
  3931. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
  3932. <html>
  3933. <script type="text/javascript">
  3934. requestNotes="";
  3935. requestType="enrollment";
  3936. recordSet = new Array;
  3937. record = new Object;
  3938. record.conDesc="This constraint accepts the subject name that matches .*CN=.*";
  3939. record.policyId="1";
  3940. record.defListSet = new Array;
  3941. defList = new Object;
  3942. defList.defId="name";
  3943. defList.defConstraint="null";
  3944. defList.defName="Subject Name";
  3945. defList.defSyntax="string";
  3946. defList.defVal="CN=IPA RA,O=RDLG.NET";
  3947. record.defListSet[0] = defList;
  3948. record.defDesc="This default populates a User-Supplied Certificate Subject Name to the request.";
  3949. recordSet[0] = record;
  3950. record = new Object;
  3951. record.conDesc="This constraint rejects the validity that is not between 720 days.";
  3952. record.policyId="2";
  3953. record.defListSet = new Array;
  3954. defList = new Object;
  3955. defList.defId="notBefore";
  3956. defList.defConstraint="null";
  3957. defList.defName="Not Before";
  3958. defList.defSyntax="string";
  3959. defList.defVal="2017-05-10 20:30:23";
  3960. record.defListSet[0] = defList;
  3961. defList = new Object;
  3962. defList.defId="notAfter";
  3963. defList.defConstraint="null";
  3964. defList.defName="Not After";
  3965. defList.defSyntax="string";
  3966. defList.defVal="2019-04-30 20:30:23";
  3967. record.defListSet[1] = defList;
  3968. record.defDesc="This default populates a Certificate Validity to the request. The default values are Range=720 in days";
  3969. recordSet[1] = record;
  3970. record = new Object;
  3971. record.conDesc="This constraint accepts the key only if Key Type=-, Key Parameters =1024,2048,3072,4096,nistp256,nistp384,nistp521";
  3972. record.policyId="3";
  3973. record.defListSet = new Array;
  3974. defList = new Object;
  3975. defList.defId="TYPE";
  3976. defList.defConstraint="readonly";
  3977. defList.defName="Key Type";
  3978. defList.defSyntax="string";
  3979. defList.defVal="RSA - 1.2.840.113549.1.1.1";
  3980. record.defListSet[0] = defList;
  3981. defList = new Object;
  3982. defList.defId="LEN";
  3983. defList.defConstraint="readonly";
  3984. defList.defName="Key Length";
  3985. defList.defSyntax="string";
  3986. defList.defVal="2048";
  3987. record.defListSet[1] = defList;
  3988. defList = new Object;
  3989. defList.defId="KEY";
  3990. defList.defConstraint="readonly";
  3991. defList.defName="Key";
  3992. defList.defSyntax="string";
  3993. defList.defVal="30:82:01:0A:02:82:01:01:00:C9:6E:E5:EF:17:73:E5:\n61:47:2C:B2:F1:A8:05:59:28:65:B1:0A:32:A1:25:30:\nC3:FB:86:8E:08:78:BF:05:7A:80:C1:4A:C5:A3:3A:51:\n2E:3D:63:D1:1D:BA:7A:49:74:F8:0F:40:B8:E7:F7:CA:\nFF:6D:38:DA:A4:68:1B:1F:1C:F6:ED:D5:46:2C:46:C7:\nE8:AF:DE:34:54:46:06:10:2A:1A:17:A4:09:AD:BF:F5:\nA6:D0:87:74:D1:14:9A:11:E6:FC:A1:2A:0E:6D:C9:59:\n30:FA:A7:1E:CA:9D:A9:C5:C2:D2:D5:77:D5:4E:68:43:\n20:BB:BE:D1:DA:D3:03:65:C1:3B:BA:10:13:03:4A:B8:\nE0:5F:39:1C:58:A3:1A:38:DD:60:3B:8A:39:30:CF:98:\n33:D1:6A:F8:2D:51:96:2A:7F:AC:0A:D3:7B:9D:8D:57:\n8B:E4:7F:07:C6:7D:42:46:2B:45:77:60:F2:E9:3E:49:\nB1:E0:48:50:9A:77:24:EF:82:B0:FF:17:F2:D3:16:DD:\nEB:2B:F3:FF:1C:23:1C:94:AF:0C:48:1E:2E:BF:56:59:\n4B:0E:57:BE:32:C1:3F:36:72:91:A9:71:38:F5:3E:2A:\n31:F1:62:53:46:8D:4B:05:D9:31:A8:D0:BC:01:D4:52:\nF9:EF:7C:0A:EF:5E:FE:29:ED:02:03:01:00:01\n";
  3994. record.defListSet[2] = defList;
  3995. record.defDesc="This default populates a User-Supplied Certificate Key to the request.";
  3996. recordSet[2] = record;
  3997. record = new Object;
  3998. record.conDesc="No Constraint";
  3999. record.policyId="4";
  4000. record.defListSet = new Array;
  4001. defList = new Object;
  4002. defList.defId="critical";
  4003. defList.defConstraint="readonly";
  4004. defList.defName="Criticality";
  4005. defList.defSyntax="string";
  4006. defList.defVal="false";
  4007. record.defListSet[0] = defList;
  4008. defList = new Object;
  4009. defList.defId="keyid";
  4010. defList.defConstraint="readonly";
  4011. defList.defName="Key ID";
  4012. defList.defSyntax="string";
  4013. defList.defVal="CA:14:72:73:F8:4E:60:E3:E2:1F:99:7C:BC:22:AD:98:\n43:35:DE:F3\n";
  4014. record.defListSet[1] = defList;
  4015. record.defDesc="This default populates an Authority Key Identifier Extension (2.5.29.35) to the request.";
  4016. recordSet[3] = record;
  4017. record = new Object;
  4018. record.conDesc="No Constraint";
  4019. record.policyId="5";
  4020. record.defListSet = new Array;
  4021. defList = new Object;
  4022. defList.defId="authInfoAccessCritical";
  4023. defList.defConstraint="null";
  4024. defList.defName="Criticality";
  4025. defList.defSyntax="boolean";
  4026. defList.defVal="false";
  4027. record.defListSet[0] = defList;
  4028. defList = new Object;
  4029. defList.defId="authInfoAccessGeneralNames";
  4030. defList.defConstraint="null";
  4031. defList.defName="General Names";
  4032. defList.defSyntax="string_list";
  4033. defList.defVal="Record #0\r\nMethod:1.3.6.1.5.5.7.48.1\r\nLocation Type:URIName\r\nLocation:http://ipa-ca.rdlg.net/ca/ocsp\r\nEnable:true\r\n\r\n";
  4034. record.defListSet[1] = defList;
  4035. record.defDesc="This default populates a Authority Info Access Extension (1.3.6.1.5.5.7.1.1) to the request. The default values are Criticality=false, Record #0{Method:1.3.6.1.5.5.7.48.1,Location Type:URIName,Location:,Enable:true}";
  4036. recordSet[4] = record;
  4037. record = new Object;
  4038. record.conDesc="This constraint accepts the Key Usage extension, if present, only when Criticality=true, Digital Signature=true, Non-Repudiation=true, Key Encipherment=true, Data Encipherment=true, Key Agreement=false, Key Certificate Sign=false, Key CRL Sign=false, Encipher Only=false, Decipher Only=false";
  4039. record.policyId="6";
  4040. record.defListSet = new Array;
  4041. defList = new Object;
  4042. defList.defId="keyUsageCritical";
  4043. defList.defConstraint="null";
  4044. defList.defName="Criticality";
  4045. defList.defSyntax="boolean";
  4046. defList.defVal="true";
  4047. record.defListSet[0] = defList;
  4048. defList = new Object;
  4049. defList.defId="keyUsageDigitalSignature";
  4050. defList.defConstraint="null";
  4051. defList.defName="Digital Signature";
  4052. defList.defSyntax="boolean";
  4053. defList.defVal="true";
  4054. record.defListSet[1] = defList;
  4055. defList = new Object;
  4056. defList.defId="keyUsageNonRepudiation";
  4057. defList.defConstraint="null";
  4058. defList.defName="Non-Repudiation";
  4059. defList.defSyntax="boolean";
  4060. defList.defVal="true";
  4061. record.defListSet[2] = defList;
  4062. defList = new Object;
  4063. defList.defId="keyUsageKeyEncipherment";
  4064. defList.defConstraint="null";
  4065. defList.defName="Key Encipherment";
  4066. defList.defSyntax="boolean";
  4067. defList.defVal="true";
  4068. record.defListSet[3] = defList;
  4069. defList = new Object;
  4070. defList.defId="keyUsageDataEncipherment";
  4071. defList.defConstraint="null";
  4072. defList.defName="Data Encipherment";
  4073. defList.defSyntax="boolean";
  4074. defList.defVal="true";
  4075. record.defListSet[4] = defList;
  4076. defList = new Object;
  4077. defList.defId="keyUsageKeyAgreement";
  4078. defList.defConstraint="null";
  4079. defList.defName="Key Agreement";
  4080. defList.defSyntax="boolean";
  4081. defList.defVal="false";
  4082. record.defListSet[5] = defList;
  4083. defList = new Object;
  4084. defList.defId="keyUsageKeyCertSign";
  4085. defList.defConstraint="null";
  4086. defList.defName="Key CertSign";
  4087. defList.defSyntax="boolean";
  4088. defList.defVal="false";
  4089. record.defListSet[6] = defList;
  4090. defList = new Object;
  4091. defList.defId="keyUsageCrlSign";
  4092. defList.defConstraint="null";
  4093. defList.defName="CRL Sign";
  4094. defList.defSyntax="boolean";
  4095. defList.defVal="false";
  4096. record.defListSet[7] = defList;
  4097. defList = new Object;
  4098. defList.defId="keyUsageEncipherOnly";
  4099. defList.defConstraint="null";
  4100. defList.defName="Encipher Only";
  4101. defList.defSyntax="boolean";
  4102. defList.defVal="false";
  4103. record.defListSet[8] = defList;
  4104. defList = new Object;
  4105. defList.defId="keyUsageDecipherOnly";
  4106. defList.defConstraint="null";
  4107. defList.defName="Decipher Only";
  4108. defList.defSyntax="boolean";
  4109. defList.defVal="false";
  4110. record.defListSet[9] = defList;
  4111. record.defDesc="This default populates a Key Usage Extension (2.5.29.15) to the request. The default values are Criticality=true, Digital Signature=true, Non-Repudiation=true, Key Encipherment=true, Data Encipherment=true, Key Agreement=false, Key Certificate Sign=false, Key CRL Sign=false, Encipher Only=false, Decipher Only=false";
  4112. recordSet[5] = record;
  4113. record = new Object;
  4114. record.conDesc="No Constraint";
  4115. record.policyId="7";
  4116. record.defListSet = new Array;
  4117. defList = new Object;
  4118. defList.defId="exKeyUsageCritical";
  4119. defList.defConstraint="null";
  4120. defList.defName="Criticality";
  4121. defList.defSyntax="boolean";
  4122. defList.defVal="false";
  4123. record.defListSet[0] = defList;
  4124. defList = new Object;
  4125. defList.defId="exKeyUsageOIDs";
  4126. defList.defConstraint="null";
  4127. defList.defName="Comma-Separated list of Object Identifiers";
  4128. defList.defSyntax="string_list";
  4129. defList.defVal="1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2";
  4130. record.defListSet[1] = defList;
  4131. record.defDesc="This default populates an Extended Key Usage Extension () to the request. The default values are Criticality=false, OIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2";
  4132. recordSet[6] = record;
  4133. record = new Object;
  4134. record.conDesc="This constraint accepts only the Signing Algorithms of SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC";
  4135. record.policyId="8";
  4136. record.defListSet = new Array;
  4137. defList = new Object;
  4138. defList.defId="signingAlg";
  4139. defList.defConstraint="SHA1withRSA,SHA256withRSA,SHA384withRSA,SHA512withRSA,MD5withRSA,MD2withRSA";
  4140. defList.defName="Signing Algorithm";
  4141. defList.defSyntax="choice";
  4142. defList.defVal="SHA256withRSA";
  4143. record.defListSet[0] = defList;
  4144. record.defDesc="This default populates the Certificate Signing Algorithm. The default values are Algorithm=SHA256withRSA";
  4145. recordSet[7] = record;
  4146. profileDesc="This certificate profile is for enrolling server certificates.";
  4147. inputListSet = new Array;
  4148. inputList = new Object;
  4149. inputList.inputId="cert_request_type";
  4150. inputList.inputName="Certificate Request Type";
  4151. inputList.inputVal="pkcs10";
  4152. inputList.inputSyntax="cert_request_type";
  4153. inputList.inputConstraint="null";
  4154. inputListSet[0] = inputList;
  4155. inputList = new Object;
  4156. inputList.inputId="cert_request";
  4157. inputList.inputName="Certificate Request";
  4158. inputList.inputVal="MIICaTCCAVECAQAwJDERMA8GA1UEChMIUkRMRy5ORVQxDzANBgNVBAMTBklQQSBS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\n";
  4159. inputList.inputSyntax="cert_request";
  4160. inputList.inputConstraint="null";
  4161. inputListSet[1] = inputList;
  4162. inputList = new Object;
  4163. inputList.inputId="requestor_name";
  4164. inputList.inputName="Requestor Name";
  4165. inputList.inputVal="IPA Installer";
  4166. inputList.inputSyntax="string";
  4167. inputList.inputConstraint="null";
  4168. inputListSet[2] = inputList;
  4169. inputList = new Object;
  4170. inputList.inputId="requestor_email";
  4171. inputList.inputName="Requestor Email";
  4172. inputList.inputVal="null";
  4173. inputList.inputSyntax="string";
  4174. inputList.inputConstraint="null";
  4175. inputListSet[3] = inputList;
  4176. inputList = new Object;
  4177. inputList.inputId="requestor_phone";
  4178. inputList.inputName="Requestor Phone";
  4179. inputList.inputVal="null";
  4180. inputList.inputSyntax="string";
  4181. inputList.inputConstraint="null";
  4182. inputListSet[4] = inputList;
  4183. errorCode="0";
  4184. requestModificationTime="Wed May 10 20:30:23 MDT 2017";
  4185. profileRemoteAddr="172.20.0.200";
  4186. profileName="Manual Server Certificate Enrollment";
  4187. profileApprovedBy="admin";
  4188. requestOwner="";
  4189. profileId="caServerCert";
  4190. profileRemoteHost="172.20.0.200";
  4191. profileIsVisible="true";
  4192. requestId="7";
  4193. errorReason="";
  4194. requestStatus="pending";
  4195. requestCreationTime="Wed May 10 20:30:23 MDT 2017";
  4196. outputListSet = new Array;
  4197. outputList = new Object;
  4198. outputList.outputId="pretty_cert";
  4199. outputList.outputSyntax="pretty_print";
  4200. outputList.outputVal="null";
  4201. outputList.outputName="Certificate Pretty Print";
  4202. outputList.outputConstraint="null";
  4203. outputListSet[0] = outputList;
  4204. outputList = new Object;
  4205. outputList.outputId="b64_cert";
  4206. outputList.outputSyntax="pretty_print";
  4207. outputList.outputVal="null";
  4208. outputList.outputName="Certificate Base-64 Encoded";
  4209. outputList.outputConstraint="null";
  4210. outputListSet[1] = outputList;
  4211. profileSetId="serverCertSet";
  4212. </script>
  4213. <style>
  4214. TABLE { border-spacing: 0 0; }
  4215. </style>
  4216.  
  4217. <script type="text/javascript">
  4218. function escapeValue(value)
  4219. {
  4220. return value.replace(/"/g,'&quot;');
  4221. }
  4222.  
  4223. function addEscapes(str)
  4224. {
  4225. var outStr = str.replace(/</g, "&lt;");
  4226. outStr = outStr.replace(/>/g, "&gt;");
  4227. return outStr;
  4228. }
  4229.  
  4230. document.writeln('<font size="+1" face="PrimaSans BT, Verdana, sans-serif">Request ');
  4231. document.writeln(requestId);
  4232. document.writeln('<br></font>');
  4233. </script>
  4234. <font size="-1" face="PrimaSans BT, Verdana, sans-serif"></font>
  4235. <table border="0" cellspacing="0" cellpadding="0" background="/pki/images/hr.gif"
  4236. width="100%">
  4237. <tr>
  4238. <td>&nbsp;</td>
  4239. </tr>
  4240. </table>
  4241. <p>
  4242. <script type="text/javascript">
  4243. if (requestStatus == 'pending') {
  4244. document.writeln('<form method=post action="profileProcess">');
  4245. document.writeln('<input type=hidden name=requestId value=' + requestId + '>');
  4246. }
  4247. document.writeln('<p>');
  4248. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Request Information</FONT></TD></TR></TABLE>');
  4249. document.writeln('<table border=1 width=100%>');
  4250. document.writeln('<tr>');
  4251. document.writeln('<td width=20%>');
  4252. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4253. document.writeln('<b>Request ID:</b>');
  4254. document.writeln('</FONT>');
  4255. document.writeln('</td>');
  4256. document.writeln('<td>');
  4257. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4258. document.writeln(requestId);
  4259. document.writeln('</FONT>');
  4260. document.writeln('</td>');
  4261. document.writeln('</tr>');
  4262. document.writeln('<tr>');
  4263. document.writeln('<td>');
  4264. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4265. document.writeln('<b>Request Type:</b>');
  4266. document.writeln('</FONT>');
  4267. document.writeln('</td>');
  4268. document.writeln('<td>');
  4269. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4270. document.writeln(requestType);
  4271. document.writeln('</FONT>');
  4272. document.writeln('</td>');
  4273. document.writeln('</tr>');
  4274. document.writeln('<tr>');
  4275. document.writeln('<td>');
  4276. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4277. document.writeln('<b>Request Status:</b>');
  4278. document.writeln('</FONT>');
  4279. document.writeln('</td>');
  4280. document.writeln('<td>');
  4281. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4282. document.writeln(requestStatus);
  4283. document.writeln('</FONT>');
  4284. document.writeln('</td>');
  4285. document.writeln('</tr>');
  4286. document.writeln('<tr>');
  4287. document.writeln('<td>');
  4288. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4289. document.writeln('<b>Requestor Host:</b>');
  4290. document.writeln('</FONT>');
  4291. document.writeln('</td>');
  4292. document.writeln('<td>');
  4293. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4294. document.writeln(profileRemoteHost);
  4295. document.writeln('</FONT>');
  4296. document.writeln('</td>');
  4297. document.writeln('</tr>');
  4298. document.writeln('<tr>');
  4299. document.writeln('<td>');
  4300. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4301. document.writeln('<b>Assigned To:</b>');
  4302. document.writeln('</FONT>');
  4303. document.writeln('</td>');
  4304. document.writeln('<td>');
  4305. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4306. document.writeln(requestOwner);
  4307. document.writeln('</FONT>');
  4308. document.writeln('</td>');
  4309. document.writeln('</tr>');
  4310. document.writeln('<tr>');
  4311. document.writeln('<td>');
  4312. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4313. document.writeln('<b>Creation Time:</b>');
  4314. document.writeln('</FONT>');
  4315. document.writeln('</td>');
  4316. document.writeln('<td>');
  4317. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4318. document.writeln(requestCreationTime);
  4319. document.writeln('</FONT>');
  4320. document.writeln('</td>');
  4321. document.writeln('</tr>');
  4322. document.writeln('<tr>');
  4323. document.writeln('<td>');
  4324. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4325. document.writeln('<b>Modification Time:</b>');
  4326. document.writeln('</FONT>');
  4327. document.writeln('</td>');
  4328. document.writeln('<td>');
  4329. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4330. document.writeln(requestModificationTime);
  4331. document.writeln('</FONT>');
  4332. document.writeln('</td>');
  4333. document.writeln('</tr>');
  4334. document.writeln('</table>');
  4335. document.writeln('<p>');
  4336. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Certificate Profile Information</FONT></TD></TR></TABLE>');
  4337. document.writeln('<table border=1 width=100%>');
  4338. document.writeln('<tr>');
  4339. document.writeln('<td width=20%>');
  4340. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4341. document.writeln('<b>Certificate Profile Id:</b>');
  4342. document.writeln('</FONT>');
  4343. document.writeln('</td>');
  4344. document.writeln('<td>');
  4345. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4346. document.writeln(profileId);
  4347. document.writeln('</FONT>');
  4348. document.writeln('</td>');
  4349. document.writeln('</tr>');
  4350. document.writeln('<tr>');
  4351. document.writeln('<td width=20%>');
  4352. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4353. document.writeln('<b>Approved By:</b>');
  4354. document.writeln('</FONT>');
  4355. document.writeln('</td>');
  4356. document.writeln('<td>');
  4357. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4358. document.writeln(profileApprovedBy);
  4359. document.writeln('</FONT>');
  4360. document.writeln('</td>');
  4361. document.writeln('</tr>');
  4362. document.writeln('<tr>');
  4363. document.writeln('<td>');
  4364. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4365. document.writeln('<b>Certificate Profile Name:</b>');
  4366. document.writeln('</FONT>');
  4367. document.writeln('</td>');
  4368. document.writeln('<td>');
  4369. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4370. document.writeln(profileName);
  4371. document.writeln('</FONT>');
  4372. document.writeln('</td>');
  4373. document.writeln('</tr>');
  4374. document.writeln('<tr>');
  4375. document.writeln('<td>');
  4376. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4377. document.writeln('<b>Certificate Profile Description:</b>');
  4378. document.writeln('</FONT>');
  4379. document.writeln('</td>');
  4380. document.writeln('<td>');
  4381. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4382. document.writeln(profileDesc);
  4383. document.writeln('</FONT>');
  4384. document.writeln('</td>');
  4385. document.writeln('</tr>');
  4386. document.writeln('</table>');
  4387. document.writeln('<p>');
  4388. if (requestStatus != 'pending') {
  4389. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Additional Notes</FONT></TD></TR></TABLE>');
  4390. document.writeln('<table width=100% border=1>');
  4391. document.writeln('<tr>');
  4392. document.writeln('<td>');
  4393. document.writeln(requestNotes);
  4394. document.writeln('</td>');
  4395. document.writeln('</tr>');
  4396. document.writeln('</table>');
  4397. document.writeln('<p>');
  4398. }
  4399. if (profileIsVisible == 'true') {
  4400. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Certificate Profile Inputs</FONT></TD></TR></TABLE>');
  4401. document.writeln('<table border=1 width=100%>');
  4402. document.writeln('<tr>');
  4403. document.writeln('<td width=20%>');
  4404. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4405. document.writeln('<b>Id</b>');
  4406. document.writeln('</FONT>');
  4407. document.writeln('</td>');
  4408. document.writeln('<td width=40%>');
  4409. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4410. document.writeln('<b>Input Names</b>');
  4411. document.writeln('</FONT>');
  4412. document.writeln('</td>');
  4413. document.writeln('<td>');
  4414. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4415. document.writeln('<b>Input Values</b>');
  4416. document.writeln('</FONT>');
  4417. document.writeln('</td>');
  4418. document.writeln('</tr>');
  4419. for (var i = 0; i < inputListSet.length; i++) {
  4420. document.writeln('<tr>');
  4421. document.writeln('<td>');
  4422. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4423. document.writeln(inputListSet[i].inputId);
  4424. document.writeln('</FONT>');
  4425. document.writeln('</td>');
  4426. document.writeln('<td>');
  4427. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4428. document.writeln(inputListSet[i].inputName);
  4429. document.writeln('</FONT>');
  4430. document.writeln('</td>');
  4431. document.writeln('<td>');
  4432. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4433. document.writeln(addEscapes(inputListSet[i].inputVal));
  4434. document.writeln('</FONT>');
  4435. document.writeln('</td>');
  4436. document.writeln('</tr>');
  4437. }
  4438. document.writeln('</table>');
  4439. document.writeln('<p>');
  4440. }
  4441. if (requestStatus == 'complete') {
  4442. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Certificate Profile Outputs</FONT></TD></TR></TABLE>');
  4443. for (var i = 0; i < outputListSet.length; i++) {
  4444. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">'
  4445. );
  4446. document.writeln('<li>');
  4447. document.writeln(outputListSet[i].outputName);
  4448. document.writeln('</FONT>');
  4449. document.writeln('<p>');
  4450. if (outputListSet[i].outputSyntax == 'string') {
  4451. document.writeln(outputListSet[i].outputVal);
  4452. } else if (outputListSet[i].outputSyntax == 'pretty_print') {
  4453. document.writeln('<pre>');
  4454. document.writeln(outputListSet[i].outputVal);
  4455. document.writeln('</pre>');
  4456. } else if (outputListSet[i].outputSyntax == 'der_b64') {
  4457. document.writeln('<pre>');
  4458. document.writeln('-----BEGIN CERTIFICATE-----');
  4459. document.writeln(outputListSet[i].outputVal);
  4460. document.writeln('-----END CERTIFICATE-----');
  4461. document.writeln('</pre>');
  4462. }
  4463. document.writeln('</p>');
  4464. }
  4465. }
  4466. if (requestStatus == 'pending') {
  4467. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Policy Information</FONT></TD></TR></TABLE>');
  4468. document.writeln('<table>');
  4469. document.writeln('<tr>');
  4470. document.writeln('<td width=20%>');
  4471. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4472. document.writeln('<b>Certificate Profile Set Id:</b>');
  4473. document.writeln('</FONT>');
  4474. document.writeln('</td>');
  4475. document.writeln('<td>');
  4476. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4477. document.writeln(profileSetId);
  4478. document.writeln('</FONT>');
  4479. document.writeln('</td>');
  4480. document.writeln('</tr>');
  4481. document.writeln('</table>');
  4482. document.writeln('<table border=1 width=100%>');
  4483. document.writeln('<tr>');
  4484. document.writeln('<td width=10%>');
  4485. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4486. document.writeln('<b>#</b>');
  4487. document.writeln('</FONT>');
  4488. document.writeln('</td>');
  4489. document.writeln('<td width=45%>');
  4490. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4491. document.writeln('<b>Extensions / Fields</b>');
  4492. document.writeln('</FONT>');
  4493. document.writeln('</td>');
  4494. document.writeln('<td width=45%>');
  4495. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4496. document.writeln('<b>Constraints</b>');
  4497. document.writeln('</FONT>');
  4498. document.writeln('</td>');
  4499. document.writeln('</tr>');
  4500. for (var i = 0; i < recordSet.length; i++) {
  4501. document.writeln('<tr valign=top>');
  4502. document.writeln('<td>');
  4503. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4504. document.writeln(recordSet[i].policyId);
  4505. document.writeln('</FONT>');
  4506. document.writeln('</td>');
  4507. document.writeln('<td>');
  4508. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4509. document.writeln(recordSet[i].defDesc);
  4510. document.writeln('</FONT>');
  4511. document.writeln('<p>');
  4512. document.writeln('<table width=100%>');
  4513. for (var j = 0; j < recordSet[i].defListSet.length; j++) {
  4514. document.writeln('<tr valign=top>');
  4515. if (typeof(recordSet[i].defListSet[j].defName) != 'undefined') {
  4516. document.writeln('<td width=30%><i>');
  4517. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4518. document.writeln(recordSet[i].defListSet[j].defName + ':');
  4519. document.writeln('</FONT>');
  4520. document.writeln('</i></td>');
  4521. document.writeln('<td width=70%>');
  4522. if (recordSet[i].defListSet[j].defConstraint == 'readonly') {
  4523. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4524. document.writeln(recordSet[i].defListSet[j].defVal);
  4525. document.writeln('</FONT>');
  4526. } else {
  4527. if (recordSet[i].defListSet[j].defSyntax == 'string') {
  4528. document.writeln('<input size=32 type=text name="' + recordSet[i].defListSet[j].defId + '" value="' + escapeValue(recordSet[i].defListSet[j].defVal) + '">');
  4529. } else if (recordSet[i].defListSet[j].defSyntax == 'string_list') {
  4530. document.writeln('<textarea cols=40 rows=5 name="' + recordSet[i].defListSet[j].defId + '">' + recordSet[i].defListSet[j].defVal + '</textarea>');
  4531. } else if (recordSet[i].defListSet[j].defSyntax == 'integer') {
  4532. document.writeln('<input size=6 type=text name="' + recordSet[i].defListSet[j].defId + '" value="' + recordSet[i].defListSet[j].defVal + '">');
  4533. } else if (recordSet[i].defListSet[j].defSyntax == 'image_url') {
  4534. document.writeln('<img border=0 src="' + recordSet[i].defListSet[j].defVal + '">');
  4535. document.writeln('<input type=hidden name="' + recordSet[i].defListSet[j].defId + '" value="' + recordSet[i].defListSet[j].defVal + '">');
  4536. } else if (recordSet[i].defListSet[j].defSyntax == 'choice') {
  4537. document.writeln('<select name="' + recordSet[i].defListSet[j].defId + '">');
  4538. var c = recordSet[i].defListSet[j].defConstraint.split(',');
  4539. for(var k = 0; k < c.length; k++) {
  4540. if (recordSet[i].defListSet[j].defVal == c[k]) {
  4541. document.writeln('<option selected value=' + c[k] + '>');
  4542. } else {
  4543. document.writeln('<option value=' + c[k] + '>');
  4544. }
  4545. document.writeln(c[k]);
  4546. document.writeln('</option>');
  4547. }
  4548.  
  4549. document.writeln('</select>');
  4550. } else if (recordSet[i].defListSet[j].defSyntax == 'boolean') {
  4551. document.writeln('<select name="' + recordSet[i].defListSet[j].defId + '">');
  4552. if (recordSet[i].defListSet[j].defVal == 'true') {
  4553. document.writeln('<option selected value=true>true</option>');
  4554. document.writeln('<option value=false>false</option>');
  4555. } else {
  4556. document.writeln('<option value=true>true</option>');
  4557. document.writeln('<option selected value=false>false</option>');
  4558. }
  4559. document.writeln('</select>');
  4560. }
  4561. }
  4562. document.writeln('</td>');
  4563. }
  4564. document.writeln('</tr>');
  4565. }
  4566. document.writeln('</table>');
  4567. document.writeln('</td>');
  4568. document.writeln('<td>');
  4569. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4570. document.writeln(recordSet[i].conDesc);
  4571. document.writeln('</FONT>');
  4572. document.writeln('</td>');
  4573. document.writeln('</tr>');
  4574. } // for
  4575. document.writeln('</table>');
  4576. document.writeln('<p>');
  4577. document.writeln('<TABLE width=100%><TR><TD valign="top" align="left" colspan="3" bgcolor="#e5e5e5"><FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">Additional Notes</FONT></TD></TR></TABLE>');
  4578. document.writeln('<textarea cols=40 rows=5 name="requestNotes">' + requestNotes + '</textarea>');
  4579. document.writeln('<p>');
  4580. document.writeln('<SELECT NAME="op">');
  4581. document.writeln('<OPTION VALUE="update">Update request</OPTION>');
  4582. document.writeln('<OPTION VALUE="validate">Validate request</OPTION>');
  4583. document.writeln('<OPTION SELECTED VALUE="approve">Approve request</OPTION>');
  4584. document.writeln('<OPTION VALUE="reject">Reject request</OPTION>');
  4585. document.writeln('<OPTION VALUE="cancel">Cancel request</OPTION>');
  4586. document.writeln('<OPTION VALUE="assign">Assign request</OPTION>');
  4587. document.writeln('<OPTION VALUE="unassign">Unassign request</OPTION>');
  4588. document.writeln('</SELECT>');
  4589. if (typeof(nonce) != "undefined") {
  4590. document.writeln("<INPUT TYPE=hidden name=nonce value=\"" + nonce +"\">");
  4591. }
  4592. document.writeln('<input type=submit name=submit value=submit>');
  4593. document.writeln('</form>');
  4594. } // if
  4595. </script>
  4596. </html>
  4597.  
  4598. Subject: CN=ipa.rdlg.net,O=RDLG.NET
  4599. Issuer : CN=Certificate Authority,O=RDLG.NET
  4600. bulk cipher AES-256, 256 secret key bits, 256 key bits, status: 1
  4601.  
  4602. 2017-05-11T02:30:24Z DEBUG stderr=GET /ca/agent/ca/profileReview?requestId=7 HTTP/1.0
  4603. Host: ipa.rdlg.net:8443
  4604.  
  4605. port: 8443
  4606. addr='ipa.rdlg.net'
  4607. family='2'
  4608. IP='172.20.0.200'
  4609. Called mygetclientauthdata - nickname = ipa-ca-agent
  4610. mygetclientauthdata - cert = 1430a70
  4611. mygetclientauthdata - privkey = 1473130
  4612. PR_Write wrote 80 bytes from bigBuf
  4613. bytes: [GET /ca/agent/ca/profileReview?requestId=7 HTTP/1.0
  4614. Host: ipa.rdlg.net:8443
  4615.  
  4616. ]
  4617. do_writes shutting down send socket
  4618. do_writes exiting with (result = 0)
  4619. connection 1 read 9000 bytes (9000 total).
  4620. these bytes read:
  4621. connection 1 read 9000 bytes (18000 total).
  4622. these bytes read:
  4623. connection 1 read 9000 bytes (27000 total).
  4624. these bytes read:
  4625. connection 1 read 2697 bytes (29697 total).
  4626. these bytes read:
  4627. connection 1 read 29697 bytes total. -----------------------------
  4628. Done with possible addresses - exiting.
  4629.  
  4630. 2017-05-11T02:30:24Z DEBUG Starting external process
  4631. 2017-05-11T02:30:24Z DEBUG args=/usr/bin/sslget -v -n ipa-ca-agent -p XXXXXXXX -d /tmp/tmp-2dhsv2 -e exKeyUsageCritical=false&keyUsageEncipherOnly=false&keyUsageNonRepudiation=true&keyUsageDataEncipherment=true&notBefore=2017-05-10+20%3A30%3A23&keyUsageCritical=true&submit=submit&notAfter=2019-04-30+20%3A30%3A23&requestId=7&signingAlg=SHA256withRSA&keyUsageDigitalSignature=true&authInfoAccessGeneralNames=Record+%230%0D%0AMethod%3A1.3.6.1.5.5.7.48.1%0D%0ALocation+Type%3AURIName%0D%0ALocation%3Ahttp%3A%2F%2Fipa-ca.rdlg.net%2Fca%2Focsp%0D%0AEnable%3Atrue%0D%0A%0D%0A&keyUsageKeyEncipherment=true&authInfoAccessCritical=false&name=CN%3DIPA+RA%2CO%3DRDLG.NET&requestNotes=&keyUsageCrlSign=false&exKeyUsageOIDs=1.3.6.1.5.5.7.3.1%2C1.3.6.1.5.5.7.3.2&keyUsageKeyAgreement=false&keyUsageKeyCertSign=false&keyUsageDecipherOnly=false&op=approve -r /ca/agent/ca/profileProcess ipa.rdlg.net:8443
  4632. 2017-05-11T02:30:24Z DEBUG Process finished, return code=0
  4633. 2017-05-11T02:30:24Z DEBUG stdout=HTTP/1.1 200 OK
  4634. Server: Apache-Coyote/1.1
  4635. Content-Type: text/html;charset=UTF-8
  4636. Date: Thu, 11 May 2017 02:30:24 GMT
  4637. Connection: close
  4638.  
  4639. <!-- --- BEGIN COPYRIGHT BLOCK ---
  4640. This program is free software; you can redistribute it and/or modify
  4641. it under the terms of the GNU General Public License as published by
  4642. the Free Software Foundation; version 2 of the License.
  4643.  
  4644. This program is distributed in the hope that it will be useful,
  4645. but WITHOUT ANY WARRANTY; without even the implied warranty of
  4646. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  4647. GNU General Public License for more details.
  4648.  
  4649. You should have received a copy of the GNU General Public License along
  4650. with this program; if not, write to the Free Software Foundation, Inc.,
  4651. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  4652.  
  4653. Copyright (C) 2007 Red Hat, Inc.
  4654. All rights reserved.
  4655. --- END COPYRIGHT BLOCK --- -->
  4656. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
  4657. <html>
  4658. <script type="text/javascript">
  4659. outputListSet = new Array;
  4660. outputList = new Object;
  4661. outputList.outputId="pretty_cert";
  4662. outputList.outputSyntax="pretty_print";
  4663. outputList.outputVal=" Certificate: \n Data: \n Version: v3\n Serial Number: 0x7\n Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11\n Issuer: CN=Certificate Authority,O=RDLG.NET\n Validity: \n Not Before: Wednesday, May 10, 2017 8:30:23 PM MDT America/Denver\n Not After: Tuesday, April 30, 2019 8:30:23 PM MDT America/Denver\n Subject: CN=IPA RA,O=RDLG.NET\n Subject Public Key Info: \n Algorithm: RSA - 1.2.840.113549.1.1.1\n Public Key: \n Exponent: 65537\n Public Key Modulus: (2048 bits) :\n C9:6E:E5:EF:17:73:E5:61:47:2C:B2:F1:A8:05:59:28:\n 65:B1:0A:32:A1:25:30:C3:FB:86:8E:08:78:BF:05:7A:\n 80:C1:4A:C5:A3:3A:51:2E:3D:63:D1:1D:BA:7A:49:74:\n F8:0F:40:B8:E7:F7:CA:FF:6D:38:DA:A4:68:1B:1F:1C:\n F6:ED:D5:46:2C:46:C7:E8:AF:DE:34:54:46:06:10:2A:\n 1A:17:A4:09:AD:BF:F5:A6:D0:87:74:D1:14:9A:11:E6:\n FC:A1:2A:0E:6D:C9:59:30:FA:A7:1E:CA:9D:A9:C5:C2:\n D2:D5:77:D5:4E:68:43:20:BB:BE:D1:DA:D3:03:65:C1:\n 3B:BA:10:13:03:4A:B8:E0:5F:39:1C:58:A3:1A:38:DD:\n 60:3B:8A:39:30:CF:98:33:D1:6A:F8:2D:51:96:2A:7F:\n AC:0A:D3:7B:9D:8D:57:8B:E4:7F:07:C6:7D:42:46:2B:\n 45:77:60:F2:E9:3E:49:B1:E0:48:50:9A:77:24:EF:82:\n B0:FF:17:F2:D3:16:DD:EB:2B:F3:FF:1C:23:1C:94:AF:\n 0C:48:1E:2E:BF:56:59:4B:0E:57:BE:32:C1:3F:36:72:\n 91:A9:71:38:F5:3E:2A:31:F1:62:53:46:8D:4B:05:D9:\n 31:A8:D0:BC:01:D4:52:F9:EF:7C:0A:EF:5E:FE:29:ED\n Extensions: \n Identifier: Authority Key Identifier - 2.5.29.35\n Critical: no \n Key Identifier: \n CA:14:72:73:F8:4E:60:E3:E2:1F:99:7C:BC:22:AD:98:\n 43:35:DE:F3\n Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1\n Critical: no \n Access Description: \n Method #0: ocsp\n Location #0: URIName: http://ipa-ca.rdlg.net/ca/ocsp\n Identifier: Key Usage: - 2.5.29.15\n Critical: yes \n Key Usage: \n Digital Signature \n Non Repudiation \n Key Encipherment \n Data Encipherment \n Identifier: Extended Key Usage: - 2.5.29.37\n Critical: no \n Extended Key Usage: \n 1.3.6.1.5.5.7.3.1\n 1.3.6.1.5.5.7.3.2\n Signature: \n Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11\n Signature: \n 3B:8C:98:2F:C1:51:E0:D2:01:BC:55:30:E8:0D:A5:B0:\n 1B:D2:2F:11:5F:1F:45:24:FD:8B:FF:AB:68:FE:5C:58:\n 65:E2:14:C5:0A:CD:9C:81:80:79:23:FF:67:55:2B:1F:\n 0F:0A:19:97:8D:FC:41:19:C5:51:90:B8:CD:BD:62:B9:\n 88:A7:2D:A7:63:25:67:6B:08:47:FA:88:42:96:09:98:\n AB:21:6A:5E:45:20:5D:61:0F:4F:40:67:32:77:D7:DC:\n 26:45:89:AF:51:DD:17:5C:FA:EF:44:73:95:CC:4C:73:\n C9:EC:88:10:9D:CF:5C:EE:69:05:C4:29:3F:00:1A:CB:\n AC:40:8D:8F:EF:A9:61:9B:8F:2B:39:C8:0D:E5:99:BC:\n ED:5F:4C:79:F1:25:0B:95:16:5A:D7:87:1E:17:F9:7D:\n BC:9B:83:94:C7:26:11:9B:FE:7F:6F:B3:9B:83:FA:EB:\n C1:0F:6F:47:9B:3D:B7:E5:57:56:42:85:F9:DD:F9:87:\n 47:3D:7F:C4:B6:91:E1:5F:78:DF:42:E1:3F:91:99:7A:\n 52:FC:08:74:97:D0:89:C0:26:B1:7E:F8:7C:EC:CB:C7:\n D3:F2:24:8E:3C:43:8B:26:7F:6C:27:45:B8:D8:8F:C5:\n 68:28:D1:9F:24:BF:76:82:5F:4C:D1:0F:1D:E5:D3:E1\n FingerPrint\n MD2:\n A6:46:DE:85:1D:25:12:B4:DD:E9:48:67:58:80:8E:88\n MD5:\n A9:2A:01:41:46:08:23:BB:65:17:F7:F1:7B:3C:B3:3A\n SHA-1:\n 34:63:66:A4:AD:92:9D:05:04:70:41:D9:72:6A:CA:D7:\n E7:F1:23:C1\n SHA-256:\n F1:DA:1C:87:30:36:0A:55:6C:07:F7:A8:46:C9:38:27:\n E1:1A:0A:73:43:2A:05:80:8F:43:1A:73:00:2C:A2:42\n SHA-512:\n 25:29:04:96:00:49:77:3C:32:7C:42:B6:7D:A2:2F:69:\n 9E:48:45:6F:EE:8D:C3:CA:A4:A8:83:02:AE:CF:EE:27:\n BF:24:4B:88:FD:DB:FE:A0:90:CD:C7:3A:31:D1:AB:4C:\n 46:6B:77:CE:F3:F0:75:D2:DC:E6:27:57:02:1A:BE:8F\n";
  4664. outputList.outputName="Certificate Pretty Print";
  4665. outputList.outputConstraint="null";
  4666. outputListSet[0] = outputList;
  4667. outputList = new Object;
  4668. outputList.outputId="b64_cert";
  4669. outputList.outputSyntax="pretty_print";
  4670. outputList.outputVal="-----BEGIN CERTIFICATE-----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\r\n0Q8d5dPh\r\n-----END CERTIFICATE-----\n";
  4671. outputList.outputName="Certificate Base-64 Encoded";
  4672. outputList.outputConstraint="null";
  4673. outputListSet[1] = outputList;
  4674. errorReason="";
  4675. requestType="enrollment";
  4676. profileId="caServerCert";
  4677. requestId="7";
  4678. errorCode="0";
  4679. requestStatus="complete";
  4680. op="approve";
  4681. </script>
  4682.  
  4683. <script type="text/javascript">
  4684. function addEscapes(str)
  4685. {
  4686. var outStr = str.replace(/</g, "&lt;");
  4687. outStr = outStr.replace(/>/g, "&gt;");
  4688. return outStr;
  4689. }
  4690.  
  4691. document.writeln('<font size="+1" face="PrimaSans BT, Verdana, sans-serif">Request ');
  4692. if (typeof(requestId) != "undefined") {
  4693. document.writeln(requestId);
  4694. }
  4695. document.writeln('<br></font>');
  4696. </script>
  4697. <font size="-1" face="PrimaSans BT, Verdana, sans-serif"></font>
  4698. <table border="0" cellspacing="0" cellpadding="0" background="/pki/images/hr.gif" width="100%">
  4699. <tr>
  4700. <td>&nbsp;</td>
  4701. </tr>
  4702. </table>
  4703. <p>
  4704.  
  4705. <script type="text/javascript">
  4706. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4707. document.writeln('<b>Request Information:</b>');
  4708. document.writeln('</FONT>');
  4709. document.writeln('<table border=1 width=100%>');
  4710. if (typeof(requestId) != "undefined") {
  4711. document.writeln('<tr>');
  4712. document.writeln('<td width=30%>');
  4713. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4714. document.writeln('<b>Request ID:</b>');
  4715. document.writeln('</FONT>');
  4716. document.writeln('</td>');
  4717. document.writeln('<td>');
  4718. document.writeln('<a href="profileReview?requestId=' + requestId + '">');
  4719. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4720. document.writeln(requestId);
  4721. document.writeln('</FONT>');
  4722. document.writeln('</a>');
  4723. document.writeln('</td>');
  4724. document.writeln('</tr>');
  4725. }
  4726. if (typeof(requestType) != "undefined") {
  4727. document.writeln('<tr>');
  4728. document.writeln('<td>');
  4729. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4730. document.writeln('<b>Request Type:</b>');
  4731. document.writeln('</FONT>');
  4732. document.writeln('</td>');
  4733. document.writeln('<td>');
  4734. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4735. document.writeln(requestType);
  4736. document.writeln('</FONT>');
  4737. document.writeln('</td>');
  4738. document.writeln('</tr>');
  4739. }
  4740. if (typeof(requestStatus) != "undefined") {
  4741. document.writeln('<tr>');
  4742. document.writeln('<td>');
  4743. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4744. document.writeln('<b>Request Status:</b>');
  4745. document.writeln('</FONT>');
  4746. document.writeln('</td>');
  4747. document.writeln('<td>');
  4748. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4749. document.writeln(requestStatus);
  4750. document.writeln('</FONT>');
  4751. document.writeln('</td>');
  4752. document.writeln('</tr>');
  4753. }
  4754. if (typeof(profileId) != "undefined") {
  4755. document.writeln('<tr>');
  4756. document.writeln('<td>');
  4757. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4758. document.writeln('<b>Certificate Profile Id:</b>');
  4759. document.writeln('</FONT>');
  4760. document.writeln('</td>');
  4761. document.writeln('<td>');
  4762. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4763. document.writeln(profileId);
  4764. document.writeln('</FONT>');
  4765. document.writeln('</td>');
  4766. document.writeln('</tr>');
  4767. }
  4768. if (typeof(op) != "undefined") {
  4769. document.writeln('<tr>');
  4770. document.writeln('<td>');
  4771. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4772. document.writeln('<b>Operation Requested:</b>');
  4773. document.writeln('</FONT>');
  4774. document.writeln('</td>');
  4775. document.writeln('<td>');
  4776. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4777. document.writeln(op);
  4778. document.writeln('</FONT>');
  4779. document.writeln('</td>');
  4780. document.writeln('</tr>');
  4781. }
  4782. if (typeof(errorCode) != "undefined") {
  4783. document.writeln('<tr>');
  4784. document.writeln('<td>');
  4785. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4786. document.writeln('<b>Error Code:</b>');
  4787. document.writeln('</FONT>');
  4788. document.writeln('</td>');
  4789. document.writeln('<td>');
  4790. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4791. document.writeln(errorCode);
  4792. document.writeln('</FONT>');
  4793. document.writeln('</td>');
  4794. document.writeln('</tr>');
  4795. }
  4796. if (typeof(errorReason) != "undefined") {
  4797. document.writeln('<tr>');
  4798. document.writeln('<td>');
  4799. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4800. document.writeln('<b>Error Reason:</b>');
  4801. document.writeln('</FONT>');
  4802. document.writeln('</td>');
  4803. document.writeln('<td>');
  4804. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">');
  4805. document.writeln(errorReason);
  4806. document.writeln('</FONT>');
  4807. document.writeln('</td>');
  4808. document.writeln('</tr>');
  4809. }
  4810. document.writeln('</table>');
  4811. document.writeln('<p>');
  4812. document.writeln('</table>');
  4813. if (typeof(requestStatus) != "undefined" && requestStatus == 'complete') {
  4814. document.writeln('<table width=100%>');
  4815. for (var i = 0; i < outputListSet.length; i++) {
  4816. document.writeln('<tr valign=top>');
  4817. document.writeln('<td>');
  4818. document.writeln('<FONT size="-1" face="PrimaSans BT, Verdana, sans-serif">'
  4819. );
  4820. document.writeln('<li>');
  4821. document.writeln(outputListSet[i].outputName);
  4822. document.writeln('</FONT>');
  4823. document.writeln('</td>');
  4824. document.writeln('<tr valign=top>');
  4825. document.writeln('</tr>');
  4826. document.writeln('<td>');
  4827. if (outputListSet[i].outputSyntax == 'string') {
  4828. document.writeln(addEscapes(outputListSet[i].outputVal));
  4829. } else if (outputListSet[i].outputSyntax == 'pretty_print') {
  4830. document.writeln('<pre>');
  4831. document.writeln(addEscapes(outputListSet[i].outputVal));
  4832. document.writeln('</pre>');
  4833. }
  4834. document.writeln('</td>');
  4835. document.writeln('</tr>');
  4836. }
  4837. document.writeln('</table>');
  4838. }
  4839. </script>
  4840. </html>
  4841.  
  4842. Subject: CN=ipa.rdlg.net,O=RDLG.NET
  4843. Issuer : CN=Certificate Authority,O=RDLG.NET
  4844. bulk cipher AES-256, 256 secret key bits, 256 key bits, status: 1
  4845.  
  4846. 2017-05-11T02:30:24Z DEBUG stderr=POST /ca/agent/ca/profileProcess HTTP/1.0
  4847. Host: ipa.rdlg.net:8443
  4848. Content-Length: 738
  4849. Content-Type: application/x-www-form-urlencoded
  4850.  
  4851. exKeyUsageCritical=false&keyUsageEncipherOnly=false&keyUsageNonRepudiation=true&keyUsageDataEncipherment=true&notBefore=2017-05-10+20%3A30%3A23&keyUsageCritical=true&submit=submit&notAfter=2019-04-30+20%3A30%3A23&requestId=7&signingAlg=SHA256withRSA&keyUsageDigitalSignature=true&authInfoAccessGeneralNames=Record+%230%0D%0AMethod%3A1.3.6.1.5.5.7.48.1%0D%0ALocation+Type%3AURIName%0D%0ALocation%3Ahttp%3A%2F%2Fipa-ca.rdlg.net%2Fca%2Focsp%0D%0AEnable%3Atrue%0D%0A%0D%0A&keyUsageKeyEncipherment=true&authInfoAccessCritical=false&name=CN%3DIPA+RA%2CO%3DRDLG.NET&requestNotes=&keyUsageCrlSign=false&exKeyUsageOIDs=1.3.6.1.5.5.7.3.1%2C1.3.6.1.5.5.7.3.2&keyUsageKeyAgreement=false&keyUsageKeyCertSign=false&keyUsageDecipherOnly=false&op=approveport: 8443
  4852. addr='ipa.rdlg.net'
  4853. family='2'
  4854. IP='172.20.0.200'
  4855. Called mygetclientauthdata - nickname = ipa-ca-agent
  4856. mygetclientauthdata - cert = fded80
  4857. mygetclientauthdata - privkey = 1021440
  4858. PR_Write wrote 878 bytes from bigBuf
  4859. bytes: [POST /ca/agent/ca/profileProcess HTTP/1.0
  4860. Host: ipa.rdlg.net:8443
  4861. Content-Length: 738
  4862. Content-Type: application/x-www-form-urlencoded
  4863.  
  4864. exKeyUsageCritical=false&keyUsageEncipherOnly=false&keyUsageNonRepudiation=true&keyUsageDataEncipherment=true&notBefore=2017-05-10+20%3A30%3A23&keyUsageCritical=true&submit=submit&notAfter=2019-04-30+20%3A30%3A23&requestId=7&signingAlg=SHA256withRSA&keyUsageDigitalSignature=true&authInfoAccessGeneralNames=Record+%230%0D%0AMethod%3A1.3.6.1.5.5.7.48.1%0D%0ALocation+Type%3AURIName%0D%0ALocation%3Ahttp%3A%2F%2Fipa-ca.rdlg.net%2Fca%2Focsp%0D%0AEnable%3Atrue%0D%0A%0D%0A&keyUsageKeyEncipherment=true&authInfoAccessCritical=false&name=CN%3DIPA+RA%2CO%3DRDLG.NET&requestNotes=&keyUsageCrlSign=false&exKeyUsageOIDs=1.3.6.1.5.5.7.3.1%2C1.3.6.1.5.5.7.3.2&keyUsageKeyAgreement=false&keyUsageKeyCertSign=false&keyUsageDecipherOnly=false&op=approve]
  4865. do_writes shutting down send socket
  4866. do_writes exiting with (result = 0)
  4867. connection 1 read 9000 bytes (9000 total).
  4868. these bytes read:
  4869. connection 1 read 4329 bytes (13329 total).
  4870. these bytes read:
  4871. connection 1 read 13329 bytes total. -----------------------------
  4872. Done with possible addresses - exiting.
  4873.  
  4874. 2017-05-11T02:30:24Z DEBUG Starting external process
  4875. 2017-05-11T02:30:24Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -f XXXXXXXX -A -t u,u,u -n ipaCert -a -i /tmp/tmp3Ay3eB
  4876. 2017-05-11T02:30:24Z DEBUG Process finished, return code=0
  4877. 2017-05-11T02:30:24Z DEBUG stdout=
  4878. 2017-05-11T02:30:24Z DEBUG stderr=Notice: Trust flag u is set automatically if the private key is present.
  4879.  
  4880. 2017-05-11T02:30:24Z DEBUG Starting external process
  4881. 2017-05-11T02:30:24Z DEBUG args=/usr/bin/pki -d /etc/httpd/alias -C /etc/httpd/alias/pwdfile.txt client-cert-show ipaCert --client-cert /etc/httpd/alias/tmpRb3Roa
  4882. 2017-05-11T02:30:25Z DEBUG Process finished, return code=0
  4883. 2017-05-11T02:30:25Z DEBUG stdout=
  4884. 2017-05-11T02:30:25Z DEBUG stderr=
  4885. 2017-05-11T02:30:25Z DEBUG duration: 1 seconds
  4886. 2017-05-11T02:30:25Z DEBUG [17/31]: adding RA agent as a trusted user
  4887. 2017-05-11T02:30:25Z DEBUG Created connection context.ldap2_85486928
  4888. 2017-05-11T02:30:25Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  4889. 2017-05-11T02:30:25Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4f95ab8>
  4890. 2017-05-11T02:30:25Z DEBUG add_entry_to_group: dn=uid=ipara,ou=People,o=ipaca group_dn=cn=Certificate Manager Agents,ou=groups,o=ipaca member_attr=uniqueMember
  4891. 2017-05-11T02:30:25Z DEBUG add_entry_to_group: dn=uid=ipara,ou=People,o=ipaca group_dn=cn=Registration Manager Agents,ou=groups,o=ipaca member_attr=uniqueMember
  4892. 2017-05-11T02:30:25Z DEBUG Destroyed connection context.ldap2_85486928
  4893. 2017-05-11T02:30:25Z DEBUG duration: 0 seconds
  4894. 2017-05-11T02:30:25Z DEBUG [18/31]: authorizing RA to modify profiles
  4895. 2017-05-11T02:30:25Z DEBUG Created connection context.ldap2_83903184
  4896. 2017-05-11T02:30:25Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  4897. 2017-05-11T02:30:25Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x753e830>
  4898. 2017-05-11T02:30:25Z DEBUG Destroyed connection context.ldap2_83903184
  4899. 2017-05-11T02:30:25Z DEBUG duration: 0 seconds
  4900. 2017-05-11T02:30:25Z DEBUG [19/31]: authorizing RA to manage lightweight CAs
  4901. 2017-05-11T02:30:25Z DEBUG Created connection context.ldap2_83906512
  4902. 2017-05-11T02:30:25Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  4903. 2017-05-11T02:30:25Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4f95ab8>
  4904. 2017-05-11T02:30:25Z DEBUG Destroyed connection context.ldap2_83906512
  4905. 2017-05-11T02:30:25Z DEBUG duration: 0 seconds
  4906. 2017-05-11T02:30:25Z DEBUG [20/31]: Ensure lightweight CAs container exists
  4907. 2017-05-11T02:30:25Z DEBUG Created connection context.ldap2_83904592
  4908. 2017-05-11T02:30:25Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  4909. 2017-05-11T02:30:25Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x753e830>
  4910. 2017-05-11T02:30:26Z DEBUG Destroyed connection context.ldap2_83904592
  4911. 2017-05-11T02:30:26Z DEBUG duration: 0 seconds
  4912. 2017-05-11T02:30:26Z DEBUG [21/31]: configure certmonger for renewals
  4913. 2017-05-11T02:30:26Z DEBUG Starting external process
  4914. 2017-05-11T02:30:26Z DEBUG args=/bin/systemctl enable certmonger.service
  4915. 2017-05-11T02:30:26Z DEBUG Process finished, return code=0
  4916. 2017-05-11T02:30:26Z DEBUG stdout=
  4917. 2017-05-11T02:30:26Z DEBUG stderr=Created symlink from /etc/systemd/system/multi-user.target.wants/certmonger.service to /usr/lib/systemd/system/certmonger.service.
  4918.  
  4919. 2017-05-11T02:30:26Z DEBUG Starting external process
  4920. 2017-05-11T02:30:26Z DEBUG args=/bin/systemctl start messagebus.service
  4921. 2017-05-11T02:30:26Z DEBUG Process finished, return code=0
  4922. 2017-05-11T02:30:26Z DEBUG stdout=
  4923. 2017-05-11T02:30:26Z DEBUG stderr=
  4924. 2017-05-11T02:30:26Z DEBUG Starting external process
  4925. 2017-05-11T02:30:26Z DEBUG args=/bin/systemctl is-active messagebus.service
  4926. 2017-05-11T02:30:26Z DEBUG Process finished, return code=0
  4927. 2017-05-11T02:30:26Z DEBUG stdout=active
  4928.  
  4929. 2017-05-11T02:30:26Z DEBUG stderr=
  4930. 2017-05-11T02:30:26Z DEBUG Starting external process
  4931. 2017-05-11T02:30:26Z DEBUG args=/bin/systemctl start certmonger.service
  4932. 2017-05-11T02:30:26Z DEBUG Process finished, return code=0
  4933. 2017-05-11T02:30:26Z DEBUG stdout=
  4934. 2017-05-11T02:30:26Z DEBUG stderr=
  4935. 2017-05-11T02:30:26Z DEBUG Starting external process
  4936. 2017-05-11T02:30:26Z DEBUG args=/bin/systemctl is-active certmonger.service
  4937. 2017-05-11T02:30:26Z DEBUG Process finished, return code=0
  4938. 2017-05-11T02:30:26Z DEBUG stdout=active
  4939.  
  4940. 2017-05-11T02:30:26Z DEBUG stderr=
  4941. 2017-05-11T02:30:26Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  4942. 2017-05-11T02:30:26Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  4943. 2017-05-11T02:30:27Z DEBUG duration: 1 seconds
  4944. 2017-05-11T02:30:27Z DEBUG [22/31]: configure certificate renewals
  4945. 2017-05-11T02:30:31Z DEBUG duration: 3 seconds
  4946. 2017-05-11T02:30:31Z DEBUG [23/31]: configure RA certificate renewal
  4947. 2017-05-11T02:30:32Z DEBUG duration: 1 seconds
  4948. 2017-05-11T02:30:32Z DEBUG [24/31]: configure Server-Cert certificate renewal
  4949. 2017-05-11T02:30:33Z DEBUG duration: 0 seconds
  4950. 2017-05-11T02:30:33Z DEBUG [25/31]: Configure HTTP to proxy connections
  4951. 2017-05-11T02:30:33Z DEBUG duration: 0 seconds
  4952. 2017-05-11T02:30:33Z DEBUG [26/31]: restarting certificate server
  4953. 2017-05-11T02:30:33Z DEBUG Starting external process
  4954. 2017-05-11T02:30:33Z DEBUG args=/bin/systemctl restart [email protected]
  4955. 2017-05-11T02:30:42Z DEBUG Process finished, return code=0
  4956. 2017-05-11T02:30:42Z DEBUG stdout=
  4957. 2017-05-11T02:30:42Z DEBUG stderr=
  4958. 2017-05-11T02:30:42Z DEBUG Starting external process
  4959. 2017-05-11T02:30:42Z DEBUG args=/bin/systemctl is-active [email protected]
  4960. 2017-05-11T02:30:42Z DEBUG Process finished, return code=0
  4961. 2017-05-11T02:30:42Z DEBUG stdout=active
  4962.  
  4963. 2017-05-11T02:30:42Z DEBUG stderr=
  4964. 2017-05-11T02:30:42Z DEBUG wait_for_open_ports: localhost [8080, 8443] timeout 300
  4965. 2017-05-11T02:30:44Z DEBUG Waiting until the CA is running
  4966. 2017-05-11T02:30:44Z DEBUG request POST http://ipa.rdlg.net:8080/ca/admin/ca/getStatus
  4967. 2017-05-11T02:30:44Z DEBUG request body ''
  4968. 2017-05-11T02:30:52Z DEBUG response status 200
  4969. 2017-05-11T02:30:52Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:52 GMT', 'content-length': '170', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  4970. 2017-05-11T02:30:52Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><State>1</State><Type>CA</Type><Status>running</Status><Version>10.3.3-18.el7_3</Version></XMLResponse>'
  4971. 2017-05-11T02:30:52Z DEBUG The CA status is: running
  4972. 2017-05-11T02:30:52Z DEBUG duration: 19 seconds
  4973. 2017-05-11T02:30:52Z DEBUG [27/31]: migrating certificate profiles to LDAP
  4974. 2017-05-11T02:30:52Z DEBUG Created connection context.ldap2_83903632
  4975. 2017-05-11T02:30:52Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  4976. 2017-05-11T02:30:52Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7320128>
  4977. 2017-05-11T02:30:53Z DEBUG Destroyed connection context.ldap2_83903632
  4978. 2017-05-11T02:30:53Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  4979. 2017-05-11T02:30:53Z DEBUG request body ''
  4980. 2017-05-11T02:30:53Z DEBUG NSSConnection init ipa.rdlg.net
  4981. 2017-05-11T02:30:53Z DEBUG Connecting: 172.20.0.200:0
  4982. 2017-05-11T02:30:53Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  4983. 2017-05-11T02:30:53Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  4984. 2017-05-11T02:30:53Z DEBUG handshake complete, peer = 172.20.0.200:8443
  4985. 2017-05-11T02:30:53Z DEBUG Protocol: TLS1.2
  4986. 2017-05-11T02:30:53Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  4987. 2017-05-11T02:30:54Z DEBUG response status 200
  4988. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=46FD6DF21C28C850B2B6E8B4670D7622; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  4989. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  4990. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  4991. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates.\nvisible=true\nenable=true\nenableBy=admin\nname=Manual User Dual-Use Certificate Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=keyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=-\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caUserCert\nclassId=caEnrollImpl\n'
  4992. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  4993. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  4994. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  4995. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  4996. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  4997. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  4998. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  4999. 2017-05-11T02:30:54Z DEBUG response status 409
  5000. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5001. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5002. 2017-05-11T02:30:54Z DEBUG Error migrating 'caUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  5003. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caUserCert?action=enable
  5004. 2017-05-11T02:30:54Z DEBUG request body ''
  5005. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5006. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5007. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5008. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5009. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5010. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5011. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5012. 2017-05-11T02:30:54Z DEBUG response status 500
  5013. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6520', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5014. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5015. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5016. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5017. 2017-05-11T02:30:54Z DEBUG request body ''
  5018. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5019. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5020. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5021. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5022. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5023. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5024. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5025. 2017-05-11T02:30:54Z DEBUG response status 204
  5026. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=DA0F105A63528E1D88C41CEAE42B6D84; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5027. 2017-05-11T02:30:54Z DEBUG response body ''
  5028. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5029. 2017-05-11T02:30:54Z DEBUG request body ''
  5030. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5031. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5032. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5033. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5034. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5035. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5036. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5037. 2017-05-11T02:30:54Z DEBUG response status 200
  5038. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=040BFE94D36250CB8F0624A171B2E1D2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5039. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5040. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5041. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling user ECC certificates.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Dual-Use ECC Certificate Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=keyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=EC\npolicyset.userCertSet.3.constraint.params.keyParameters=nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caECUserCert\nclassId=caEnrollImpl\n'
  5042. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5043. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5044. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5045. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5046. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5047. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5048. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5049. 2017-05-11T02:30:54Z DEBUG response status 409
  5050. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5051. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5052. 2017-05-11T02:30:54Z DEBUG Error migrating 'caECUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  5053. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caECUserCert?action=enable
  5054. 2017-05-11T02:30:54Z DEBUG request body ''
  5055. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5056. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5057. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5058. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5059. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5060. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5061. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5062. 2017-05-11T02:30:54Z DEBUG response status 500
  5063. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6520', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5064. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5065. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5066. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5067. 2017-05-11T02:30:54Z DEBUG request body ''
  5068. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5069. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5070. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5071. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5072. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5073. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5074. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5075. 2017-05-11T02:30:54Z DEBUG response status 204
  5076. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=9EA9BC3B10FF742555CDEAC8B774CE25; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5077. 2017-05-11T02:30:54Z DEBUG response body ''
  5078. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5079. 2017-05-11T02:30:54Z DEBUG request body ''
  5080. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5081. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5082. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5083. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5084. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5085. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5086. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5087. 2017-05-11T02:30:54Z DEBUG response status 200
  5088. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=7EB614EA21AE5E4AEB76579A135E0844; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5089. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5090. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5091. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates with S/MIME capabilities extension - OID: 1.2.840.113549.1.9.15\nvisible=true\nenable=true\nenableBy=admin\nname=Manual User Dual-Use S/MIME capabilities Certificate Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=keyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9,11\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=-\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\npolicyset.userCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.11.constraint.name=No Constraint\npolicyset.userCertSet.11.default.class_id=genericExtDefaultImpl\npolicyset.userCertSet.11.default.name=Generic Extension\npolicyset.userCertSet.11.default.params.genericExtOID=1.2.840.113549.1.9.15\npolicyset.userCertSet.11.default.params.genericExtData=3067300B06092A864886F70D010105300B06092A864886F70D01010B300B06092A864886F70D01010C300B06092A864886F70D01010D300A06082A864886F70D0307300B0609608648016503040102300B060960864801650304012A300B06092A864886F70D010101\nprofileId=caUserSMIMEcapCert\nclassId=caEnrollImpl\n'
  5092. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5093. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5094. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5095. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5096. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5097. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5098. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5099. 2017-05-11T02:30:54Z DEBUG response status 409
  5100. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5101. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5102. 2017-05-11T02:30:54Z DEBUG Error migrating 'caUserSMIMEcapCert': Non-2xx response from CA REST API: 409. Profile already exists
  5103. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caUserSMIMEcapCert?action=enable
  5104. 2017-05-11T02:30:54Z DEBUG request body ''
  5105. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5106. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5107. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5108. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5109. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5110. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5111. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5112. 2017-05-11T02:30:54Z DEBUG response status 500
  5113. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6520', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5114. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5115. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5116. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5117. 2017-05-11T02:30:54Z DEBUG request body ''
  5118. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5119. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5120. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5121. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5122. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5123. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5124. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5125. 2017-05-11T02:30:54Z DEBUG response status 204
  5126. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=B9F26815F636D5A804F4AEDFFC622B8C; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5127. 2017-05-11T02:30:54Z DEBUG response body ''
  5128. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5129. 2017-05-11T02:30:54Z DEBUG request body ''
  5130. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5131. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5132. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5133. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5134. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5135. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5136. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5137. 2017-05-11T02:30:54Z DEBUG response status 200
  5138. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=34934FBB1F4F7B4160CD13C13C73F300; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5139. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5140. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5141. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling dual user certificates. It works only with Netscape 7.0 or later.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Signing & Encryption Certificates Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=dualKeyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=encryptionCertSet,signingCertSet\npolicyset.encryptionCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.encryptionCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.encryptionCertSet.1.constraint.name=Subject Name Constraint\npolicyset.encryptionCertSet.1.constraint.params.pattern=UID=.*\npolicyset.encryptionCertSet.1.constraint.params.accept=true\npolicyset.encryptionCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.encryptionCertSet.1.default.name=Subject Name Default\npolicyset.encryptionCertSet.1.default.params.name=\npolicyset.encryptionCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.encryptionCertSet.2.constraint.name=Validity Constraint\npolicyset.encryptionCertSet.2.constraint.params.range=365\npolicyset.encryptionCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.encryptionCertSet.2.constraint.params.notAfterCheck=false\npolicyset.encryptionCertSet.2.default.class_id=validityDefaultImpl\npolicyset.encryptionCertSet.2.default.name=Validity Default\npolicyset.encryptionCertSet.2.default.params.range=180\npolicyset.encryptionCertSet.2.default.params.startTime=0\npolicyset.encryptionCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.encryptionCertSet.3.constraint.name=Key Constraint\npolicyset.encryptionCertSet.3.constraint.params.keyType=RSA\npolicyset.encryptionCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.encryptionCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.encryptionCertSet.3.default.name=Key Default\npolicyset.encryptionCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.4.constraint.name=No Constraint\npolicyset.encryptionCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.encryptionCertSet.4.default.name=Authority Key Identifier Default\npolicyset.encryptionCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.5.constraint.name=No Constraint\npolicyset.encryptionCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.encryptionCertSet.5.default.name=AIA Extension Default\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.encryptionCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.encryptionCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.encryptionCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.encryptionCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.encryptionCertSet.6.default.name=Key Usage Default\npolicyset.encryptionCertSet.6.default.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.default.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.default.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.7.constraint.name=No Constraint\npolicyset.encryptionCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.encryptionCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.encryptionCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.encryptionCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.encryptionCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.8.constraint.name=No Constraint\npolicyset.encryptionCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.encryptionCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.encryptionCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.encryptionCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.encryptionCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.encryptionCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.encryptionCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.encryptionCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.encryptionCertSet.9.constraint.name=No Constraint\npolicyset.encryptionCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.encryptionCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.encryptionCertSet.9.default.name=Signing Alg\npolicyset.encryptionCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.list=1,2,3,4,6,7,8,9\npolicyset.signingCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.signingCertSet.1.constraint.name=Subject Name Constraint\npolicyset.signingCertSet.1.constraint.params.pattern=UID=.*\npolicyset.signingCertSet.1.constraint.params.accept=true\npolicyset.signingCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.signingCertSet.1.default.name=Subject Name Default\npolicyset.signingCertSet.1.default.params.name=\npolicyset.signingCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.signingCertSet.2.constraint.name=Validity Constraint\npolicyset.signingCertSet.2.constraint.params.range=365\npolicyset.signingCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.signingCertSet.2.constraint.params.notAfterCheck=false\npolicyset.signingCertSet.2.default.class_id=validityDefaultImpl\npolicyset.signingCertSet.2.default.name=Validity Default\npolicyset.signingCertSet.2.default.params.range=180\npolicyset.signingCertSet.2.default.params.startTime=0\npolicyset.signingCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.signingCertSet.3.constraint.name=Key Constraint\npolicyset.signingCertSet.3.constraint.params.keyType=RSA\npolicyset.signingCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.signingCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.signingCertSet.3.default.name=Key Default\npolicyset.signingCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.4.constraint.name=No Constraint\npolicyset.signingCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.signingCertSet.4.default.name=Authority Key Identifier Default\npolicyset.signingCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.signingCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.signingCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.signingCertSet.6.default.name=Key Usage Default\npolicyset.signingCertSet.6.default.params.keyUsageCritical=true\npolicyset.signingCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.7.constraint.name=No Constraint\npolicyset.signingCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.signingCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.signingCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.signingCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.signingCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.8.constraint.name=No Constraint\npolicyset.signingCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.signingCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.signingCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.signingCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.signingCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.signingCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.signingCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.signingCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.signingCertSet.9.constraint.name=No Constraint\npolicyset.signingCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.signingCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.signingCertSet.9.default.name=Signing Alg\npolicyset.signingCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.9.default.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\nprofileId=caDualCert\nclassId=caEnrollImpl\n'
  5142. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5143. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5144. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5145. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5146. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5147. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5148. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5149. 2017-05-11T02:30:54Z DEBUG response status 409
  5150. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5151. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5152. 2017-05-11T02:30:54Z DEBUG Error migrating 'caDualCert': Non-2xx response from CA REST API: 409. Profile already exists
  5153. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDualCert?action=enable
  5154. 2017-05-11T02:30:54Z DEBUG request body ''
  5155. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5156. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5157. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5158. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5159. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5160. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5161. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5162. 2017-05-11T02:30:54Z DEBUG response status 500
  5163. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6520', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5164. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n\tsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5165. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5166. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5167. 2017-05-11T02:30:54Z DEBUG request body ''
  5168. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5169. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5170. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5171. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5172. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5173. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5174. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5175. 2017-05-11T02:30:54Z DEBUG response status 204
  5176. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=C240B403C517A5BD8BF13EC248AF68FA; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5177. 2017-05-11T02:30:54Z DEBUG response body ''
  5178. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5179. 2017-05-11T02:30:54Z DEBUG request body ''
  5180. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5181. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5182. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5183. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5184. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5185. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5186. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5187. 2017-05-11T02:30:54Z DEBUG response status 200
  5188. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=144987A81FEC4CDC6BFD553798A5D971; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5189. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5190. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5191. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling dual user certificates. It works only with Netscape 7.0 or later.\nvisible=true\nenable=true\nenableBy=admin\nname=Directory-authenticated User Signing & Encryption Certificates Enrollment\nauth.instance_id=UserDirEnrollment\ninput.list=i1,i2,i3\ninput.i1.class_id=dualKeyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=encryptionCertSet,signingCertSet\npolicyset.encryptionCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.encryptionCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.encryptionCertSet.1.constraint.name=Subject Name Constraint\npolicyset.encryptionCertSet.1.constraint.params.pattern=UID=.*\npolicyset.encryptionCertSet.1.constraint.params.accept=true\npolicyset.encryptionCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.encryptionCertSet.1.default.name=Subject Name Default\npolicyset.encryptionCertSet.1.default.params.name=\npolicyset.encryptionCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.encryptionCertSet.2.constraint.name=Validity Constraint\npolicyset.encryptionCertSet.2.constraint.params.range=365\npolicyset.encryptionCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.encryptionCertSet.2.constraint.params.notAfterCheck=false\npolicyset.encryptionCertSet.2.default.class_id=validityDefaultImpl\npolicyset.encryptionCertSet.2.default.name=Validity Default\npolicyset.encryptionCertSet.2.default.params.range=180\npolicyset.encryptionCertSet.2.default.params.startTime=0\npolicyset.encryptionCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.encryptionCertSet.3.constraint.name=Key Constraint\npolicyset.encryptionCertSet.3.constraint.params.keyType=RSA\npolicyset.encryptionCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.encryptionCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.encryptionCertSet.3.default.name=Key Default\npolicyset.encryptionCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.4.constraint.name=No Constraint\npolicyset.encryptionCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.encryptionCertSet.4.default.name=Authority Key Identifier Default\npolicyset.encryptionCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.5.constraint.name=No Constraint\npolicyset.encryptionCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.encryptionCertSet.5.default.name=AIA Extension Default\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.encryptionCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.encryptionCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.encryptionCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.encryptionCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.encryptionCertSet.6.default.name=Key Usage Default\npolicyset.encryptionCertSet.6.default.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.default.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.default.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.7.constraint.name=No Constraint\npolicyset.encryptionCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.encryptionCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.encryptionCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.encryptionCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.encryptionCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.8.constraint.name=No Constraint\npolicyset.encryptionCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.encryptionCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.encryptionCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.encryptionCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.encryptionCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.encryptionCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.encryptionCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.encryptionCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.encryptionCertSet.9.constraint.name=No Constraint\npolicyset.encryptionCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA384withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.encryptionCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.encryptionCertSet.9.default.name=Signing Alg\npolicyset.encryptionCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.list=1,2,3,4,6,7,8,9\npolicyset.signingCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.signingCertSet.1.constraint.name=Subject Name Constraint\npolicyset.signingCertSet.1.constraint.params.pattern=UID=.*\npolicyset.signingCertSet.1.constraint.params.accept=true\npolicyset.signingCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.signingCertSet.1.default.name=Subject Name Default\npolicyset.signingCertSet.1.default.params.name=\npolicyset.signingCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.signingCertSet.2.constraint.name=Validity Constraint\npolicyset.signingCertSet.2.constraint.params.range=365\npolicyset.signingCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.signingCertSet.2.constraint.params.notAfterCheck=false\npolicyset.signingCertSet.2.default.class_id=validityDefaultImpl\npolicyset.signingCertSet.2.default.name=Validity Default\npolicyset.signingCertSet.2.default.params.range=180\npolicyset.signingCertSet.2.default.params.startTime=0\npolicyset.signingCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.signingCertSet.3.constraint.name=Key Constraint\npolicyset.signingCertSet.3.constraint.params.keyType=RSA\npolicyset.signingCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.signingCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.signingCertSet.3.default.name=Key Default\npolicyset.signingCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.4.constraint.name=No Constraint\npolicyset.signingCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.signingCertSet.4.default.name=Authority Key Identifier Default\npolicyset.signingCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.signingCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.signingCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.signingCertSet.6.default.name=Key Usage Default\npolicyset.signingCertSet.6.default.params.keyUsageCritical=true\npolicyset.signingCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.7.constraint.name=No Constraint\npolicyset.signingCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.signingCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.signingCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.signingCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.signingCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.8.constraint.name=No Constraint\npolicyset.signingCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.signingCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.signingCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.signingCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.signingCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.signingCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.signingCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.signingCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.signingCertSet.9.constraint.name=No Constraint\npolicyset.signingCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.signingCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.signingCertSet.9.default.name=Signing Alg\npolicyset.signingCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.9.default.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\nprofileId=caDirBasedDualCert\nclassId=caEnrollImpl\n'
  5192. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5193. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5194. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5195. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5196. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5197. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5198. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5199. 2017-05-11T02:30:54Z DEBUG response status 409
  5200. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5201. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5202. 2017-05-11T02:30:54Z DEBUG Error migrating 'caDirBasedDualCert': Non-2xx response from CA REST API: 409. Profile already exists
  5203. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDirBasedDualCert?action=enable
  5204. 2017-05-11T02:30:54Z DEBUG request body ''
  5205. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5206. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5207. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5208. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5209. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5210. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5211. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5212. 2017-05-11T02:30:54Z DEBUG response status 500
  5213. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5214. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5215. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5216. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5217. 2017-05-11T02:30:54Z DEBUG request body ''
  5218. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5219. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5220. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5221. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5222. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5223. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5224. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5225. 2017-05-11T02:30:54Z DEBUG response status 204
  5226. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=B55E3A8D30B594FD0D7FD1D1FAD7235B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5227. 2017-05-11T02:30:54Z DEBUG response body ''
  5228. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5229. 2017-05-11T02:30:54Z DEBUG request body ''
  5230. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5231. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5232. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5233. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5234. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5235. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5236. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5237. 2017-05-11T02:30:54Z DEBUG response status 200
  5238. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=4C186CD489792FFADC572F2BF715FADE; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5239. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5240. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5241. 2017-05-11T02:30:54Z DEBUG request body 'desc=This certificate profile is for enrolling dual user ECC certificates. It works only with Netscape 7.0 or later.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Signing & Encryption ECC Certificates Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=dualKeyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=encryptionCertSet,signingCertSet\npolicyset.encryptionCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.encryptionCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.encryptionCertSet.1.constraint.name=Subject Name Constraint\npolicyset.encryptionCertSet.1.constraint.params.pattern=UID=.*\npolicyset.encryptionCertSet.1.constraint.params.accept=true\npolicyset.encryptionCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.encryptionCertSet.1.default.name=Subject Name Default\npolicyset.encryptionCertSet.1.default.params.name=\npolicyset.encryptionCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.encryptionCertSet.2.constraint.name=Validity Constraint\npolicyset.encryptionCertSet.2.constraint.params.range=365\npolicyset.encryptionCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.encryptionCertSet.2.constraint.params.notAfterCheck=false\npolicyset.encryptionCertSet.2.default.class_id=validityDefaultImpl\npolicyset.encryptionCertSet.2.default.name=Validity Default\npolicyset.encryptionCertSet.2.default.params.range=180\npolicyset.encryptionCertSet.2.default.params.startTime=0\npolicyset.encryptionCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.encryptionCertSet.3.constraint.name=Key Constraint\npolicyset.encryptionCertSet.3.constraint.params.keyType=EC\npolicyset.encryptionCertSet.3.constraint.params.keyParameters=nistp256,nistp384,nistp521\npolicyset.encryptionCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.encryptionCertSet.3.default.name=Key Default\npolicyset.encryptionCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.4.constraint.name=No Constraint\npolicyset.encryptionCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.encryptionCertSet.4.default.name=Authority Key Identifier Default\npolicyset.encryptionCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.5.constraint.name=No Constraint\npolicyset.encryptionCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.encryptionCertSet.5.default.name=AIA Extension Default\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.encryptionCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.encryptionCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.encryptionCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.encryptionCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.encryptionCertSet.6.default.name=Key Usage Default\npolicyset.encryptionCertSet.6.default.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.default.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.default.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.7.constraint.name=No Constraint\npolicyset.encryptionCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.encryptionCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.encryptionCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.encryptionCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.encryptionCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.8.constraint.name=No Constraint\npolicyset.encryptionCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.encryptionCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.encryptionCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.encryptionCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.encryptionCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.encryptionCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.encryptionCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.encryptionCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.encryptionCertSet.9.constraint.name=No Constraint\npolicyset.encryptionCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.encryptionCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.encryptionCertSet.9.default.name=Signing Alg\npolicyset.encryptionCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.list=1,2,3,4,6,7,8,9\npolicyset.signingCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.signingCertSet.1.constraint.name=Subject Name Constraint\npolicyset.signingCertSet.1.constraint.params.pattern=UID=.*\npolicyset.signingCertSet.1.constraint.params.accept=true\npolicyset.signingCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.signingCertSet.1.default.name=Subject Name Default\npolicyset.signingCertSet.1.default.params.name=\npolicyset.signingCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.signingCertSet.2.constraint.name=Validity Constraint\npolicyset.signingCertSet.2.constraint.params.range=365\npolicyset.signingCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.signingCertSet.2.constraint.params.notAfterCheck=false\npolicyset.signingCertSet.2.default.class_id=validityDefaultImpl\npolicyset.signingCertSet.2.default.name=Validity Default\npolicyset.signingCertSet.2.default.params.range=180\npolicyset.signingCertSet.2.default.params.startTime=0\npolicyset.signingCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.signingCertSet.3.constraint.name=Key Constraint\npolicyset.signingCertSet.3.constraint.params.keyType=EC\npolicyset.signingCertSet.3.constraint.params.keyParameters=nistp256,nistp384,nistp521\npolicyset.signingCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.signingCertSet.3.default.name=Key Default\npolicyset.signingCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.4.constraint.name=No Constraint\npolicyset.signingCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.signingCertSet.4.default.name=Authority Key Identifier Default\npolicyset.signingCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.signingCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.signingCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.signingCertSet.6.default.name=Key Usage Default\npolicyset.signingCertSet.6.default.params.keyUsageCritical=true\npolicyset.signingCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.7.constraint.name=No Constraint\npolicyset.signingCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.signingCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.signingCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.signingCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.signingCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.8.constraint.name=No Constraint\npolicyset.signingCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.signingCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.signingCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.signingCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.signingCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.signingCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.signingCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.signingCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.signingCertSet.9.constraint.name=No Constraint\npolicyset.signingCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.signingCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.signingCertSet.9.default.name=Signing Alg\npolicyset.signingCertSet.9.default.params.signingAlg=-\npolicyset.signingCertSet.9.default.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\nprofileId=caECDualCert\nclassId=caEnrollImpl\n'
  5242. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5243. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5244. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5245. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5246. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5247. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5248. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5249. 2017-05-11T02:30:54Z DEBUG response status 409
  5250. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5251. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5252. 2017-05-11T02:30:54Z DEBUG Error migrating 'caECDualCert': Non-2xx response from CA REST API: 409. Profile already exists
  5253. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caECDualCert?action=enable
  5254. 2017-05-11T02:30:54Z DEBUG request body ''
  5255. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5256. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5257. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5258. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5259. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5260. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5261. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5262. 2017-05-11T02:30:54Z DEBUG response status 500
  5263. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5264. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5265. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5266. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5267. 2017-05-11T02:30:54Z DEBUG request body ''
  5268. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5269. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5270. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5271. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5272. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5273. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5274. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5275. 2017-05-11T02:30:54Z DEBUG response status 204
  5276. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=042FD11A1B84018026B0AD3A0F1694D4; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5277. 2017-05-11T02:30:54Z DEBUG response body ''
  5278. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5279. 2017-05-11T02:30:54Z DEBUG request body ''
  5280. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5281. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5282. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5283. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5284. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5285. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5286. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5287. 2017-05-11T02:30:54Z DEBUG response status 200
  5288. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=E73BAA0CFF371050FE9628A41AC9D514; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5289. 2017-05-11T02:30:54Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5290. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5291. 2017-05-11T02:30:54Z DEBUG request body "desc=This certificate profile is for enrolling Administrator's certificates suitable for use by clients such as browsers.\nvisible=true\nenable=true\nenableBy=admin\nauth.instance_id=\nname=Manual Administrator Certificate Enrollment\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\ninput.i3.class_id=subjectDNInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=adminCertSet\npolicyset.adminCertSet.list=1,2,3,4,5,6,7,8\npolicyset.adminCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.adminCertSet.1.constraint.name=Subject Name Constraint\npolicyset.adminCertSet.1.constraint.params.pattern=.*\npolicyset.adminCertSet.1.constraint.params.accept=true\npolicyset.adminCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.adminCertSet.1.default.name=Subject Name Default\npolicyset.adminCertSet.1.default.params.name=\npolicyset.adminCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.adminCertSet.2.constraint.name=Validity Constraint\npolicyset.adminCertSet.2.constraint.params.range=365\npolicyset.adminCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.adminCertSet.2.constraint.params.notAfterCheck=false\npolicyset.adminCertSet.2.default.class_id=validityDefaultImpl\npolicyset.adminCertSet.2.default.name=Validity Default\npolicyset.adminCertSet.2.default.params.range=365\npolicyset.adminCertSet.2.default.params.startTime=0\npolicyset.adminCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.adminCertSet.3.constraint.name=Key Constraint\npolicyset.adminCertSet.3.constraint.params.keyType=-\npolicyset.adminCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.adminCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.adminCertSet.3.default.name=Key Default\npolicyset.adminCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.4.constraint.name=No Constraint\npolicyset.adminCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.adminCertSet.4.default.name=Authority Key Identifier Default\npolicyset.adminCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.5.constraint.name=No Constraint\npolicyset.adminCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.adminCertSet.5.default.name=AIA Extension Default\npolicyset.adminCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.adminCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.adminCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.adminCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.adminCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.adminCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.adminCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.adminCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.adminCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.adminCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.adminCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.adminCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.adminCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.adminCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.adminCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.adminCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.adminCertSet.6.default.name=Key Usage Default\npolicyset.adminCertSet.6.default.params.keyUsageCritical=true\npolicyset.adminCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.adminCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.adminCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.adminCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.adminCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.adminCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.adminCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.adminCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.adminCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.adminCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.7.constraint.name=No Constraint\npolicyset.adminCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.adminCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.adminCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.adminCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.adminCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.adminCertSet.8.constraint.name=No Constraint\npolicyset.adminCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.adminCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.adminCertSet.8.default.name=Signing Alg\npolicyset.adminCertSet.8.default.params.signingAlg=-\nprofileId=AdminCert\nclassId=caEnrollImpl\n"
  5292. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5293. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5294. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5295. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5296. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5297. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5298. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5299. 2017-05-11T02:30:54Z DEBUG response status 409
  5300. 2017-05-11T02:30:54Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5301. 2017-05-11T02:30:54Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5302. 2017-05-11T02:30:54Z DEBUG Error migrating 'AdminCert': Non-2xx response from CA REST API: 409. Profile already exists
  5303. 2017-05-11T02:30:54Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/AdminCert?action=enable
  5304. 2017-05-11T02:30:54Z DEBUG request body ''
  5305. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5306. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5307. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5308. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5309. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5310. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5311. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5312. 2017-05-11T02:30:54Z DEBUG response status 500
  5313. 2017-05-11T02:30:54Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5314. 2017-05-11T02:30:54Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5315. 2017-05-11T02:30:54Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5316. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5317. 2017-05-11T02:30:54Z DEBUG request body ''
  5318. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5319. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5320. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5321. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5322. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5323. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5324. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5325. 2017-05-11T02:30:54Z DEBUG response status 204
  5326. 2017-05-11T02:30:54Z DEBUG response headers {'set-cookie': 'JSESSIONID=24661E0665FCB5CF3110082DCEFDF294; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5327. 2017-05-11T02:30:54Z DEBUG response body ''
  5328. 2017-05-11T02:30:54Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5329. 2017-05-11T02:30:54Z DEBUG request body ''
  5330. 2017-05-11T02:30:54Z DEBUG NSSConnection init ipa.rdlg.net
  5331. 2017-05-11T02:30:54Z DEBUG Connecting: 172.20.0.200:0
  5332. 2017-05-11T02:30:54Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5333. 2017-05-11T02:30:54Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5334. 2017-05-11T02:30:54Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5335. 2017-05-11T02:30:54Z DEBUG Protocol: TLS1.2
  5336. 2017-05-11T02:30:54Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5337. 2017-05-11T02:30:55Z DEBUG response status 200
  5338. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=DC3BE0380E26C75661E3DB3EBF78D0A2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/xml'}
  5339. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5340. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5341. 2017-05-11T02:30:55Z DEBUG request body 'desc=This profile is for enrolling audit log signing certificates\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual Log Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=caLogSigningSet\npolicyset.caLogSigningSet.list=1,2,3,4,6,8,9\npolicyset.caLogSigningSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.caLogSigningSet.1.constraint.name=Subject Name Constraint\npolicyset.caLogSigningSet.1.constraint.params.pattern=CN=.*\npolicyset.caLogSigningSet.1.constraint.params.accept=true\npolicyset.caLogSigningSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.caLogSigningSet.1.default.name=Subject Name Default\npolicyset.caLogSigningSet.1.default.params.name=\npolicyset.caLogSigningSet.2.constraint.class_id=validityConstraintImpl\npolicyset.caLogSigningSet.2.constraint.name=Validity Constraint\npolicyset.caLogSigningSet.2.constraint.params.range=720\npolicyset.caLogSigningSet.2.constraint.params.notBeforeCheck=false\npolicyset.caLogSigningSet.2.constraint.params.notAfterCheck=false\npolicyset.caLogSigningSet.2.default.class_id=validityDefaultImpl\npolicyset.caLogSigningSet.2.default.name=Validity Default\npolicyset.caLogSigningSet.2.default.params.range=720\npolicyset.caLogSigningSet.2.default.params.startTime=0\npolicyset.caLogSigningSet.3.constraint.class_id=keyConstraintImpl\npolicyset.caLogSigningSet.3.constraint.name=Key Constraint\npolicyset.caLogSigningSet.3.constraint.params.keyType=RSA\npolicyset.caLogSigningSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.caLogSigningSet.3.default.class_id=userKeyDefaultImpl\npolicyset.caLogSigningSet.3.default.name=Key Default\npolicyset.caLogSigningSet.4.constraint.class_id=noConstraintImpl\npolicyset.caLogSigningSet.4.constraint.name=No Constraint\npolicyset.caLogSigningSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.caLogSigningSet.4.default.name=Authority Key Identifier Default\npolicyset.caLogSigningSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.caLogSigningSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.caLogSigningSet.6.constraint.params.keyUsageCritical=true\npolicyset.caLogSigningSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.caLogSigningSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.caLogSigningSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.caLogSigningSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.caLogSigningSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.caLogSigningSet.6.default.name=Key Usage Default\npolicyset.caLogSigningSet.6.default.params.keyUsageCritical=true\npolicyset.caLogSigningSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.caLogSigningSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.caLogSigningSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.caLogSigningSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.caLogSigningSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.caLogSigningSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.caLogSigningSet.6.default.params.keyUsageCrlSign=false\npolicyset.caLogSigningSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.caLogSigningSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.caLogSigningSet.8.constraint.class_id=noConstraintImpl\npolicyset.caLogSigningSet.8.constraint.name=No Constraint\npolicyset.caLogSigningSet.8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.caLogSigningSet.8.default.name=Subject Key Identifier Extension Default\npolicyset.caLogSigningSet.8.default.params.critical=false\npolicyset.caLogSigningSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.caLogSigningSet.9.constraint.name=No Constraint\npolicyset.caLogSigningSet.9.constraint.params.signingAlgsAllowed=MD5withRSA,MD2withRSA,SHA1withRSA,SHA256withRSA,SHA512withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.caLogSigningSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.caLogSigningSet.9.default.name=Signing Alg\npolicyset.caLogSigningSet.9.default.params.signingAlg=-\nprofileId=caSignedLogCert\nclassId=caEnrollImpl\n'
  5342. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5343. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5344. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5345. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5346. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5347. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5348. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5349. 2017-05-11T02:30:55Z DEBUG response status 409
  5350. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5351. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5352. 2017-05-11T02:30:55Z DEBUG Error migrating 'caSignedLogCert': Non-2xx response from CA REST API: 409. Profile already exists
  5353. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSignedLogCert?action=enable
  5354. 2017-05-11T02:30:55Z DEBUG request body ''
  5355. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5356. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5357. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5358. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5359. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5360. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5361. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5362. 2017-05-11T02:30:55Z DEBUG response status 500
  5363. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:54 GMT', 'content-type': 'text/html;charset=utf-8'}
  5364. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5365. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5366. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5367. 2017-05-11T02:30:55Z DEBUG request body ''
  5368. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5369. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5370. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5371. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5372. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5373. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5374. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5375. 2017-05-11T02:30:55Z DEBUG response status 204
  5376. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=7AA05A9DDDEE34BEED4232409651B965; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5377. 2017-05-11T02:30:55Z DEBUG response body ''
  5378. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5379. 2017-05-11T02:30:55Z DEBUG request body ''
  5380. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5381. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5382. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5383. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5384. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5385. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5386. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5387. 2017-05-11T02:30:55Z DEBUG response status 200
  5388. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=1BC28DC8994A6112F7C33650F4650F46; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5389. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5390. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5391. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling TPS server certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual TPS Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caTPSCert\nclassId=caEnrollImpl\n'
  5392. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5393. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5394. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5395. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5396. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5397. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5398. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5399. 2017-05-11T02:30:55Z DEBUG response status 409
  5400. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5401. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5402. 2017-05-11T02:30:55Z DEBUG Error migrating 'caTPSCert': Non-2xx response from CA REST API: 409. Profile already exists
  5403. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTPSCert?action=enable
  5404. 2017-05-11T02:30:55Z DEBUG request body ''
  5405. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5406. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5407. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5408. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5409. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5410. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5411. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5412. 2017-05-11T02:30:55Z DEBUG response status 500
  5413. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5414. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5415. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5416. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5417. 2017-05-11T02:30:55Z DEBUG request body ''
  5418. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5419. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5420. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5421. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5422. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5423. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5424. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5425. 2017-05-11T02:30:55Z DEBUG response status 204
  5426. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=47DC5F2C6D258E45E557ACC83A990060; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5427. 2017-05-11T02:30:55Z DEBUG response body ''
  5428. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5429. 2017-05-11T02:30:55Z DEBUG request body ''
  5430. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5431. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5432. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5433. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5434. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5435. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5436. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5437. 2017-05-11T02:30:55Z DEBUG response status 200
  5438. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=370AC3D36623B4095E5F3D852FE29078; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5439. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5440. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5441. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling router certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=RA Agent-Authenticated Router Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caRARouterCert\nclassId=caEnrollImpl\n'
  5442. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5443. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5444. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5445. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5446. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5447. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5448. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5449. 2017-05-11T02:30:55Z DEBUG response status 409
  5450. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5451. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5452. 2017-05-11T02:30:55Z DEBUG Error migrating 'caRARouterCert': Non-2xx response from CA REST API: 409. Profile already exists
  5453. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caRARouterCert?action=enable
  5454. 2017-05-11T02:30:55Z DEBUG request body ''
  5455. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5456. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5457. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5458. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5459. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5460. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5461. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5462. 2017-05-11T02:30:55Z DEBUG response status 500
  5463. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5464. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5465. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5466. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5467. 2017-05-11T02:30:55Z DEBUG request body ''
  5468. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5469. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5470. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5471. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5472. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5473. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5474. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5475. 2017-05-11T02:30:55Z DEBUG response status 204
  5476. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=24D6FAB637F1C197A16D514BE733B51A; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5477. 2017-05-11T02:30:55Z DEBUG response body ''
  5478. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5479. 2017-05-11T02:30:55Z DEBUG request body ''
  5480. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5481. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5482. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5483. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5484. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5485. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5486. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5487. 2017-05-11T02:30:55Z DEBUG response status 200
  5488. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=AE7CD0068442866E31AB80D24CD5EBC0; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5489. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5490. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5491. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling router certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=flatFileAuth\nname=One Time Pin Router Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caRouterCert\nclassId=caEnrollImpl\n'
  5492. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5493. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5494. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5495. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5496. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5497. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5498. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5499. 2017-05-11T02:30:55Z DEBUG response status 409
  5500. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5501. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5502. 2017-05-11T02:30:55Z DEBUG Error migrating 'caRouterCert': Non-2xx response from CA REST API: 409. Profile already exists
  5503. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caRouterCert?action=enable
  5504. 2017-05-11T02:30:55Z DEBUG request body ''
  5505. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5506. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5507. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5508. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5509. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5510. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5511. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5512. 2017-05-11T02:30:55Z DEBUG response status 500
  5513. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5514. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5515. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5516. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5517. 2017-05-11T02:30:55Z DEBUG request body ''
  5518. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5519. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5520. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5521. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5522. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5523. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5524. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5525. 2017-05-11T02:30:55Z DEBUG response status 204
  5526. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=9D065B162B15A99C4196A4D93EE205BE; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5527. 2017-05-11T02:30:55Z DEBUG response body ''
  5528. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5529. 2017-05-11T02:30:55Z DEBUG request body ''
  5530. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5531. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5532. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5533. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5534. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5535. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5536. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5537. 2017-05-11T02:30:55Z DEBUG response status 200
  5538. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=CAC3858C06215F9E52C22A6F80AFCFBD; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5539. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5540. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5541. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling server certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=.*CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caServerCert\nclassId=caEnrollImpl\n'
  5542. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5543. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5544. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5545. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5546. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5547. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5548. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5549. 2017-05-11T02:30:55Z DEBUG response status 409
  5550. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5551. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5552. 2017-05-11T02:30:55Z DEBUG Error migrating 'caServerCert': Non-2xx response from CA REST API: 409. Profile already exists
  5553. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caServerCert?action=enable
  5554. 2017-05-11T02:30:55Z DEBUG request body ''
  5555. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5556. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5557. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5558. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5559. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5560. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5561. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5562. 2017-05-11T02:30:55Z DEBUG response status 500
  5563. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5564. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5565. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5566. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5567. 2017-05-11T02:30:55Z DEBUG request body ''
  5568. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5569. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5570. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5571. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5572. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5573. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5574. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5575. 2017-05-11T02:30:55Z DEBUG response status 204
  5576. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=EEC3A5E4616CDC92E4CA0159ECF394F8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5577. 2017-05-11T02:30:55Z DEBUG response body ''
  5578. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5579. 2017-05-11T02:30:55Z DEBUG request body ''
  5580. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5581. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5582. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5583. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5584. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5585. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5586. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5587. 2017-05-11T02:30:55Z DEBUG response status 200
  5588. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=B6CB304E7FB2D4DB05AE61E08901A598; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5589. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5590. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5591. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling subsystem certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual Subsystem Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caSubsystemCert\nclassId=caEnrollImpl\n'
  5592. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5593. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5594. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5595. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5596. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5597. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5598. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5599. 2017-05-11T02:30:55Z DEBUG response status 409
  5600. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5601. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5602. 2017-05-11T02:30:55Z DEBUG Error migrating 'caSubsystemCert': Non-2xx response from CA REST API: 409. Profile already exists
  5603. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSubsystemCert?action=enable
  5604. 2017-05-11T02:30:55Z DEBUG request body ''
  5605. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5606. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5607. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5608. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5609. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5610. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5611. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5612. 2017-05-11T02:30:55Z DEBUG response status 500
  5613. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5614. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5615. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5616. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5617. 2017-05-11T02:30:55Z DEBUG request body ''
  5618. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5619. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5620. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5621. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5622. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5623. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5624. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5625. 2017-05-11T02:30:55Z DEBUG response status 204
  5626. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=586BD0C8C2163E855718416104F3461E; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5627. 2017-05-11T02:30:55Z DEBUG response body ''
  5628. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5629. 2017-05-11T02:30:55Z DEBUG request body ''
  5630. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5631. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5632. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5633. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5634. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5635. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5636. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5637. 2017-05-11T02:30:55Z DEBUG response status 200
  5638. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=F0694B09D01938C76727D5E7974DDCE8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5639. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5640. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5641. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling other certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Other Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=otherCertSet\npolicyset.otherCertSet.list=1,2,3,4,5,6,7,8\npolicyset.otherCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.otherCertSet.1.constraint.name=Subject Name Constraint\npolicyset.otherCertSet.1.constraint.params.pattern=CN=.*\npolicyset.otherCertSet.1.constraint.params.accept=true\npolicyset.otherCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.otherCertSet.1.default.name=Subject Name Default\npolicyset.otherCertSet.1.default.params.name=\npolicyset.otherCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.otherCertSet.2.constraint.name=Validity Constraint\npolicyset.otherCertSet.2.constraint.params.range=720\npolicyset.otherCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.otherCertSet.2.constraint.params.notAfterCheck=false\npolicyset.otherCertSet.2.default.class_id=validityDefaultImpl\npolicyset.otherCertSet.2.default.name=Validity Default\npolicyset.otherCertSet.2.default.params.range=720\npolicyset.otherCertSet.2.default.params.startTime=0\npolicyset.otherCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.otherCertSet.3.constraint.name=Key Constraint\npolicyset.otherCertSet.3.constraint.params.keyType=-\npolicyset.otherCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.otherCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.otherCertSet.3.default.name=Key Default\npolicyset.otherCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.otherCertSet.4.constraint.name=No Constraint\npolicyset.otherCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.otherCertSet.4.default.name=Authority Key Identifier Default\npolicyset.otherCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.otherCertSet.5.constraint.name=No Constraint\npolicyset.otherCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.otherCertSet.5.default.name=AIA Extension Default\npolicyset.otherCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.otherCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.otherCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.otherCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.otherCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.otherCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.otherCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.otherCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.otherCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.otherCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.otherCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.otherCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.otherCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.otherCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.otherCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.otherCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.otherCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.otherCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.otherCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.otherCertSet.6.default.name=Key Usage Default\npolicyset.otherCertSet.6.default.params.keyUsageCritical=true\npolicyset.otherCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.otherCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.otherCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.otherCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.otherCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.otherCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.otherCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.otherCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.otherCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.otherCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.otherCertSet.7.constraint.name=No Constraint\npolicyset.otherCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.otherCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.otherCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.otherCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.otherCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.otherCertSet.8.constraint.name=No Constraint\npolicyset.otherCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.otherCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.otherCertSet.8.default.name=Signing Alg\npolicyset.otherCertSet.8.default.params.signingAlg=-\nprofileId=caOtherCert\nclassId=caEnrollImpl\n'
  5642. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5643. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5644. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5645. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5646. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5647. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5648. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5649. 2017-05-11T02:30:55Z DEBUG response status 409
  5650. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5651. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5652. 2017-05-11T02:30:55Z DEBUG Error migrating 'caOtherCert': Non-2xx response from CA REST API: 409. Profile already exists
  5653. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caOtherCert?action=enable
  5654. 2017-05-11T02:30:55Z DEBUG request body ''
  5655. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5656. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5657. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5658. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5659. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5660. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5661. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5662. 2017-05-11T02:30:55Z DEBUG response status 500
  5663. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5664. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5665. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5666. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5667. 2017-05-11T02:30:55Z DEBUG request body ''
  5668. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5669. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5670. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5671. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5672. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5673. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5674. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5675. 2017-05-11T02:30:55Z DEBUG response status 204
  5676. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=0E81CE66AB933454F40F6C29DBF786F3; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5677. 2017-05-11T02:30:55Z DEBUG response body ''
  5678. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5679. 2017-05-11T02:30:55Z DEBUG request body ''
  5680. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5681. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5682. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5683. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5684. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5685. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5686. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5687. 2017-05-11T02:30:55Z DEBUG response status 200
  5688. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=33A345D9395D85A8BD078E5D4921AB6C; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5689. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5690. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5691. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling Certificate Authority certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual Certificate Manager Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=caCertSet\npolicyset.caCertSet.list=1,2,3,4,5,6,8,9,10\npolicyset.caCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.caCertSet.1.constraint.name=Subject Name Constraint\npolicyset.caCertSet.1.constraint.params.pattern=CN=.*\npolicyset.caCertSet.1.constraint.params.accept=true\npolicyset.caCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.caCertSet.1.default.name=Subject Name Default\npolicyset.caCertSet.1.default.params.name=\npolicyset.caCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.caCertSet.2.constraint.name=Validity Constraint\npolicyset.caCertSet.2.constraint.params.range=7305\npolicyset.caCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.caCertSet.2.constraint.params.notAfterCheck=false\npolicyset.caCertSet.2.default.class_id=caValidityDefaultImpl\npolicyset.caCertSet.2.default.name=CA Certificate Validity Default\npolicyset.caCertSet.2.default.params.range=7305\npolicyset.caCertSet.2.default.params.startTime=0\npolicyset.caCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.caCertSet.3.constraint.name=Key Constraint\npolicyset.caCertSet.3.constraint.params.keyType=-\npolicyset.caCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.caCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.caCertSet.3.default.name=Key Default\npolicyset.caCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.4.constraint.name=No Constraint\npolicyset.caCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.4.default.name=Authority Key Identifier Default\npolicyset.caCertSet.5.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.caCertSet.5.constraint.name=Basic Constraint Extension Constraint\npolicyset.caCertSet.5.constraint.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.caCertSet.5.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.caCertSet.5.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.caCertSet.5.default.name=Basic Constraints Extension Default\npolicyset.caCertSet.5.default.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.default.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.default.params.basicConstraintsPathLen=-1\npolicyset.caCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.caCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.caCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.caCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.caCertSet.6.default.name=Key Usage Default\npolicyset.caCertSet.6.default.params.keyUsageCritical=true\npolicyset.caCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.default.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.default.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.8.constraint.name=No Constraint\npolicyset.caCertSet.8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.8.default.name=Subject Key Identifier Extension Default\npolicyset.caCertSet.8.default.params.critical=false\npolicyset.caCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.caCertSet.9.constraint.name=No Constraint\npolicyset.caCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.caCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.caCertSet.9.default.name=Signing Alg\npolicyset.caCertSet.9.default.params.signingAlg=-\npolicyset.caCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.10.constraint.name=No Constraint\npolicyset.caCertSet.10.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.caCertSet.10.default.name=AIA Extension Default\npolicyset.caCertSet.10.default.params.authInfoAccessADEnable_0=true\npolicyset.caCertSet.10.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.caCertSet.10.default.params.authInfoAccessADLocation_0=\npolicyset.caCertSet.10.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.caCertSet.10.default.params.authInfoAccessCritical=false\npolicyset.caCertSet.10.default.params.authInfoAccessNumADs=1\nprofileId=caCACert\nclassId=caEnrollImpl\n'
  5692. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5693. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5694. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5695. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5696. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5697. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5698. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5699. 2017-05-11T02:30:55Z DEBUG response status 409
  5700. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5701. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5702. 2017-05-11T02:30:55Z DEBUG Error migrating 'caCACert': Non-2xx response from CA REST API: 409. Profile already exists
  5703. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caCACert?action=enable
  5704. 2017-05-11T02:30:55Z DEBUG request body ''
  5705. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5706. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5707. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5708. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5709. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5710. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5711. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5712. 2017-05-11T02:30:55Z DEBUG response status 500
  5713. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5714. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5715. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5716. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5717. 2017-05-11T02:30:55Z DEBUG request body ''
  5718. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5719. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5720. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5721. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5722. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5723. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5724. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5725. 2017-05-11T02:30:55Z DEBUG response status 204
  5726. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=1666AF99F4350CA2DD03468414D81851; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5727. 2017-05-11T02:30:55Z DEBUG response body ''
  5728. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5729. 2017-05-11T02:30:55Z DEBUG request body ''
  5730. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5731. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5732. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5733. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5734. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5735. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5736. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5737. 2017-05-11T02:30:55Z DEBUG response status 200
  5738. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=E320477F05778C3BE006B51328794EBA; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5739. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5740. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5741. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling Cross Signed Certificate Authority certificates.\nvisible=false\nenable=false\nenableBy=admin\nauth.class_id=\nname=Manual Cross Signed Certificate Manager Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=caCertSet\npolicyset.caCertSet.list=1,2,3,4,5,6,8,9,10\npolicyset.caCertSet.1.constraint.class_id=userSubjectNameConstraintImpl\npolicyset.caCertSet.1.constraint.name=User Subject Name Constraint\npolicyset.caCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.caCertSet.1.default.name=User Supplied Subject Name Default\npolicyset.caCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.caCertSet.2.constraint.name=Validity Constraint\npolicyset.caCertSet.2.constraint.params.range=7305\npolicyset.caCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.caCertSet.2.constraint.params.notAfterCheck=false\npolicyset.caCertSet.2.default.class_id=caValidityDefaultImpl\npolicyset.caCertSet.2.default.name=CA Certificate Validity Default\npolicyset.caCertSet.2.default.params.range=7305\npolicyset.caCertSet.2.default.params.startTime=0\npolicyset.caCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.caCertSet.3.constraint.name=Key Constraint\npolicyset.caCertSet.3.constraint.params.keyType=-\npolicyset.caCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.caCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.caCertSet.3.default.name=Key Default\npolicyset.caCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.4.constraint.name=No Constraint\npolicyset.caCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.4.default.name=Authority Key Identifier Default\npolicyset.caCertSet.5.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.caCertSet.5.constraint.name=Basic Constraint Extension Constraint\npolicyset.caCertSet.5.constraint.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.caCertSet.5.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.caCertSet.5.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.caCertSet.5.default.name=Basic Constraints Extension Default\npolicyset.caCertSet.5.default.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.default.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.default.params.basicConstraintsPathLen=-1\npolicyset.caCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.caCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.caCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.caCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.caCertSet.6.default.name=Key Usage Default\npolicyset.caCertSet.6.default.params.keyUsageCritical=true\npolicyset.caCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.default.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.default.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.8.constraint.name=No Constraint\npolicyset.caCertSet.8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.8.default.name=Subject Key Identifier Extension Default\npolicyset.caCertSet.8.default.params.critical=false\npolicyset.caCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.caCertSet.9.constraint.name=No Constraint\npolicyset.caCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.caCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.caCertSet.9.default.name=Signing Alg\npolicyset.caCertSet.9.default.params.signingAlg=-\npolicyset.caCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.10.constraint.name=No Constraint\npolicyset.caCertSet.10.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.caCertSet.10.default.name=AIA Extension Default\npolicyset.caCertSet.10.default.params.authInfoAccessADEnable_0=true\npolicyset.caCertSet.10.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.caCertSet.10.default.params.authInfoAccessADLocation_0=\npolicyset.caCertSet.10.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.caCertSet.10.default.params.authInfoAccessCritical=false\npolicyset.caCertSet.10.default.params.authInfoAccessNumADs=1\nprofileId=caCrossSignedCACert\nclassId=caEnrollImpl\n'
  5742. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5743. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5744. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5745. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5746. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5747. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5748. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5749. 2017-05-11T02:30:55Z DEBUG response status 409
  5750. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5751. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5752. 2017-05-11T02:30:55Z DEBUG Error migrating 'caCrossSignedCACert': Non-2xx response from CA REST API: 409. Profile already exists
  5753. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caCrossSignedCACert?action=enable
  5754. 2017-05-11T02:30:55Z DEBUG request body ''
  5755. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5756. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5757. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5758. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5759. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5760. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5761. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5762. 2017-05-11T02:30:55Z DEBUG response status 204
  5763. 2017-05-11T02:30:55Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  5764. 2017-05-11T02:30:55Z DEBUG response body ''
  5765. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5766. 2017-05-11T02:30:55Z DEBUG request body ''
  5767. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5768. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5769. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5770. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5771. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5772. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5773. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5774. 2017-05-11T02:30:55Z DEBUG response status 204
  5775. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=DD7BBED93F65808288D14EAE012C29B4; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5776. 2017-05-11T02:30:55Z DEBUG response body ''
  5777. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5778. 2017-05-11T02:30:55Z DEBUG request body ''
  5779. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5780. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5781. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5782. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5783. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5784. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5785. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5786. 2017-05-11T02:30:55Z DEBUG response status 200
  5787. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=573DDC30D27B038CEA56F1A8F63528E5; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5788. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5789. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5790. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain Certificate Authority certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Manual Security Domain Certificate Authority Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=caCertSet\npolicyset.caCertSet.list=1,2,3,4,5,6,8,9,10\npolicyset.caCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.caCertSet.1.constraint.name=Subject Name Constraint\npolicyset.caCertSet.1.constraint.params.pattern=CN=.*\npolicyset.caCertSet.1.constraint.params.accept=true\npolicyset.caCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.caCertSet.1.default.name=Subject Name Default\npolicyset.caCertSet.1.default.params.name=\npolicyset.caCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.caCertSet.2.constraint.name=Validity Constraint\npolicyset.caCertSet.2.constraint.params.range=720\npolicyset.caCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.caCertSet.2.constraint.params.notAfterCheck=false\npolicyset.caCertSet.2.default.class_id=validityDefaultImpl\npolicyset.caCertSet.2.default.name=Validity Default\npolicyset.caCertSet.2.default.params.range=720\npolicyset.caCertSet.2.default.params.startTime=0\npolicyset.caCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.caCertSet.3.constraint.name=Key Constraint\npolicyset.caCertSet.3.constraint.params.keyType=-\npolicyset.caCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.caCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.caCertSet.3.default.name=Key Default\npolicyset.caCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.4.constraint.name=No Constraint\npolicyset.caCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.4.default.name=Authority Key Identifier Default\npolicyset.caCertSet.5.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.caCertSet.5.constraint.name=Basic Constraint Extension Constraint\npolicyset.caCertSet.5.constraint.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.caCertSet.5.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.caCertSet.5.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.caCertSet.5.default.name=Basic Constraints Extension Default\npolicyset.caCertSet.5.default.params.basicConstraintsCritical=true\npolicyset.caCertSet.5.default.params.basicConstraintsIsCA=true\npolicyset.caCertSet.5.default.params.basicConstraintsPathLen=-1\npolicyset.caCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.caCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.caCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.caCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.constraint.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.caCertSet.6.default.name=Key Usage Default\npolicyset.caCertSet.6.default.params.keyUsageCritical=true\npolicyset.caCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.caCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.caCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.caCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.caCertSet.6.default.params.keyUsageKeyCertSign=true\npolicyset.caCertSet.6.default.params.keyUsageCrlSign=true\npolicyset.caCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.caCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.caCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.8.constraint.name=No Constraint\npolicyset.caCertSet.8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.caCertSet.8.default.name=Subject Key Identifier Extension Default\npolicyset.caCertSet.8.default.params.critical=false\npolicyset.caCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.caCertSet.9.constraint.name=No Constraint\npolicyset.caCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.caCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.caCertSet.9.default.name=Signing Alg\npolicyset.caCertSet.9.default.params.signingAlg=-\npolicyset.caCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.caCertSet.10.constraint.name=No Constraint\npolicyset.caCertSet.10.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.caCertSet.10.default.name=AIA Extension Default\npolicyset.caCertSet.10.default.params.authInfoAccessADEnable_0=true\npolicyset.caCertSet.10.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.caCertSet.10.default.params.authInfoAccessADLocation_0=\npolicyset.caCertSet.10.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.caCertSet.10.default.params.authInfoAccessCritical=false\npolicyset.caCertSet.10.default.params.authInfoAccessNumADs=1\nprofileId=caInstallCACert\nclassId=caEnrollImpl\n'
  5791. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5792. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5793. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5794. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5795. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5796. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5797. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5798. 2017-05-11T02:30:55Z DEBUG response status 409
  5799. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5800. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5801. 2017-05-11T02:30:55Z DEBUG Error migrating 'caInstallCACert': Non-2xx response from CA REST API: 409. Profile already exists
  5802. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInstallCACert?action=enable
  5803. 2017-05-11T02:30:55Z DEBUG request body ''
  5804. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5805. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5806. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5807. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5808. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5809. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5810. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5811. 2017-05-11T02:30:55Z DEBUG response status 500
  5812. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5813. 2017-05-11T02:30:55Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5814. 2017-05-11T02:30:55Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5815. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5816. 2017-05-11T02:30:55Z DEBUG request body ''
  5817. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5818. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5819. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5820. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5821. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5822. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5823. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5824. 2017-05-11T02:30:55Z DEBUG response status 204
  5825. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=5640EAFE196F40FAAAABCC8A1D7131BE; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5826. 2017-05-11T02:30:55Z DEBUG response body ''
  5827. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5828. 2017-05-11T02:30:55Z DEBUG request body ''
  5829. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5830. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5831. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5832. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5833. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5834. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5835. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5836. 2017-05-11T02:30:55Z DEBUG response status 200
  5837. 2017-05-11T02:30:55Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=CAA28333764DC76F421A2ACEDFC20DA9; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5838. 2017-05-11T02:30:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5839. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5840. 2017-05-11T02:30:55Z DEBUG request body 'desc=This certificate profile is for enrolling Registration Manager certificates.\nvisible=false\nenable=false\nenableBy=admin\nauth.class_id=\nname=Manual Registration Manager Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=raCertSet\npolicyset.raCertSet.list=1,2,3,4,5,6,7,8\npolicyset.raCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.raCertSet.1.constraint.name=Subject Name Constraint\npolicyset.raCertSet.1.constraint.params.pattern=CN=.*\npolicyset.raCertSet.1.constraint.params.accept=true\npolicyset.raCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.raCertSet.1.default.name=Subject Name Default\npolicyset.raCertSet.1.default.params.name=\npolicyset.raCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.raCertSet.2.constraint.name=Validity Constraint\npolicyset.raCertSet.2.constraint.params.range=720\npolicyset.raCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.raCertSet.2.constraint.params.notAfterCheck=false\npolicyset.raCertSet.2.default.class_id=validityDefaultImpl\npolicyset.raCertSet.2.default.name=Validity Default\npolicyset.raCertSet.2.default.params.range=720\npolicyset.raCertSet.2.default.params.startTime=0\npolicyset.raCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.raCertSet.3.constraint.name=Key Constraint\npolicyset.raCertSet.3.constraint.params.keyType=RSA\npolicyset.raCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.raCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.raCertSet.3.default.name=Key Default\npolicyset.raCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.raCertSet.4.constraint.name=No Constraint\npolicyset.raCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.raCertSet.4.default.name=Authority Key Identifier Default\npolicyset.raCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.raCertSet.5.constraint.name=No Constraint\npolicyset.raCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.raCertSet.5.default.name=AIA Extension Default\npolicyset.raCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.raCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.raCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.raCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.raCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.raCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.raCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.raCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.raCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.raCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.raCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.raCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.raCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.raCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.raCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.raCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.raCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.raCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.raCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.raCertSet.6.default.name=Key Usage Default\npolicyset.raCertSet.6.default.params.keyUsageCritical=true\npolicyset.raCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.raCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.raCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.raCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.raCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.raCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.raCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.raCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.raCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.raCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.raCertSet.7.constraint.name=No Constraint\npolicyset.raCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.raCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.raCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.raCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.raCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.raCertSet.8.constraint.name=No Constraint\npolicyset.raCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.raCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.raCertSet.8.default.name=Signing Alg\npolicyset.raCertSet.8.default.params.signingAlg=-\nprofileId=caRACert\nclassId=caEnrollImpl\n'
  5841. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5842. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5843. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5844. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5845. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5846. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5847. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5848. 2017-05-11T02:30:55Z DEBUG response status 409
  5849. 2017-05-11T02:30:55Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5850. 2017-05-11T02:30:55Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5851. 2017-05-11T02:30:55Z DEBUG Error migrating 'caRACert': Non-2xx response from CA REST API: 409. Profile already exists
  5852. 2017-05-11T02:30:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caRACert?action=enable
  5853. 2017-05-11T02:30:55Z DEBUG request body ''
  5854. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5855. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5856. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5857. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5858. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5859. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5860. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5861. 2017-05-11T02:30:55Z DEBUG response status 204
  5862. 2017-05-11T02:30:55Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  5863. 2017-05-11T02:30:55Z DEBUG response body ''
  5864. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5865. 2017-05-11T02:30:55Z DEBUG request body ''
  5866. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5867. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5868. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5869. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5870. 2017-05-11T02:30:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5871. 2017-05-11T02:30:55Z DEBUG Protocol: TLS1.2
  5872. 2017-05-11T02:30:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5873. 2017-05-11T02:30:55Z DEBUG response status 204
  5874. 2017-05-11T02:30:55Z DEBUG response headers {'set-cookie': 'JSESSIONID=8CBE95B91C98750C369C6F217F13AA64; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5875. 2017-05-11T02:30:55Z DEBUG response body ''
  5876. 2017-05-11T02:30:55Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5877. 2017-05-11T02:30:55Z DEBUG request body ''
  5878. 2017-05-11T02:30:55Z DEBUG NSSConnection init ipa.rdlg.net
  5879. 2017-05-11T02:30:55Z DEBUG Connecting: 172.20.0.200:0
  5880. 2017-05-11T02:30:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5881. 2017-05-11T02:30:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5882. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5883. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5884. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5885. 2017-05-11T02:30:56Z DEBUG response status 200
  5886. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=D7C389F46EEB67CA4497D074344327B8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5887. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5888. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5889. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling OCSP Manager certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual OCSP Manager Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=ocspCertSet\npolicyset.ocspCertSet.list=1,2,3,4,5,6,8,9\npolicyset.ocspCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.ocspCertSet.1.constraint.name=Subject Name Constraint\npolicyset.ocspCertSet.1.constraint.params.pattern=CN=.*\npolicyset.ocspCertSet.1.constraint.params.accept=true\npolicyset.ocspCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.ocspCertSet.1.default.name=Subject Name Default\npolicyset.ocspCertSet.1.default.params.name=\npolicyset.ocspCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.ocspCertSet.2.constraint.name=Validity Constraint\npolicyset.ocspCertSet.2.constraint.params.range=720\npolicyset.ocspCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.ocspCertSet.2.constraint.params.notAfterCheck=false\npolicyset.ocspCertSet.2.default.class_id=validityDefaultImpl\npolicyset.ocspCertSet.2.default.name=Validity Default\npolicyset.ocspCertSet.2.default.params.range=720\npolicyset.ocspCertSet.2.default.params.startTime=0\npolicyset.ocspCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.ocspCertSet.3.constraint.name=Key Constraint\npolicyset.ocspCertSet.3.constraint.params.keyType=-\npolicyset.ocspCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.ocspCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.ocspCertSet.3.default.name=Key Default\npolicyset.ocspCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.ocspCertSet.4.constraint.name=No Constraint\npolicyset.ocspCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.ocspCertSet.4.default.name=Authority Key Identifier Default\npolicyset.ocspCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.ocspCertSet.5.constraint.name=No Constraint\npolicyset.ocspCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.ocspCertSet.5.default.name=AIA Extension Default\npolicyset.ocspCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.ocspCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.ocspCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.ocspCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.ocspCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.ocspCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.ocspCertSet.6.constraint.class_id=extendedKeyUsageExtConstraintImpl\npolicyset.ocspCertSet.6.constraint.name=Extended Key Usage Extension\npolicyset.ocspCertSet.6.constraint.params.exKeyUsageCritical=false\npolicyset.ocspCertSet.6.constraint.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.9\npolicyset.ocspCertSet.6.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.ocspCertSet.6.default.name=Extended Key Usage Default\npolicyset.ocspCertSet.6.default.params.exKeyUsageCritical=false\npolicyset.ocspCertSet.6.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.9\npolicyset.ocspCertSet.8.constraint.class_id=extensionConstraintImpl\npolicyset.ocspCertSet.8.constraint.name=No Constraint\npolicyset.ocspCertSet.8.constraint.params.extCritical=false\npolicyset.ocspCertSet.8.constraint.params.extOID=1.3.6.1.5.5.7.48.1.5\npolicyset.ocspCertSet.8.default.class_id=ocspNoCheckExtDefaultImpl\npolicyset.ocspCertSet.8.default.name=OCSP No Check Extension\npolicyset.ocspCertSet.8.default.params.ocspNoCheckCritical=false\npolicyset.ocspCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.ocspCertSet.9.constraint.name=No Constraint\npolicyset.ocspCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.ocspCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.ocspCertSet.9.default.name=Signing Alg\npolicyset.ocspCertSet.9.default.params.signingAlg=-\nprofileId=caOCSPCert\nclassId=caEnrollImpl\n'
  5890. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5891. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5892. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5893. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5894. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5895. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5896. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5897. 2017-05-11T02:30:56Z DEBUG response status 409
  5898. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5899. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5900. 2017-05-11T02:30:56Z DEBUG Error migrating 'caOCSPCert': Non-2xx response from CA REST API: 409. Profile already exists
  5901. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caOCSPCert?action=enable
  5902. 2017-05-11T02:30:56Z DEBUG request body ''
  5903. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5904. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5905. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5906. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5907. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5908. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5909. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5910. 2017-05-11T02:30:56Z DEBUG response status 500
  5911. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'text/html;charset=utf-8'}
  5912. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5913. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5914. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5915. 2017-05-11T02:30:56Z DEBUG request body ''
  5916. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5917. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5918. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5919. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5920. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5921. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5922. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5923. 2017-05-11T02:30:56Z DEBUG response status 204
  5924. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=72E69BB693CD23FB84BECE71C02B6382; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5925. 2017-05-11T02:30:56Z DEBUG response body ''
  5926. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5927. 2017-05-11T02:30:56Z DEBUG request body ''
  5928. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5929. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5930. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5931. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5932. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5933. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5934. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5935. 2017-05-11T02:30:56Z DEBUG response status 200
  5936. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=D5901AF0D3D8D8A65CFD291FA19FA384; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:55 GMT', 'content-type': 'application/xml'}
  5937. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5938. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5939. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling Data Recovery Manager storage certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class.id=\nname=Manual Data Recovery Manager Storage Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=drmStorageCertSet\npolicyset.drmStorageCertSet.list=1,2,3,4,5,6,7,9\npolicyset.drmStorageCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.drmStorageCertSet.1.constraint.name=Subject Name Constraint\npolicyset.drmStorageCertSet.1.constraint.params.pattern=CN=.*\npolicyset.drmStorageCertSet.1.constraint.params.accept=true\npolicyset.drmStorageCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.drmStorageCertSet.1.default.name=Subject Name Default\npolicyset.drmStorageCertSet.1.default.params.name=\npolicyset.drmStorageCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.drmStorageCertSet.2.constraint.name=Validity Constraint\npolicyset.drmStorageCertSet.2.constraint.params.range=720\npolicyset.drmStorageCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.drmStorageCertSet.2.constraint.params.notAfterCheck=false\npolicyset.drmStorageCertSet.2.default.class_id=validityDefaultImpl\npolicyset.drmStorageCertSet.2.default.name=Validity Default\npolicyset.drmStorageCertSet.2.default.params.range=720\npolicyset.drmStorageCertSet.2.default.params.startTime=0\npolicyset.drmStorageCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.drmStorageCertSet.3.constraint.name=Key Constraint\npolicyset.drmStorageCertSet.3.constraint.params.keyType=RSA\npolicyset.drmStorageCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.drmStorageCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.drmStorageCertSet.3.default.name=Key Default\npolicyset.drmStorageCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.4.constraint.name=No Constraint\npolicyset.drmStorageCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.drmStorageCertSet.4.default.name=Authority Key Identifier Default\npolicyset.drmStorageCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.5.constraint.name=No Constraint\npolicyset.drmStorageCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.drmStorageCertSet.5.default.name=AIA Extension Default\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.drmStorageCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.drmStorageCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.drmStorageCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.drmStorageCertSet.6.default.name=Key Usage Default\npolicyset.drmStorageCertSet.6.default.params.keyUsageCritical=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.drmStorageCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.7.constraint.name=No Constraint\npolicyset.drmStorageCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.drmStorageCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.drmStorageCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.drmStorageCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.drmStorageCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.drmStorageCertSet.9.constraint.name=No Constraint\npolicyset.drmStorageCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.drmStorageCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.drmStorageCertSet.9.default.name=Signing Alg\npolicyset.drmStorageCertSet.9.default.params.signingAlg=-\nprofileId=caStorageCert\nclassId=caEnrollImpl\n'
  5940. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5941. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5942. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5943. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5944. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5945. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5946. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5947. 2017-05-11T02:30:56Z DEBUG response status 409
  5948. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5949. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  5950. 2017-05-11T02:30:56Z DEBUG Error migrating 'caStorageCert': Non-2xx response from CA REST API: 409. Profile already exists
  5951. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caStorageCert?action=enable
  5952. 2017-05-11T02:30:56Z DEBUG request body ''
  5953. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5954. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5955. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5956. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5957. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5958. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5959. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5960. 2017-05-11T02:30:56Z DEBUG response status 500
  5961. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  5962. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  5963. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  5964. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  5965. 2017-05-11T02:30:56Z DEBUG request body ''
  5966. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5967. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5968. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5969. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5970. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5971. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5972. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5973. 2017-05-11T02:30:56Z DEBUG response status 204
  5974. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=0D8919ACD16EFBB3D22B4ADA9C090F08; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  5975. 2017-05-11T02:30:56Z DEBUG response body ''
  5976. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  5977. 2017-05-11T02:30:56Z DEBUG request body ''
  5978. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5979. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5980. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5981. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5982. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5983. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5984. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5985. 2017-05-11T02:30:56Z DEBUG response status 200
  5986. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=77F2BEF46C29548CA1D77AA08065CFEB; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  5987. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  5988. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  5989. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling Data Recovery Manager transport certificates.\nvisible=true\nenable=true\nenableBy=admin\nauth.class_id=\nname=Manual Data Recovery Manager Transport Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=transportCertSet\npolicyset.transportCertSet.list=1,2,3,4,5,6,7,8\npolicyset.transportCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.transportCertSet.1.constraint.name=Subject Name Constraint\npolicyset.transportCertSet.1.constraint.params.pattern=CN=.*\npolicyset.transportCertSet.1.constraint.params.accept=true\npolicyset.transportCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.transportCertSet.1.default.name=Subject Name Default\npolicyset.transportCertSet.1.default.params.name=\npolicyset.transportCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.transportCertSet.2.constraint.name=Validity Constraint\npolicyset.transportCertSet.2.constraint.params.range=720\npolicyset.transportCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.transportCertSet.2.constraint.params.notAfterCheck=false\npolicyset.transportCertSet.2.default.class_id=validityDefaultImpl\npolicyset.transportCertSet.2.default.name=Validity Default\npolicyset.transportCertSet.2.default.params.range=720\npolicyset.transportCertSet.2.default.params.startTime=0\npolicyset.transportCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.transportCertSet.3.constraint.name=Key Constraint\npolicyset.transportCertSet.3.constraint.params.keyType=RSA\npolicyset.transportCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.transportCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.transportCertSet.3.default.name=Key Default\npolicyset.transportCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.4.constraint.name=No Constraint\npolicyset.transportCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.transportCertSet.4.default.name=Authority Key Identifier Default\npolicyset.transportCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.5.constraint.name=No Constraint\npolicyset.transportCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.transportCertSet.5.default.name=AIA Extension Default\npolicyset.transportCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.transportCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.transportCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.transportCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.transportCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.transportCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.transportCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.transportCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.transportCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.transportCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.transportCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.transportCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.transportCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.transportCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.transportCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.transportCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.transportCertSet.6.default.name=Key Usage Default\npolicyset.transportCertSet.6.default.params.keyUsageCritical=true\npolicyset.transportCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.transportCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.transportCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.transportCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.transportCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.transportCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.transportCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.transportCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.transportCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.transportCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.7.constraint.name=No Constraint\npolicyset.transportCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.transportCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.transportCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.transportCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.transportCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.transportCertSet.8.constraint.name=No Constraint\npolicyset.transportCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.transportCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.transportCertSet.8.default.name=Signing Alg\npolicyset.transportCertSet.8.default.params.signingAlg=-\nprofileId=caTransportCert\nclassId=caEnrollImpl\n'
  5990. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  5991. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  5992. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  5993. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  5994. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  5995. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  5996. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  5997. 2017-05-11T02:30:56Z DEBUG response status 409
  5998. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  5999. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6000. 2017-05-11T02:30:56Z DEBUG Error migrating 'caTransportCert': Non-2xx response from CA REST API: 409. Profile already exists
  6001. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTransportCert?action=enable
  6002. 2017-05-11T02:30:56Z DEBUG request body ''
  6003. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6004. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6005. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6006. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6007. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6008. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6009. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6010. 2017-05-11T02:30:56Z DEBUG response status 500
  6011. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6012. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6013. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6014. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6015. 2017-05-11T02:30:56Z DEBUG request body ''
  6016. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6017. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6018. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6019. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6020. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6021. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6022. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6023. 2017-05-11T02:30:56Z DEBUG response status 204
  6024. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=66F10A2A23194FAC231BEBAD398333DA; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6025. 2017-05-11T02:30:56Z DEBUG response body ''
  6026. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6027. 2017-05-11T02:30:56Z DEBUG request body ''
  6028. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6029. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6030. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6031. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6032. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6033. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6034. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6035. 2017-05-11T02:30:56Z DEBUG response status 200
  6036. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=3E4222E03E7F02E961745F462130DBE2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6037. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6038. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6039. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates with directory-pin-based authentication.\nvisible=true\nenable=false\nenableBy=admin\nname=Directory-Pin-Authenticated User Dual-Use Certificate Enrollment\nauth.instance_id=PinDirEnrollment\ninput.list=i1\ninput.i1.class_id=keyGenInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=(UID|CN)=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=authTokenSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=RSA\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caDirPinUserCert\nclassId=caEnrollImpl\n'
  6040. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6041. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6042. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6043. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6044. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6045. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6046. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6047. 2017-05-11T02:30:56Z DEBUG response status 409
  6048. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6049. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6050. 2017-05-11T02:30:56Z DEBUG Error migrating 'caDirPinUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6051. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDirPinUserCert?action=enable
  6052. 2017-05-11T02:30:56Z DEBUG request body ''
  6053. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6054. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6055. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6056. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6057. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6058. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6059. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6060. 2017-05-11T02:30:56Z DEBUG response status 204
  6061. 2017-05-11T02:30:56Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  6062. 2017-05-11T02:30:56Z DEBUG response body ''
  6063. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6064. 2017-05-11T02:30:56Z DEBUG request body ''
  6065. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6066. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6067. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6068. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6069. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6070. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6071. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6072. 2017-05-11T02:30:56Z DEBUG response status 204
  6073. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=B4630202ADFB2EAE8B190C30A8C2821C; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6074. 2017-05-11T02:30:56Z DEBUG response body ''
  6075. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6076. 2017-05-11T02:30:56Z DEBUG request body ''
  6077. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6078. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6079. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6080. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6081. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6082. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6083. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6084. 2017-05-11T02:30:56Z DEBUG response status 200
  6085. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=9C7A84C18AED26B441E0606D19183CD0; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6086. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6087. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6088. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates with directory-based authentication.\nvisible=true\nenable=true\nenableBy=admin\nname=Directory-Authenticated User Dual-Use Certificate Enrollment\nauth.instance_id=UserDirEnrollment\ninput.list=i1\ninput.i1.class_id=keyGenInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=(UID|CN)=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=authTokenSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=-\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caDirUserCert\nclassId=caEnrollImpl\n'
  6089. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6090. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6091. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6092. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6093. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6094. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6095. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6096. 2017-05-11T02:30:56Z DEBUG response status 409
  6097. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6098. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6099. 2017-05-11T02:30:56Z DEBUG Error migrating 'caDirUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6100. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDirUserCert?action=enable
  6101. 2017-05-11T02:30:56Z DEBUG request body ''
  6102. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6103. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6104. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6105. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6106. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6107. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6108. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6109. 2017-05-11T02:30:56Z DEBUG response status 500
  6110. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6111. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6112. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6113. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6114. 2017-05-11T02:30:56Z DEBUG request body ''
  6115. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6116. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6117. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6118. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6119. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6120. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6121. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6122. 2017-05-11T02:30:56Z DEBUG response status 204
  6123. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=4DB58D7422000FDE7247C1E996EA7012; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6124. 2017-05-11T02:30:56Z DEBUG response body ''
  6125. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6126. 2017-05-11T02:30:56Z DEBUG request body ''
  6127. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6128. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6129. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6130. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6131. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6132. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6133. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6134. 2017-05-11T02:30:56Z DEBUG response status 200
  6135. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=4D57DCACCF60FC91EE60E14043EC7B40; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6136. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6137. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6138. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates with directory-based authentication.\nvisible=true\nenable=true\nenableBy=admin\nname=Directory-Authenticated User Dual-Use ECC Certificate Enrollment\nauth.instance_id=UserDirEnrollment\ninput.list=i1\ninput.i1.class_id=keyGenInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,10,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=(UID|CN)=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=authTokenSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.userCertSet.10.constraint.name=Renewal Grace Period Constraint\npolicyset.userCertSet.10.constraint.params.renewal.graceBefore=30\npolicyset.userCertSet.10.constraint.params.renewal.graceAfter=30\npolicyset.userCertSet.10.default.class_id=noDefaultImpl\npolicyset.userCertSet.10.default.name=No Default\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=EC\npolicyset.userCertSet.3.constraint.params.keyParameters=nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caECDirUserCert\nclassId=caEnrollImpl\n'
  6139. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6140. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6141. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6142. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6143. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6144. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6145. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6146. 2017-05-11T02:30:56Z DEBUG response status 409
  6147. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6148. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6149. 2017-05-11T02:30:56Z DEBUG Error migrating 'caECDirUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6150. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caECDirUserCert?action=enable
  6151. 2017-05-11T02:30:56Z DEBUG request body ''
  6152. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6153. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6154. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6155. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6156. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6157. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6158. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6159. 2017-05-11T02:30:56Z DEBUG response status 500
  6160. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6161. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6162. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6163. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6164. 2017-05-11T02:30:56Z DEBUG request body ''
  6165. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6166. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6167. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6168. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6169. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6170. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6171. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6172. 2017-05-11T02:30:56Z DEBUG response status 204
  6173. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=1ECE2A33B9192764F86287850C43055B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6174. 2017-05-11T02:30:56Z DEBUG response body ''
  6175. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6176. 2017-05-11T02:30:56Z DEBUG request body ''
  6177. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6178. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6179. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6180. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6181. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6182. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6183. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6184. 2017-05-11T02:30:56Z DEBUG response status 200
  6185. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=2B561B9132160098054494DC99D15A3C; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6186. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6187. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6188. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling server certificates with agent authentication.\nvisible=true\nenable=true\nenableBy=admin\nauth.instance_id=AgentCertAuth\nname=Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=365\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=180\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caAgentServerCert\nclassId=caEnrollImpl\n'
  6189. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6190. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6191. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6192. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6193. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6194. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6195. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6196. 2017-05-11T02:30:56Z DEBUG response status 409
  6197. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6198. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6199. 2017-05-11T02:30:56Z DEBUG Error migrating 'caAgentServerCert': Non-2xx response from CA REST API: 409. Profile already exists
  6200. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caAgentServerCert?action=enable
  6201. 2017-05-11T02:30:56Z DEBUG request body ''
  6202. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6203. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6204. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6205. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6206. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6207. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6208. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6209. 2017-05-11T02:30:56Z DEBUG response status 500
  6210. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6211. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6212. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6213. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6214. 2017-05-11T02:30:56Z DEBUG request body ''
  6215. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6216. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6217. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6218. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6219. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6220. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6221. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6222. 2017-05-11T02:30:56Z DEBUG response status 204
  6223. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=CE3DF2DEA7CF52AB69EBD7F162AC27FD; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6224. 2017-05-11T02:30:56Z DEBUG response body ''
  6225. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6226. 2017-05-11T02:30:56Z DEBUG request body ''
  6227. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6228. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6229. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6230. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6231. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6232. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6233. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6234. 2017-05-11T02:30:56Z DEBUG response status 200
  6235. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=9CD681DA6A0FCFCC1F8DB4094ECFA9B9; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6236. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6237. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6238. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for getting file signing certificate with agent authentication.\nvisible=true\nenable=true\nenableBy=admin\nauth.instance_id=AgentCertAuth\nname=Agent-Authenticated File Signing\ninput.list=i1,i2,i3\ninput.i1.class_id=keyGenInputImpl\ninput.i2.class_id=fileSigningInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=pkcs7OutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=CN=(Name)$request.requestor_name$(Text)$request.file_signing_text$(Size)$request.file_signing_size$(DigestType)$request.file_signing_digest_type$(Digest)$request.file_signing_digest$\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=365\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=180\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.3\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caAgentFileSigning\nclassId=caEnrollImpl\n'
  6239. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6240. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6241. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6242. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6243. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6244. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6245. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6246. 2017-05-11T02:30:56Z DEBUG response status 409
  6247. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6248. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6249. 2017-05-11T02:30:56Z DEBUG Error migrating 'caAgentFileSigning': Non-2xx response from CA REST API: 409. Profile already exists
  6250. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caAgentFileSigning?action=enable
  6251. 2017-05-11T02:30:56Z DEBUG request body ''
  6252. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6253. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6254. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6255. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6256. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6257. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6258. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6259. 2017-05-11T02:30:56Z DEBUG response status 500
  6260. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6261. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6262. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6263. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6264. 2017-05-11T02:30:56Z DEBUG request body ''
  6265. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6266. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6267. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6268. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6269. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6270. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6271. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6272. 2017-05-11T02:30:56Z DEBUG response status 204
  6273. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=2D7D3FE8C58A3A3549F2193A93AD081D; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6274. 2017-05-11T02:30:56Z DEBUG response body ''
  6275. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6276. 2017-05-11T02:30:56Z DEBUG request body ''
  6277. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6278. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6279. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6280. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6281. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6282. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6283. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6284. 2017-05-11T02:30:56Z DEBUG response status 200
  6285. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=AF482EB5E6832413CCCFECBE97A2AD9D; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6286. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6287. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6288. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates by using the CMC certificate request with CMC Signature authentication.\nvisible=true\nenable=true\nenableBy=admin\nauth.instance_id=CMCAuth\nauthz.acl=group="Certificate Manager Agents"\nname=Signed CMC-Authenticated User Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=cmcCertReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=cmcUserCertSet\npolicyset.cmcUserCertSet.list=1,2,3,4,5,6,7,8\npolicyset.cmcUserCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.cmcUserCertSet.1.constraint.name=Subject Name Constraint\npolicyset.cmcUserCertSet.1.constraint.params.pattern=.*\npolicyset.cmcUserCertSet.1.constraint.params.accept=true\npolicyset.cmcUserCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.cmcUserCertSet.1.default.name=Subject Name Default\npolicyset.cmcUserCertSet.1.default.params.name=\npolicyset.cmcUserCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.cmcUserCertSet.2.constraint.name=Validity Constraint\npolicyset.cmcUserCertSet.2.constraint.params.range=365\npolicyset.cmcUserCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.cmcUserCertSet.2.constraint.params.notAfterCheck=false\npolicyset.cmcUserCertSet.2.default.class_id=validityDefaultImpl\npolicyset.cmcUserCertSet.2.default.name=Validity Default\npolicyset.cmcUserCertSet.2.default.params.range=180\npolicyset.cmcUserCertSet.2.default.params.startTime=0\npolicyset.cmcUserCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.cmcUserCertSet.3.constraint.name=Key Constraint\npolicyset.cmcUserCertSet.3.constraint.params.keyType=-\npolicyset.cmcUserCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp521\npolicyset.cmcUserCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.cmcUserCertSet.3.default.name=Key Default\npolicyset.cmcUserCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.4.constraint.name=No Constraint\npolicyset.cmcUserCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.cmcUserCertSet.4.default.name=Authority Key Identifier Default\npolicyset.cmcUserCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.5.constraint.name=No Constraint\npolicyset.cmcUserCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.cmcUserCertSet.5.default.name=AIA Extension Default\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.cmcUserCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.cmcUserCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.6.default.name=Key Usage Default\npolicyset.cmcUserCertSet.6.default.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.7.constraint.name=No Constraint\npolicyset.cmcUserCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.cmcUserCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.cmcUserCertSet.8.constraint.name=No Constraint\npolicyset.cmcUserCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.cmcUserCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.cmcUserCertSet.8.default.name=Signing Alg\npolicyset.cmcUserCertSet.8.default.params.signingAlg=-\nprofileId=caCMCUserCert\nclassId=caEnrollImpl\n'
  6289. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6290. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6291. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6292. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6293. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6294. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6295. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6296. 2017-05-11T02:30:56Z DEBUG response status 409
  6297. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6298. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6299. 2017-05-11T02:30:56Z DEBUG Error migrating 'caCMCUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6300. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caCMCUserCert?action=enable
  6301. 2017-05-11T02:30:56Z DEBUG request body ''
  6302. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6303. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6304. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6305. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6306. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6307. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6308. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6309. 2017-05-11T02:30:56Z DEBUG response status 500
  6310. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6311. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6312. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6313. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6314. 2017-05-11T02:30:56Z DEBUG request body ''
  6315. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6316. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6317. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6318. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6319. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6320. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6321. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6322. 2017-05-11T02:30:56Z DEBUG response status 204
  6323. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=3B88E13CD74865938C20B0E3E9A76830; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6324. 2017-05-11T02:30:56Z DEBUG response body ''
  6325. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6326. 2017-05-11T02:30:56Z DEBUG request body ''
  6327. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6328. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6329. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6330. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6331. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6332. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6333. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6334. 2017-05-11T02:30:56Z DEBUG response status 200
  6335. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=1C8104F02E73AD311EDA8A0A8105D796; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6336. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6337. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6338. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates by using the CMC certificate request with CMC Signature authentication.\nenable=true\nenableBy=admin\nname=Signed CMC-Authenticated User Certificate Enrollment\nvisible=false\nauth.instance_id=CMCAuth\ninput.list=i1,i2\ninput.i1.class_id=cmcCertReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=cmcUserCertSet\npolicyset.cmcUserCertSet.list=1,2,3,4,5,6,7,8\npolicyset.cmcUserCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.cmcUserCertSet.1.constraint.name=Subject Name Constraint\npolicyset.cmcUserCertSet.1.constraint.params.accept=true\npolicyset.cmcUserCertSet.1.constraint.params.pattern=.*\npolicyset.cmcUserCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.cmcUserCertSet.1.default.name=Subject Name Default\npolicyset.cmcUserCertSet.1.default.params.name=\npolicyset.cmcUserCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.cmcUserCertSet.2.constraint.name=Validity Constraint\npolicyset.cmcUserCertSet.2.constraint.params.notAfterCheck=false\npolicyset.cmcUserCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.cmcUserCertSet.2.constraint.params.range=365\npolicyset.cmcUserCertSet.2.default.class_id=validityDefaultImpl\npolicyset.cmcUserCertSet.2.default.name=Validity Default\npolicyset.cmcUserCertSet.2.default.params.range=180\npolicyset.cmcUserCertSet.2.default.params.startTime=0\npolicyset.cmcUserCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.cmcUserCertSet.3.constraint.name=Key Constraint\npolicyset.cmcUserCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp521\npolicyset.cmcUserCertSet.3.constraint.params.keyType=-\npolicyset.cmcUserCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.cmcUserCertSet.3.default.name=Key Default\npolicyset.cmcUserCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.4.constraint.name=No Constraint\npolicyset.cmcUserCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.cmcUserCertSet.4.default.name=Authority Key Identifier Default\npolicyset.cmcUserCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.5.constraint.name=No Constraint\npolicyset.cmcUserCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.cmcUserCertSet.5.default.name=AIA Extension Default\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.cmcUserCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.cmcUserCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.6.default.name=Key Usage Default\npolicyset.cmcUserCertSet.6.default.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.7.constraint.name=No Constraint\npolicyset.cmcUserCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.cmcUserCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.cmcUserCertSet.8.constraint.name=No Constraint\npolicyset.cmcUserCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.cmcUserCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.cmcUserCertSet.8.default.name=Signing Alg\npolicyset.cmcUserCertSet.8.default.params.signingAlg=-\nprofileId=caFullCMCUserCert\nclassId=caEnrollImpl\n'
  6339. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6340. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6341. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6342. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6343. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6344. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6345. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6346. 2017-05-11T02:30:56Z DEBUG response status 409
  6347. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6348. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6349. 2017-05-11T02:30:56Z DEBUG Error migrating 'caFullCMCUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6350. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caFullCMCUserCert?action=enable
  6351. 2017-05-11T02:30:56Z DEBUG request body ''
  6352. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6353. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6354. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6355. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6356. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6357. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6358. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6359. 2017-05-11T02:30:56Z DEBUG response status 500
  6360. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6361. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6362. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6363. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6364. 2017-05-11T02:30:56Z DEBUG request body ''
  6365. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6366. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6367. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6368. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6369. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6370. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6371. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6372. 2017-05-11T02:30:56Z DEBUG response status 204
  6373. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=6FD84914A9C240372D4C712BBCB7612B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6374. 2017-05-11T02:30:56Z DEBUG response body ''
  6375. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6376. 2017-05-11T02:30:56Z DEBUG request body ''
  6377. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6378. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6379. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6380. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6381. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6382. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6383. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6384. 2017-05-11T02:30:56Z DEBUG response status 200
  6385. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=CF7E6E4E53FB8AFEF7983D37C3F1B9B6; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6386. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6387. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6388. 2017-05-11T02:30:56Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates by using the CMC certificate request with CMC Signature authentication.\nenable=true\nenableBy=admin\nname=Simple CMC Enrollment Request for User Certificate\nvisible=false\nauth.instance_id=\ninput.list=i1\ninput.i1.class_id=certReqInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=cmcUserCertSet\npolicyset.cmcUserCertSet.list=1,2,3,4,5,6,7,8\npolicyset.cmcUserCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.cmcUserCertSet.1.constraint.name=Subject Name Constraint\npolicyset.cmcUserCertSet.1.constraint.params.accept=true\npolicyset.cmcUserCertSet.1.constraint.params.pattern=.*\npolicyset.cmcUserCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.cmcUserCertSet.1.default.name=Subject Name Default\npolicyset.cmcUserCertSet.1.default.params.name=\npolicyset.cmcUserCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.cmcUserCertSet.2.constraint.name=Validity Constraint\npolicyset.cmcUserCertSet.2.constraint.params.notAfterCheck=false\npolicyset.cmcUserCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.cmcUserCertSet.2.constraint.params.range=365\npolicyset.cmcUserCertSet.2.default.class_id=validityDefaultImpl\npolicyset.cmcUserCertSet.2.default.name=Validity Default\npolicyset.cmcUserCertSet.2.default.params.range=180\npolicyset.cmcUserCertSet.2.default.params.startTime=0\npolicyset.cmcUserCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.cmcUserCertSet.3.constraint.name=Key Constraint\npolicyset.cmcUserCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp521\npolicyset.cmcUserCertSet.3.constraint.params.keyType=-\npolicyset.cmcUserCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.cmcUserCertSet.3.default.name=Key Default\npolicyset.cmcUserCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.4.constraint.name=No Constraint\npolicyset.cmcUserCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.cmcUserCertSet.4.default.name=Authority Key Identifier Default\npolicyset.cmcUserCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.5.constraint.name=No Constraint\npolicyset.cmcUserCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.cmcUserCertSet.5.default.name=AIA Extension Default\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.cmcUserCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.cmcUserCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.cmcUserCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.6.default.name=Key Usage Default\npolicyset.cmcUserCertSet.6.default.params.keyUsageCritical=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.cmcUserCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.cmcUserCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.cmcUserCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.cmcUserCertSet.7.constraint.name=No Constraint\npolicyset.cmcUserCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.cmcUserCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.cmcUserCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.cmcUserCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.cmcUserCertSet.8.constraint.name=No Constraint\npolicyset.cmcUserCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.cmcUserCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.cmcUserCertSet.8.default.name=Signing Alg\npolicyset.cmcUserCertSet.8.default.params.signingAlg=-\nprofileId=caSimpleCMCUserCert\nclassId=caEnrollImpl\n'
  6389. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6390. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6391. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6392. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6393. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6394. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6395. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6396. 2017-05-11T02:30:56Z DEBUG response status 409
  6397. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6398. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6399. 2017-05-11T02:30:56Z DEBUG Error migrating 'caSimpleCMCUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  6400. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSimpleCMCUserCert?action=enable
  6401. 2017-05-11T02:30:56Z DEBUG request body ''
  6402. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6403. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6404. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6405. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6406. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6407. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6408. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6409. 2017-05-11T02:30:56Z DEBUG response status 500
  6410. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6411. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6412. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6413. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6414. 2017-05-11T02:30:56Z DEBUG request body ''
  6415. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6416. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6417. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6418. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6419. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6420. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6421. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6422. 2017-05-11T02:30:56Z DEBUG response status 204
  6423. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=2BE472BB444277B32F8D6EA35B4A2C66; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6424. 2017-05-11T02:30:56Z DEBUG response body ''
  6425. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6426. 2017-05-11T02:30:56Z DEBUG request body ''
  6427. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6428. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6429. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6430. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6431. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6432. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6433. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6434. 2017-05-11T02:30:56Z DEBUG response status 200
  6435. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=FDC5F023E7559B3381BC375561A7F3A8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6436. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6437. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6438. 2017-05-11T02:30:56Z DEBUG request body 'desc=This profile is for enrolling token device keys\nenable=true\nenableBy=admin\nlastModified=1068835451090\nname=Token Device Key Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsHKeyCertReqInputImpl\ninput.i1.name=nsHKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p3,p4,p5,p1,p7,p8,p9,p12,p6\npolicyset.set1.list=p2,p4,p5,p1,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenDeviceKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenDeviceKeySubjectNameDefault\npolicyset.set1.p1.default.params.dnpattern=UID=Token Key Device - $request.tokencuid$\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p3.constraint.class_id=noConstraintImpl\npolicyset.set1.p3.constraint.name=No Constraint\npolicyset.set1.p3.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p3.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p3.default.params.crlDistPointsCritical=false\npolicyset.set1.p3.default.params.crlDistPointsNum=1\npolicyset.set1.p3.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p3.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p3.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p3.default.params.crlDistPointsPointName_0=\npolicyset.set1.p3.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p3.default.params.crlDistPointsReasons_0=\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=false\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_1=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\nprofileId=caTokenDeviceKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6439. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6440. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6441. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6442. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6443. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6444. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6445. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6446. 2017-05-11T02:30:56Z DEBUG response status 409
  6447. 2017-05-11T02:30:56Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6448. 2017-05-11T02:30:56Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6449. 2017-05-11T02:30:56Z DEBUG Error migrating 'caTokenDeviceKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6450. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenDeviceKeyEnrollment?action=enable
  6451. 2017-05-11T02:30:56Z DEBUG request body ''
  6452. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6453. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6454. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6455. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6456. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6457. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6458. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6459. 2017-05-11T02:30:56Z DEBUG response status 500
  6460. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6461. 2017-05-11T02:30:56Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6462. 2017-05-11T02:30:56Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6463. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6464. 2017-05-11T02:30:56Z DEBUG request body ''
  6465. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6466. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6467. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6468. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6469. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6470. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6471. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6472. 2017-05-11T02:30:56Z DEBUG response status 204
  6473. 2017-05-11T02:30:56Z DEBUG response headers {'set-cookie': 'JSESSIONID=9B06D2FCFA60AECF08D6ABC2CEF78018; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6474. 2017-05-11T02:30:56Z DEBUG response body ''
  6475. 2017-05-11T02:30:56Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6476. 2017-05-11T02:30:56Z DEBUG request body ''
  6477. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6478. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6479. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6480. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6481. 2017-05-11T02:30:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6482. 2017-05-11T02:30:56Z DEBUG Protocol: TLS1.2
  6483. 2017-05-11T02:30:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6484. 2017-05-11T02:30:56Z DEBUG response status 200
  6485. 2017-05-11T02:30:56Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=9437F8FA146FEF5CFD475641827E2AE6; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6486. 2017-05-11T02:30:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6487. 2017-05-11T02:30:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6488. 2017-05-11T02:30:56Z DEBUG request body 'desc=This profile is for enrolling Token Encryption key\nenable=true\nenableBy=admin\nname=Token User Encryption Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenUserKeySubjectNameDefault\npolicyset.set1.p1.default.params.dnpattern=UID=$request.uid$, O=Token Key User\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=false\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=true\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=false\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.mail$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.set1.10.constraint.name=Renewal Grace Period Constraint\npolicyset.set1.10.constraint.params.renewal.graceBefore=30\npolicyset.set1.10.constraint.params.renewal.graceAfter=30\npolicyset.set1.10.default.class_id=noDefaultImpl\npolicyset.set1.10.default.name=No Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTokenUserEncryptionKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6489. 2017-05-11T02:30:56Z DEBUG NSSConnection init ipa.rdlg.net
  6490. 2017-05-11T02:30:56Z DEBUG Connecting: 172.20.0.200:0
  6491. 2017-05-11T02:30:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6492. 2017-05-11T02:30:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6493. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6494. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6495. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6496. 2017-05-11T02:30:57Z DEBUG response status 409
  6497. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6498. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6499. 2017-05-11T02:30:57Z DEBUG Error migrating 'caTokenUserEncryptionKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6500. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserEncryptionKeyEnrollment?action=enable
  6501. 2017-05-11T02:30:57Z DEBUG request body ''
  6502. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6503. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6504. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6505. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6506. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6507. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6508. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6509. 2017-05-11T02:30:57Z DEBUG response status 500
  6510. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6511. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6512. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6513. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6514. 2017-05-11T02:30:57Z DEBUG request body ''
  6515. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6516. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6517. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6518. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6519. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6520. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6521. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6522. 2017-05-11T02:30:57Z DEBUG response status 204
  6523. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=DFE9079E7F5FD62A94071476230CA852; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6524. 2017-05-11T02:30:57Z DEBUG response body ''
  6525. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6526. 2017-05-11T02:30:57Z DEBUG request body ''
  6527. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6528. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6529. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6530. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6531. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6532. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6533. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6534. 2017-05-11T02:30:57Z DEBUG response status 200
  6535. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=F98D279C285CD70D28E715CD7399B8F8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/xml'}
  6536. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6537. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6538. 2017-05-11T02:30:57Z DEBUG request body 'desc=This profile is for enrolling Token Signing key\nenable=true\nenableBy=admin\nname=Token User Signing Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenUserKeySubjectNameDefault\npolicyset.set1.p1.default.params.dnpattern=UID=$request.uid$, O=Token Key User\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=true\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.mail$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.set1.10.constraint.name=Renewal Grace Period Constraint\npolicyset.set1.10.constraint.params.renewal.graceBefore=30\npolicyset.set1.10.constraint.params.renewal.graceAfter=30\npolicyset.set1.10.default.class_id=noDefaultImpl\npolicyset.set1.10.default.name=No Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTokenUserSigningKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6539. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6540. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6541. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6542. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6543. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6544. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6545. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6546. 2017-05-11T02:30:57Z DEBUG response status 409
  6547. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6548. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6549. 2017-05-11T02:30:57Z DEBUG Error migrating 'caTokenUserSigningKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6550. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserSigningKeyEnrollment?action=enable
  6551. 2017-05-11T02:30:57Z DEBUG request body ''
  6552. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6553. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6554. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6555. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6556. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6557. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6558. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6559. 2017-05-11T02:30:57Z DEBUG response status 500
  6560. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:56 GMT', 'content-type': 'text/html;charset=utf-8'}
  6561. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6562. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6563. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6564. 2017-05-11T02:30:57Z DEBUG request body ''
  6565. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6566. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6567. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6568. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6569. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6570. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6571. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6572. 2017-05-11T02:30:57Z DEBUG response status 204
  6573. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=3DC19B40923D5438BAF4727C52684832; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6574. 2017-05-11T02:30:57Z DEBUG response body ''
  6575. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6576. 2017-05-11T02:30:57Z DEBUG request body ''
  6577. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6578. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6579. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6580. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6581. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6582. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6583. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6584. 2017-05-11T02:30:57Z DEBUG response status 200
  6585. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=883F6A8FAC216E5F9248B0E2C2E242DE; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6586. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6587. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6588. 2017-05-11T02:30:57Z DEBUG request body 'desc=This profile is for enrolling token device keys\nenable=true\nenableBy=admin\nlastModified=1068835451090\nname=Temporary Device Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsHKeyCertReqInputImpl\ninput.i1.name=nsHKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p3,p4,p5,p1,p7,p8,p9,p12,p6\npolicyset.set1.list=p2,p4,p5,p1,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenDeviceKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenDeviceKeySubjectNameDefault\npolicyset.set1.p1.default.params.dnpattern=UID=Token Key Device - $request.tokencuid$\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=7\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p3.constraint.class_id=noConstraintImpl\npolicyset.set1.p3.constraint.name=No Constraint\npolicyset.set1.p3.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p3.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p3.default.params.crlDistPointsCritical=false\npolicyset.set1.p3.default.params.crlDistPointsNum=1\npolicyset.set1.p3.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p3.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p3.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p3.default.params.crlDistPointsPointName_0=\npolicyset.set1.p3.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p3.default.params.crlDistPointsReasons_0=\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=false\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_1=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\nprofileId=caTempTokenDeviceKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6589. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6590. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6591. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6592. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6593. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6594. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6595. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6596. 2017-05-11T02:30:57Z DEBUG response status 409
  6597. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6598. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6599. 2017-05-11T02:30:57Z DEBUG Error migrating 'caTempTokenDeviceKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6600. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTempTokenDeviceKeyEnrollment?action=enable
  6601. 2017-05-11T02:30:57Z DEBUG request body ''
  6602. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6603. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6604. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6605. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6606. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6607. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6608. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6609. 2017-05-11T02:30:57Z DEBUG response status 500
  6610. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6611. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6612. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6613. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6614. 2017-05-11T02:30:57Z DEBUG request body ''
  6615. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6616. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6617. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6618. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6619. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6620. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6621. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6622. 2017-05-11T02:30:57Z DEBUG response status 204
  6623. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=C8AF81894DBD5B3F48B5EC13FC05C23F; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6624. 2017-05-11T02:30:57Z DEBUG response body ''
  6625. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6626. 2017-05-11T02:30:57Z DEBUG request body ''
  6627. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6628. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6629. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6630. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6631. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6632. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6633. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6634. 2017-05-11T02:30:57Z DEBUG response status 200
  6635. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=E2A5AFDAD0966FDAB7896AAB4B1C72F4; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6636. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6637. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6638. 2017-05-11T02:30:57Z DEBUG request body 'desc=This profile is for enrolling Token Encryption key\nenable=true\nenableBy=admin\nname=Temporary Token User Encryption Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenUserKeySubjectNameDefault\n#uncomment below to support SMIME\n#policyset.set1.p1.default.params.dnpattern=UID=$request.uid$, E=$request.mail$, O=Token Key User\npolicyset.set1.p1.default.params.dnpattern=UID=$request.uid$, O=Token Key User\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=7\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=false\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=true\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=false\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.mail$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTempTokenUserEncryptionKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6639. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6640. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6641. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6642. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6643. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6644. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6645. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6646. 2017-05-11T02:30:57Z DEBUG response status 409
  6647. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6648. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6649. 2017-05-11T02:30:57Z DEBUG Error migrating 'caTempTokenUserEncryptionKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6650. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTempTokenUserEncryptionKeyEnrollment?action=enable
  6651. 2017-05-11T02:30:57Z DEBUG request body ''
  6652. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6653. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6654. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6655. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6656. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6657. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6658. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6659. 2017-05-11T02:30:57Z DEBUG response status 500
  6660. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6661. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6662. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6663. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6664. 2017-05-11T02:30:57Z DEBUG request body ''
  6665. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6666. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6667. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6668. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6669. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6670. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6671. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6672. 2017-05-11T02:30:57Z DEBUG response status 204
  6673. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=D449ADF4D5669ABDAC708B467929C066; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6674. 2017-05-11T02:30:57Z DEBUG response body ''
  6675. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6676. 2017-05-11T02:30:57Z DEBUG request body ''
  6677. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6678. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6679. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6680. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6681. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6682. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6683. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6684. 2017-05-11T02:30:57Z DEBUG response status 200
  6685. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=5D2ACF73880B53880AA3ED5AEF87086B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6686. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6687. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6688. 2017-05-11T02:30:57Z DEBUG request body 'desc=This profile is for enrolling Token Signing key\nenable=true\nenableBy=admin\nname=Temporary Token User Signing Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenUserKeySubjectNameDefault\n#uncomment below to support SMIME\n#policyset.set1.p1.default.params.dnpattern=UID=$request.uid$, E=$request.mail$, O=Token Key User\npolicyset.set1.p1.default.params.dnpattern=UID=$request.uid$, O=Token Key User\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=7\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=true\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.mail$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTempTokenUserSigningKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  6689. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6690. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6691. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6692. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6693. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6694. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6695. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6696. 2017-05-11T02:30:57Z DEBUG response status 409
  6697. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6698. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6699. 2017-05-11T02:30:57Z DEBUG Error migrating 'caTempTokenUserSigningKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  6700. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTempTokenUserSigningKeyEnrollment?action=enable
  6701. 2017-05-11T02:30:57Z DEBUG request body ''
  6702. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6703. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6704. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6705. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6706. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6707. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6708. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6709. 2017-05-11T02:30:57Z DEBUG response status 500
  6710. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6711. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6712. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6713. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6714. 2017-05-11T02:30:57Z DEBUG request body ''
  6715. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6716. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6717. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6718. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6719. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6720. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6721. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6722. 2017-05-11T02:30:57Z DEBUG response status 204
  6723. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=4E4F1A376ABCA848816DECD8DDA946E3; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6724. 2017-05-11T02:30:57Z DEBUG response body ''
  6725. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6726. 2017-05-11T02:30:57Z DEBUG request body ''
  6727. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6728. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6729. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6730. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6731. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6732. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6733. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6734. 2017-05-11T02:30:57Z DEBUG response status 200
  6735. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=70EB3239CE3341AB55AA6216A1C27A14; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6736. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6737. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6738. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain administrator\'s certificates with LDAP authentication against the internal LDAP database.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain Administrator Certificate Enrollment\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\ninput.i3.class_id=subjectDNInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=adminCertSet\npolicyset.adminCertSet.list=1,2,3,4,5,6,7,8\npolicyset.adminCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.adminCertSet.1.constraint.name=Subject Name Constraint\npolicyset.adminCertSet.1.constraint.params.pattern=.*\npolicyset.adminCertSet.1.constraint.params.accept=true\npolicyset.adminCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.adminCertSet.1.default.name=Subject Name Default\npolicyset.adminCertSet.1.default.params.name=\npolicyset.adminCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.adminCertSet.2.constraint.name=Validity Constraint\npolicyset.adminCertSet.2.constraint.params.range=365\npolicyset.adminCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.adminCertSet.2.constraint.params.notAfterCheck=false\npolicyset.adminCertSet.2.default.class_id=validityDefaultImpl\npolicyset.adminCertSet.2.default.name=Validity Default\npolicyset.adminCertSet.2.default.params.range=365\npolicyset.adminCertSet.2.default.params.startTime=0\npolicyset.adminCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.adminCertSet.3.constraint.name=Key Constraint\npolicyset.adminCertSet.3.constraint.params.keyType=-\npolicyset.adminCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.adminCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.adminCertSet.3.default.name=Key Default\npolicyset.adminCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.4.constraint.name=No Constraint\npolicyset.adminCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.adminCertSet.4.default.name=Authority Key Identifier Default\npolicyset.adminCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.5.constraint.name=No Constraint\npolicyset.adminCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.adminCertSet.5.default.name=AIA Extension Default\npolicyset.adminCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.adminCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.adminCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.adminCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.adminCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.adminCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.adminCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.adminCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.adminCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.adminCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.adminCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.adminCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.adminCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.adminCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.adminCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.adminCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.adminCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.adminCertSet.6.default.name=Key Usage Default\npolicyset.adminCertSet.6.default.params.keyUsageCritical=true\npolicyset.adminCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.adminCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.adminCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.adminCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.adminCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.adminCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.adminCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.adminCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.adminCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.adminCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.adminCertSet.7.constraint.name=No Constraint\npolicyset.adminCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.adminCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.adminCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.adminCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.adminCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.adminCertSet.8.constraint.name=No Constraint\npolicyset.adminCertSet.8.constraint.params.signingAlgsAllowed=SHA256withRSA,SHA1withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA256withEC,SHA1withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.adminCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.adminCertSet.8.default.name=Signing Alg\npolicyset.adminCertSet.8.default.params.signingAlg=-\nprofileId=caAdminCert\nclassId=caEnrollImpl\n'
  6739. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6740. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6741. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6742. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6743. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6744. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6745. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6746. 2017-05-11T02:30:57Z DEBUG response status 409
  6747. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6748. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6749. 2017-05-11T02:30:57Z DEBUG Error migrating 'caAdminCert': Non-2xx response from CA REST API: 409. Profile already exists
  6750. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caAdminCert?action=enable
  6751. 2017-05-11T02:30:57Z DEBUG request body ''
  6752. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6753. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6754. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6755. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6756. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6757. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6758. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6759. 2017-05-11T02:30:57Z DEBUG response status 500
  6760. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6761. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6762. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6763. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6764. 2017-05-11T02:30:57Z DEBUG request body ''
  6765. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6766. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6767. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6768. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6769. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6770. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6771. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6772. 2017-05-11T02:30:57Z DEBUG response status 204
  6773. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=DC86AE42F7996F325C549F8A880EFC7D; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6774. 2017-05-11T02:30:57Z DEBUG response body ''
  6775. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6776. 2017-05-11T02:30:57Z DEBUG request body ''
  6777. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6778. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6779. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6780. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6781. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6782. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6783. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6784. 2017-05-11T02:30:57Z DEBUG response status 200
  6785. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=B1F6A17F89680118863AE4B614ECC6D3; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6786. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6787. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6788. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain server certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\ninput.i3.class_id=subjectAltNameExtInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\n# allows SAN to be specified from client side\n# need to:\n# 1. add i3 to input.list above\n# 2. add 9 to policyset.serverCertSet.list above\n# 3. change below to reflect the number of general names, and\n# turn each corresponding subjAltExtPattern_<num> to true\n# policyset.serverCertSet.9.default.params.subjAltNameNumGNs\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.serverCertSet.9.default.name=Subject Alternative Name Extension Default\npolicyset.serverCertSet.9.default.params.subjAltExtGNEnable_0=true\npolicyset.serverCertSet.9.default.params.subjAltExtPattern_0=$request.req_san_pattern_0$\npolicyset.serverCertSet.9.default.params.subjAltExtType_0=DNSName\npolicyset.serverCertSet.9.default.params.subjAltExtGNEnable_1=false\npolicyset.serverCertSet.9.default.params.subjAltExtPattern_1=$request.req_san_pattern_1$\npolicyset.serverCertSet.9.default.params.subjAltExtType_1=DNSName\npolicyset.serverCertSet.9.default.params.subjAltExtGNEnable_2=false\npolicyset.serverCertSet.9.default.params.subjAltExtPattern_2=$request.req_san_pattern_2$\npolicyset.serverCertSet.9.default.params.subjAltExtType_2=DNSName\npolicyset.serverCertSet.9.default.params.subjAltNameExtCritical=false\npolicyset.serverCertSet.9.default.params.subjAltNameNumGNs=1\nprofileId=caInternalAuthServerCert\nclassId=caEnrollImpl\n'
  6789. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6790. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6791. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6792. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6793. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6794. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6795. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6796. 2017-05-11T02:30:57Z DEBUG response status 409
  6797. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6798. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6799. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthServerCert': Non-2xx response from CA REST API: 409. Profile already exists
  6800. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthServerCert?action=enable
  6801. 2017-05-11T02:30:57Z DEBUG request body ''
  6802. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6803. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6804. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6805. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6806. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6807. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6808. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6809. 2017-05-11T02:30:57Z DEBUG response status 500
  6810. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6811. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6812. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6813. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6814. 2017-05-11T02:30:57Z DEBUG request body ''
  6815. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6816. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6817. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6818. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6819. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6820. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6821. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6822. 2017-05-11T02:30:57Z DEBUG response status 204
  6823. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=61DBF58D7CDCFEADF13A3702717B4394; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6824. 2017-05-11T02:30:57Z DEBUG response body ''
  6825. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6826. 2017-05-11T02:30:57Z DEBUG request body ''
  6827. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6828. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6829. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6830. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6831. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6832. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6833. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6834. 2017-05-11T02:30:57Z DEBUG response status 200
  6835. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=C6818A844D8CFB9998CAD332D8D12174; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6836. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6837. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6838. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain Data Recovery Manager transport certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain Data Recovery Manager Transport Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=transportCertSet\npolicyset.transportCertSet.list=1,2,3,4,5,6,7,8\npolicyset.transportCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.transportCertSet.1.constraint.name=Subject Name Constraint\npolicyset.transportCertSet.1.constraint.params.pattern=CN=.*\npolicyset.transportCertSet.1.constraint.params.accept=true\npolicyset.transportCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.transportCertSet.1.default.name=Subject Name Default\npolicyset.transportCertSet.1.default.params.name=\npolicyset.transportCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.transportCertSet.2.constraint.name=Validity Constraint\npolicyset.transportCertSet.2.constraint.params.range=720\npolicyset.transportCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.transportCertSet.2.constraint.params.notAfterCheck=false\npolicyset.transportCertSet.2.default.class_id=validityDefaultImpl\npolicyset.transportCertSet.2.default.name=Validity Default\npolicyset.transportCertSet.2.default.params.range=720\npolicyset.transportCertSet.2.default.params.startTime=0\npolicyset.transportCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.transportCertSet.3.constraint.name=Key Constraint\npolicyset.transportCertSet.3.constraint.params.keyType=-\npolicyset.transportCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.transportCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.transportCertSet.3.default.name=Key Default\npolicyset.transportCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.4.constraint.name=No Constraint\npolicyset.transportCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.transportCertSet.4.default.name=Authority Key Identifier Default\npolicyset.transportCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.5.constraint.name=No Constraint\npolicyset.transportCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.transportCertSet.5.default.name=AIA Extension Default\npolicyset.transportCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.transportCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.transportCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.transportCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.transportCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.transportCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.transportCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.transportCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.transportCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.transportCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.transportCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.transportCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.transportCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.transportCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.transportCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.transportCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.transportCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.transportCertSet.6.default.name=Key Usage Default\npolicyset.transportCertSet.6.default.params.keyUsageCritical=true\npolicyset.transportCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.transportCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.transportCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.transportCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.transportCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.transportCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.transportCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.transportCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.transportCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.transportCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.transportCertSet.7.constraint.name=No Constraint\npolicyset.transportCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.transportCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.transportCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.transportCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.transportCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.transportCertSet.8.constraint.name=No Constraint\npolicyset.transportCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.transportCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.transportCertSet.8.default.name=Signing Alg\npolicyset.transportCertSet.8.default.params.signingAlg=-\nprofileId=caInternalAuthTransportCert\nclassId=caEnrollImpl\n'
  6839. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6840. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6841. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6842. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6843. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6844. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6845. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6846. 2017-05-11T02:30:57Z DEBUG response status 409
  6847. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6848. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6849. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthTransportCert': Non-2xx response from CA REST API: 409. Profile already exists
  6850. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthTransportCert?action=enable
  6851. 2017-05-11T02:30:57Z DEBUG request body ''
  6852. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6853. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6854. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6855. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6856. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6857. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6858. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6859. 2017-05-11T02:30:57Z DEBUG response status 500
  6860. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6861. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6862. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6863. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6864. 2017-05-11T02:30:57Z DEBUG request body ''
  6865. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6866. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6867. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6868. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6869. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6870. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6871. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6872. 2017-05-11T02:30:57Z DEBUG response status 204
  6873. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=4DA27EEE6330057DD3713E9376672FD9; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6874. 2017-05-11T02:30:57Z DEBUG response body ''
  6875. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6876. 2017-05-11T02:30:57Z DEBUG request body ''
  6877. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6878. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6879. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6880. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6881. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6882. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6883. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6884. 2017-05-11T02:30:57Z DEBUG response status 200
  6885. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=4BC1E6A8C91A070E772016ED416D5016; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6886. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6887. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6888. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain DRM storage certificates\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain DRM storage Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=drmStorageCertSet\npolicyset.drmStorageCertSet.list=1,2,3,4,5,6,7,9\npolicyset.drmStorageCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.drmStorageCertSet.1.constraint.name=Subject Name Constraint\npolicyset.drmStorageCertSet.1.constraint.params.pattern=CN=.*\npolicyset.drmStorageCertSet.1.constraint.params.accept=true\npolicyset.drmStorageCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.drmStorageCertSet.1.default.name=Subject Name Default\npolicyset.drmStorageCertSet.1.default.params.name=\npolicyset.drmStorageCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.drmStorageCertSet.2.constraint.name=Validity Constraint\npolicyset.drmStorageCertSet.2.constraint.params.range=720\npolicyset.drmStorageCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.drmStorageCertSet.2.constraint.params.notAfterCheck=false\npolicyset.drmStorageCertSet.2.default.class_id=validityDefaultImpl\npolicyset.drmStorageCertSet.2.default.name=Validity Default\npolicyset.drmStorageCertSet.2.default.params.range=720\npolicyset.drmStorageCertSet.2.default.params.startTime=0\npolicyset.drmStorageCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.drmStorageCertSet.3.constraint.name=Key Constraint\npolicyset.drmStorageCertSet.3.constraint.params.keyType=-\npolicyset.drmStorageCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.drmStorageCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.drmStorageCertSet.3.default.name=Key Default\npolicyset.drmStorageCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.4.constraint.name=No Constraint\npolicyset.drmStorageCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.drmStorageCertSet.4.default.name=Authority Key Identifier Default\npolicyset.drmStorageCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.5.constraint.name=No Constraint\npolicyset.drmStorageCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.drmStorageCertSet.5.default.name=AIA Extension Default\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.drmStorageCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.drmStorageCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.drmStorageCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.drmStorageCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.drmStorageCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.drmStorageCertSet.6.default.name=Key Usage Default\npolicyset.drmStorageCertSet.6.default.params.keyUsageCritical=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.drmStorageCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.drmStorageCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.drmStorageCertSet.7.constraint.name=No Constraint\npolicyset.drmStorageCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.drmStorageCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.drmStorageCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.drmStorageCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.drmStorageCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.drmStorageCertSet.9.constraint.name=No Constraint\npolicyset.drmStorageCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.drmStorageCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.drmStorageCertSet.9.default.name=Signing Alg\npolicyset.drmStorageCertSet.9.default.params.signingAlg=-\nprofileId=caInternalAuthDRMstorageCert\nclassId=caEnrollImpl\n'
  6889. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6890. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6891. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6892. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6893. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6894. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6895. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6896. 2017-05-11T02:30:57Z DEBUG response status 409
  6897. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6898. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6899. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthDRMstorageCert': Non-2xx response from CA REST API: 409. Profile already exists
  6900. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthDRMstorageCert?action=enable
  6901. 2017-05-11T02:30:57Z DEBUG request body ''
  6902. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6903. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6904. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6905. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6906. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6907. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6908. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6909. 2017-05-11T02:30:57Z DEBUG response status 500
  6910. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6911. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6912. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6913. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6914. 2017-05-11T02:30:57Z DEBUG request body ''
  6915. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6916. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6917. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6918. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6919. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6920. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6921. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6922. 2017-05-11T02:30:57Z DEBUG response status 204
  6923. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=AB136A40B274663299A1CB9D25977FFA; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6924. 2017-05-11T02:30:57Z DEBUG response body ''
  6925. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6926. 2017-05-11T02:30:57Z DEBUG request body ''
  6927. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6928. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6929. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6930. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6931. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6932. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6933. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6934. 2017-05-11T02:30:57Z DEBUG response status 200
  6935. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=68D933C7C8EDB1C07C15243E7E408CE0; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6936. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6937. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6938. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain subsystem certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain Subsystem Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nupdater.list=u1\nupdater.u1.class_id=subsystemGroupUpdaterImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=720\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=720\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=-\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caInternalAuthSubsystemCert\nclassId=caEnrollImpl\n'
  6939. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6940. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6941. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6942. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6943. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6944. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6945. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6946. 2017-05-11T02:30:57Z DEBUG response status 409
  6947. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6948. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6949. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthSubsystemCert': Non-2xx response from CA REST API: 409. Profile already exists
  6950. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthSubsystemCert?action=enable
  6951. 2017-05-11T02:30:57Z DEBUG request body ''
  6952. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6953. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6954. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6955. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6956. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6957. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6958. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6959. 2017-05-11T02:30:57Z DEBUG response status 500
  6960. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  6961. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  6962. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  6963. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  6964. 2017-05-11T02:30:57Z DEBUG request body ''
  6965. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6966. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6967. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6968. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6969. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6970. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6971. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6972. 2017-05-11T02:30:57Z DEBUG response status 204
  6973. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=CF15E6D47184538AF19B6D586ACD1893; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6974. 2017-05-11T02:30:57Z DEBUG response body ''
  6975. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  6976. 2017-05-11T02:30:57Z DEBUG request body ''
  6977. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6978. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6979. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6980. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6981. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6982. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6983. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6984. 2017-05-11T02:30:57Z DEBUG response status 200
  6985. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=6CF87AF0A1C18DF0372050476C72C77D; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  6986. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  6987. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  6988. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling Security Domain OCSP Manager certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Security Domain OCSP Manager Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=ocspCertSet\npolicyset.ocspCertSet.list=1,2,3,4,5,6,8,9\npolicyset.ocspCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.ocspCertSet.1.constraint.name=Subject Name Constraint\npolicyset.ocspCertSet.1.constraint.params.pattern=CN=.*\npolicyset.ocspCertSet.1.constraint.params.accept=true\npolicyset.ocspCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.ocspCertSet.1.default.name=Subject Name Default\npolicyset.ocspCertSet.1.default.params.name=\npolicyset.ocspCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.ocspCertSet.2.constraint.name=Validity Constraint\npolicyset.ocspCertSet.2.constraint.params.range=720\npolicyset.ocspCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.ocspCertSet.2.constraint.params.notAfterCheck=false\npolicyset.ocspCertSet.2.default.class_id=validityDefaultImpl\npolicyset.ocspCertSet.2.default.name=Validity Default\npolicyset.ocspCertSet.2.default.params.range=720\npolicyset.ocspCertSet.2.default.params.startTime=0\npolicyset.ocspCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.ocspCertSet.3.constraint.name=Key Constraint\npolicyset.ocspCertSet.3.constraint.params.keyType=-\npolicyset.ocspCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.ocspCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.ocspCertSet.3.default.name=Key Default\npolicyset.ocspCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.ocspCertSet.4.constraint.name=No Constraint\npolicyset.ocspCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.ocspCertSet.4.default.name=Authority Key Identifier Default\npolicyset.ocspCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.ocspCertSet.5.constraint.name=No Constraint\npolicyset.ocspCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.ocspCertSet.5.default.name=AIA Extension Default\npolicyset.ocspCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.ocspCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.ocspCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.ocspCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.ocspCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.ocspCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.ocspCertSet.6.constraint.class_id=extendedKeyUsageExtConstraintImpl\npolicyset.ocspCertSet.6.constraint.name=Extended Key Usage Extension\npolicyset.ocspCertSet.6.constraint.params.exKeyUsageCritical=false\npolicyset.ocspCertSet.6.constraint.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.9\npolicyset.ocspCertSet.6.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.ocspCertSet.6.default.name=Extended Key Usage Default\npolicyset.ocspCertSet.6.default.params.exKeyUsageCritical=false\npolicyset.ocspCertSet.6.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.9\npolicyset.ocspCertSet.8.constraint.class_id=extensionConstraintImpl\npolicyset.ocspCertSet.8.constraint.name=No Constraint\npolicyset.ocspCertSet.8.constraint.params.extCritical=false\npolicyset.ocspCertSet.8.constraint.params.extOID=1.3.6.1.5.5.7.48.1.5\npolicyset.ocspCertSet.8.default.class_id=ocspNoCheckExtDefaultImpl\npolicyset.ocspCertSet.8.default.name=OCSP No Check Extension\npolicyset.ocspCertSet.8.default.params.ocspNoCheckCritical=false\npolicyset.ocspCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.ocspCertSet.9.constraint.name=No Constraint\npolicyset.ocspCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.ocspCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.ocspCertSet.9.default.name=Signing Alg\npolicyset.ocspCertSet.9.default.params.signingAlg=-\nprofileId=caInternalAuthOCSPCert\nclassId=caEnrollImpl\n'
  6989. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  6990. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  6991. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  6992. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  6993. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  6994. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  6995. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  6996. 2017-05-11T02:30:57Z DEBUG response status 409
  6997. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  6998. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  6999. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthOCSPCert': Non-2xx response from CA REST API: 409. Profile already exists
  7000. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthOCSPCert?action=enable
  7001. 2017-05-11T02:30:57Z DEBUG request body ''
  7002. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7003. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7004. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7005. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7006. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7007. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7008. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7009. 2017-05-11T02:30:57Z DEBUG response status 500
  7010. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  7011. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7012. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7013. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7014. 2017-05-11T02:30:57Z DEBUG request body ''
  7015. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7016. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7017. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7018. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7019. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7020. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7021. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7022. 2017-05-11T02:30:57Z DEBUG response status 204
  7023. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=D1266F02201DEBDDBF314C30BE773E8A; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7024. 2017-05-11T02:30:57Z DEBUG response body ''
  7025. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7026. 2017-05-11T02:30:57Z DEBUG request body ''
  7027. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7028. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7029. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7030. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7031. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7032. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7033. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7034. 2017-05-11T02:30:57Z DEBUG response status 200
  7035. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=9FE1EDC77F728F102276CD1993A6FC92; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7036. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7037. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7038. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling audit signing certificates.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=TokenAuth\nauthz.acl=group="Enterprise OCSP Administrators" || group="Enterprise RA Administrators" || group="Enterprise CA Administrators" || group="Enterprise KRA Administrators" || group="Enterprise TKS Administrators" || group="Enterprise TPS Administrators"\nname=Audit Signing Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=auditSigningCertSet\npolicyset.auditSigningCertSet.list=1,2,3,4,5,6,9\npolicyset.auditSigningCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.auditSigningCertSet.1.constraint.name=Subject Name Constraint\npolicyset.auditSigningCertSet.1.constraint.params.pattern=CN=.*\npolicyset.auditSigningCertSet.1.constraint.params.accept=true\npolicyset.auditSigningCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.auditSigningCertSet.1.default.name=Subject Name Default\npolicyset.auditSigningCertSet.1.default.params.name=\npolicyset.auditSigningCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.auditSigningCertSet.2.constraint.name=Validity Constraint\npolicyset.auditSigningCertSet.2.constraint.params.range=720\npolicyset.auditSigningCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.auditSigningCertSet.2.constraint.params.notAfterCheck=false\npolicyset.auditSigningCertSet.2.default.class_id=validityDefaultImpl\npolicyset.auditSigningCertSet.2.default.name=Validity Default\npolicyset.auditSigningCertSet.2.default.params.range=720\npolicyset.auditSigningCertSet.2.default.params.startTime=0\npolicyset.auditSigningCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.auditSigningCertSet.3.constraint.name=Key Constraint\npolicyset.auditSigningCertSet.3.constraint.params.keyType=-\npolicyset.auditSigningCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.auditSigningCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.auditSigningCertSet.3.default.name=Key Default\npolicyset.auditSigningCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.auditSigningCertSet.4.constraint.name=No Constraint\npolicyset.auditSigningCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.auditSigningCertSet.4.default.name=Authority Key Identifier Default\npolicyset.auditSigningCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.auditSigningCertSet.5.constraint.name=No Constraint\npolicyset.auditSigningCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.auditSigningCertSet.5.default.name=AIA Extension Default\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.auditSigningCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.auditSigningCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.auditSigningCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageKeyEncipherment=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.auditSigningCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.auditSigningCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.auditSigningCertSet.6.default.name=Key Usage Default\npolicyset.auditSigningCertSet.6.default.params.keyUsageCritical=true\npolicyset.auditSigningCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.auditSigningCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.auditSigningCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.auditSigningCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.auditSigningCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.auditSigningCertSet.9.constraint.name=No Constraint\npolicyset.auditSigningCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.auditSigningCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.auditSigningCertSet.9.default.name=Signing Alg\npolicyset.auditSigningCertSet.9.default.params.signingAlg=-\nprofileId=caInternalAuthAuditSigningCert\nclassId=caEnrollImpl\n'
  7039. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7040. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7041. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7042. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7043. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7044. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7045. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7046. 2017-05-11T02:30:57Z DEBUG response status 409
  7047. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7048. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7049. 2017-05-11T02:30:57Z DEBUG Error migrating 'caInternalAuthAuditSigningCert': Non-2xx response from CA REST API: 409. Profile already exists
  7050. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caInternalAuthAuditSigningCert?action=enable
  7051. 2017-05-11T02:30:57Z DEBUG request body ''
  7052. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7053. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7054. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7055. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7056. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7057. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7058. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7059. 2017-05-11T02:30:57Z DEBUG response status 500
  7060. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  7061. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7062. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7063. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7064. 2017-05-11T02:30:57Z DEBUG request body ''
  7065. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7066. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7067. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7068. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7069. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7070. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7071. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7072. 2017-05-11T02:30:57Z DEBUG response status 204
  7073. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=B6952DBB1B81786382651460280E74C6; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7074. 2017-05-11T02:30:57Z DEBUG response body ''
  7075. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7076. 2017-05-11T02:30:57Z DEBUG request body ''
  7077. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7078. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7079. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7080. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7081. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7082. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7083. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7084. 2017-05-11T02:30:57Z DEBUG response status 200
  7085. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=1AB851486467D4B420A95EC67A31D771; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7086. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7087. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7088. 2017-05-11T02:30:57Z DEBUG request body "desc=This profile is for enrolling Domain Controller Certificate\nenable=true\nenableBy=admin\nname=Domain Controller\nvisible=true\nauth.instance_id=AgentCertAuth\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\ninput.i3.class_id=genericInputImpl\ninput.i3.params.gi_display_name0=ccm\ninput.i3.params.gi_param_enable0=true\ninput.i3.params.gi_param_name0=ccm\ninput.i3.params.gi_display_name1=GUID\ninput.i3.params.gi_param_enable1=true\ninput.i3.params.gi_param_name1=GUID\ninput.i3.params.gi_num=2\noutput.list=o1,o2\noutput.o1.class_id=certOutputImpl\noutput.o2.class_id=pkcs7OutputImpl\npolicyset.list=set1\npolicyset.set1.list=p2,p4,p5,subj,p6,p8,p9,p12,eku,gen,crldp\npolicyset.set1.subj.constraint.class_id=noConstraintImpl\npolicyset.set1.subj.constraint.name=No Constraint\npolicyset.set1.subj.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.subj.default.name=nsTokenUserKeySubjectNameDefault\n#policyset.set1.p1.default.params.dnpattern=UID=$request.uid$, E=$request.mail$, O=Token Key User\n#policyset.set1.subj.default.params.dnpattern=CN=GEMSTAR,OU=Domain Controllers,DC=test,dc=local\npolicyset.set1.subj.default.params.dnpattern=CN=$request.ccm$\npolicyset.set1.subj.default.params.ldap.enable=false\npolicyset.set1.subj.default.params.ldap.searchName=uid\npolicyset.set1.subj.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.subj.default.params.ldap.basedn=\npolicyset.set1.subj.default.params.ldap.maxConns=4\npolicyset.set1.subj.default.params.ldap.minConns=1\npolicyset.set1.subj.default.params.ldap.ldapconn.Version=2\npolicyset.set1.subj.default.params.ldap.ldapconn.host=\npolicyset.set1.subj.default.params.ldap.ldapconn.port=\npolicyset.set1.subj.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=true\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=false\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=true\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.ccm$\npolicyset.set1.p6.default.params.subjAltExtType_0=DNSName\npolicyset.set1.p6.default.params.subjAltExtPattern_1=(Any)1.3.6.1.4.1.311.25.1,0410$request.GUID$\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=2\npolicyset.set1.5.constraint.class_id=noConstraintImpl\npolicyset.set1.5.constraint.name=No Constraint\npolicyset.set1.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.5.default.name=AIA Extension Default\npolicyset.set1.5.default.params.authInfoAccessADEnable_0=true\npolicyset.set1.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.5.default.params.authInfoAccessADLocation_0=http://localhost.localdomain:9180/ca/ee/ca/getCRL?crlIssuingPoint=MasterCRL&op=getCRL&crlDisplayType=cachedCRL&submit=Submit\npolicyset.set1.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.2\npolicyset.set1.5.default.params.authInfoAccessCritical=false\npolicyset.set1.5.default.params.authInfoAccessNumADs=1\npolicyset.set1.eku.constraint.class_id=noConstraintImpl\npolicyset.set1.eku.constraint.name=No Constraint\npolicyset.set1.eku.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.set1.eku.default.name=Extended Key Usage Extension Default\npolicyset.set1.eku.default.params.exKeyUsageCritical=false\npolicyset.set1.eku.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.crldp.constraint.class_id=noConstraintImpl\npolicyset.set1.crldp.constraint.name=No Constraint\npolicyset.set1.crldp.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.crldp.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.crldp.default.params.crlDistPointsCritical=false\npolicyset.set1.crldp.default.params.crlDistPointsNum=1\npolicyset.set1.crldp.default.params.crlDistPointsEnable_0=true\npolicyset.set1.crldp.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.crldp.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.crldp.default.params.crlDistPointsPointName_0=http://localhost.localdomain:9180/ca/ee/ca/getCRL?crlIssuingPoint=MasterCRL&op=getCRL&crlDisplayType=cachedCRL&submit=Submit\npolicyset.set1.crldp.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.crldp.default.params.crlDistPointsReasons_0=\npolicyset.set1.gen.constraint.class_id=noConstraintImpl\npolicyset.set1.gen.constraint.name=No Constraint\npolicyset.set1.gen.default.class_id=genericExtDefaultImpl\npolicyset.set1.gen.default.name=Generic Extension\n#This is the Microsoft 'Certificate Template Name' Extensions. The Value is 'DomainController'\npolicyset.set1.gen.default.params.genericExtOID=1.3.6.1.4.1.311.20.2\npolicyset.set1.gen.default.params.genericExtData=1e200044006f006d00610069006e0043006f006e00740072006f006c006c00650072\nprofileId=DomainController\nclassId=caEnrollImpl\n"
  7089. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7090. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7091. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7092. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7093. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7094. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7095. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7096. 2017-05-11T02:30:57Z DEBUG response status 409
  7097. 2017-05-11T02:30:57Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7098. 2017-05-11T02:30:57Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7099. 2017-05-11T02:30:57Z DEBUG Error migrating 'DomainController': Non-2xx response from CA REST API: 409. Profile already exists
  7100. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/DomainController?action=enable
  7101. 2017-05-11T02:30:57Z DEBUG request body ''
  7102. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7103. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7104. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7105. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7106. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7107. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7108. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7109. 2017-05-11T02:30:57Z DEBUG response status 500
  7110. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  7111. 2017-05-11T02:30:57Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7112. 2017-05-11T02:30:57Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7113. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7114. 2017-05-11T02:30:57Z DEBUG request body ''
  7115. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7116. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7117. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7118. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7119. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7120. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7121. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7122. 2017-05-11T02:30:57Z DEBUG response status 204
  7123. 2017-05-11T02:30:57Z DEBUG response headers {'set-cookie': 'JSESSIONID=9115C88734285FED43DC577E5C94866F; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7124. 2017-05-11T02:30:57Z DEBUG response body ''
  7125. 2017-05-11T02:30:57Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7126. 2017-05-11T02:30:57Z DEBUG request body ''
  7127. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7128. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7129. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7130. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7131. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7132. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7133. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7134. 2017-05-11T02:30:57Z DEBUG response status 200
  7135. 2017-05-11T02:30:57Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=538CC0A24F42BA7179625E6FDF3CCED8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7136. 2017-05-11T02:30:57Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7137. 2017-05-11T02:30:57Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7138. 2017-05-11T02:30:57Z DEBUG request body 'desc=This certificate profile is for enrolling user certificates with RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=RA Agent-Authenticated User Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=.*UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=RSA\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caDualRAuserCert\nclassId=caEnrollImpl\n'
  7139. 2017-05-11T02:30:57Z DEBUG NSSConnection init ipa.rdlg.net
  7140. 2017-05-11T02:30:57Z DEBUG Connecting: 172.20.0.200:0
  7141. 2017-05-11T02:30:57Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7142. 2017-05-11T02:30:57Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7143. 2017-05-11T02:30:57Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7144. 2017-05-11T02:30:57Z DEBUG Protocol: TLS1.2
  7145. 2017-05-11T02:30:57Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7146. 2017-05-11T02:30:58Z DEBUG response status 409
  7147. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7148. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7149. 2017-05-11T02:30:58Z DEBUG Error migrating 'caDualRAuserCert': Non-2xx response from CA REST API: 409. Profile already exists
  7150. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDualRAuserCert?action=enable
  7151. 2017-05-11T02:30:58Z DEBUG request body ''
  7152. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7153. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7154. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7155. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7156. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7157. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7158. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7159. 2017-05-11T02:30:58Z DEBUG response status 500
  7160. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  7161. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7162. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7163. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7164. 2017-05-11T02:30:58Z DEBUG request body ''
  7165. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7166. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7167. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7168. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7169. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7170. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7171. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7172. 2017-05-11T02:30:58Z DEBUG response status 204
  7173. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=182992E1B3FA6269DE751801FAC2F628; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7174. 2017-05-11T02:30:58Z DEBUG response body ''
  7175. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7176. 2017-05-11T02:30:58Z DEBUG request body ''
  7177. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7178. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7179. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7180. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7181. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7182. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7183. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7184. 2017-05-11T02:30:58Z DEBUG response status 200
  7185. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=A076DE38FC7E1F02BC3109F943C43594; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7186. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7187. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7188. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling RA agent user certificates with RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=RA Agent-Authenticated Agent User Certificate Enrollment\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\ninput.i3.class_id=subjectDNInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=RSA\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caRAagentCert\nclassId=caEnrollImpl\n'
  7189. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7190. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7191. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7192. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7193. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7194. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7195. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7196. 2017-05-11T02:30:58Z DEBUG response status 409
  7197. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7198. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7199. 2017-05-11T02:30:58Z DEBUG Error migrating 'caRAagentCert': Non-2xx response from CA REST API: 409. Profile already exists
  7200. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caRAagentCert?action=enable
  7201. 2017-05-11T02:30:58Z DEBUG request body ''
  7202. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7203. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7204. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7205. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7206. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7207. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7208. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7209. 2017-05-11T02:30:58Z DEBUG response status 500
  7210. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'text/html;charset=utf-8'}
  7211. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7212. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7213. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7214. 2017-05-11T02:30:58Z DEBUG request body ''
  7215. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7216. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7217. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7218. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7219. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7220. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7221. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7222. 2017-05-11T02:30:58Z DEBUG response status 204
  7223. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=08322014CC4176ABA64146550FB4F067; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7224. 2017-05-11T02:30:58Z DEBUG response body ''
  7225. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7226. 2017-05-11T02:30:58Z DEBUG request body ''
  7227. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7228. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7229. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7230. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7231. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7232. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7233. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7234. 2017-05-11T02:30:58Z DEBUG response status 200
  7235. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=9995B637CC2EE2F819DC46C074683C47; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:57 GMT', 'content-type': 'application/xml'}
  7236. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7237. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7238. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling server certificates with RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=RA Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=.*\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=365\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=180\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\nprofileId=caRAserverCert\nclassId=caEnrollImpl\n'
  7239. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7240. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7241. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7242. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7243. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7244. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7245. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7246. 2017-05-11T02:30:58Z DEBUG response status 409
  7247. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7248. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7249. 2017-05-11T02:30:58Z DEBUG Error migrating 'caRAserverCert': Non-2xx response from CA REST API: 409. Profile already exists
  7250. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caRAserverCert?action=enable
  7251. 2017-05-11T02:30:58Z DEBUG request body ''
  7252. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7253. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7254. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7255. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7256. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7257. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7258. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7259. 2017-05-11T02:30:58Z DEBUG response status 500
  7260. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7261. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7262. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7263. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7264. 2017-05-11T02:30:58Z DEBUG request body ''
  7265. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7266. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7267. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7268. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7269. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7270. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7271. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7272. 2017-05-11T02:30:58Z DEBUG response status 204
  7273. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=0E85CCE265B4D1FA73450A6433A83E9B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7274. 2017-05-11T02:30:58Z DEBUG response body ''
  7275. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7276. 2017-05-11T02:30:58Z DEBUG request body ''
  7277. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7278. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7279. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7280. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7281. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7282. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7283. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7284. 2017-05-11T02:30:58Z DEBUG response status 200
  7285. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=80F3BDB39D80DF60C7BDF8C735C3B189; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7286. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7287. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7288. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling device certificates to contain UUID in the Subject Alternative Name extension\nvisible=true\nenable=false\nenableBy=admin\nname=Manual device Dual-Use Certificate Enrollment to contain UUID in SAN\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=keyGenInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=userCertSet\npolicyset.userCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.userCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.userCertSet.1.constraint.name=Subject Name Constraint\npolicyset.userCertSet.1.constraint.params.pattern=UID=.*\npolicyset.userCertSet.1.constraint.params.accept=true\npolicyset.userCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.userCertSet.1.default.name=Subject Name Default\npolicyset.userCertSet.1.default.params.name=\npolicyset.userCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.userCertSet.2.constraint.name=Validity Constraint\npolicyset.userCertSet.2.constraint.params.range=365\npolicyset.userCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.userCertSet.2.constraint.params.notAfterCheck=false\npolicyset.userCertSet.2.default.class_id=validityDefaultImpl\npolicyset.userCertSet.2.default.name=Validity Default\npolicyset.userCertSet.2.default.params.range=180\npolicyset.userCertSet.2.default.params.startTime=0\npolicyset.userCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.userCertSet.3.constraint.name=Key Constraint\npolicyset.userCertSet.3.constraint.params.keyType=-\npolicyset.userCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096,nistp256,nistp384,nistp521\npolicyset.userCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.userCertSet.3.default.name=Key Default\npolicyset.userCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.4.constraint.name=No Constraint\npolicyset.userCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.userCertSet.4.default.name=Authority Key Identifier Default\npolicyset.userCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.5.constraint.name=No Constraint\npolicyset.userCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.userCertSet.5.default.name=AIA Extension Default\npolicyset.userCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.userCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.userCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.userCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.userCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.userCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.userCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.userCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.userCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.userCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.userCertSet.6.default.name=Key Usage Default\npolicyset.userCertSet.6.default.params.keyUsageCritical=true\npolicyset.userCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.userCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.userCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.userCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.userCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.userCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.userCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.userCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.userCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.userCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.7.constraint.name=No Constraint\npolicyset.userCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.userCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.userCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.userCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.userCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.userCertSet.8.constraint.name=No Constraint\npolicyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.userCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.userCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.userCertSet.8.default.params.subjAltExtType_1=OtherName\npolicyset.userCertSet.8.default.params.subjAltExtPattern_1=(IA5String)1.2.3.4,$server.source$\npolicyset.userCertSet.8.default.params.subjAltExtGNEnable_1=true\npolicyset.userCertSet.8.default.params.subjAltExtSource_1=UUID4\npolicyset.userCertSet.8.default.params.subjAltNameNumGNs=2\npolicyset.userCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.userCertSet.9.constraint.name=No Constraint\npolicyset.userCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.userCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.userCertSet.9.default.name=Signing Alg\npolicyset.userCertSet.9.default.params.signingAlg=-\nprofileId=caUUIDdeviceCert\nclassId=caEnrollImpl\n'
  7289. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7290. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7291. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7292. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7293. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7294. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7295. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7296. 2017-05-11T02:30:58Z DEBUG response status 409
  7297. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7298. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7299. 2017-05-11T02:30:58Z DEBUG Error migrating 'caUUIDdeviceCert': Non-2xx response from CA REST API: 409. Profile already exists
  7300. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caUUIDdeviceCert?action=enable
  7301. 2017-05-11T02:30:58Z DEBUG request body ''
  7302. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7303. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7304. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7305. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7306. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7307. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7308. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7309. 2017-05-11T02:30:58Z DEBUG response status 204
  7310. 2017-05-11T02:30:58Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  7311. 2017-05-11T02:30:58Z DEBUG response body ''
  7312. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7313. 2017-05-11T02:30:58Z DEBUG request body ''
  7314. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7315. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7316. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7317. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7318. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7319. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7320. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7321. 2017-05-11T02:30:58Z DEBUG response status 204
  7322. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=68B1B09B612394C6107E00480B53D4AC; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7323. 2017-05-11T02:30:58Z DEBUG response body ''
  7324. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7325. 2017-05-11T02:30:58Z DEBUG request body ''
  7326. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7327. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7328. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7329. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7330. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7331. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7332. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7333. 2017-05-11T02:30:58Z DEBUG response status 200
  7334. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=2987DD780FCBE8C7E5B227BFF4697CE2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7335. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7336. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7337. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing SSL client certificates.\nvisible=true\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=SSLclientCertAuth\nname=Renewal: Self-renew user SSL client certificates\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caSSLClientSelfRenewal\nclassId=caEnrollImpl\n'
  7338. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7339. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7340. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7341. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7342. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7343. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7344. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7345. 2017-05-11T02:30:58Z DEBUG response status 409
  7346. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7347. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7348. 2017-05-11T02:30:58Z DEBUG Error migrating 'caSSLClientSelfRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7349. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSSLClientSelfRenewal?action=enable
  7350. 2017-05-11T02:30:58Z DEBUG request body ''
  7351. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7352. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7353. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7354. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7355. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7356. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7357. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7358. 2017-05-11T02:30:58Z DEBUG response status 500
  7359. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7360. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7361. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7362. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7363. 2017-05-11T02:30:58Z DEBUG request body ''
  7364. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7365. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7366. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7367. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7368. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7369. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7370. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7371. 2017-05-11T02:30:58Z DEBUG response status 204
  7372. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=644F322201634A664A80761E02D7669B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7373. 2017-05-11T02:30:58Z DEBUG response body ''
  7374. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7375. 2017-05-11T02:30:58Z DEBUG request body ''
  7376. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7377. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7378. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7379. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7380. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7381. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7382. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7383. 2017-05-11T02:30:58Z DEBUG response status 200
  7384. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=035500ACDB2FB969E354CFEC53E93CC9; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7385. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7386. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7387. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing a certificate by serial number by using directory based authentication.\nvisible=true\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=UserDirEnrollment\nauthz.acl=user_origreq="auth_token.uid"\nname=Renewal: Directory-Authenticated User Certificate Self-Renew profile\ninput.list=i1\ninput.i1.class_id=serialNumRenewInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caDirUserRenewal\nclassId=caEnrollImpl\n'
  7388. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7389. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7390. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7391. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7392. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7393. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7394. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7395. 2017-05-11T02:30:58Z DEBUG response status 409
  7396. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7397. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7398. 2017-05-11T02:30:58Z DEBUG Error migrating 'caDirUserRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7399. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caDirUserRenewal?action=enable
  7400. 2017-05-11T02:30:58Z DEBUG request body ''
  7401. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7402. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7403. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7404. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7405. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7406. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7407. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7408. 2017-05-11T02:30:58Z DEBUG response status 500
  7409. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7410. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7411. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7412. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7413. 2017-05-11T02:30:58Z DEBUG request body ''
  7414. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7415. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7416. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7417. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7418. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7419. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7420. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7421. 2017-05-11T02:30:58Z DEBUG response status 204
  7422. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=1B12804ABC70F481C514CF1387AA8FA3; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7423. 2017-05-11T02:30:58Z DEBUG response body ''
  7424. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7425. 2017-05-11T02:30:58Z DEBUG request body ''
  7426. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7427. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7428. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7429. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7430. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7431. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7432. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7433. 2017-05-11T02:30:58Z DEBUG response status 200
  7434. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=4F7288B249DA22712C7AA09F597E9254; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7435. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7436. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7437. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing certificates to be approved manually by agents.\nvisible=true\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=\nname=Renewal: Renew certificate to be manually approved by agents\ninput.list=i1\ninput.i1.class_id=serialNumRenewInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caManualRenewal\nclassId=caEnrollImpl\n'
  7438. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7439. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7440. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7441. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7442. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7443. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7444. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7445. 2017-05-11T02:30:58Z DEBUG response status 409
  7446. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7447. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7448. 2017-05-11T02:30:58Z DEBUG Error migrating 'caManualRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7449. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caManualRenewal?action=enable
  7450. 2017-05-11T02:30:58Z DEBUG request body ''
  7451. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7452. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7453. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7454. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7455. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7456. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7457. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7458. 2017-05-11T02:30:58Z DEBUG response status 500
  7459. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7460. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7461. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7462. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7463. 2017-05-11T02:30:58Z DEBUG request body ''
  7464. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7465. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7466. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7467. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7468. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7469. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7470. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7471. 2017-05-11T02:30:58Z DEBUG response status 204
  7472. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=EB6528EE7A03D0B6072753172501AC8E; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7473. 2017-05-11T02:30:58Z DEBUG response body ''
  7474. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7475. 2017-05-11T02:30:58Z DEBUG request body ''
  7476. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7477. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7478. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7479. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7480. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7481. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7482. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7483. 2017-05-11T02:30:58Z DEBUG response status 200
  7484. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=F45F58013B24DE6D8EB8CFC1A0C6F90F; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7485. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7486. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7487. 2017-05-11T02:30:58Z DEBUG request body 'desc=This profile is for enrolling MS Login Certificate\nenable=true\nenableBy=admin\nname=Token User MS Login Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o2.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12,p13,p14,p15\npolicyset.set1.p1.constraint.class_id=noConstraintImpl\npolicyset.set1.p1.constraint.name=No Constraint\npolicyset.set1.p1.default.class_id=nsTokenUserKeySubjectNameDefaultImpl\npolicyset.set1.p1.default.name=nsTokenUserKeySubjectNameDefault\npolicyset.set1.p1.default.params.dnpattern=CN=uid=$request.uid$,E=$request.mail$, ou=$request.upn$, o=example\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=true\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail,givenName,sn,upn\npolicyset.set1.p1.default.params.ldap.basedn=ou=People,dc=example,dc=com\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=localhost.localdomain\npolicyset.set1.p1.default.params.ldap.ldapconn.port=389\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=true\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.mail$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=(UTF8String)1.3.6.1.4.1.311.20.2.3,$request.upn$\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=2\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\n policyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\n policyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\n policyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\n policyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\n policyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\n policyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=true\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=http://localhost.localdomain:9443/ca/ee/ca/getCRL?crlIssuingPoint=MasterCRL&op=getCRL\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=true\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=http://localhost.localdomain:9443/ca/ocsp\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\npolicyset.set1.p15.constraint.class_id=noConstraintImpl\npolicyset.set1.p15.constraint.name=No Constraint\npolicyset.set1.p15.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.set1.p15.default.name=Extended Key Usage Extension Default\npolicyset.set1.p15.default.params.exKeyUsageCritical=false\npolicyset.set1.p15.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.4.1.311.20.2.2\n\nprofileId=caTokenMSLoginEnrollment\nclassId=caUserCertEnrollImpl\n'
  7488. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7489. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7490. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7491. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7492. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7493. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7494. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7495. 2017-05-11T02:30:58Z DEBUG response status 409
  7496. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7497. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7498. 2017-05-11T02:30:58Z DEBUG Error migrating 'caTokenMSLoginEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  7499. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenMSLoginEnrollment?action=enable
  7500. 2017-05-11T02:30:58Z DEBUG request body ''
  7501. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7502. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7503. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7504. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7505. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7506. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7507. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7508. 2017-05-11T02:30:58Z DEBUG response status 500
  7509. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7510. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7511. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7512. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7513. 2017-05-11T02:30:58Z DEBUG request body ''
  7514. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7515. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7516. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7517. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7518. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7519. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7520. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7521. 2017-05-11T02:30:58Z DEBUG response status 204
  7522. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=123159B1C1402A26A271E7AD8E287376; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7523. 2017-05-11T02:30:58Z DEBUG response body ''
  7524. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7525. 2017-05-11T02:30:58Z DEBUG request body ''
  7526. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7527. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7528. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7529. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7530. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7531. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7532. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7533. 2017-05-11T02:30:58Z DEBUG response status 200
  7534. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=810876DC01E828CABD741C1E0F2B7221; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7535. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7536. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7537. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing a token certificate\nvisible=false\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=AgentCertAuth\nname=smart card token signing cert renewal profile\ninput.list=i1\ninput.i1.class_id=serialNumRenewInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caTokenUserSigningKeyRenewal\nclassId=caUserCertEnrollImpl\n'
  7538. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7539. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7540. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7541. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7542. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7543. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7544. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7545. 2017-05-11T02:30:58Z DEBUG response status 409
  7546. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7547. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7548. 2017-05-11T02:30:58Z DEBUG Error migrating 'caTokenUserSigningKeyRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7549. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserSigningKeyRenewal?action=enable
  7550. 2017-05-11T02:30:58Z DEBUG request body ''
  7551. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7552. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7553. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7554. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7555. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7556. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7557. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7558. 2017-05-11T02:30:58Z DEBUG response status 500
  7559. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7560. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7561. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7562. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7563. 2017-05-11T02:30:58Z DEBUG request body ''
  7564. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7565. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7566. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7567. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7568. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7569. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7570. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7571. 2017-05-11T02:30:58Z DEBUG response status 204
  7572. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=64581118A37C9476B43760D4D2AA98E2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7573. 2017-05-11T02:30:58Z DEBUG response body ''
  7574. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7575. 2017-05-11T02:30:58Z DEBUG request body ''
  7576. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7577. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7578. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7579. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7580. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7581. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7582. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7583. 2017-05-11T02:30:58Z DEBUG response status 200
  7584. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=4FDFE3C95CFC914259D03AE213603590; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7585. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7586. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7587. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing a token encryption certificate\nvisible=false\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=AgentCertAuth\nname=smart card token encryption cert renewal profile\ninput.list=i1\ninput.i1.class_id=serialNumRenewInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caTokenUserEncryptionKeyRenewal\nclassId=caUserCertEnrollImpl\n'
  7588. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7589. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7590. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7591. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7592. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7593. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7594. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7595. 2017-05-11T02:30:58Z DEBUG response status 409
  7596. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7597. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7598. 2017-05-11T02:30:58Z DEBUG Error migrating 'caTokenUserEncryptionKeyRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7599. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserEncryptionKeyRenewal?action=enable
  7600. 2017-05-11T02:30:58Z DEBUG request body ''
  7601. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7602. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7603. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7604. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7605. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7606. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7607. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7608. 2017-05-11T02:30:58Z DEBUG response status 500
  7609. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7610. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7611. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7612. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7613. 2017-05-11T02:30:58Z DEBUG request body ''
  7614. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7615. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7616. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7617. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7618. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7619. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7620. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7621. 2017-05-11T02:30:58Z DEBUG response status 204
  7622. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=052341DBAB8371C74BD9FD0B28BE47CE; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7623. 2017-05-11T02:30:58Z DEBUG response body ''
  7624. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7625. 2017-05-11T02:30:58Z DEBUG request body ''
  7626. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7627. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7628. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7629. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7630. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7631. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7632. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7633. 2017-05-11T02:30:58Z DEBUG response status 200
  7634. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=F7396C8C1E32B52E7F5D22B5AB635E30; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7635. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7636. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7637. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for renewing a token authentication certificate\nvisible=false\nenable=true\nenableBy=admin\nrenewal=true\nauth.instance_id=AgentCertAuth\nname=smart card token authentication cert renewal profile\ninput.list=i1\ninput.i1.class_id=serialNumRenewInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\nprofileId=caTokenUserAuthKeyRenewal\nclassId=caUserCertEnrollImpl\n'
  7638. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7639. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7640. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7641. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7642. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7643. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7644. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7645. 2017-05-11T02:30:58Z DEBUG response status 409
  7646. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7647. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7648. 2017-05-11T02:30:58Z DEBUG Error migrating 'caTokenUserAuthKeyRenewal': Non-2xx response from CA REST API: 409. Profile already exists
  7649. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserAuthKeyRenewal?action=enable
  7650. 2017-05-11T02:30:58Z DEBUG request body ''
  7651. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7652. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7653. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7654. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7655. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7656. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7657. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7658. 2017-05-11T02:30:58Z DEBUG response status 500
  7659. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7660. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7661. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7662. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7663. 2017-05-11T02:30:58Z DEBUG request body ''
  7664. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7665. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7666. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7667. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7668. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7669. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7670. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7671. 2017-05-11T02:30:58Z DEBUG response status 204
  7672. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=EDA97407BE5E4DC72CEE5218C0AE8ED9; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7673. 2017-05-11T02:30:58Z DEBUG response body ''
  7674. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7675. 2017-05-11T02:30:58Z DEBUG request body ''
  7676. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7677. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7678. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7679. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7680. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7681. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7682. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7683. 2017-05-11T02:30:58Z DEBUG response status 200
  7684. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=DD2CDD4AEB417073407922FB2676CF83; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7685. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7686. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7687. 2017-05-11T02:30:58Z DEBUG request body 'desc=This is an IPA profile for enrolling Jar Signing certificates.\nenable=true\nenableBy=admin\nname=Manual Jar Signing Certificate Enrollment\nvisible=false\nauth.class_id=\nauth.instance_id=raCertAuth\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=caJarSigningSet\npolicyset.caJarSigningSet.list=1,2,3,4,5,6\npolicyset.caJarSigningSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.caJarSigningSet.1.constraint.name=Subject Name Constraint\npolicyset.caJarSigningSet.1.constraint.params.accept=true\npolicyset.caJarSigningSet.1.constraint.params.pattern=.*\npolicyset.caJarSigningSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.caJarSigningSet.1.default.name=Subject Name Default\npolicyset.caJarSigningSet.1.default.params.name=\npolicyset.caJarSigningSet.2.constraint.class_id=validityConstraintImpl\npolicyset.caJarSigningSet.2.constraint.name=Validity Constraint\npolicyset.caJarSigningSet.2.constraint.params.notAfterCheck=false\npolicyset.caJarSigningSet.2.constraint.params.notBeforeCheck=false\npolicyset.caJarSigningSet.2.constraint.params.range=2922\npolicyset.caJarSigningSet.2.default.class_id=validityDefaultImpl\npolicyset.caJarSigningSet.2.default.name=Validity Default\npolicyset.caJarSigningSet.2.default.params.range=1461\npolicyset.caJarSigningSet.2.default.params.startTime=0\npolicyset.caJarSigningSet.3.constraint.class_id=keyConstraintImpl\npolicyset.caJarSigningSet.3.constraint.name=Key Constraint\npolicyset.caJarSigningSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.caJarSigningSet.3.constraint.params.keyType=RSA\npolicyset.caJarSigningSet.3.default.class_id=userKeyDefaultImpl\npolicyset.caJarSigningSet.3.default.name=Key Default\npolicyset.caJarSigningSet.4.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.caJarSigningSet.4.constraint.name=Key Usage Extension Constraint\npolicyset.caJarSigningSet.4.constraint.params.keyUsageCritical=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageCrlSign=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageDataEncipherment=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageDecipherOnly=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageDigitalSignature=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageEncipherOnly=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageKeyAgreement=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageKeyCertSign=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageKeyEncipherment=-\npolicyset.caJarSigningSet.4.constraint.params.keyUsageNonRepudiation=-\npolicyset.caJarSigningSet.4.default.class_id=keyUsageExtDefaultImpl\npolicyset.caJarSigningSet.4.default.name=Key Usage Default\npolicyset.caJarSigningSet.4.default.params.keyUsageCritical=true\npolicyset.caJarSigningSet.4.default.params.keyUsageCrlSign=false\npolicyset.caJarSigningSet.4.default.params.keyUsageDataEncipherment=false\npolicyset.caJarSigningSet.4.default.params.keyUsageDecipherOnly=false\npolicyset.caJarSigningSet.4.default.params.keyUsageDigitalSignature=true\npolicyset.caJarSigningSet.4.default.params.keyUsageEncipherOnly=false\npolicyset.caJarSigningSet.4.default.params.keyUsageKeyAgreement=false\npolicyset.caJarSigningSet.4.default.params.keyUsageKeyCertSign=true\npolicyset.caJarSigningSet.4.default.params.keyUsageKeyEncipherment=false\npolicyset.caJarSigningSet.4.default.params.keyUsageNonRepudiation=false\npolicyset.caJarSigningSet.5.constraint.class_id=nsCertTypeExtConstraintImpl\npolicyset.caJarSigningSet.5.constraint.name=Netscape Certificate Type Extension Constraint\npolicyset.caJarSigningSet.5.constraint.params.nsCertCritical=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertEmail=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertEmailCA=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertObjectSigning=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertObjectSigningCA=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertSSLCA=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertSSLClient=-\npolicyset.caJarSigningSet.5.constraint.params.nsCertSSLServer=-\npolicyset.caJarSigningSet.5.default.class_id=nsCertTypeExtDefaultImpl\npolicyset.caJarSigningSet.5.default.name=Netscape Certificate Type Extension Default\npolicyset.caJarSigningSet.5.default.params.nsCertCritical=false\npolicyset.caJarSigningSet.5.default.params.nsCertEmail=false\npolicyset.caJarSigningSet.5.default.params.nsCertEmailCA=false\npolicyset.caJarSigningSet.5.default.params.nsCertObjectSigning=true\npolicyset.caJarSigningSet.5.default.params.nsCertObjectSigningCA=false\npolicyset.caJarSigningSet.5.default.params.nsCertSSLCA=false\npolicyset.caJarSigningSet.5.default.params.nsCertSSLClient=false\npolicyset.caJarSigningSet.5.default.params.nsCertSSLServer=false\npolicyset.caJarSigningSet.6.constraint.class_id=signingAlgConstraintImpl\npolicyset.caJarSigningSet.6.constraint.name=No Constraint\npolicyset.caJarSigningSet.6.constraint.params.signingAlgsAllowed=MD5withRSA,MD2withRSA,SHA1withRSA,SHA256withRSA,SHA512withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.caJarSigningSet.6.default.class_id=signingAlgDefaultImpl\npolicyset.caJarSigningSet.6.default.name=Signing Alg\npolicyset.caJarSigningSet.6.default.params.signingAlg=-\nprofileId=caJarSigningCert\nclassId=caEnrollImpl\n'
  7688. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7689. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7690. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7691. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7692. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7693. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7694. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7695. 2017-05-11T02:30:58Z DEBUG response status 409
  7696. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7697. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7698. 2017-05-11T02:30:58Z DEBUG Error migrating 'caJarSigningCert': Non-2xx response from CA REST API: 409. Profile already exists
  7699. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caJarSigningCert?action=enable
  7700. 2017-05-11T02:30:58Z DEBUG request body ''
  7701. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7702. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7703. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7704. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7705. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7706. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7707. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7708. 2017-05-11T02:30:58Z DEBUG response status 500
  7709. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7710. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7711. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7712. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7713. 2017-05-11T02:30:58Z DEBUG request body ''
  7714. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7715. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7716. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7717. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7718. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7719. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7720. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7721. 2017-05-11T02:30:58Z DEBUG response status 204
  7722. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=AAFE444092F7EF7B6BCBA6C94AE0A135; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7723. 2017-05-11T02:30:58Z DEBUG response body ''
  7724. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7725. 2017-05-11T02:30:58Z DEBUG request body ''
  7726. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7727. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7728. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7729. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7730. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7731. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7732. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7733. 2017-05-11T02:30:58Z DEBUG response status 200
  7734. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=C6584322B79C49320D19BA2DA8048429; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7735. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7736. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7737. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling server certificates with IPA-RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, OU=pki-ipa, O=IPA \npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=https://ipa.example.com/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\nprofileId=caIPAserviceCert\nclassId=caEnrollImpl\n'
  7738. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7739. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7740. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7741. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7742. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7743. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7744. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7745. 2017-05-11T02:30:58Z DEBUG response status 409
  7746. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7747. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7748. 2017-05-11T02:30:58Z DEBUG Error migrating 'caIPAserviceCert': Non-2xx response from CA REST API: 409. Profile already exists
  7749. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caIPAserviceCert?action=enable
  7750. 2017-05-11T02:30:58Z DEBUG request body ''
  7751. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7752. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7753. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7754. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7755. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7756. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7757. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7758. 2017-05-11T02:30:58Z DEBUG response status 500
  7759. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7760. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7761. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7762. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7763. 2017-05-11T02:30:58Z DEBUG request body ''
  7764. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7765. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7766. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7767. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7768. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7769. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7770. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7771. 2017-05-11T02:30:58Z DEBUG response status 204
  7772. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=823425594F298491516A43D868F91CAD; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7773. 2017-05-11T02:30:58Z DEBUG response body ''
  7774. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7775. 2017-05-11T02:30:58Z DEBUG request body ''
  7776. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7777. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7778. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7779. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7780. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7781. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7782. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7783. 2017-05-11T02:30:58Z DEBUG response status 200
  7784. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=A800AD8A3E6BCAF3DB46976CB5F652C2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7785. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7786. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7787. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling user encryption certificates with option to archive keys.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Encryption Certificates Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=encryptionCertSet\npolicyset.encryptionCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.encryptionCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.encryptionCertSet.1.constraint.name=Subject Name Constraint\npolicyset.encryptionCertSet.1.constraint.params.pattern=CN=.*\npolicyset.encryptionCertSet.1.constraint.params.accept=true\npolicyset.encryptionCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.encryptionCertSet.1.default.name=Subject Name Default\npolicyset.encryptionCertSet.1.default.params.name=\npolicyset.encryptionCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.encryptionCertSet.2.constraint.name=Validity Constraint\npolicyset.encryptionCertSet.2.constraint.params.range=365\npolicyset.encryptionCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.encryptionCertSet.2.constraint.params.notAfterCheck=false\npolicyset.encryptionCertSet.2.default.class_id=validityDefaultImpl\npolicyset.encryptionCertSet.2.default.name=Validity Default\npolicyset.encryptionCertSet.2.default.params.range=180\npolicyset.encryptionCertSet.2.default.params.startTime=0\npolicyset.encryptionCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.encryptionCertSet.3.constraint.name=Key Constraint\npolicyset.encryptionCertSet.3.constraint.params.keyType=RSA\npolicyset.encryptionCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.encryptionCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.encryptionCertSet.3.default.name=Key Default\npolicyset.encryptionCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.4.constraint.name=No Constraint\npolicyset.encryptionCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.encryptionCertSet.4.default.name=Authority Key Identifier Default\npolicyset.encryptionCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.5.constraint.name=No Constraint\npolicyset.encryptionCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.encryptionCertSet.5.default.name=AIA Extension Default\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.encryptionCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.encryptionCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.encryptionCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.encryptionCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.encryptionCertSet.6.default.name=Key Usage Default\npolicyset.encryptionCertSet.6.default.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.default.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.default.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.7.constraint.name=No Constraint\npolicyset.encryptionCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.encryptionCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.encryptionCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.encryptionCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.encryptionCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.8.constraint.name=No Constraint\npolicyset.encryptionCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.encryptionCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.encryptionCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.encryptionCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.encryptionCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.encryptionCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.encryptionCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.encryptionCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.encryptionCertSet.9.constraint.name=No Constraint\npolicyset.encryptionCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.encryptionCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.encryptionCertSet.9.default.name=Signing Alg\npolicyset.encryptionCertSet.9.default.params.signingAlg=-\n\nprofileId=caEncUserCert\nclassId=caEnrollImpl\n'
  7788. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7789. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7790. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7791. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7792. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7793. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7794. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7795. 2017-05-11T02:30:58Z DEBUG response status 409
  7796. 2017-05-11T02:30:58Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7797. 2017-05-11T02:30:58Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7798. 2017-05-11T02:30:58Z DEBUG Error migrating 'caEncUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  7799. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caEncUserCert?action=enable
  7800. 2017-05-11T02:30:58Z DEBUG request body ''
  7801. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7802. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7803. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7804. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7805. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7806. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7807. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7808. 2017-05-11T02:30:58Z DEBUG response status 500
  7809. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7810. 2017-05-11T02:30:58Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7811. 2017-05-11T02:30:58Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7812. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7813. 2017-05-11T02:30:58Z DEBUG request body ''
  7814. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7815. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7816. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7817. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7818. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7819. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7820. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7821. 2017-05-11T02:30:58Z DEBUG response status 204
  7822. 2017-05-11T02:30:58Z DEBUG response headers {'set-cookie': 'JSESSIONID=EB127D2F4F73A04EB78FF42ED07D4B78; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7823. 2017-05-11T02:30:58Z DEBUG response body ''
  7824. 2017-05-11T02:30:58Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7825. 2017-05-11T02:30:58Z DEBUG request body ''
  7826. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7827. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7828. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7829. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7830. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7831. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7832. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7833. 2017-05-11T02:30:58Z DEBUG response status 200
  7834. 2017-05-11T02:30:58Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=1E9C5604D5DC4FFCF4BE233C121EC17B; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7835. 2017-05-11T02:30:58Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7836. 2017-05-11T02:30:58Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7837. 2017-05-11T02:30:58Z DEBUG request body 'desc=This certificate profile is for enrolling user signing certificates.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Signing Certificate Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=signingCertSet\npolicyset.signingCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.signingCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.signingCertSet.1.constraint.name=Subject Name Constraint\npolicyset.signingCertSet.1.constraint.params.pattern=CN=.*\npolicyset.signingCertSet.1.constraint.params.accept=true\npolicyset.signingCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.signingCertSet.1.default.name=Subject Name Default\npolicyset.signingCertSet.1.default.params.name=\npolicyset.signingCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.signingCertSet.2.constraint.name=Validity Constraint\npolicyset.signingCertSet.2.constraint.params.range=365\npolicyset.signingCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.signingCertSet.2.constraint.params.notAfterCheck=false\npolicyset.signingCertSet.2.default.class_id=validityDefaultImpl\npolicyset.signingCertSet.2.default.name=Validity Default\npolicyset.signingCertSet.2.default.params.range=180\npolicyset.signingCertSet.2.default.params.startTime=0\npolicyset.signingCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.signingCertSet.3.constraint.name=Key Constraint\npolicyset.signingCertSet.3.constraint.params.keyType=RSA\npolicyset.signingCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.signingCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.signingCertSet.3.default.name=Key Default\npolicyset.signingCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.4.constraint.name=No Constraint\npolicyset.signingCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.signingCertSet.4.default.name=Authority Key Identifier Default\npolicyset.signingCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.5.constraint.name=No Constraint\npolicyset.signingCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.signingCertSet.5.default.name=AIA Extension Default\npolicyset.signingCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.signingCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.signingCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.signingCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.signingCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.signingCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.signingCertSet.6.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.6.constraint.name=No Constraint\npolicyset.signingCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.signingCertSet.6.default.name=Key Usage Default\npolicyset.signingCertSet.6.default.params.keyUsageCritical=true\npolicyset.signingCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.7.constraint.name=No Constraint\npolicyset.signingCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.signingCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.signingCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.signingCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.signingCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.8.constraint.name=No Constraint\npolicyset.signingCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.signingCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.signingCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.signingCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.signingCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.signingCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.signingCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.signingCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.signingCertSet.9.constraint.name=No Constraint\npolicyset.signingCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.signingCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.signingCertSet.9.default.name=Signing Alg\npolicyset.signingCertSet.9.default.params.signingAlg=-\n\nprofileId=caSigningUserCert\nclassId=caEnrollImpl\n'
  7838. 2017-05-11T02:30:58Z DEBUG NSSConnection init ipa.rdlg.net
  7839. 2017-05-11T02:30:58Z DEBUG Connecting: 172.20.0.200:0
  7840. 2017-05-11T02:30:58Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7841. 2017-05-11T02:30:58Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7842. 2017-05-11T02:30:58Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7843. 2017-05-11T02:30:58Z DEBUG Protocol: TLS1.2
  7844. 2017-05-11T02:30:58Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7845. 2017-05-11T02:30:59Z DEBUG response status 409
  7846. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7847. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7848. 2017-05-11T02:30:59Z DEBUG Error migrating 'caSigningUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  7849. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSigningUserCert?action=enable
  7850. 2017-05-11T02:30:59Z DEBUG request body ''
  7851. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7852. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7853. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7854. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7855. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7856. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7857. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7858. 2017-05-11T02:30:59Z DEBUG response status 500
  7859. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7860. 2017-05-11T02:30:59Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7861. 2017-05-11T02:30:59Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7862. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7863. 2017-05-11T02:30:59Z DEBUG request body ''
  7864. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7865. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7866. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7867. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7868. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7869. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7870. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7871. 2017-05-11T02:30:59Z DEBUG response status 204
  7872. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=BB89A7FE3CEE2F81EB68687D46E1D368; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7873. 2017-05-11T02:30:59Z DEBUG response body ''
  7874. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7875. 2017-05-11T02:30:59Z DEBUG request body ''
  7876. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7877. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7878. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7879. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7880. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7881. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7882. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7883. 2017-05-11T02:30:59Z DEBUG response status 200
  7884. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=FC3ACF10F594F86A0C6AEA06D44F0AA2; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7885. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7886. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7887. 2017-05-11T02:30:59Z DEBUG request body 'desc=This certificate profile is for enrolling user ECC signing certificates. It works only with the latest Firefox.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Signing ECC Certificate Enrollment\nauth.class_id=\ninput.list=i1,i2,i3\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=subjectNameInputImpl\ninput.i3.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=signingCertSet\npolicyset.signingCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.signingCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.signingCertSet.1.constraint.name=Subject Name Constraint\npolicyset.signingCertSet.1.constraint.params.pattern=CN=.*\npolicyset.signingCertSet.1.constraint.params.accept=true\npolicyset.signingCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.signingCertSet.1.default.name=Subject Name Default\npolicyset.signingCertSet.1.default.params.name=\npolicyset.signingCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.signingCertSet.2.constraint.name=Validity Constraint\npolicyset.signingCertSet.2.constraint.params.range=365\npolicyset.signingCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.signingCertSet.2.constraint.params.notAfterCheck=false\npolicyset.signingCertSet.2.default.class_id=validityDefaultImpl\npolicyset.signingCertSet.2.default.name=Validity Default\npolicyset.signingCertSet.2.default.params.range=180\npolicyset.signingCertSet.2.default.params.startTime=0\npolicyset.signingCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.signingCertSet.3.constraint.name=Key Constraint\npolicyset.signingCertSet.3.constraint.params.keyType=EC\npolicyset.signingCertSet.3.constraint.params.keyParameters=nistp256,nistp521\npolicyset.signingCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.signingCertSet.3.default.name=Key Default\npolicyset.signingCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.4.constraint.name=No Constraint\npolicyset.signingCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.signingCertSet.4.default.name=Authority Key Identifier Default\npolicyset.signingCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.5.constraint.name=No Constraint\npolicyset.signingCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.signingCertSet.5.default.name=AIA Extension Default\npolicyset.signingCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.signingCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.signingCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.signingCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.signingCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.signingCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.signingCertSet.6.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.6.constraint.name=No Constraint\npolicyset.signingCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.signingCertSet.6.default.name=Key Usage Default\npolicyset.signingCertSet.6.default.params.keyUsageCritical=true\npolicyset.signingCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.signingCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.signingCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyEncipherment=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.signingCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.signingCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.signingCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.signingCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.signingCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.7.constraint.name=No Constraint\npolicyset.signingCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.signingCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.signingCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.signingCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.signingCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.signingCertSet.8.constraint.name=No Constraint\npolicyset.signingCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.signingCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.signingCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.signingCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.signingCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.signingCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.signingCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.signingCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.signingCertSet.9.constraint.name=No Constraint\npolicyset.signingCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.signingCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.signingCertSet.9.default.name=Signing Alg\npolicyset.signingCertSet.9.default.params.signingAlg=-\n\nprofileId=caSigningECUserCert\nclassId=caEnrollImpl\n'
  7888. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7889. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7890. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7891. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7892. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7893. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7894. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7895. 2017-05-11T02:30:59Z DEBUG response status 409
  7896. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7897. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7898. 2017-05-11T02:30:59Z DEBUG Error migrating 'caSigningECUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  7899. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caSigningECUserCert?action=enable
  7900. 2017-05-11T02:30:59Z DEBUG request body ''
  7901. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7902. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7903. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7904. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7905. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7906. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7907. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7908. 2017-05-11T02:30:59Z DEBUG response status 500
  7909. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7910. 2017-05-11T02:30:59Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7911. 2017-05-11T02:30:59Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7912. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7913. 2017-05-11T02:30:59Z DEBUG request body ''
  7914. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7915. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7916. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7917. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7918. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7919. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7920. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7921. 2017-05-11T02:30:59Z DEBUG response status 204
  7922. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=4257C5D5391D0227A699E737F0D523ED; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7923. 2017-05-11T02:30:59Z DEBUG response body ''
  7924. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7925. 2017-05-11T02:30:59Z DEBUG request body ''
  7926. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7927. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7928. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7929. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7930. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7931. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7932. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7933. 2017-05-11T02:30:59Z DEBUG response status 200
  7934. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=7C25D447552066DE32A631C340A6E2A6; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/xml'}
  7935. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7936. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7937. 2017-05-11T02:30:59Z DEBUG request body 'desc=This certificate profile is for enrolling user ECC encryption certificates. It works only with latest Firefox.\nvisible=false\nenable=true\nenableBy=admin\nname=Manual User Encryption ECC Certificates Enrollment\nauth.class_id=\ninput.list=i1\ninput.i1.class_id=encKeyGenInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=encryptionCertSet\npolicyset.encryptionCertSet.list=1,2,3,4,5,6,7,8,9\npolicyset.encryptionCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.encryptionCertSet.1.constraint.name=Subject Name Constraint\npolicyset.encryptionCertSet.1.constraint.params.pattern=CN=.*\npolicyset.encryptionCertSet.1.constraint.params.accept=true\npolicyset.encryptionCertSet.1.default.class_id=userSubjectNameDefaultImpl\npolicyset.encryptionCertSet.1.default.name=Subject Name Default\npolicyset.encryptionCertSet.1.default.params.name=\npolicyset.encryptionCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.encryptionCertSet.2.constraint.name=Validity Constraint\npolicyset.encryptionCertSet.2.constraint.params.range=365\npolicyset.encryptionCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.encryptionCertSet.2.constraint.params.notAfterCheck=false\npolicyset.encryptionCertSet.2.default.class_id=validityDefaultImpl\npolicyset.encryptionCertSet.2.default.name=Validity Default\npolicyset.encryptionCertSet.2.default.params.range=180\npolicyset.encryptionCertSet.2.default.params.startTime=0\npolicyset.encryptionCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.encryptionCertSet.3.constraint.name=Key Constraint\npolicyset.encryptionCertSet.3.constraint.params.keyType=EC\npolicyset.encryptionCertSet.3.constraint.params.keyParameters=nistp256,nistp521\npolicyset.encryptionCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.encryptionCertSet.3.default.name=Key Default\npolicyset.encryptionCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.4.constraint.name=No Constraint\npolicyset.encryptionCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.encryptionCertSet.4.default.name=Authority Key Identifier Default\npolicyset.encryptionCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.5.constraint.name=No Constraint\npolicyset.encryptionCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.encryptionCertSet.5.default.name=AIA Extension Default\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADLocation_0=\npolicyset.encryptionCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.encryptionCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.encryptionCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.encryptionCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.encryptionCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.encryptionCertSet.6.default.name=Key Usage Default\npolicyset.encryptionCertSet.6.default.params.keyUsageCritical=true\npolicyset.encryptionCertSet.6.default.params.keyUsageDigitalSignature=false\npolicyset.encryptionCertSet.6.default.params.keyUsageNonRepudiation=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDataEncipherment=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.encryptionCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.encryptionCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.encryptionCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.encryptionCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.7.constraint.name=No Constraint\npolicyset.encryptionCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.encryptionCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.encryptionCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.encryptionCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4\npolicyset.encryptionCertSet.8.constraint.class_id=noConstraintImpl\npolicyset.encryptionCertSet.8.constraint.name=No Constraint\npolicyset.encryptionCertSet.8.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.encryptionCertSet.8.default.name=Subject Alt Name Constraint\npolicyset.encryptionCertSet.8.default.params.subjAltNameExtCritical=false\npolicyset.encryptionCertSet.8.default.params.subjAltExtType_0=RFC822Name\npolicyset.encryptionCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$\npolicyset.encryptionCertSet.8.default.params.subjAltExtGNEnable_0=true\npolicyset.encryptionCertSet.8.default.params.subjAltNameNumGNs=1\npolicyset.encryptionCertSet.9.constraint.class_id=signingAlgConstraintImpl\npolicyset.encryptionCertSet.9.constraint.name=No Constraint\npolicyset.encryptionCertSet.9.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC\npolicyset.encryptionCertSet.9.default.class_id=signingAlgDefaultImpl\npolicyset.encryptionCertSet.9.default.name=Signing Alg\npolicyset.encryptionCertSet.9.default.params.signingAlg=-\nprofileId=caEncECUserCert\nclassId=caEnrollImpl\n'
  7938. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7939. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7940. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7941. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7942. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7943. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7944. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7945. 2017-05-11T02:30:59Z DEBUG response status 409
  7946. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7947. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7948. 2017-05-11T02:30:59Z DEBUG Error migrating 'caEncECUserCert': Non-2xx response from CA REST API: 409. Profile already exists
  7949. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caEncECUserCert?action=enable
  7950. 2017-05-11T02:30:59Z DEBUG request body ''
  7951. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7952. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7953. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7954. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7955. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7956. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7957. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7958. 2017-05-11T02:30:59Z DEBUG response status 500
  7959. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:58 GMT', 'content-type': 'text/html;charset=utf-8'}
  7960. 2017-05-11T02:30:59Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  7961. 2017-05-11T02:30:59Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  7962. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  7963. 2017-05-11T02:30:59Z DEBUG request body ''
  7964. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7965. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7966. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7967. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7968. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7969. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7970. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7971. 2017-05-11T02:30:59Z DEBUG response status 204
  7972. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=EA35DCC523C01764F8D62E11D499A02D; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  7973. 2017-05-11T02:30:59Z DEBUG response body ''
  7974. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  7975. 2017-05-11T02:30:59Z DEBUG request body ''
  7976. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7977. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7978. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7979. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7980. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7981. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7982. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7983. 2017-05-11T02:30:59Z DEBUG response status 200
  7984. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=5E5DBE138D6E4A3CED0DD7F3E48754DD; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  7985. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  7986. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  7987. 2017-05-11T02:30:59Z DEBUG request body 'desc=This profile is for enrolling Token User Delegate Authentication key\nenable=true\nenableBy=admin\nname=Token User Delegate Authentication Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1,i2,i3\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\ninput.i2.class_id=subjectDNInputImpl\ninput.i2.name=subjectDNInputImpl\ninput.i3.class_id=subjectAltNameExtInputImpl\ninput.i3.name=subjectAltNameExtInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o1.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=subjectNameConstraintImpl\npolicyset.set1.p1.constraint.name=Subject Name Constraint\npolicyset.set1.p1.constraint.params.pattern=.*\npolicyset.set1.p1.constraint.params.accept=true\npolicyset.set1.p1.default.class_id=userSubjectNameDefaultImpl\npolicyset.set1.p1.default.name=Subject Name Default\npolicyset.set1.p1.default.params.name=\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=true\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=(UTF8String)1.3.6.1.4.1.311.20.2.3,$request.req_san_pattern_0$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.set1.10.constraint.name=Renewal Grace Period Constraint\npolicyset.set1.10.constraint.params.renewal.graceBefore=30\npolicyset.set1.10.constraint.params.renewal.graceAfter=30\npolicyset.set1.10.default.class_id=noDefaultImpl\npolicyset.set1.10.default.name=No Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTokenUserDelegateAuthKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  7988. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  7989. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  7990. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  7991. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  7992. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  7993. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  7994. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  7995. 2017-05-11T02:30:59Z DEBUG response status 409
  7996. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  7997. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  7998. 2017-05-11T02:30:59Z DEBUG Error migrating 'caTokenUserDelegateAuthKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  7999. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserDelegateAuthKeyEnrollment?action=enable
  8000. 2017-05-11T02:30:59Z DEBUG request body ''
  8001. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8002. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8003. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8004. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8005. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8006. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8007. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8008. 2017-05-11T02:30:59Z DEBUG response status 500
  8009. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'text/html;charset=utf-8'}
  8010. 2017-05-11T02:30:59Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  8011. 2017-05-11T02:30:59Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  8012. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  8013. 2017-05-11T02:30:59Z DEBUG request body ''
  8014. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8015. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8016. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8017. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8018. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8019. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8020. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8021. 2017-05-11T02:30:59Z DEBUG response status 204
  8022. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=C1916DFA4FC116820634D4E5C602FF95; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8023. 2017-05-11T02:30:59Z DEBUG response body ''
  8024. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  8025. 2017-05-11T02:30:59Z DEBUG request body ''
  8026. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8027. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8028. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8029. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8030. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8031. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8032. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8033. 2017-05-11T02:30:59Z DEBUG response status 200
  8034. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=FEA91CD2AE13E69C171FB9D197219DBB; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8035. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  8036. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  8037. 2017-05-11T02:30:59Z DEBUG request body 'desc=This profile is for enrolling Token User Delegate Signing key\nenable=true\nenableBy=admin\nname=Token User Delegate Signing Certificate Enrollment\nvisible=false\nauth.instance_id=AgentCertAuth\ninput.list=i1,i2,i3\ninput.i1.class_id=nsNKeyCertReqInputImpl\ninput.i1.name=nsNKeyCertReqInputImpl\ninput.i2.class_id=subjectDNInputImpl\ninput.i2.name=subjectDNInputImpl\ninput.i3.class_id=subjectAltNameExtInputImpl\ninput.i3.name=subjectAltNameExtInputImpl\noutput.list=o1\noutput.o1.class_id=nsNKeyOutputImpl\noutput.o1.name=nsNKeyOutputImpl\npolicyset.list=set1\n#policyset.set1.list=p2,p4,p5,p1,p6,p7,p8,p9,p12,p13,p14\npolicyset.set1.list=p2,p4,p5,p1,p6,p8,p9,p12\npolicyset.set1.p1.constraint.class_id=subjectNameConstraintImpl\npolicyset.set1.p1.constraint.name=Subject Name Constraint\npolicyset.set1.p1.constraint.params.pattern=.*\npolicyset.set1.p1.constraint.params.accept=true\npolicyset.set1.p1.default.class_id=userSubjectNameDefaultImpl\npolicyset.set1.p1.default.name=Subject Name Default\npolicyset.set1.p1.default.params.dnpattern=UID=$request.uid$, O=Token Key User\n#changed ldap.enable to true to support SMIME\npolicyset.set1.p1.default.params.ldap.enable=false\npolicyset.set1.p1.default.params.ldap.searchName=uid\npolicyset.set1.p1.default.params.ldapStringAttributes=uid,mail\npolicyset.set1.p1.default.params.ldap.basedn=\npolicyset.set1.p1.default.params.ldap.maxConns=4\npolicyset.set1.p1.default.params.ldap.minConns=1\npolicyset.set1.p1.default.params.ldap.ldapconn.Version=2\npolicyset.set1.p1.default.params.ldap.ldapconn.host=\npolicyset.set1.p1.default.params.ldap.ldapconn.port=\npolicyset.set1.p1.default.params.ldap.ldapconn.secureConn=false\npolicyset.set1.p2.constraint.class_id=noConstraintImpl\npolicyset.set1.p2.constraint.name=No Constraint\npolicyset.set1.p2.default.class_id=validityDefaultImpl\npolicyset.set1.p2.default.name=Validity Default\npolicyset.set1.p2.default.params.range=1825\npolicyset.set1.p2.default.params.startTime=0\npolicyset.set1.p4.constraint.class_id=noConstraintImpl\npolicyset.set1.p4.constraint.name=No Constraint\npolicyset.set1.p4.default.class_id=signingAlgDefaultImpl\npolicyset.set1.p4.default.name=Signing Algorithm Default\npolicyset.set1.p4.default.params.signingAlg=-\npolicyset.set1.p5.constraint.class_id=noConstraintImpl\npolicyset.set1.p5.constraint.name=No Constraint\npolicyset.set1.p5.default.class_id=keyUsageExtDefaultImpl\npolicyset.set1.p5.default.name=Key Usage Extension Default\npolicyset.set1.p5.default.params.keyUsageCritical=true\npolicyset.set1.p5.default.params.keyUsageCrlSign=false\npolicyset.set1.p5.default.params.keyUsageDataEncipherment=false\npolicyset.set1.p5.default.params.keyUsageDecipherOnly=false\npolicyset.set1.p5.default.params.keyUsageDigitalSignature=true\npolicyset.set1.p5.default.params.keyUsageEncipherOnly=false\npolicyset.set1.p5.default.params.keyUsageKeyAgreement=false\npolicyset.set1.p5.default.params.keyUsageKeyCertSign=false\npolicyset.set1.p5.default.params.keyUsageKeyEncipherment=false\npolicyset.set1.p5.default.params.keyUsageNonRepudiation=true\npolicyset.set1.p6.constraint.class_id=noConstraintImpl\npolicyset.set1.p6.constraint.name=No Constraint\npolicyset.set1.p6.default.class_id=subjectAltNameExtDefaultImpl\npolicyset.set1.p6.default.name=Subject Alternative Name Extension Default\npolicyset.set1.p6.default.params.subjAltExtGNEnable_0=true\npolicyset.set1.p6.default.params.subjAltExtGNEnable_1=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_2=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_3=false\npolicyset.set1.p6.default.params.subjAltExtGNEnable_4=false\npolicyset.set1.p6.default.params.subjAltExtPattern_0=$request.req_san_pattern_0$\npolicyset.set1.p6.default.params.subjAltExtPattern_1=\npolicyset.set1.p6.default.params.subjAltExtPattern_2=\npolicyset.set1.p6.default.params.subjAltExtPattern_3=\npolicyset.set1.p6.default.params.subjAltExtPattern_4=\npolicyset.set1.p6.default.params.subjAltExtType_0=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_1=OtherName\npolicyset.set1.p6.default.params.subjAltExtType_2=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_3=RFC822Name\npolicyset.set1.p6.default.params.subjAltExtType_4=RFC822Name\npolicyset.set1.p6.default.params.subjAltNameExtCritical=false\npolicyset.set1.p6.default.params.subjAltNameNumGNs=1\npolicyset.set1.p7.constraint.class_id=noConstraintImpl\npolicyset.set1.p7.constraint.name=No Constraint\npolicyset.set1.p7.default.class_id=certificatePoliciesExtDefaultImpl\npolicyset.set1.p7.default.name=Certificate Policies Extension Default\npolicyset.set1.p7.default.params.Critical=false\npolicyset.set1.p7.default.params.PoliciesExt.num=5\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.enable=true\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy0.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy1.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy2.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy3.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.policyId=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.CPSURI.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.enable=false\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.explicitText.value=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.noticeNumbers=\npolicyset.set1.p7.default.params.PoliciesExt.certPolicy4.PolicyQualifiers0.usernotice.noticeReference.organization=\npolicyset.set1.p8.constraint.class_id=noConstraintImpl\npolicyset.set1.p8.constraint.name=No Constraint\npolicyset.set1.p8.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.set1.p8.default.name=Subject Key Identifier Default\npolicyset.set1.p9.constraint.class_id=noConstraintImpl\npolicyset.set1.p9.constraint.name=No Constraint\npolicyset.set1.p9.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.set1.p9.default.name=Authority Key Identifier Extension Default\npolicyset.set1.10.constraint.class_id=renewGracePeriodConstraintImpl\npolicyset.set1.10.constraint.name=Renewal Grace Period Constraint\npolicyset.set1.10.constraint.params.renewal.graceBefore=30\npolicyset.set1.10.constraint.params.renewal.graceAfter=30\npolicyset.set1.10.default.class_id=noDefaultImpl\npolicyset.set1.10.default.name=No Default\npolicyset.set1.p12.constraint.class_id=basicConstraintsExtConstraintImpl\npolicyset.set1.p12.constraint.name=Basic Constraints Extension Constraint\npolicyset.set1.p12.constraint.params.basicConstraintsCritical=-\npolicyset.set1.p12.constraint.params.basicConstraintsIsCA=-\npolicyset.set1.p12.constraint.params.basicConstraintsMaxPathLen=-1\npolicyset.set1.p12.constraint.params.basicConstraintsMinPathLen=-1\npolicyset.set1.p12.default.class_id=basicConstraintsExtDefaultImpl\npolicyset.set1.p12.default.name=Basic Constraints Extension Default\npolicyset.set1.p12.default.params.basicConstraintsCritical=false\npolicyset.set1.p12.default.params.basicConstraintsIsCA=false\npolicyset.set1.p12.default.params.basicConstraintsPathLen=-1\npolicyset.set1.p13.constraint.class_id=noConstraintImpl\npolicyset.set1.p13.constraint.name=No Constraint\npolicyset.set1.p13.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.name=crlDistributionPointsExtDefaultImpl\npolicyset.set1.p13.default.params.crlDistPointsCritical=false\npolicyset.set1.p13.default.params.crlDistPointsNum=1\npolicyset.set1.p13.default.params.crlDistPointsEnable_0=false\npolicyset.set1.p13.default.params.crlDistPointsIssuerName_0=\npolicyset.set1.p13.default.params.crlDistPointsIssuerType_0=\npolicyset.set1.p13.default.params.crlDistPointsPointName_0=\npolicyset.set1.p13.default.params.crlDistPointsPointType_0=URIName\npolicyset.set1.p13.default.params.crlDistPointsReasons_0=\npolicyset.set1.p14.constraint.class_id=noConstraintImpl\npolicyset.set1.p14.constraint.name=No Constraint\npolicyset.set1.p14.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.set1.p14.default.name=AIA Extension Default\npolicyset.set1.p14.default.params.authInfoAccessADEnable_0=false\npolicyset.set1.p14.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.set1.p14.default.params.authInfoAccessADLocation_0=\npolicyset.set1.p14.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.set1.p14.default.params.authInfoAccessCritical=false\npolicyset.set1.p14.default.params.authInfoAccessNumADs=1\nprofileId=caTokenUserDelegateSigningKeyEnrollment\nclassId=caUserCertEnrollImpl\n'
  8038. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8039. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8040. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8041. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8042. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8043. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8044. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8045. 2017-05-11T02:30:59Z DEBUG response status 409
  8046. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  8047. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  8048. 2017-05-11T02:30:59Z DEBUG Error migrating 'caTokenUserDelegateSigningKeyEnrollment': Non-2xx response from CA REST API: 409. Profile already exists
  8049. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caTokenUserDelegateSigningKeyEnrollment?action=enable
  8050. 2017-05-11T02:30:59Z DEBUG request body ''
  8051. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8052. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8053. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8054. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8055. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8056. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8057. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8058. 2017-05-11T02:30:59Z DEBUG response status 500
  8059. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '6208', 'content-language': 'en', 'server': 'Apache-Coyote/1.1', 'connection': 'close', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'text/html;charset=utf-8'}
  8060. 2017-05-11T02:30:59Z DEBUG response body '<html><head><title>Apache Tomcat/7.0.69 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>root cause</b> <pre>org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not find MessageBodyWriter for response object of type: com.netscape.certsrv.base.PKIException$Data of media type: application/x-www-form-urlencoded\n\torg.jboss.resteasy.core.ServerResponseWriter.writeNomapResponse(ServerResponseWriter.java:67)\n\torg.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:153)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)\n\torg.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)\n\torg.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n\torg.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n\tjavax.servlet.http.HttpServlet.service(HttpServlet.java:731)\n\tsun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\torg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)\n\tsun.reflect.GeneratedMethodAccessor41.invoke(Unknown Source)\n\tsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n\tjava.lang.reflect.Method.invoke(Method.java:498)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)\n\torg.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)\n\tjava.security.AccessController.doPrivileged(Native Method)\n\tjavax.security.auth.Subject.doAsPrivileged(Subject.java:549)\n\torg.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)\n\torg.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)\n</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.69</h3></body></html>'
  8061. 2017-05-11T02:30:59Z DEBUG Failed to enable profile '%s' (it is probably already enabled)
  8062. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  8063. 2017-05-11T02:30:59Z DEBUG request body ''
  8064. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8065. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8066. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8067. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8068. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8069. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8070. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8071. 2017-05-11T02:30:59Z DEBUG response status 204
  8072. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=4CA5D5654D25030CFA8BA994A4E39630; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8073. 2017-05-11T02:30:59Z DEBUG response body ''
  8074. 2017-05-11T02:30:59Z DEBUG duration: 6 seconds
  8075. 2017-05-11T02:30:59Z DEBUG [28/31]: importing IPA certificate profiles
  8076. 2017-05-11T02:30:59Z DEBUG Created connection context.ldap2_83905744
  8077. 2017-05-11T02:30:59Z DEBUG Created connection context.ldap2_85558352
  8078. 2017-05-11T02:30:59Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8079. 2017-05-11T02:30:59Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x753ee18>
  8080. 2017-05-11T02:30:59Z DEBUG Destroyed connection context.ldap2_85558352
  8081. 2017-05-11T02:30:59Z DEBUG Created connection context.ldap2_85557968
  8082. 2017-05-11T02:30:59Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8083. 2017-05-11T02:30:59Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x747a248>
  8084. 2017-05-11T02:30:59Z DEBUG Destroyed connection context.ldap2_85557968
  8085. 2017-05-11T02:30:59Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8086. 2017-05-11T02:30:59Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7320128>
  8087. 2017-05-11T02:30:59Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  8088. 2017-05-11T02:30:59Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  8089. 2017-05-11T02:30:59Z DEBUG Trying to find certificate subject base in sysupgrade
  8090. 2017-05-11T02:30:59Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  8091. 2017-05-11T02:30:59Z DEBUG Found certificate subject base in sysupgrade: O=RDLG.NET
  8092. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  8093. 2017-05-11T02:30:59Z DEBUG request body ''
  8094. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8095. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8096. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8097. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8098. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8099. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8100. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8101. 2017-05-11T02:30:59Z DEBUG response status 200
  8102. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=21942F71E553053C62DEEABB57B52EDF; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8103. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  8104. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  8105. 2017-05-11T02:30:59Z DEBUG request body 'profileId=IECUserRoles\nclassId=caEnrollImpl\ndesc=Enroll user certificates with IECUserRoles extension via IPA-RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8,9,10,11,12\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, O=RDLG.NET\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=http://ipa-ca.rdlg.net/ca/ocsp\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=CN=Certificate Authority,o=ipaca\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=DirectoryName\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=http://ipa-ca.rdlg.net/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\npolicyset.serverCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.10.constraint.name=No Constraint\npolicyset.serverCertSet.10.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.10.default.name=Subject Key Identifier Extension Default\npolicyset.serverCertSet.10.default.params.critical=false\npolicyset.serverCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.11.constraint.name=No Constraint\npolicyset.serverCertSet.11.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.11.default.name=User Supplied Extension Default\npolicyset.serverCertSet.11.default.params.userExtOID=2.5.29.17\npolicyset.serverCertSet.12.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.12.constraint.name=No Constraint\npolicyset.serverCertSet.12.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.12.default.name=IECUserRoles Extension Default\npolicyset.serverCertSet.12.default.params.userExtOID=1.2.840.10070.8.1\n'
  8106. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8107. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8108. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8109. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8110. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8111. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8112. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8113. 2017-05-11T02:30:59Z DEBUG response status 201
  8114. 2017-05-11T02:30:59Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-length': '7318', 'content-type': 'application/json', 'location': 'https://ipa.rdlg.net:8443/ca/rest/profiles/raw', 'server': 'Apache-Coyote/1.1'}
  8115. 2017-05-11T02:30:59Z DEBUG response body '#Wed May 10 20:30:59 MDT 2017\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\ninput.i2.class_id=submitterInfoInputImpl\nauth.instance_id=raCertAuth\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\noutput.o1.class_id=certOutputImpl\npolicyset.serverCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\noutput.list=o1\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.11.default.name=User Supplied Extension Default\ninput.list=i1,i2\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\nvisible=false\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.10.default.name=Subject Key Identifier Extension Default\ndesc=Enroll user certificates with IECUserRoles extension via IPA-RA agent authentication.\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.11.default.params.userExtOID=2.5.29.17\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=http://ipa-ca.rdlg.net/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\nenable=true\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.10.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=CN=Certificate Authority,o=ipaca\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\ninput.i1.class_id=certReqInputImpl\nenableBy=admin\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.10.default.params.critical=false\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8,9,10,11,12\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.11.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.12.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, O=RDLG.NET\npolicyset.serverCertSet.12.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.12.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.12.default.params.userExtOID=1.2.840.10070.8.1\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.11.constraint.name=No Constraint\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.12.default.name=IECUserRoles Extension Default\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=DirectoryName\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.10.constraint.name=No Constraint\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=http://ipa-ca.rdlg.net/ca/ocsp\n'
  8116. 2017-05-11T02:30:59Z INFO Profile 'IECUserRoles' successfully migrated to LDAP
  8117. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/IECUserRoles?action=enable
  8118. 2017-05-11T02:30:59Z DEBUG request body ''
  8119. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8120. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8121. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8122. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8123. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8124. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8125. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8126. 2017-05-11T02:30:59Z DEBUG response status 204
  8127. 2017-05-11T02:30:59Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  8128. 2017-05-11T02:30:59Z DEBUG response body ''
  8129. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  8130. 2017-05-11T02:30:59Z DEBUG request body ''
  8131. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8132. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8133. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8134. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8135. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8136. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8137. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8138. 2017-05-11T02:30:59Z DEBUG response status 204
  8139. 2017-05-11T02:30:59Z DEBUG response headers {'set-cookie': 'JSESSIONID=00F7BF6530451CBFBCA82ED0AA9660E8; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8140. 2017-05-11T02:30:59Z DEBUG response body ''
  8141. 2017-05-11T02:30:59Z INFO Imported profile 'IECUserRoles'
  8142. 2017-05-11T02:30:59Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  8143. 2017-05-11T02:30:59Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  8144. 2017-05-11T02:30:59Z DEBUG Trying to find certificate subject base in sysupgrade
  8145. 2017-05-11T02:30:59Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  8146. 2017-05-11T02:30:59Z DEBUG Found certificate subject base in sysupgrade: O=RDLG.NET
  8147. 2017-05-11T02:30:59Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  8148. 2017-05-11T02:30:59Z DEBUG request body ''
  8149. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8150. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8151. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8152. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8153. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8154. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8155. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8156. 2017-05-11T02:30:59Z DEBUG response status 200
  8157. 2017-05-11T02:30:59Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=3A15D74952FE9E0184B4202C7FF0AB85; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8158. 2017-05-11T02:30:59Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  8159. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/raw
  8160. 2017-05-11T02:30:59Z DEBUG request body 'profileId=caIPAserviceCert\nclassId=caEnrollImpl\ndesc=This certificate profile is for enrolling server certificates with IPA-RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8,9,10,11\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, O=RDLG.NET\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=http://ipa-ca.rdlg.net/ca/ocsp\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=CN=Certificate Authority,o=ipaca\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=DirectoryName\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=http://ipa-ca.rdlg.net/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\npolicyset.serverCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.10.constraint.name=No Constraint\npolicyset.serverCertSet.10.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.10.default.name=Subject Key Identifier Extension Default\npolicyset.serverCertSet.10.default.params.critical=false\npolicyset.serverCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.11.constraint.name=No Constraint\npolicyset.serverCertSet.11.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.11.default.name=User Supplied Extension Default\npolicyset.serverCertSet.11.default.params.userExtOID=2.5.29.17\n'
  8161. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8162. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8163. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8164. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8165. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8166. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8167. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8168. 2017-05-11T02:30:59Z DEBUG response status 409
  8169. 2017-05-11T02:30:59Z DEBUG response headers {'transfer-encoding': 'chunked', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/json', 'server': 'Apache-Coyote/1.1'}
  8170. 2017-05-11T02:30:59Z DEBUG response body '{"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.ConflictingOperationException","Code":409,"Message":"Profile already exists"}'
  8171. 2017-05-11T02:30:59Z DEBUG Error migrating 'caIPAserviceCert': Non-2xx response from CA REST API: 409. Profile already exists
  8172. 2017-05-11T02:30:59Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caIPAserviceCert?action=disable
  8173. 2017-05-11T02:30:59Z DEBUG request body ''
  8174. 2017-05-11T02:30:59Z DEBUG NSSConnection init ipa.rdlg.net
  8175. 2017-05-11T02:30:59Z DEBUG Connecting: 172.20.0.200:0
  8176. 2017-05-11T02:30:59Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8177. 2017-05-11T02:30:59Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8178. 2017-05-11T02:30:59Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8179. 2017-05-11T02:30:59Z DEBUG Protocol: TLS1.2
  8180. 2017-05-11T02:30:59Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8181. 2017-05-11T02:31:00Z DEBUG response status 204
  8182. 2017-05-11T02:31:00Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  8183. 2017-05-11T02:31:00Z DEBUG response body ''
  8184. 2017-05-11T02:31:00Z DEBUG request PUT https://ipa.rdlg.net:8443/ca/rest/profiles/caIPAserviceCert/raw
  8185. 2017-05-11T02:31:00Z DEBUG request body 'profileId=caIPAserviceCert\nclassId=caEnrollImpl\ndesc=This certificate profile is for enrolling server certificates with IPA-RA agent authentication.\nvisible=false\nenable=true\nenableBy=admin\nauth.instance_id=raCertAuth\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\ninput.list=i1,i2\ninput.i1.class_id=certReqInputImpl\ninput.i2.class_id=submitterInfoInputImpl\noutput.list=o1\noutput.o1.class_id=certOutputImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8,9,10,11\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, O=RDLG.NET\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=http://ipa-ca.rdlg.net/ca/ocsp\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=CN=Certificate Authority,o=ipaca\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=DirectoryName\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=http://ipa-ca.rdlg.net/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\npolicyset.serverCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.10.constraint.name=No Constraint\npolicyset.serverCertSet.10.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.10.default.name=Subject Key Identifier Extension Default\npolicyset.serverCertSet.10.default.params.critical=false\npolicyset.serverCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.11.constraint.name=No Constraint\npolicyset.serverCertSet.11.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.11.default.name=User Supplied Extension Default\npolicyset.serverCertSet.11.default.params.userExtOID=2.5.29.17\n'
  8186. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8187. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8188. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8189. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8190. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8191. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8192. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8193. 2017-05-11T02:31:00Z DEBUG response status 200
  8194. 2017-05-11T02:31:00Z DEBUG response headers {'content-length': '6993', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/json'}
  8195. 2017-05-11T02:31:00Z DEBUG response body '#Wed May 10 20:31:00 MDT 2017\npolicyset.serverCertSet.4.constraint.name=No Constraint\npolicyset.serverCertSet.6.default.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.5.default.params.authInfoAccessCritical=false\npolicyset.serverCertSet.2.default.params.range=731\npolicyset.serverCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2\ninput.i2.class_id=submitterInfoInputImpl\nauth.instance_id=raCertAuth\npolicyset.serverCertSet.6.default.params.keyUsageNonRepudiation=true\noutput.o1.class_id=certOutputImpl\npolicyset.serverCertSet.11.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.9.default.name=CRL Distribution Points Extension Default\npolicyset.serverCertSet.6.default.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.params.keyUsageEncipherOnly=false\npolicyset.serverCertSet.6.constraint.class_id=keyUsageExtConstraintImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsCritical=false\npolicyset.serverCertSet.5.default.class_id=authInfoAccessExtDefaultImpl\npolicyset.serverCertSet.3.constraint.name=Key Constraint\npolicyset.serverCertSet.3.constraint.params.keyType=RSA\npolicyset.serverCertSet.2.constraint.params.range=740\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyAgreement=false\npolicyset.serverCertSet.9.constraint.name=No Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageCritical=true\noutput.list=o1\npolicyset.serverCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1\npolicyset.serverCertSet.9.default.params.crlDistPointsNum=1\npolicyset.serverCertSet.11.default.name=User Supplied Extension Default\ninput.list=i1,i2\npolicyset.serverCertSet.3.default.name=Key Default\npolicyset.serverCertSet.6.constraint.params.keyUsageCrlSign=false\npolicyset.serverCertSet.2.constraint.class_id=validityConstraintImpl\npolicyset.serverCertSet.6.constraint.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.6.default.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.6.default.params.keyUsageDecipherOnly=false\nvisible=false\npolicyset.serverCertSet.9.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.6.constraint.params.keyUsageNonRepudiation=true\npolicyset.serverCertSet.10.default.name=Subject Key Identifier Extension Default\ndesc=This certificate profile is for enrolling server certificates with IPA-RA agent authentication.\npolicyset.serverCertSet.8.default.name=Signing Alg\npolicyset.serverCertSet.2.constraint.name=Validity Constraint\npolicyset.serverCertSet.6.default.params.keyUsageKeyEncipherment=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocationType_0=URIName\npolicyset.serverCertSet.6.default.class_id=keyUsageExtDefaultImpl\npolicyset.serverCertSet.11.default.params.userExtOID=2.5.29.17\npolicyset.serverCertSet.8.constraint.name=No Constraint\npolicyset.serverCertSet.6.default.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.6.constraint.params.keyUsageDecipherOnly=false\npolicyset.serverCertSet.10.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.5.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.1.constraint.name=Subject Name Constraint\npolicyset.serverCertSet.9.default.params.crlDistPointsPointName_0=http://ipa-ca.rdlg.net/ipa/crl/MasterCRL.bin\npolicyset.serverCertSet.5.default.params.authInfoAccessNumADs=1\npolicyset.serverCertSet.2.default.name=Validity Default\npolicyset.serverCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl\nenable=true\npolicyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+\npolicyset.serverCertSet.10.default.class_id=subjectKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl\npolicyset.serverCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerName_0=CN=Certificate Authority,o=ipaca\npolicyset.serverCertSet.2.constraint.params.notAfterCheck=false\npolicyset.serverCertSet.7.default.name=Extended Key Usage Extension Default\npolicyset.serverCertSet.8.constraint.class_id=signingAlgConstraintImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsEnable_0=true\ninput.i1.class_id=certReqInputImpl\nenableBy=admin\npolicyset.serverCertSet.7.constraint.name=No Constraint\npolicyset.serverCertSet.10.default.params.critical=false\npolicyset.serverCertSet.list=1,2,3,4,5,6,7,8,9,10,11\npolicyset.serverCertSet.1.default.name=Subject Name Default\npolicyset.serverCertSet.6.constraint.name=Key Usage Extension Constraint\npolicyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl\npolicyset.serverCertSet.8.default.class_id=signingAlgDefaultImpl\nname=IPA-RA Agent-Authenticated Server Certificate Enrollment\npolicyset.serverCertSet.4.constraint.class_id=noConstraintImpl\npolicyset.serverCertSet.11.default.class_id=userExtensionDefaultImpl\npolicyset.serverCertSet.2.default.class_id=validityDefaultImpl\npolicyset.serverCertSet.9.default.params.crlDistPointsReasons_0=\npolicyset.serverCertSet.6.default.name=Key Usage Default\npolicyset.serverCertSet.6.constraint.params.keyUsageDigitalSignature=true\npolicyset.serverCertSet.9.default.class_id=crlDistributionPointsExtDefaultImpl\npolicyset.serverCertSet.6.default.params.keyUsageCritical=true\npolicyset.serverCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withEC,SHA512withEC\npolicyset.serverCertSet.1.default.params.name=CN=$request.req_subject_name.cn$, O=RDLG.NET\npolicyset.serverCertSet.3.default.class_id=userKeyDefaultImpl\npolicyset.serverCertSet.8.default.params.signingAlg=-\npolicyset.serverCertSet.2.default.params.startTime=0\npolicyset.serverCertSet.7.constraint.class_id=noConstraintImpl\npolicyset.list=serverCertSet\npolicyset.serverCertSet.5.constraint.name=No Constraint\npolicyset.serverCertSet.6.constraint.params.keyUsageDataEncipherment=true\npolicyset.serverCertSet.2.constraint.params.notBeforeCheck=false\npolicyset.serverCertSet.6.default.params.keyUsageKeyCertSign=false\npolicyset.serverCertSet.7.default.params.exKeyUsageCritical=false\npolicyset.serverCertSet.9.default.params.crlDistPointsPointType_0=URIName\npolicyset.serverCertSet.5.default.params.authInfoAccessADEnable_0=true\npolicyset.serverCertSet.5.default.name=AIA Extension Default\npolicyset.serverCertSet.11.constraint.name=No Constraint\npolicyset.serverCertSet.3.constraint.class_id=keyConstraintImpl\npolicyset.serverCertSet.6.default.params.keyUsageCrlSign=false\npolicyset.serverCertSet.9.default.params.crlDistPointsIssuerType_0=DirectoryName\npolicyset.serverCertSet.4.default.name=Authority Key Identifier Default\npolicyset.serverCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl\npolicyset.serverCertSet.10.constraint.name=No Constraint\npolicyset.serverCertSet.1.constraint.params.accept=true\npolicyset.serverCertSet.5.default.params.authInfoAccessADLocation_0=http://ipa-ca.rdlg.net/ca/ocsp\n'
  8196. 2017-05-11T02:31:00Z DEBUG request POST https://ipa.rdlg.net:8443/ca/rest/profiles/caIPAserviceCert?action=enable
  8197. 2017-05-11T02:31:00Z DEBUG request body ''
  8198. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8199. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8200. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8201. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8202. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8203. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8204. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8205. 2017-05-11T02:31:00Z DEBUG response status 204
  8206. 2017-05-11T02:31:00Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/x-www-form-urlencoded', 'server': 'Apache-Coyote/1.1'}
  8207. 2017-05-11T02:31:00Z DEBUG response body ''
  8208. 2017-05-11T02:31:00Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  8209. 2017-05-11T02:31:00Z DEBUG request body ''
  8210. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8211. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8212. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8213. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8214. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8215. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8216. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8217. 2017-05-11T02:31:00Z DEBUG response status 204
  8218. 2017-05-11T02:31:00Z DEBUG response headers {'set-cookie': 'JSESSIONID=612EA2986DFE7F674877A00983A19CDD; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:30:59 GMT', 'content-type': 'application/xml'}
  8219. 2017-05-11T02:31:00Z DEBUG response body ''
  8220. 2017-05-11T02:31:00Z INFO Imported profile 'caIPAserviceCert'
  8221. 2017-05-11T02:31:00Z DEBUG Destroyed connection context.ldap2_83905744
  8222. 2017-05-11T02:31:00Z DEBUG duration: 0 seconds
  8223. 2017-05-11T02:31:00Z DEBUG [29/31]: adding default CA ACL
  8224. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_50539920
  8225. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_83498192
  8226. 2017-05-11T02:31:00Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8227. 2017-05-11T02:31:00Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x517e908>
  8228. 2017-05-11T02:31:00Z DEBUG Destroyed connection context.ldap2_83498192
  8229. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_85558160
  8230. 2017-05-11T02:31:00Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8231. 2017-05-11T02:31:00Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x50d8d40>
  8232. 2017-05-11T02:31:00Z DEBUG Destroyed connection context.ldap2_85558160
  8233. 2017-05-11T02:31:00Z DEBUG raw: caacl_find(None, version=u'2.213')
  8234. 2017-05-11T02:31:00Z DEBUG caacl_find(None, all=False, raw=False, version=u'2.213', no_members=True, pkey_only=False)
  8235. 2017-05-11T02:31:00Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8236. 2017-05-11T02:31:00Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x22649e0>
  8237. 2017-05-11T02:31:00Z DEBUG raw: caacl_add(u'hosts_services_caIPAserviceCert', hostcategory=u'all', servicecategory=u'all', version=u'2.213')
  8238. 2017-05-11T02:31:00Z DEBUG caacl_add(u'hosts_services_caIPAserviceCert', hostcategory=u'all', servicecategory=u'all', all=False, raw=False, version=u'2.213', no_members=False)
  8239. 2017-05-11T02:31:00Z DEBUG raw: caacl_add_profile(u'hosts_services_caIPAserviceCert', version=u'2.213', certprofile=(u'caIPAserviceCert',))
  8240. 2017-05-11T02:31:00Z DEBUG caacl_add_profile(u'hosts_services_caIPAserviceCert', all=False, raw=False, version=u'2.213', no_members=False, certprofile=(u'caIPAserviceCert',))
  8241. 2017-05-11T02:31:00Z DEBUG add_entry_to_group: dn=cn=caIPAserviceCert,cn=certprofiles,cn=ca,dc=rdlg,dc=net group_dn=ipaUniqueID=df34f9fa-35f1-11e7-9f69-0050568f60a6,cn=caacls,cn=ca,dc=rdlg,dc=net member_attr=ipamembercertprofile
  8242. 2017-05-11T02:31:00Z DEBUG Destroyed connection context.ldap2_50539920
  8243. 2017-05-11T02:31:00Z DEBUG duration: 0 seconds
  8244. 2017-05-11T02:31:00Z DEBUG [30/31]: adding 'ipa' CA entry
  8245. 2017-05-11T02:31:00Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/login
  8246. 2017-05-11T02:31:00Z DEBUG request body ''
  8247. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8248. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8249. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8250. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8251. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8252. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8253. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8254. 2017-05-11T02:31:00Z DEBUG response status 200
  8255. 2017-05-11T02:31:00Z DEBUG response headers {'content-length': '218', 'set-cookie': 'JSESSIONID=BE20BBD3EB6FF30E91831E0F9127762A; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:31:00 GMT', 'content-type': 'application/xml'}
  8256. 2017-05-11T02:31:00Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><Account id="ipara"><Attributes/><FullName>ipara</FullName><Roles><Role>Certificate Manager Agents</Role><Role>Registration Manager Agents</Role></Roles></Account>'
  8257. 2017-05-11T02:31:00Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/authorities/host-authority
  8258. 2017-05-11T02:31:00Z DEBUG request body ''
  8259. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8260. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8261. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8262. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8263. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8264. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8265. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8266. 2017-05-11T02:31:00Z DEBUG response status 200
  8267. 2017-05-11T02:31:00Z DEBUG response headers {'transfer-encoding': 'chunked', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:31:00 GMT', 'content-type': 'application/json'}
  8268. 2017-05-11T02:31:00Z DEBUG response body '{"isHostAuthority":true,"id":"c170e458-b0c1-4298-8017-1b001e1d4d39","parentID":null,"issuerDN":"CN=Certificate Authority,O=RDLG.NET","serial":1,"dn":"CN=Certificate Authority,O=RDLG.NET","enabled":true,"description":"Host authority","ready":true,"link":null}'
  8269. 2017-05-11T02:31:00Z DEBUG request GET https://ipa.rdlg.net:8443/ca/rest/account/logout
  8270. 2017-05-11T02:31:00Z DEBUG request body ''
  8271. 2017-05-11T02:31:00Z DEBUG NSSConnection init ipa.rdlg.net
  8272. 2017-05-11T02:31:00Z DEBUG Connecting: 172.20.0.200:0
  8273. 2017-05-11T02:31:00Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8274. 2017-05-11T02:31:00Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8275. 2017-05-11T02:31:00Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8276. 2017-05-11T02:31:00Z DEBUG Protocol: TLS1.2
  8277. 2017-05-11T02:31:00Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8278. 2017-05-11T02:31:00Z DEBUG response status 204
  8279. 2017-05-11T02:31:00Z DEBUG response headers {'set-cookie': 'JSESSIONID=3AEAE1DF36604D792C5B6B4A3E65640E; Path=/ca/; Secure; HttpOnly', 'expires': 'Wed, 31 Dec 1969 17:00:00 MST', 'server': 'Apache-Coyote/1.1', 'cache-control': 'private', 'date': 'Thu, 11 May 2017 02:31:00 GMT', 'content-type': 'application/xml'}
  8280. 2017-05-11T02:31:00Z DEBUG response body ''
  8281. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_50539920
  8282. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_122102480
  8283. 2017-05-11T02:31:00Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8284. 2017-05-11T02:31:00Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7491050>
  8285. 2017-05-11T02:31:00Z DEBUG Destroyed connection context.ldap2_122102480
  8286. 2017-05-11T02:31:00Z DEBUG Created connection context.ldap2_83382864
  8287. 2017-05-11T02:31:00Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8288. 2017-05-11T02:31:00Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4f9bd88>
  8289. 2017-05-11T02:31:01Z DEBUG Destroyed connection context.ldap2_83382864
  8290. 2017-05-11T02:31:01Z DEBUG Destroyed connection context.ldap2_50539920
  8291. 2017-05-11T02:31:01Z DEBUG duration: 0 seconds
  8292. 2017-05-11T02:31:01Z DEBUG [31/31]: updating IPA configuration
  8293. 2017-05-11T02:31:01Z DEBUG duration: 0 seconds
  8294. 2017-05-11T02:31:01Z DEBUG Done configuring certificate server (pki-tomcatd).
  8295. 2017-05-11T02:31:01Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  8296. 2017-05-11T02:31:01Z DEBUG Starting external process
  8297. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -f XXXXXXXX -L -n RDLG.NET IPA CA -a
  8298. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8299. 2017-05-11T02:31:01Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  8300. MIIDgjCCAmqgAwIBAgIBATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  8301. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  8302. Mjk1NloXDTM3MDUxMTAyMjk1NlowMzERMA8GA1UECgwIUkRMRy5ORVQxHjAcBgNV
  8303. BAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  8304. ADCCAQoCggEBAL7p94qOWxiCMRT+Engmh3SKl6MFWOgXWnYfZYd8DikRR+Lhstl0
  8305. LYHb9OEbJW7VjhHu6TYfAyunXx1i/FWbDQy+5H/qWUZDUPNeg6D7HsJOnWjEpWsf
  8306. 0Y8IR4dqb0nsbvscGZOY6IfxWBvTcoUpb6fATZnjJYJEXKvbwk3Fnedb/yt3Xu4j
  8307. mPa59Ey0M43q2oRtgwZKyxn2Jjqkoze27Q6sdvCeHOlFy3kX5tzoTtmQ1moZlkYY
  8308. a5crBdiZjG+PIv3VocYU2RzA4/r08Cs173Qpe1TLou/4zJ4Ru7qq1gbWHIN0ZDXB
  8309. eO/CGO4iutUTzFZmrKh/eGr5l1EAXEQry+0CAwEAAaOBoDCBnTAfBgNVHSMEGDAW
  8310. gBTKFHJz+E5g4+IfmXy8Iq2YQzXe8zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB
  8311. /wQEAwIBxjAdBgNVHQ4EFgQUyhRyc/hOYOPiH5l8vCKtmEM13vMwOgYIKwYBBQUH
  8312. AQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLnJkbGcubmV0L2NhL29j
  8313. c3AwDQYJKoZIhvcNAQELBQADggEBAAe2GwBcMyjzUn24OAMxBSDmJTr49ByS4+zu
  8314. 7Y7gXVuS5lvMOm+DaM9UZXkQtvPwB3XtOrhX0USUhq1uhDuh2bYfkxKekGPWYyo0
  8315. 1jDpvBp8IQaD9tcAJcc+KcAmdN2hV5r372xhWosMlT+gkqNm1tpQ15kzrHJHgGRy
  8316. 243aRtXVr1RdTCNOm7Qplj5+xXtFyElcSFkrsqvoQrKnp0GY81zw6OmdQaC4GYAv
  8317. uZazc5OlNNpGLDYtN5iT4VR4fIdYkfi174VtNlR1O9ZGZ+on863r9CTUhHmnzz5I
  8318. /EfCR4uOA6jCe2XbGJMVhdZzMFWKH1ddo6WHyuzBQANOuqlAt5E=
  8319. -----END CERTIFICATE-----
  8320.  
  8321. 2017-05-11T02:31:01Z DEBUG stderr=
  8322. 2017-05-11T02:31:01Z DEBUG Configuring directory server (dirsrv). Estimated time: 10 seconds
  8323. 2017-05-11T02:31:01Z DEBUG [1/3]: configuring ssl for ds instance
  8324. 2017-05-11T02:31:01Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  8325. 2017-05-11T02:31:01Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  8326. 2017-05-11T02:31:01Z DEBUG Starting external process
  8327. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -O -n ipaCert
  8328. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8329. 2017-05-11T02:31:01Z DEBUG stdout="RDLG.NET IPA CA" [CN=Certificate Authority,O=RDLG.NET]
  8330.  
  8331. "ipaCert" [CN=IPA RA,O=RDLG.NET]
  8332.  
  8333.  
  8334. 2017-05-11T02:31:01Z DEBUG stderr=
  8335. 2017-05-11T02:31:01Z DEBUG Starting external process
  8336. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -n RDLG.NET IPA CA -a
  8337. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8338. 2017-05-11T02:31:01Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  8339. MIIDgjCCAmqgAwIBAgIBATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  8340. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  8341. Mjk1NloXDTM3MDUxMTAyMjk1NlowMzERMA8GA1UECgwIUkRMRy5ORVQxHjAcBgNV
  8342. BAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  8343. ADCCAQoCggEBAL7p94qOWxiCMRT+Engmh3SKl6MFWOgXWnYfZYd8DikRR+Lhstl0
  8344. LYHb9OEbJW7VjhHu6TYfAyunXx1i/FWbDQy+5H/qWUZDUPNeg6D7HsJOnWjEpWsf
  8345. 0Y8IR4dqb0nsbvscGZOY6IfxWBvTcoUpb6fATZnjJYJEXKvbwk3Fnedb/yt3Xu4j
  8346. mPa59Ey0M43q2oRtgwZKyxn2Jjqkoze27Q6sdvCeHOlFy3kX5tzoTtmQ1moZlkYY
  8347. a5crBdiZjG+PIv3VocYU2RzA4/r08Cs173Qpe1TLou/4zJ4Ru7qq1gbWHIN0ZDXB
  8348. eO/CGO4iutUTzFZmrKh/eGr5l1EAXEQry+0CAwEAAaOBoDCBnTAfBgNVHSMEGDAW
  8349. gBTKFHJz+E5g4+IfmXy8Iq2YQzXe8zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB
  8350. /wQEAwIBxjAdBgNVHQ4EFgQUyhRyc/hOYOPiH5l8vCKtmEM13vMwOgYIKwYBBQUH
  8351. AQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLnJkbGcubmV0L2NhL29j
  8352. c3AwDQYJKoZIhvcNAQELBQADggEBAAe2GwBcMyjzUn24OAMxBSDmJTr49ByS4+zu
  8353. 7Y7gXVuS5lvMOm+DaM9UZXkQtvPwB3XtOrhX0USUhq1uhDuh2bYfkxKekGPWYyo0
  8354. 1jDpvBp8IQaD9tcAJcc+KcAmdN2hV5r372xhWosMlT+gkqNm1tpQ15kzrHJHgGRy
  8355. 243aRtXVr1RdTCNOm7Qplj5+xXtFyElcSFkrsqvoQrKnp0GY81zw6OmdQaC4GYAv
  8356. uZazc5OlNNpGLDYtN5iT4VR4fIdYkfi174VtNlR1O9ZGZ+on863r9CTUhHmnzz5I
  8357. /EfCR4uOA6jCe2XbGJMVhdZzMFWKH1ddo6WHyuzBQANOuqlAt5E=
  8358. -----END CERTIFICATE-----
  8359.  
  8360. 2017-05-11T02:31:01Z DEBUG stderr=
  8361. 2017-05-11T02:31:01Z DEBUG Starting external process
  8362. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -L -n RDLG.NET IPA CA -a
  8363. 2017-05-11T02:31:01Z DEBUG Process finished, return code=255
  8364. 2017-05-11T02:31:01Z DEBUG stdout=
  8365. 2017-05-11T02:31:01Z DEBUG stderr=certutil: Could not find cert: RDLG.NET IPA CA
  8366. : PR_FILE_NOT_FOUND_ERROR: File not found
  8367.  
  8368. 2017-05-11T02:31:01Z DEBUG Starting external process
  8369. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -N -f /etc/dirsrv/slapd-RDLG-NET//pwdfile.txt
  8370. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8371. 2017-05-11T02:31:01Z DEBUG stdout=
  8372. 2017-05-11T02:31:01Z DEBUG stderr=
  8373. 2017-05-11T02:31:01Z DEBUG Starting external process
  8374. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -A -n RDLG.NET IPA CA -t CT,C,C -a
  8375. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8376. 2017-05-11T02:31:01Z DEBUG stdout=
  8377. 2017-05-11T02:31:01Z DEBUG stderr=
  8378. 2017-05-11T02:31:01Z DEBUG Starting external process
  8379. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -R -s CN=ipa.rdlg.net,O=RDLG.NET -o /var/lib/ipa/ipa-93vgs6/tmpcertreq -k rsa -g 2048 -z /etc/dirsrv/slapd-RDLG-NET//noise.txt -f /etc/dirsrv/slapd-RDLG-NET//pwdfile.txt -a
  8380. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8381. 2017-05-11T02:31:01Z DEBUG stdout=
  8382. 2017-05-11T02:31:01Z DEBUG stderr=
  8383.  
  8384. Generating key. This may take a few moments...
  8385.  
  8386.  
  8387. 2017-05-11T02:31:01Z DEBUG request POST https://ipa.rdlg.net:8443/ca/ee/ca/profileSubmitSSLClient
  8388. 2017-05-11T02:31:01Z DEBUG request body 'profileId=caIPAserviceCert&requestor_name=IPA+Installer&cert_request=MIICbzCCAVcCAQAwKjERMA8GA1UEChMIUkRMRy5ORVQxFTATBgNVBAMTDGlwYS5y%0D%0AZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMgwaRm6Trb1%0D%0AlL%2B%2FFTUZjc20H%2BUWTjOnUsmuJkuALMdRkRnnJF2IsArm7nxxZavUvSRYw1i0ACcu%0D%0AkICy32Eb3q2lG3xFXzt9ZO%2F%2F5FTYSnR04DsM3uUPaVL9FiDtZDwnPsgPUKIuFXKb%0D%0Ac32bGmjAra3JP7TrzkowRZ8ZewXwRLcmmoT2tNvERrTndvFmnnxhXs5CNCvx308H%0D%0AyyYvRcgH14uAGnn8KdhidCDu0eyzpy3kDweyPfDW7aTqQbuoBvSftvVz9g0IxbOX%0D%0A%2BN8hbIjGN82i%2FryQoPeIvHShYAxVQ8Z%2BbPjCz%2Bz5j0l46m0pybH%2BMxMQEP%2BY456c%0D%0ARSfMHCPLkQ0CAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQAJcP2zhNBx3EkMJv5K%0D%0Ac62goqGHKrS4r8CU%2F%2Fv8%2Fn2JS0m6F%2FvUa%2FV3WC0ymu0xcZZlDSDqa3t1xuV8wcrm%0D%0AUZrpP0J3sRl%2FyrFBWzxgqsX07wm%2BgHFFE%2BusVyWLNVABiEz1OsX6qYNPDIfwh%2FmR%0D%0A77Ngj49UKb3%2BbD%2FP%2BD3v4hjqrjxRYBpXQ%2BTtlNkYvJn%2Fc0ONjEIQHv2eD8exPaiR%0D%0A5Hx%2FA0WMViCnBRml6vCluCCs1ZDPQTu6%2B4TWZXAivUg8GkO2yRQSFKDxDtPioT9X%0D%0AfWFQuReF5ASMmhZSduO0DUt6glMXZxMI%2FnNCrhkQzKChvNsDnHu6VvA4LSYBVLL1%0D%0AX3tU%0A&cert_request_type=pkcs10&xmlOutput=true'
  8389. 2017-05-11T02:31:01Z DEBUG NSSConnection init ipa.rdlg.net
  8390. 2017-05-11T02:31:01Z DEBUG Connecting: 172.20.0.200:0
  8391. 2017-05-11T02:31:01Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  8392. 2017-05-11T02:31:01Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  8393. 2017-05-11T02:31:01Z DEBUG handshake complete, peer = 172.20.0.200:8443
  8394. 2017-05-11T02:31:01Z DEBUG Protocol: TLS1.2
  8395. 2017-05-11T02:31:01Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  8396. 2017-05-11T02:31:01Z DEBUG response status 200
  8397. 2017-05-11T02:31:01Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:31:01 GMT', 'content-length': '1599', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  8398. 2017-05-11T02:31:01Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><Status>0</Status><Requests><Request><Id>8</Id><SubjectDN>CN=ipa.rdlg.net,O=RDLG.NET</SubjectDN><serialno>8</serialno><b64>MIID/jCCAuagAwIBAgIBCDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExHLk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAyMzEwMVoXDTE5MDUxMjAyMzEwMVowKjERMA8GA1UECgwIUkRMRy5ORVQxFTATBgNVBAMMDGlwYS5yZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMgwaRm6Trb1lL+/FTUZjc20H+UWTjOnUsmuJkuALMdRkRnnJF2IsArm7nxxZavUvSRYw1i0ACcukICy32Eb3q2lG3xFXzt9ZO//5FTYSnR04DsM3uUPaVL9FiDtZDwnPsgPUKIuFXKbc32bGmjAra3JP7TrzkowRZ8ZewXwRLcmmoT2tNvERrTndvFmnnxhXs5CNCvx308HyyYvRcgH14uAGnn8KdhidCDu0eyzpy3kDweyPfDW7aTqQbuoBvSftvVz9g0IxbOX+N8hbIjGN82i/ryQoPeIvHShYAxVQ8Z+bPjCz+z5j0l46m0pybH+MxMQEP+Y456cRSfMHCPLkQ0CAwEAAaOCASQwggEgMB8GA1UdIwQYMBaAFMoUcnP4TmDj4h+ZfLwirZhDNd7zMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5yZGxnLm5ldC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5yZGxnLm5ldC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO/ai4muEu3NIASl9/6y7+pL4J0xMA0GCSqGSIb3DQEBCwUAA4IBAQBlEg6LWNp8RFPgumvrJ/KHK7AY+P6BJQ8Zyk+6jfUVc6zuIuNT70Ri/BhAWeiimyfCsuNZMPQQCqeHC/sG4gQb1ICiahL9TdFHVZE6UoFTq/DEuDtzFUldUGj5Aan9BrVH36Z5MGzN4r2Hzf0DzmO02wxPpl9Y073rnF0/H4GmgAkrFrBwwmITsF448My+Q9q8sr4hh8qMdNhyDOgxfCH+fLu613be/r3EYiHvrGtwPDz02jmRIkMfWniDGuZop4LAsqoLfcAJu5oA8TCAijaUDgcm7+SyKl/QQDju2xZDrTjJfqMlymURQrI/CHj3kU7O7zDue2DMZRioLzJW5wLc</b64></Request></Requests></XMLResponse>'
  8399. 2017-05-11T02:31:01Z DEBUG Starting external process
  8400. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -A -n Server-Cert -t u,u,u -i /var/lib/ipa/ipa-93vgs6/tmpcert.der -f /etc/dirsrv/slapd-RDLG-NET//pwdfile.txt
  8401. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8402. 2017-05-11T02:31:01Z DEBUG stdout=
  8403. 2017-05-11T02:31:01Z DEBUG stderr=Notice: Trust flag u is set automatically if the private key is present.
  8404.  
  8405. 2017-05-11T02:31:01Z DEBUG Starting external process
  8406. 2017-05-11T02:31:01Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -L -n Server-Cert -a
  8407. 2017-05-11T02:31:01Z DEBUG Process finished, return code=0
  8408. 2017-05-11T02:31:01Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  8409. MIID/jCCAuagAwIBAgIBCDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  8410. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  8411. MzEwMVoXDTE5MDUxMjAyMzEwMVowKjERMA8GA1UECgwIUkRMRy5ORVQxFTATBgNV
  8412. BAMMDGlwYS5yZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
  8413. AMgwaRm6Trb1lL+/FTUZjc20H+UWTjOnUsmuJkuALMdRkRnnJF2IsArm7nxxZavU
  8414. vSRYw1i0ACcukICy32Eb3q2lG3xFXzt9ZO//5FTYSnR04DsM3uUPaVL9FiDtZDwn
  8415. PsgPUKIuFXKbc32bGmjAra3JP7TrzkowRZ8ZewXwRLcmmoT2tNvERrTndvFmnnxh
  8416. Xs5CNCvx308HyyYvRcgH14uAGnn8KdhidCDu0eyzpy3kDweyPfDW7aTqQbuoBvSf
  8417. tvVz9g0IxbOX+N8hbIjGN82i/ryQoPeIvHShYAxVQ8Z+bPjCz+z5j0l46m0pybH+
  8418. MxMQEP+Y456cRSfMHCPLkQ0CAwEAAaOCASQwggEgMB8GA1UdIwQYMBaAFMoUcnP4
  8419. TmDj4h+ZfLwirZhDNd7zMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0
  8420. cDovL2lwYS1jYS5yZGxnLm5ldC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNV
  8421. HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0
  8422. cDovL2lwYS1jYS5yZGxnLm5ldC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAx
  8423. DjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkw
  8424. HQYDVR0OBBYEFO/ai4muEu3NIASl9/6y7+pL4J0xMA0GCSqGSIb3DQEBCwUAA4IB
  8425. AQBlEg6LWNp8RFPgumvrJ/KHK7AY+P6BJQ8Zyk+6jfUVc6zuIuNT70Ri/BhAWeii
  8426. myfCsuNZMPQQCqeHC/sG4gQb1ICiahL9TdFHVZE6UoFTq/DEuDtzFUldUGj5Aan9
  8427. BrVH36Z5MGzN4r2Hzf0DzmO02wxPpl9Y073rnF0/H4GmgAkrFrBwwmITsF448My+
  8428. Q9q8sr4hh8qMdNhyDOgxfCH+fLu613be/r3EYiHvrGtwPDz02jmRIkMfWniDGuZo
  8429. p4LAsqoLfcAJu5oA8TCAijaUDgcm7+SyKl/QQDju2xZDrTjJfqMlymURQrI/CHj3
  8430. kU7O7zDue2DMZRioLzJW5wLc
  8431. -----END CERTIFICATE-----
  8432.  
  8433. 2017-05-11T02:31:01Z DEBUG stderr=
  8434. 2017-05-11T02:31:02Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  8435. 2017-05-11T02:31:02Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x5181878>
  8436. 2017-05-11T02:31:02Z DEBUG duration: 1 seconds
  8437. 2017-05-11T02:31:02Z DEBUG [2/3]: restarting directory server
  8438. 2017-05-11T02:31:02Z DEBUG Starting external process
  8439. 2017-05-11T02:31:02Z DEBUG args=/bin/systemctl --system daemon-reload
  8440. 2017-05-11T02:31:02Z DEBUG Process finished, return code=0
  8441. 2017-05-11T02:31:02Z DEBUG stdout=
  8442. 2017-05-11T02:31:02Z DEBUG stderr=
  8443. 2017-05-11T02:31:02Z DEBUG Starting external process
  8444. 2017-05-11T02:31:02Z DEBUG args=/bin/systemctl restart [email protected]
  8445. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8446. 2017-05-11T02:31:05Z DEBUG stdout=
  8447. 2017-05-11T02:31:05Z DEBUG stderr=
  8448. 2017-05-11T02:31:05Z DEBUG Starting external process
  8449. 2017-05-11T02:31:05Z DEBUG args=/bin/systemctl is-active [email protected]
  8450. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8451. 2017-05-11T02:31:05Z DEBUG stdout=active
  8452.  
  8453. 2017-05-11T02:31:05Z DEBUG stderr=
  8454. 2017-05-11T02:31:05Z DEBUG wait_for_open_ports: localhost [389] timeout 300
  8455. 2017-05-11T02:31:05Z DEBUG Starting external process
  8456. 2017-05-11T02:31:05Z DEBUG args=/bin/systemctl is-active [email protected]
  8457. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8458. 2017-05-11T02:31:05Z DEBUG stdout=active
  8459.  
  8460. 2017-05-11T02:31:05Z DEBUG stderr=
  8461. 2017-05-11T02:31:05Z DEBUG duration: 3 seconds
  8462. 2017-05-11T02:31:05Z DEBUG [3/3]: adding CA certificate entry
  8463. 2017-05-11T02:31:05Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  8464. 2017-05-11T02:31:05Z DEBUG Starting external process
  8465. 2017-05-11T02:31:05Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -L
  8466. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8467. 2017-05-11T02:31:05Z DEBUG stdout=
  8468. Certificate Nickname Trust Attributes
  8469. SSL,S/MIME,JAR/XPI
  8470.  
  8471. Server-Cert u,u,u
  8472. RDLG.NET IPA CA CT,C,C
  8473.  
  8474. 2017-05-11T02:31:05Z DEBUG stderr=
  8475. 2017-05-11T02:31:05Z DEBUG Starting external process
  8476. 2017-05-11T02:31:05Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -O -n RDLG.NET IPA CA
  8477. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8478. 2017-05-11T02:31:05Z DEBUG stdout="RDLG.NET IPA CA" [CN=Certificate Authority,O=RDLG.NET]
  8479.  
  8480.  
  8481. 2017-05-11T02:31:05Z DEBUG stderr=
  8482. 2017-05-11T02:31:05Z DEBUG Starting external process
  8483. 2017-05-11T02:31:05Z DEBUG args=/usr/bin/certutil -d /etc/dirsrv/slapd-RDLG-NET/ -L -n RDLG.NET IPA CA -a
  8484. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8485. 2017-05-11T02:31:05Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  8486. MIIDgjCCAmqgAwIBAgIBATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  8487. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  8488. Mjk1NloXDTM3MDUxMTAyMjk1NlowMzERMA8GA1UECgwIUkRMRy5ORVQxHjAcBgNV
  8489. BAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  8490. ADCCAQoCggEBAL7p94qOWxiCMRT+Engmh3SKl6MFWOgXWnYfZYd8DikRR+Lhstl0
  8491. LYHb9OEbJW7VjhHu6TYfAyunXx1i/FWbDQy+5H/qWUZDUPNeg6D7HsJOnWjEpWsf
  8492. 0Y8IR4dqb0nsbvscGZOY6IfxWBvTcoUpb6fATZnjJYJEXKvbwk3Fnedb/yt3Xu4j
  8493. mPa59Ey0M43q2oRtgwZKyxn2Jjqkoze27Q6sdvCeHOlFy3kX5tzoTtmQ1moZlkYY
  8494. a5crBdiZjG+PIv3VocYU2RzA4/r08Cs173Qpe1TLou/4zJ4Ru7qq1gbWHIN0ZDXB
  8495. eO/CGO4iutUTzFZmrKh/eGr5l1EAXEQry+0CAwEAAaOBoDCBnTAfBgNVHSMEGDAW
  8496. gBTKFHJz+E5g4+IfmXy8Iq2YQzXe8zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB
  8497. /wQEAwIBxjAdBgNVHQ4EFgQUyhRyc/hOYOPiH5l8vCKtmEM13vMwOgYIKwYBBQUH
  8498. AQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLnJkbGcubmV0L2NhL29j
  8499. c3AwDQYJKoZIhvcNAQELBQADggEBAAe2GwBcMyjzUn24OAMxBSDmJTr49ByS4+zu
  8500. 7Y7gXVuS5lvMOm+DaM9UZXkQtvPwB3XtOrhX0USUhq1uhDuh2bYfkxKekGPWYyo0
  8501. 1jDpvBp8IQaD9tcAJcc+KcAmdN2hV5r372xhWosMlT+gkqNm1tpQ15kzrHJHgGRy
  8502. 243aRtXVr1RdTCNOm7Qplj5+xXtFyElcSFkrsqvoQrKnp0GY81zw6OmdQaC4GYAv
  8503. uZazc5OlNNpGLDYtN5iT4VR4fIdYkfi174VtNlR1O9ZGZ+on863r9CTUhHmnzz5I
  8504. /EfCR4uOA6jCe2XbGJMVhdZzMFWKH1ddo6WHyuzBQANOuqlAt5E=
  8505. -----END CERTIFICATE-----
  8506.  
  8507. 2017-05-11T02:31:05Z DEBUG stderr=
  8508. 2017-05-11T02:31:05Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  8509. 2017-05-11T02:31:05Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7493248>
  8510. 2017-05-11T02:31:05Z DEBUG duration: 0 seconds
  8511. 2017-05-11T02:31:05Z DEBUG Done configuring directory server (dirsrv).
  8512. 2017-05-11T02:31:05Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  8513. 2017-05-11T02:31:05Z DEBUG Starting external process
  8514. 2017-05-11T02:31:05Z DEBUG args=keyctl get_persistent @s 0
  8515. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8516. 2017-05-11T02:31:05Z DEBUG stdout=639120935
  8517.  
  8518. 2017-05-11T02:31:05Z DEBUG stderr=
  8519. 2017-05-11T02:31:05Z DEBUG Enabling persistent keyring CCACHE
  8520. 2017-05-11T02:31:05Z DEBUG Starting external process
  8521. 2017-05-11T02:31:05Z DEBUG args=/bin/systemctl is-active krb5kdc.service
  8522. 2017-05-11T02:31:05Z DEBUG Process finished, return code=3
  8523. 2017-05-11T02:31:05Z DEBUG stdout=unknown
  8524.  
  8525. 2017-05-11T02:31:05Z DEBUG stderr=
  8526. 2017-05-11T02:31:05Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  8527. 2017-05-11T02:31:05Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  8528. 2017-05-11T02:31:05Z DEBUG Starting external process
  8529. 2017-05-11T02:31:05Z DEBUG args=/bin/systemctl stop krb5kdc.service
  8530. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8531. 2017-05-11T02:31:05Z DEBUG stdout=
  8532. 2017-05-11T02:31:05Z DEBUG stderr=
  8533. 2017-05-11T02:31:05Z DEBUG Configuring Kerberos KDC (krb5kdc). Estimated time: 30 seconds
  8534. 2017-05-11T02:31:05Z DEBUG [1/9]: adding kerberos container to the directory
  8535. 2017-05-11T02:31:05Z DEBUG Starting external process
  8536. 2017-05-11T02:31:05Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpXt6UCm -H ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket -x -D cn=Directory Manager -y /tmp/tmpcFAcM2
  8537. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8538. 2017-05-11T02:31:05Z DEBUG stdout=add objectClass:
  8539. krbContainer
  8540. top
  8541. add cn:
  8542. kerberos
  8543. adding new entry "cn=kerberos,dc=rdlg,dc=net"
  8544. modify complete
  8545.  
  8546. add cn:
  8547. RDLG.NET
  8548. add objectClass:
  8549. top
  8550. krbrealmcontainer
  8551. krbticketpolicyaux
  8552. add krbSubTrees:
  8553. dc=rdlg,dc=net
  8554. add krbSearchScope:
  8555. 2
  8556. add krbSupportedEncSaltTypes:
  8557. aes256-cts:normal
  8558. aes256-cts:special
  8559. aes128-cts:normal
  8560. aes128-cts:special
  8561. des3-hmac-sha1:normal
  8562. des3-hmac-sha1:special
  8563. arcfour-hmac:normal
  8564. arcfour-hmac:special
  8565. camellia128-cts-cmac:normal
  8566. camellia128-cts-cmac:special
  8567. camellia256-cts-cmac:normal
  8568. camellia256-cts-cmac:special
  8569. add krbMaxTicketLife:
  8570. 86400
  8571. add krbMaxRenewableAge:
  8572. 604800
  8573. add krbDefaultEncSaltTypes:
  8574. aes256-cts:special
  8575. aes128-cts:special
  8576. adding new entry "cn=RDLG.NET,cn=kerberos,dc=rdlg,dc=net"
  8577. modify complete
  8578.  
  8579. add objectClass:
  8580. top
  8581. nsContainer
  8582. krbPwdPolicy
  8583. add krbMinPwdLife:
  8584. 3600
  8585. add krbPwdMinDiffChars:
  8586. 0
  8587. add krbPwdMinLength:
  8588. 8
  8589. add krbPwdHistoryLength:
  8590. 0
  8591. add krbMaxPwdLife:
  8592. 7776000
  8593. add krbPwdMaxFailure:
  8594. 6
  8595. add krbPwdFailureCountInterval:
  8596. 60
  8597. add krbPwdLockoutDuration:
  8598. 600
  8599. adding new entry "cn=global_policy,cn=RDLG.NET,cn=kerberos,dc=rdlg,dc=net"
  8600. modify complete
  8601.  
  8602.  
  8603. 2017-05-11T02:31:05Z DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-RDLG-NET.socket/??base )
  8604.  
  8605. 2017-05-11T02:31:05Z DEBUG duration: 0 seconds
  8606. 2017-05-11T02:31:05Z DEBUG [2/9]: configuring KDC
  8607. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/var/kerberos/krb5kdc/kdc.conf'
  8608. 2017-05-11T02:31:05Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  8609. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/etc/krb5.conf'
  8610. 2017-05-11T02:31:05Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  8611. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/usr/share/ipa/html/krb5.ini'
  8612. 2017-05-11T02:31:05Z DEBUG -> Not backing up - '/usr/share/ipa/html/krb5.ini' doesn't exist
  8613. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/usr/share/ipa/html/krb.con'
  8614. 2017-05-11T02:31:05Z DEBUG -> Not backing up - '/usr/share/ipa/html/krb.con' doesn't exist
  8615. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/usr/share/ipa/html/krbrealm.con'
  8616. 2017-05-11T02:31:05Z DEBUG -> Not backing up - '/usr/share/ipa/html/krbrealm.con' doesn't exist
  8617. 2017-05-11T02:31:05Z DEBUG Starting external process
  8618. 2017-05-11T02:31:05Z DEBUG args=klist -V
  8619. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8620. 2017-05-11T02:31:05Z DEBUG stdout=Kerberos 5 version 1.14.1
  8621.  
  8622. 2017-05-11T02:31:05Z DEBUG stderr=
  8623. 2017-05-11T02:31:05Z DEBUG Backing up system configuration file '/etc/sysconfig/krb5kdc'
  8624. 2017-05-11T02:31:05Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  8625. 2017-05-11T02:31:05Z DEBUG Starting external process
  8626. 2017-05-11T02:31:05Z DEBUG args=/usr/sbin/selinuxenabled
  8627. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8628. 2017-05-11T02:31:05Z DEBUG stdout=
  8629. 2017-05-11T02:31:05Z DEBUG stderr=
  8630. 2017-05-11T02:31:05Z DEBUG Starting external process
  8631. 2017-05-11T02:31:05Z DEBUG args=/sbin/restorecon /etc/sysconfig/krb5kdc
  8632. 2017-05-11T02:31:05Z DEBUG Process finished, return code=0
  8633. 2017-05-11T02:31:05Z DEBUG stdout=
  8634. 2017-05-11T02:31:05Z DEBUG stderr=
  8635. 2017-05-11T02:31:05Z DEBUG duration: 0 seconds
  8636. 2017-05-11T02:31:05Z DEBUG [3/9]: initialize kerberos container
  8637. 2017-05-11T02:31:05Z DEBUG WARNING: Your system is running out of entropy, you may experience long delays
  8638. 2017-05-11T02:31:05Z DEBUG WARNING: Your system is running out of entropy, you may experience long delays
  8639. 2017-05-11T02:31:05Z DEBUG Starting external process
  8640. 2017-05-11T02:31:05Z DEBUG args=kdb5_util create -s -r RDLG.NET -x ipa-setup-override-restrictions
  8641. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8642. 2017-05-11T02:35:38Z DEBUG stdout=Loading random data
  8643. Initializing database '/var/kerberos/krb5kdc/principal' for realm 'RDLG.NET',
  8644. master key name 'K/[email protected]'
  8645. You will be prompted for the database Master Password.
  8646. It is important that you NOT FORGET this password.
  8647. Enter KDC database master key:
  8648. Re-enter KDC database master key to verify:
  8649.  
  8650. 2017-05-11T02:35:38Z DEBUG stderr=
  8651. 2017-05-11T02:35:38Z DEBUG duration: 272 seconds
  8652. 2017-05-11T02:35:38Z DEBUG [4/9]: adding default ACIs
  8653. 2017-05-11T02:35:38Z DEBUG Starting external process
  8654. 2017-05-11T02:35:38Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpycj9Ve -H ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket -x -D cn=Directory Manager -y /tmp/tmpUDVrpn
  8655. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8656. 2017-05-11T02:35:38Z DEBUG stdout=add aci:
  8657. (targetattr = "userpassword || krbprincipalkey || sambalmpassword || sambantpassword")(version 3.0; acl "selfservice:Self can write own password"; allow (write) userdn="ldap:///self";)
  8658. modifying entry "dc=rdlg,dc=net"
  8659. modify complete
  8660.  
  8661. add aci:
  8662. (targetattr = "givenname || sn || cn || displayname || title || initials || loginshell || gecos || homephone || mobile || pager || facsimiletelephonenumber || telephonenumber || street || roomnumber || l || st || postalcode || manager || secretary || description || carlicense || labeleduri || inetuserhttpurl || seealso || employeetype || businesscategory || ou")(version 3.0;acl "selfservice:User Self service";allow (write) userdn = "ldap:///self";)
  8663. (targetattr = "ipasshpubkey")(version 3.0;acl "selfservice:Users can manage their own SSH public keys";allow (write) userdn = "ldap:///self";)
  8664. (targetattr = "usercertificate")(version 3.0;acl "selfservice:Users can manage their own X.509 certificates";allow (write) userdn = "ldap:///self";)
  8665. modifying entry "dc=rdlg,dc=net"
  8666. modify complete
  8667.  
  8668. add aci:
  8669. (targetfilter = "(objectClass=ipaGuiConfig)")(targetattr != "aci")(version 3.0;acl "Admins can change GUI config"; allow (read, search, compare, write) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8670. modifying entry "cn=etc,dc=rdlg,dc=net"
  8671. modify complete
  8672.  
  8673. add aci:
  8674. (targetfilter = "(|(objectClass=ipaConfigObject)(dnahostname=*))")(version 3.0;acl "Admins can change GUI config"; allow (delete) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8675. modifying entry "cn=ipa,cn=etc,dc=rdlg,dc=net"
  8676. modify complete
  8677.  
  8678. add aci:
  8679. (targetattr = "krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength")(version 3.0;acl "Admins can write password policy"; allow (write) groupdn="ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8680. (targetattr = "aci")(version 3.0;acl "Admins can manage delegations"; allow (write, delete) groupdn="ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8681. (targetattr="ipaProtectedOperation;read_keys")(version 3.0; acl "Users allowed to retrieve keytab keys"; allow(read) userattr="ipaAllowedToPerform;read_keys#USERDN";)
  8682. (targetattr="ipaProtectedOperation;read_keys")(version 3.0; acl "Groups allowed to retrieve keytab keys"; allow(read) userattr="ipaAllowedToPerform;read_keys#GROUPDN";)
  8683. (targetattr="ipaProtectedOperation;write_keys")(version 3.0; acl "Users allowed to create keytab keys"; allow(write) userattr="ipaAllowedToPerform;write_keys#USERDN";)
  8684. (targetattr="ipaProtectedOperation;write_keys")(version 3.0; acl "Groups allowed to create keytab keys"; allow(write) userattr="ipaAllowedToPerform;write_keys#GROUPDN";)
  8685. (targetattr="ipaProtectedOperation;write_keys")(version 3.0; acl "Entities are allowed to rekey themselves"; allow(write) userdn="ldap:///self";)
  8686. (targetattr="ipaProtectedOperation;write_keys")(version 3.0; acl "Admins are allowed to rekey any entity"; allow(write) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8687. (targetfilter="(|(objectclass=ipaHost)(objectclass=ipaService))")(targetattr="ipaProtectedOperation;write_keys")(version 3.0; acl "Entities are allowed to rekey managed entries"; allow(write) userattr="managedby#USERDN";)
  8688. modifying entry "cn=accounts,dc=rdlg,dc=net"
  8689. modify complete
  8690.  
  8691. add aci:
  8692. (targetattr = "krbPrincipalKey || krbLastPwdChange")(target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=rdlg,dc=net")(version 3.0;acl "Admins can manage service keytab";allow (write) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8693. modifying entry "cn=services,cn=accounts,dc=rdlg,dc=net"
  8694. modify complete
  8695.  
  8696. add aci:
  8697. (targetattr="userCertificate || krbPrincipalKey")(version 3.0; acl "Hosts can manage service Certificates and kerberos keys"; allow(write) userattr = "parent[0,1].managedby#USERDN";)
  8698. modifying entry "cn=services,cn=accounts,dc=rdlg,dc=net"
  8699. modify complete
  8700.  
  8701. add aci:
  8702. (targetattr="usercertificate || krblastpwdchange || description || l || nshostlocation || nshardwareplatform || nsosversion")(version 3.0; acl "Hosts can modify their own certs and keytabs"; allow(write) userdn = "ldap:///self";)
  8703. (targetattr="ipasshpubkey")(version 3.0; acl "Hosts can modify their own SSH public keys"; allow(write) userdn = "ldap:///self";)
  8704. modifying entry "cn=computers,cn=accounts,dc=rdlg,dc=net"
  8705. modify complete
  8706.  
  8707. add aci:
  8708. (targetattr="userCertificate || krbPrincipalKey")(version 3.0; acl "Hosts can manage other host Certificates and kerberos keys"; allow(write) userattr = "parent[0,1].managedby#USERDN";)
  8709. (targetattr="ipasshpubkey")(version 3.0; acl "Hosts can manage other host SSH public keys"; allow(write) userattr = "parent[0,1].managedby#USERDN";)
  8710. modifying entry "cn=computers,cn=accounts,dc=rdlg,dc=net"
  8711. modify complete
  8712.  
  8713. add aci:
  8714. (targetattr = "krbPrincipalKey || krbLastPwdChange")(target = "ldap:///fqdn=*,cn=computers,cn=accounts,dc=rdlg,dc=net")(version 3.0;acl "Admins can manage host keytab";allow (write) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,dc=rdlg,dc=net";)
  8715. modifying entry "cn=computers,cn=accounts,dc=rdlg,dc=net"
  8716. modify complete
  8717.  
  8718. add aci:
  8719. (targetattr="userPassword || krbPrincipalKey")(version 3.0; acl "Search existence of password and kerberos keys"; allow(search) userdn = "ldap:///all";)
  8720. modifying entry "cn=accounts,dc=rdlg,dc=net"
  8721. modify complete
  8722.  
  8723. add aci:
  8724. (targetfilter = "(objectClass=ipaToken)")(targetattrs = "objectclass || description || managedBy || ipatokenUniqueID || ipatokenDisabled || ipatokenNotBefore || ipatokenNotAfter || ipatokenVendor || ipatokenModel || ipatokenSerial || ipatokenOwner")(version 3.0; acl "Users/managers can read basic token info"; allow (read, search, compare) userattr = "ipatokenOwner#USERDN" or userattr = "managedBy#USERDN";)
  8725. (targetfilter = "(objectClass=ipatokenTOTP)")(targetattrs = "ipatokenOTPalgorithm || ipatokenOTPdigits || ipatokenTOTPtimeStep")(version 3.0; acl "Users/managers can see TOTP details"; allow (read, search, compare) userattr = "ipatokenOwner#USERDN" or userattr = "managedBy#USERDN";)
  8726. (targetfilter = "(objectClass=ipatokenHOTP)")(targetattrs = "ipatokenOTPalgorithm || ipatokenOTPdigits")(version 3.0; acl "Users/managers can see HOTP details"; allow (read, search, compare) userattr = "ipatokenOwner#USERDN" or userattr = "managedBy#USERDN";)
  8727. (targetfilter = "(objectClass=ipaToken)")(targetattrs = "description || ipatokenDisabled || ipatokenNotBefore || ipatokenNotAfter || ipatokenVendor || ipatokenModel || ipatokenSerial")(version 3.0; acl "Managers can write basic token info"; allow (write) userattr = "managedBy#USERDN";)
  8728. (targetfilter = "(objectClass=ipaToken)")(version 3.0; acl "Managers can delete tokens"; allow (delete) userattr = "managedBy#USERDN";)
  8729. (target = "ldap:///ipatokenuniqueid=*,cn=otp,dc=rdlg,dc=net")(targetfilter = "(objectClass=ipaToken)")(version 3.0; acl "Users can create self-managed tokens"; allow (add) userattr = "ipatokenOwner#SELFDN" and userattr = "managedBy#SELFDN";)
  8730. modifying entry "dc=rdlg,dc=net"
  8731. modify complete
  8732.  
  8733.  
  8734. 2017-05-11T02:35:38Z DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-RDLG-NET.socket/??base )
  8735.  
  8736. 2017-05-11T02:35:38Z DEBUG duration: 0 seconds
  8737. 2017-05-11T02:35:38Z DEBUG [5/9]: creating a keytab for the directory
  8738. 2017-05-11T02:35:38Z DEBUG Starting external process
  8739. 2017-05-11T02:35:38Z DEBUG args=kadmin.local -q addprinc -randkey ldap/[email protected] -x ipa-setup-override-restrictions
  8740. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8741. 2017-05-11T02:35:38Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  8742. Principal "ldap/[email protected]" created.
  8743.  
  8744. 2017-05-11T02:35:38Z DEBUG stderr=WARNING: no policy specified for ldap/[email protected]; defaulting to no policy
  8745.  
  8746. 2017-05-11T02:35:38Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8747. 2017-05-11T02:35:38Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7481d88>
  8748. 2017-05-11T02:35:38Z DEBUG Backing up system configuration file '/etc/dirsrv/ds.keytab'
  8749. 2017-05-11T02:35:38Z DEBUG -> Not backing up - '/etc/dirsrv/ds.keytab' doesn't exist
  8750. 2017-05-11T02:35:38Z DEBUG Starting external process
  8751. 2017-05-11T02:35:38Z DEBUG args=kadmin.local -q ktadd -k /etc/dirsrv/ds.keytab ldap/[email protected] -x ipa-setup-override-restrictions
  8752. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8753. 2017-05-11T02:35:38Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  8754. Entry for principal ldap/[email protected] with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8755. Entry for principal ldap/[email protected] with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8756. Entry for principal ldap/[email protected] with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8757. Entry for principal ldap/[email protected] with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8758. Entry for principal ldap/[email protected] with kvno 2, encryption type camellia128-cts-cmac added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8759. Entry for principal ldap/[email protected] with kvno 2, encryption type camellia256-cts-cmac added to keytab WRFILE:/etc/dirsrv/ds.keytab.
  8760.  
  8761. 2017-05-11T02:35:38Z DEBUG stderr=
  8762. 2017-05-11T02:35:38Z DEBUG duration: 0 seconds
  8763. 2017-05-11T02:35:38Z DEBUG [6/9]: creating a keytab for the machine
  8764. 2017-05-11T02:35:38Z DEBUG Starting external process
  8765. 2017-05-11T02:35:38Z DEBUG args=kadmin.local -q addprinc -randkey host/[email protected] -x ipa-setup-override-restrictions
  8766. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8767. 2017-05-11T02:35:38Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  8768. Principal "host/[email protected]" created.
  8769.  
  8770. 2017-05-11T02:35:38Z DEBUG stderr=WARNING: no policy specified for host/[email protected]; defaulting to no policy
  8771.  
  8772. 2017-05-11T02:35:38Z DEBUG Backing up system configuration file '/etc/krb5.keytab'
  8773. 2017-05-11T02:35:38Z DEBUG -> Not backing up - '/etc/krb5.keytab' doesn't exist
  8774. 2017-05-11T02:35:38Z DEBUG Starting external process
  8775. 2017-05-11T02:35:38Z DEBUG args=kadmin.local -q ktadd -k /etc/krb5.keytab host/[email protected] -x ipa-setup-override-restrictions
  8776. 2017-05-11T02:35:38Z DEBUG Process finished, return code=0
  8777. 2017-05-11T02:35:38Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  8778. Entry for principal host/[email protected] with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
  8779. Entry for principal host/[email protected] with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
  8780. Entry for principal host/[email protected] with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/krb5.keytab.
  8781. Entry for principal host/[email protected] with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:/etc/krb5.keytab.
  8782. Entry for principal host/[email protected] with kvno 2, encryption type camellia128-cts-cmac added to keytab WRFILE:/etc/krb5.keytab.
  8783. Entry for principal host/[email protected] with kvno 2, encryption type camellia256-cts-cmac added to keytab WRFILE:/etc/krb5.keytab.
  8784.  
  8785. 2017-05-11T02:35:38Z DEBUG stderr=
  8786. 2017-05-11T02:35:38Z DEBUG importing all plugin modules in ipaserver.plugins...
  8787. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.aci
  8788. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.automember
  8789. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.automount
  8790. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.baseldap
  8791. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.baseldap is not a valid plugin module
  8792. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.baseuser
  8793. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.batch
  8794. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.ca
  8795. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.caacl
  8796. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.cert
  8797. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.certprofile
  8798. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.config
  8799. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.delegation
  8800. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.dns
  8801. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.dnsserver
  8802. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.dogtag
  8803. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.domainlevel
  8804. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.group
  8805. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hbac
  8806. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.hbac is not a valid plugin module
  8807. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hbacrule
  8808. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hbacsvc
  8809. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hbacsvcgroup
  8810. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hbactest
  8811. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.host
  8812. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.hostgroup
  8813. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.idrange
  8814. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.idviews
  8815. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.internal
  8816. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.join
  8817. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.krbtpolicy
  8818. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.ldap2
  8819. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.location
  8820. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.migration
  8821. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.misc
  8822. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.netgroup
  8823. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.otp
  8824. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.otp is not a valid plugin module
  8825. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.otpconfig
  8826. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.otptoken
  8827. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.passwd
  8828. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.permission
  8829. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.ping
  8830. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.pkinit
  8831. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.pkinit is not a valid plugin module
  8832. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.privilege
  8833. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.pwpolicy
  8834. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.rabase
  8835. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.rabase is not a valid plugin module
  8836. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.radiusproxy
  8837. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.realmdomains
  8838. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.role
  8839. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.schema
  8840. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.selfservice
  8841. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.selinuxusermap
  8842. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.server
  8843. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.serverrole
  8844. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.serverroles
  8845. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.service
  8846. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.servicedelegation
  8847. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.session
  8848. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.stageuser
  8849. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.sudo
  8850. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.sudo is not a valid plugin module
  8851. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.sudocmd
  8852. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.sudocmdgroup
  8853. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.sudorule
  8854. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.topology
  8855. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.trust
  8856. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.user
  8857. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.vault
  8858. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.virtual
  8859. 2017-05-11T02:35:38Z DEBUG ipaserver.plugins.virtual is not a valid plugin module
  8860. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.plugins.xmlserver
  8861. 2017-05-11T02:35:38Z DEBUG importing all plugin modules in ipaserver.install.plugins...
  8862. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.adtrust
  8863. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.ca_renewal_master
  8864. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.dns
  8865. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.fix_replica_agreements
  8866. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.rename_managed
  8867. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_ca_topology
  8868. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_idranges
  8869. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_managed_permissions
  8870. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_nis
  8871. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_pacs
  8872. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_passsync
  8873. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_referint
  8874. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_services
  8875. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.update_uniqueness
  8876. 2017-05-11T02:35:38Z DEBUG importing plugin module ipaserver.install.plugins.upload_cacrt
  8877. 2017-05-11T02:35:40Z DEBUG Created connection context.ldap2_123162512
  8878. 2017-05-11T02:35:40Z DEBUG Destroyed connection context.ldap2_123162512
  8879. 2017-05-11T02:35:40Z DEBUG Created connection context.ldap2_123162512
  8880. 2017-05-11T02:35:40Z DEBUG Parsing update file '/usr/share/ipa/updates/20-ipaservers_hostgroup.update'
  8881. 2017-05-11T02:35:40Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  8882. 2017-05-11T02:35:40Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9893170>
  8883. 2017-05-11T02:35:40Z DEBUG Updating existing entry: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8884. 2017-05-11T02:35:40Z DEBUG ---------------------------------------------
  8885. 2017-05-11T02:35:40Z DEBUG Initial value
  8886. 2017-05-11T02:35:40Z DEBUG dn: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8887. 2017-05-11T02:35:40Z DEBUG objectClass:
  8888. 2017-05-11T02:35:40Z DEBUG top
  8889. 2017-05-11T02:35:40Z DEBUG groupOfNames
  8890. 2017-05-11T02:35:40Z DEBUG nestedGroup
  8891. 2017-05-11T02:35:40Z DEBUG ipaobject
  8892. 2017-05-11T02:35:40Z DEBUG ipahostgroup
  8893. 2017-05-11T02:35:40Z DEBUG cn:
  8894. 2017-05-11T02:35:40Z DEBUG ipaservers
  8895. 2017-05-11T02:35:40Z DEBUG ipaUniqueID:
  8896. 2017-05-11T02:35:40Z DEBUG 97269128-35f1-11e7-bc0a-0050568f60a6
  8897. 2017-05-11T02:35:40Z DEBUG description:
  8898. 2017-05-11T02:35:40Z DEBUG IPA server hosts
  8899. 2017-05-11T02:35:40Z DEBUG ---------------------------------------------
  8900. 2017-05-11T02:35:40Z DEBUG Final value after applying updates
  8901. 2017-05-11T02:35:40Z DEBUG dn: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8902. 2017-05-11T02:35:40Z DEBUG objectClass:
  8903. 2017-05-11T02:35:40Z DEBUG top
  8904. 2017-05-11T02:35:40Z DEBUG groupOfNames
  8905. 2017-05-11T02:35:40Z DEBUG nestedGroup
  8906. 2017-05-11T02:35:40Z DEBUG ipaobject
  8907. 2017-05-11T02:35:40Z DEBUG ipahostgroup
  8908. 2017-05-11T02:35:40Z DEBUG cn:
  8909. 2017-05-11T02:35:40Z DEBUG ipaservers
  8910. 2017-05-11T02:35:40Z DEBUG ipaUniqueID:
  8911. 2017-05-11T02:35:40Z DEBUG 97269128-35f1-11e7-bc0a-0050568f60a6
  8912. 2017-05-11T02:35:40Z DEBUG description:
  8913. 2017-05-11T02:35:40Z DEBUG IPA server hosts
  8914. 2017-05-11T02:35:40Z DEBUG []
  8915. 2017-05-11T02:35:40Z DEBUG Updated 0
  8916. 2017-05-11T02:35:40Z DEBUG Done
  8917. 2017-05-11T02:35:40Z DEBUG Updating existing entry: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8918. 2017-05-11T02:35:40Z DEBUG ---------------------------------------------
  8919. 2017-05-11T02:35:40Z DEBUG Initial value
  8920. 2017-05-11T02:35:40Z DEBUG dn: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8921. 2017-05-11T02:35:40Z DEBUG objectClass:
  8922. 2017-05-11T02:35:40Z DEBUG top
  8923. 2017-05-11T02:35:40Z DEBUG groupOfNames
  8924. 2017-05-11T02:35:40Z DEBUG nestedGroup
  8925. 2017-05-11T02:35:40Z DEBUG ipaobject
  8926. 2017-05-11T02:35:40Z DEBUG ipahostgroup
  8927. 2017-05-11T02:35:40Z DEBUG cn:
  8928. 2017-05-11T02:35:40Z DEBUG ipaservers
  8929. 2017-05-11T02:35:40Z DEBUG ipaUniqueID:
  8930. 2017-05-11T02:35:40Z DEBUG 97269128-35f1-11e7-bc0a-0050568f60a6
  8931. 2017-05-11T02:35:40Z DEBUG description:
  8932. 2017-05-11T02:35:40Z DEBUG IPA server hosts
  8933. 2017-05-11T02:35:40Z DEBUG add: 'fqdn=ipa.rdlg.net,cn=computers,cn=accounts,dc=rdlg,dc=net' to member, current value []
  8934. 2017-05-11T02:35:40Z DEBUG add: updated value ['fqdn=ipa.rdlg.net,cn=computers,cn=accounts,dc=rdlg,dc=net']
  8935. 2017-05-11T02:35:40Z DEBUG ---------------------------------------------
  8936. 2017-05-11T02:35:40Z DEBUG Final value after applying updates
  8937. 2017-05-11T02:35:40Z DEBUG dn: cn=ipaservers,cn=hostgroups,cn=accounts,dc=rdlg,dc=net
  8938. 2017-05-11T02:35:40Z DEBUG objectClass:
  8939. 2017-05-11T02:35:40Z DEBUG top
  8940. 2017-05-11T02:35:40Z DEBUG groupOfNames
  8941. 2017-05-11T02:35:40Z DEBUG nestedGroup
  8942. 2017-05-11T02:35:40Z DEBUG ipaobject
  8943. 2017-05-11T02:35:40Z DEBUG ipahostgroup
  8944. 2017-05-11T02:35:40Z DEBUG member:
  8945. 2017-05-11T02:35:40Z DEBUG fqdn=ipa.rdlg.net,cn=computers,cn=accounts,dc=rdlg,dc=net
  8946. 2017-05-11T02:35:40Z DEBUG cn:
  8947. 2017-05-11T02:35:40Z DEBUG ipaservers
  8948. 2017-05-11T02:35:40Z DEBUG ipaUniqueID:
  8949. 2017-05-11T02:35:40Z DEBUG 97269128-35f1-11e7-bc0a-0050568f60a6
  8950. 2017-05-11T02:35:40Z DEBUG description:
  8951. 2017-05-11T02:35:40Z DEBUG IPA server hosts
  8952. 2017-05-11T02:35:40Z DEBUG [(2, u'member', ['fqdn=ipa.rdlg.net,cn=computers,cn=accounts,dc=rdlg,dc=net'])]
  8953. 2017-05-11T02:35:40Z DEBUG Updated 1
  8954. 2017-05-11T02:35:40Z DEBUG Done
  8955. 2017-05-11T02:35:40Z DEBUG Destroyed connection context.ldap2_123162512
  8956. 2017-05-11T02:35:40Z DEBUG duration: 1 seconds
  8957. 2017-05-11T02:35:40Z DEBUG [7/9]: adding the password extension to the directory
  8958. 2017-05-11T02:35:40Z DEBUG Starting external process
  8959. 2017-05-11T02:35:40Z DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp5TDLO1 -H ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket -x -D cn=Directory Manager -y /tmp/tmpFgblH6
  8960. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  8961. 2017-05-11T02:35:40Z DEBUG stdout=add objectclass:
  8962. top
  8963. nsSlapdPlugin
  8964. extensibleObject
  8965. add cn:
  8966. ipa_pwd_extop
  8967. add nsslapd-pluginpath:
  8968. libipa_pwd_extop
  8969. add nsslapd-plugininitfunc:
  8970. ipapwd_init
  8971. add nsslapd-plugintype:
  8972. extendedop
  8973. add nsslapd-pluginbetxn:
  8974. on
  8975. add nsslapd-pluginenabled:
  8976. on
  8977. add nsslapd-pluginid:
  8978. ipa_pwd_extop
  8979. add nsslapd-pluginversion:
  8980. 1.0
  8981. add nsslapd-pluginvendor:
  8982. RedHat
  8983. add nsslapd-plugindescription:
  8984. Support saving passwords in multiple formats for different consumers (krb5, samba, freeradius, etc.)
  8985. add nsslapd-plugin-depends-on-type:
  8986. database
  8987. add nsslapd-realmTree:
  8988. dc=rdlg,dc=net
  8989. adding new entry "cn=ipa_pwd_extop,cn=plugins,cn=config"
  8990. modify complete
  8991.  
  8992.  
  8993. 2017-05-11T02:35:40Z DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-RDLG-NET.socket/??base )
  8994.  
  8995. 2017-05-11T02:35:40Z DEBUG duration: 0 seconds
  8996. 2017-05-11T02:35:40Z DEBUG [8/9]: starting the KDC
  8997. 2017-05-11T02:35:40Z DEBUG Starting external process
  8998. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl start krb5kdc.service
  8999. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9000. 2017-05-11T02:35:40Z DEBUG stdout=
  9001. 2017-05-11T02:35:40Z DEBUG stderr=
  9002. 2017-05-11T02:35:40Z DEBUG Starting external process
  9003. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl is-active krb5kdc.service
  9004. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9005. 2017-05-11T02:35:40Z DEBUG stdout=active
  9006.  
  9007. 2017-05-11T02:35:40Z DEBUG stderr=
  9008. 2017-05-11T02:35:40Z DEBUG duration: 0 seconds
  9009. 2017-05-11T02:35:40Z DEBUG [9/9]: configuring KDC to start on boot
  9010. 2017-05-11T02:35:40Z DEBUG Starting external process
  9011. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl is-enabled krb5kdc.service
  9012. 2017-05-11T02:35:40Z DEBUG Process finished, return code=1
  9013. 2017-05-11T02:35:40Z DEBUG stdout=disabled
  9014.  
  9015. 2017-05-11T02:35:40Z DEBUG stderr=
  9016. 2017-05-11T02:35:40Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9017. 2017-05-11T02:35:40Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9018. 2017-05-11T02:35:40Z DEBUG Starting external process
  9019. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl disable krb5kdc.service
  9020. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9021. 2017-05-11T02:35:40Z DEBUG stdout=
  9022. 2017-05-11T02:35:40Z DEBUG stderr=
  9023. 2017-05-11T02:35:40Z DEBUG duration: 0 seconds
  9024. 2017-05-11T02:35:40Z DEBUG Done configuring Kerberos KDC (krb5kdc).
  9025. 2017-05-11T02:35:40Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9026. 2017-05-11T02:35:40Z DEBUG Configuring kadmin
  9027. 2017-05-11T02:35:40Z DEBUG [1/2]: starting kadmin
  9028. 2017-05-11T02:35:40Z DEBUG Starting external process
  9029. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl is-active kadmin.service
  9030. 2017-05-11T02:35:40Z DEBUG Process finished, return code=3
  9031. 2017-05-11T02:35:40Z DEBUG stdout=unknown
  9032.  
  9033. 2017-05-11T02:35:40Z DEBUG stderr=
  9034. 2017-05-11T02:35:40Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9035. 2017-05-11T02:35:40Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9036. 2017-05-11T02:35:40Z DEBUG Starting external process
  9037. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl restart kadmin.service
  9038. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9039. 2017-05-11T02:35:40Z DEBUG stdout=
  9040. 2017-05-11T02:35:40Z DEBUG stderr=
  9041. 2017-05-11T02:35:40Z DEBUG Starting external process
  9042. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl is-active kadmin.service
  9043. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9044. 2017-05-11T02:35:40Z DEBUG stdout=active
  9045.  
  9046. 2017-05-11T02:35:40Z DEBUG stderr=
  9047. 2017-05-11T02:35:40Z DEBUG duration: 0 seconds
  9048. 2017-05-11T02:35:40Z DEBUG [2/2]: configuring kadmin to start on boot
  9049. 2017-05-11T02:35:40Z DEBUG Starting external process
  9050. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl is-enabled kadmin.service
  9051. 2017-05-11T02:35:40Z DEBUG Process finished, return code=1
  9052. 2017-05-11T02:35:40Z DEBUG stdout=disabled
  9053.  
  9054. 2017-05-11T02:35:40Z DEBUG stderr=
  9055. 2017-05-11T02:35:40Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9056. 2017-05-11T02:35:40Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9057. 2017-05-11T02:35:40Z DEBUG Starting external process
  9058. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl disable kadmin.service
  9059. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9060. 2017-05-11T02:35:40Z DEBUG stdout=
  9061. 2017-05-11T02:35:40Z DEBUG stderr=
  9062. 2017-05-11T02:35:40Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9063. 2017-05-11T02:35:40Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9e3ccb0>
  9064. 2017-05-11T02:35:40Z DEBUG duration: 0 seconds
  9065. 2017-05-11T02:35:40Z DEBUG Done configuring kadmin.
  9066. 2017-05-11T02:35:40Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9067. 2017-05-11T02:35:40Z DEBUG Starting external process
  9068. 2017-05-11T02:35:40Z DEBUG args=/bin/systemctl disable pki-tomcatd.target
  9069. 2017-05-11T02:35:40Z DEBUG Process finished, return code=0
  9070. 2017-05-11T02:35:40Z DEBUG stdout=
  9071. 2017-05-11T02:35:40Z DEBUG stderr=Removed symlink /etc/systemd/system/multi-user.target.wants/pki-tomcatd.target.
  9072.  
  9073. 2017-05-11T02:35:40Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9074. 2017-05-11T02:35:40Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9a3b908>
  9075. 2017-05-11T02:35:41Z DEBUG Ensuring that service pki-tomcatd@pki-tomcat is not running while the next set of commands is being executed.
  9076. 2017-05-11T02:35:41Z DEBUG Starting external process
  9077. 2017-05-11T02:35:41Z DEBUG args=/bin/systemctl is-active [email protected]
  9078. 2017-05-11T02:35:41Z DEBUG Process finished, return code=0
  9079. 2017-05-11T02:35:41Z DEBUG stdout=active
  9080.  
  9081. 2017-05-11T02:35:41Z DEBUG stderr=
  9082. 2017-05-11T02:35:41Z DEBUG Stopping pki-tomcatd@pki-tomcat.
  9083. 2017-05-11T02:35:41Z DEBUG Starting external process
  9084. 2017-05-11T02:35:41Z DEBUG args=/bin/systemctl stop [email protected]
  9085. 2017-05-11T02:35:41Z DEBUG Process finished, return code=0
  9086. 2017-05-11T02:35:41Z DEBUG stdout=
  9087. 2017-05-11T02:35:41Z DEBUG stderr=
  9088. 2017-05-11T02:35:41Z DEBUG Starting pki-tomcatd@pki-tomcat.
  9089. 2017-05-11T02:35:41Z DEBUG Starting external process
  9090. 2017-05-11T02:35:41Z DEBUG args=/bin/systemctl start [email protected]
  9091. 2017-05-11T02:35:41Z DEBUG Process finished, return code=0
  9092. 2017-05-11T02:35:41Z DEBUG stdout=
  9093. 2017-05-11T02:35:41Z DEBUG stderr=
  9094. 2017-05-11T02:35:41Z DEBUG Starting external process
  9095. 2017-05-11T02:35:41Z DEBUG args=/bin/systemctl is-active [email protected]
  9096. 2017-05-11T02:35:41Z DEBUG Process finished, return code=0
  9097. 2017-05-11T02:35:41Z DEBUG stdout=active
  9098.  
  9099. 2017-05-11T02:35:41Z DEBUG stderr=
  9100. 2017-05-11T02:35:41Z DEBUG wait_for_open_ports: localhost [8080, 8443] timeout 300
  9101. 2017-05-11T02:35:43Z DEBUG Waiting until the CA is running
  9102. 2017-05-11T02:35:43Z DEBUG request POST http://ipa.rdlg.net:8080/ca/admin/ca/getStatus
  9103. 2017-05-11T02:35:43Z DEBUG request body ''
  9104. 2017-05-11T02:35:50Z DEBUG response status 200
  9105. 2017-05-11T02:35:50Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:35:49 GMT', 'content-length': '170', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  9106. 2017-05-11T02:35:50Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><State>1</State><Type>CA</Type><Status>running</Status><Version>10.3.3-18.el7_3</Version></XMLResponse>'
  9107. 2017-05-11T02:35:50Z DEBUG The CA status is: running
  9108. 2017-05-11T02:35:50Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  9109. 2017-05-11T02:35:50Z INFO [Set up lightweight CA key retrieval]
  9110. 2017-05-11T02:35:50Z INFO Creating principal
  9111. 2017-05-11T02:35:50Z DEBUG Starting external process
  9112. 2017-05-11T02:35:50Z DEBUG args=kadmin.local -q addprinc -randkey dogtag/[email protected] -x ipa-setup-override-restrictions
  9113. 2017-05-11T02:35:50Z DEBUG Process finished, return code=0
  9114. 2017-05-11T02:35:50Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  9115. Principal "dogtag/[email protected]" created.
  9116.  
  9117. 2017-05-11T02:35:50Z DEBUG stderr=WARNING: no policy specified for dogtag/[email protected]; defaulting to no policy
  9118.  
  9119. 2017-05-11T02:35:50Z INFO Retrieving keytab
  9120. 2017-05-11T02:35:50Z DEBUG Starting external process
  9121. 2017-05-11T02:35:50Z DEBUG args=kadmin.local -q ktadd -k /etc/pki/pki-tomcat/dogtag.keytab dogtag/[email protected] -x ipa-setup-override-restrictions
  9122. 2017-05-11T02:35:50Z DEBUG Process finished, return code=0
  9123. 2017-05-11T02:35:50Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  9124. Entry for principal dogtag/[email protected] with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9125. Entry for principal dogtag/[email protected] with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9126. Entry for principal dogtag/[email protected] with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9127. Entry for principal dogtag/[email protected] with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9128. Entry for principal dogtag/[email protected] with kvno 2, encryption type camellia128-cts-cmac added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9129. Entry for principal dogtag/[email protected] with kvno 2, encryption type camellia256-cts-cmac added to keytab WRFILE:/etc/pki/pki-tomcat/dogtag.keytab.
  9130.  
  9131. 2017-05-11T02:35:50Z DEBUG stderr=
  9132. 2017-05-11T02:35:50Z INFO Creating Custodia keys
  9133. 2017-05-11T02:35:50Z DEBUG Created connection context.ldap2_169661520
  9134. 2017-05-11T02:35:50Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9135. 2017-05-11T02:35:50Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9b3aa70>
  9136. 2017-05-11T02:35:50Z DEBUG Destroyed connection context.ldap2_169661520
  9137. 2017-05-11T02:35:50Z DEBUG Created connection context.ldap2_169661840
  9138. 2017-05-11T02:35:50Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9139. 2017-05-11T02:35:50Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0xa559e18>
  9140. 2017-05-11T02:35:50Z DEBUG Destroyed connection context.ldap2_169661840
  9141. 2017-05-11T02:35:51Z INFO Configuring key retriever
  9142. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  9143. 2017-05-11T02:35:51Z DEBUG Saving StateFile to '/var/lib/ipa/sysupgrade/sysupgrade.state'
  9144. 2017-05-11T02:35:51Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  9145. 2017-05-11T02:35:51Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9e3d998>
  9146. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9147. 2017-05-11T02:35:51Z DEBUG Configuring ipa_memcached
  9148. 2017-05-11T02:35:51Z DEBUG [1/2]: starting ipa_memcached
  9149. 2017-05-11T02:35:51Z DEBUG Starting external process
  9150. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-active ipa_memcached.service
  9151. 2017-05-11T02:35:51Z DEBUG Process finished, return code=3
  9152. 2017-05-11T02:35:51Z DEBUG stdout=unknown
  9153.  
  9154. 2017-05-11T02:35:51Z DEBUG stderr=
  9155. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9156. 2017-05-11T02:35:51Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9157. 2017-05-11T02:35:51Z DEBUG Starting external process
  9158. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl restart ipa_memcached.service
  9159. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9160. 2017-05-11T02:35:51Z DEBUG stdout=
  9161. 2017-05-11T02:35:51Z DEBUG stderr=
  9162. 2017-05-11T02:35:51Z DEBUG Starting external process
  9163. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-active ipa_memcached.service
  9164. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9165. 2017-05-11T02:35:51Z DEBUG stdout=active
  9166.  
  9167. 2017-05-11T02:35:51Z DEBUG stderr=
  9168. 2017-05-11T02:35:51Z DEBUG duration: 0 seconds
  9169. 2017-05-11T02:35:51Z DEBUG [2/2]: configuring ipa_memcached to start on boot
  9170. 2017-05-11T02:35:51Z DEBUG Starting external process
  9171. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-enabled ipa_memcached.service
  9172. 2017-05-11T02:35:51Z DEBUG Process finished, return code=1
  9173. 2017-05-11T02:35:51Z DEBUG stdout=disabled
  9174.  
  9175. 2017-05-11T02:35:51Z DEBUG stderr=
  9176. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9177. 2017-05-11T02:35:51Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9178. 2017-05-11T02:35:51Z DEBUG Starting external process
  9179. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl disable ipa_memcached.service
  9180. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9181. 2017-05-11T02:35:51Z DEBUG stdout=
  9182. 2017-05-11T02:35:51Z DEBUG stderr=
  9183. 2017-05-11T02:35:51Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  9184. 2017-05-11T02:35:51Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0xa1c41b8>
  9185. 2017-05-11T02:35:51Z DEBUG duration: 0 seconds
  9186. 2017-05-11T02:35:51Z DEBUG Done configuring ipa_memcached.
  9187. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9188. 2017-05-11T02:35:51Z DEBUG Configuring ipa-otpd
  9189. 2017-05-11T02:35:51Z DEBUG [1/2]: starting ipa-otpd
  9190. 2017-05-11T02:35:51Z DEBUG Starting external process
  9191. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-active ipa-otpd.socket
  9192. 2017-05-11T02:35:51Z DEBUG Process finished, return code=3
  9193. 2017-05-11T02:35:51Z DEBUG stdout=unknown
  9194.  
  9195. 2017-05-11T02:35:51Z DEBUG stderr=
  9196. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9197. 2017-05-11T02:35:51Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9198. 2017-05-11T02:35:51Z DEBUG Starting external process
  9199. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl restart ipa-otpd.socket
  9200. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9201. 2017-05-11T02:35:51Z DEBUG stdout=
  9202. 2017-05-11T02:35:51Z DEBUG stderr=
  9203. 2017-05-11T02:35:51Z DEBUG Starting external process
  9204. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-active ipa-otpd.socket
  9205. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9206. 2017-05-11T02:35:51Z DEBUG stdout=active
  9207.  
  9208. 2017-05-11T02:35:51Z DEBUG stderr=
  9209. 2017-05-11T02:35:51Z DEBUG duration: 0 seconds
  9210. 2017-05-11T02:35:51Z DEBUG [2/2]: configuring ipa-otpd to start on boot
  9211. 2017-05-11T02:35:51Z DEBUG Starting external process
  9212. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl is-enabled ipa-otpd.socket
  9213. 2017-05-11T02:35:51Z DEBUG Process finished, return code=1
  9214. 2017-05-11T02:35:51Z DEBUG stdout=disabled
  9215.  
  9216. 2017-05-11T02:35:51Z DEBUG stderr=
  9217. 2017-05-11T02:35:51Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9218. 2017-05-11T02:35:51Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9219. 2017-05-11T02:35:51Z DEBUG Starting external process
  9220. 2017-05-11T02:35:51Z DEBUG args=/bin/systemctl disable ipa-otpd.socket
  9221. 2017-05-11T02:35:51Z DEBUG Process finished, return code=0
  9222. 2017-05-11T02:35:51Z DEBUG stdout=
  9223. 2017-05-11T02:35:51Z DEBUG stderr=
  9224. 2017-05-11T02:35:51Z DEBUG flushing ldap://ipa.rdlg.net:389 from SchemaCache
  9225. 2017-05-11T02:35:51Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.rdlg.net:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x9c50710>
  9226. 2017-05-11T02:35:52Z DEBUG duration: 0 seconds
  9227. 2017-05-11T02:35:52Z DEBUG Done configuring ipa-otpd.
  9228. 2017-05-11T02:35:52Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9229. 2017-05-11T02:35:52Z DEBUG Configuring ipa-custodia
  9230. 2017-05-11T02:35:52Z DEBUG [1/5]: Generating ipa-custodia config file
  9231. 2017-05-11T02:35:52Z DEBUG duration: 0 seconds
  9232. 2017-05-11T02:35:52Z DEBUG [2/5]: Making sure custodia container exists
  9233. 2017-05-11T02:35:52Z DEBUG importing all plugin modules in ipaserver.plugins...
  9234. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.aci
  9235. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.automember
  9236. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.automount
  9237. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.baseldap
  9238. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.baseldap is not a valid plugin module
  9239. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.baseuser
  9240. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.batch
  9241. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.ca
  9242. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.caacl
  9243. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.cert
  9244. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.certprofile
  9245. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.config
  9246. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.delegation
  9247. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.dns
  9248. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.dnsserver
  9249. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.dogtag
  9250. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.domainlevel
  9251. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.group
  9252. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hbac
  9253. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.hbac is not a valid plugin module
  9254. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hbacrule
  9255. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hbacsvc
  9256. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hbacsvcgroup
  9257. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hbactest
  9258. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.host
  9259. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.hostgroup
  9260. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.idrange
  9261. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.idviews
  9262. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.internal
  9263. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.join
  9264. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.krbtpolicy
  9265. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.ldap2
  9266. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.location
  9267. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.migration
  9268. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.misc
  9269. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.netgroup
  9270. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.otp
  9271. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.otp is not a valid plugin module
  9272. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.otpconfig
  9273. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.otptoken
  9274. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.passwd
  9275. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.permission
  9276. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.ping
  9277. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.pkinit
  9278. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.pkinit is not a valid plugin module
  9279. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.privilege
  9280. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.pwpolicy
  9281. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.rabase
  9282. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.rabase is not a valid plugin module
  9283. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.radiusproxy
  9284. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.realmdomains
  9285. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.role
  9286. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.schema
  9287. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.selfservice
  9288. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.selinuxusermap
  9289. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.server
  9290. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.serverrole
  9291. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.serverroles
  9292. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.service
  9293. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.servicedelegation
  9294. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.session
  9295. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.stageuser
  9296. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.sudo
  9297. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.sudo is not a valid plugin module
  9298. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.sudocmd
  9299. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.sudocmdgroup
  9300. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.sudorule
  9301. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.topology
  9302. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.trust
  9303. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.user
  9304. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.vault
  9305. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.virtual
  9306. 2017-05-11T02:35:52Z DEBUG ipaserver.plugins.virtual is not a valid plugin module
  9307. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.plugins.xmlserver
  9308. 2017-05-11T02:35:52Z DEBUG importing all plugin modules in ipaserver.install.plugins...
  9309. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.adtrust
  9310. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.ca_renewal_master
  9311. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.dns
  9312. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.fix_replica_agreements
  9313. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.rename_managed
  9314. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_ca_topology
  9315. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_idranges
  9316. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_managed_permissions
  9317. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_nis
  9318. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_pacs
  9319. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_passsync
  9320. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_referint
  9321. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_services
  9322. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.update_uniqueness
  9323. 2017-05-11T02:35:52Z DEBUG importing plugin module ipaserver.install.plugins.upload_cacrt
  9324. 2017-05-11T02:35:53Z DEBUG Created connection context.ldap2_191452880
  9325. 2017-05-11T02:35:53Z DEBUG Destroyed connection context.ldap2_191452880
  9326. 2017-05-11T02:35:53Z DEBUG Created connection context.ldap2_191452880
  9327. 2017-05-11T02:35:53Z DEBUG Parsing update file '/usr/share/ipa/updates/73-custodia.update'
  9328. 2017-05-11T02:35:53Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9329. 2017-05-11T02:35:53Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x740d3b0>
  9330. 2017-05-11T02:35:53Z DEBUG Updating existing entry: cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9331. 2017-05-11T02:35:53Z DEBUG ---------------------------------------------
  9332. 2017-05-11T02:35:53Z DEBUG Initial value
  9333. 2017-05-11T02:35:53Z DEBUG dn: cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9334. 2017-05-11T02:35:53Z DEBUG objectClass:
  9335. 2017-05-11T02:35:53Z DEBUG nsContainer
  9336. 2017-05-11T02:35:53Z DEBUG top
  9337. 2017-05-11T02:35:53Z DEBUG cn:
  9338. 2017-05-11T02:35:53Z DEBUG custodia
  9339. 2017-05-11T02:35:53Z DEBUG ---------------------------------------------
  9340. 2017-05-11T02:35:53Z DEBUG Final value after applying updates
  9341. 2017-05-11T02:35:53Z DEBUG dn: cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9342. 2017-05-11T02:35:53Z DEBUG objectClass:
  9343. 2017-05-11T02:35:53Z DEBUG nsContainer
  9344. 2017-05-11T02:35:53Z DEBUG top
  9345. 2017-05-11T02:35:53Z DEBUG cn:
  9346. 2017-05-11T02:35:53Z DEBUG custodia
  9347. 2017-05-11T02:35:53Z DEBUG []
  9348. 2017-05-11T02:35:53Z DEBUG Updated 0
  9349. 2017-05-11T02:35:53Z DEBUG Done
  9350. 2017-05-11T02:35:53Z DEBUG Updating existing entry: cn=dogtag,cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9351. 2017-05-11T02:35:53Z DEBUG ---------------------------------------------
  9352. 2017-05-11T02:35:53Z DEBUG Initial value
  9353. 2017-05-11T02:35:53Z DEBUG dn: cn=dogtag,cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9354. 2017-05-11T02:35:53Z DEBUG objectClass:
  9355. 2017-05-11T02:35:53Z DEBUG nsContainer
  9356. 2017-05-11T02:35:53Z DEBUG top
  9357. 2017-05-11T02:35:53Z DEBUG cn:
  9358. 2017-05-11T02:35:53Z DEBUG dogtag
  9359. 2017-05-11T02:35:53Z DEBUG ---------------------------------------------
  9360. 2017-05-11T02:35:53Z DEBUG Final value after applying updates
  9361. 2017-05-11T02:35:53Z DEBUG dn: cn=dogtag,cn=custodia,cn=ipa,cn=etc,dc=rdlg,dc=net
  9362. 2017-05-11T02:35:53Z DEBUG objectClass:
  9363. 2017-05-11T02:35:53Z DEBUG nsContainer
  9364. 2017-05-11T02:35:53Z DEBUG top
  9365. 2017-05-11T02:35:53Z DEBUG cn:
  9366. 2017-05-11T02:35:53Z DEBUG dogtag
  9367. 2017-05-11T02:35:53Z DEBUG []
  9368. 2017-05-11T02:35:53Z DEBUG Updated 0
  9369. 2017-05-11T02:35:53Z DEBUG Done
  9370. 2017-05-11T02:35:53Z DEBUG Destroyed connection context.ldap2_191452880
  9371. 2017-05-11T02:35:53Z DEBUG duration: 1 seconds
  9372. 2017-05-11T02:35:53Z DEBUG [3/5]: Generating ipa-custodia keys
  9373. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9374. 2017-05-11T02:35:53Z DEBUG [4/5]: starting ipa-custodia
  9375. 2017-05-11T02:35:53Z DEBUG Starting external process
  9376. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl is-active ipa-custodia.service
  9377. 2017-05-11T02:35:53Z DEBUG Process finished, return code=3
  9378. 2017-05-11T02:35:53Z DEBUG stdout=unknown
  9379.  
  9380. 2017-05-11T02:35:53Z DEBUG stderr=
  9381. 2017-05-11T02:35:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9382. 2017-05-11T02:35:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9383. 2017-05-11T02:35:53Z DEBUG Starting external process
  9384. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl restart ipa-custodia.service
  9385. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9386. 2017-05-11T02:35:53Z DEBUG stdout=
  9387. 2017-05-11T02:35:53Z DEBUG stderr=
  9388. 2017-05-11T02:35:53Z DEBUG Starting external process
  9389. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl is-active ipa-custodia.service
  9390. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9391. 2017-05-11T02:35:53Z DEBUG stdout=active
  9392.  
  9393. 2017-05-11T02:35:53Z DEBUG stderr=
  9394. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9395. 2017-05-11T02:35:53Z DEBUG [5/5]: configuring ipa-custodia to start on boot
  9396. 2017-05-11T02:35:53Z DEBUG Starting external process
  9397. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl is-enabled ipa-custodia.service
  9398. 2017-05-11T02:35:53Z DEBUG Process finished, return code=1
  9399. 2017-05-11T02:35:53Z DEBUG stdout=disabled
  9400.  
  9401. 2017-05-11T02:35:53Z DEBUG stderr=
  9402. 2017-05-11T02:35:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9403. 2017-05-11T02:35:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9404. 2017-05-11T02:35:53Z DEBUG Starting external process
  9405. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl disable ipa-custodia.service
  9406. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9407. 2017-05-11T02:35:53Z DEBUG stdout=
  9408. 2017-05-11T02:35:53Z DEBUG stderr=
  9409. 2017-05-11T02:35:53Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9410. 2017-05-11T02:35:53Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0xa5502d8>
  9411. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9412. 2017-05-11T02:35:53Z DEBUG Done configuring ipa-custodia.
  9413. 2017-05-11T02:35:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state'
  9414. 2017-05-11T02:35:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysupgrade/sysupgrade.state'
  9415. 2017-05-11T02:35:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9416. 2017-05-11T02:35:53Z DEBUG Configuring the web interface (httpd). Estimated time: 1 minute
  9417. 2017-05-11T02:35:53Z DEBUG [1/21]: setting mod_nss port to 443
  9418. 2017-05-11T02:35:53Z DEBUG Backing up system configuration file '/etc/httpd/conf.d/nss.conf'
  9419. 2017-05-11T02:35:53Z DEBUG Saving Index File to '/var/lib/ipa/sysrestore/sysrestore.index'
  9420. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9421. 2017-05-11T02:35:53Z DEBUG [2/21]: setting mod_nss cipher suite
  9422. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9423. 2017-05-11T02:35:53Z DEBUG [3/21]: setting mod_nss protocol list to TLSv1.0 - TLSv1.2
  9424. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9425. 2017-05-11T02:35:53Z DEBUG [4/21]: setting mod_nss password file
  9426. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9427. 2017-05-11T02:35:53Z DEBUG [5/21]: enabling mod_nss renegotiate
  9428. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9429. 2017-05-11T02:35:53Z DEBUG [6/21]: adding URL rewriting rules
  9430. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9431. 2017-05-11T02:35:53Z DEBUG [7/21]: configuring httpd
  9432. 2017-05-11T02:35:53Z DEBUG Starting external process
  9433. 2017-05-11T02:35:53Z DEBUG args=/usr/sbin/selinuxenabled
  9434. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9435. 2017-05-11T02:35:53Z DEBUG stdout=
  9436. 2017-05-11T02:35:53Z DEBUG stderr=
  9437. 2017-05-11T02:35:53Z DEBUG Starting external process
  9438. 2017-05-11T02:35:53Z DEBUG args=/sbin/restorecon /etc/systemd/system/httpd.service.d/ipa.conf
  9439. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9440. 2017-05-11T02:35:53Z DEBUG stdout=
  9441. 2017-05-11T02:35:53Z DEBUG stderr=
  9442. 2017-05-11T02:35:53Z DEBUG Backing up system configuration file '/etc/httpd/conf.d/ipa.conf'
  9443. 2017-05-11T02:35:53Z DEBUG -> Not backing up - '/etc/httpd/conf.d/ipa.conf' doesn't exist
  9444. 2017-05-11T02:35:53Z DEBUG Backing up system configuration file '/etc/httpd/conf.d/ipa-rewrite.conf'
  9445. 2017-05-11T02:35:53Z DEBUG -> Not backing up - '/etc/httpd/conf.d/ipa-rewrite.conf' doesn't exist
  9446. 2017-05-11T02:35:53Z DEBUG duration: 0 seconds
  9447. 2017-05-11T02:35:53Z DEBUG [8/21]: configure certmonger for renewals
  9448. 2017-05-11T02:35:53Z DEBUG Starting external process
  9449. 2017-05-11T02:35:53Z DEBUG args=/bin/systemctl is-active certmonger.service
  9450. 2017-05-11T02:35:53Z DEBUG Process finished, return code=0
  9451. 2017-05-11T02:35:53Z DEBUG stdout=active
  9452.  
  9453. 2017-05-11T02:35:53Z DEBUG stderr=
  9454. 2017-05-11T02:35:53Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9455. 2017-05-11T02:35:53Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9456. 2017-05-11T02:35:54Z DEBUG duration: 0 seconds
  9457. 2017-05-11T02:35:54Z DEBUG [9/21]: setting up httpd keytab
  9458. 2017-05-11T02:35:54Z DEBUG Removing service keytab: /etc/httpd/conf/ipa.keytab
  9459. 2017-05-11T02:35:54Z DEBUG Starting external process
  9460. 2017-05-11T02:35:54Z DEBUG args=kadmin.local -q addprinc -randkey HTTP/[email protected] -x ipa-setup-override-restrictions
  9461. 2017-05-11T02:35:55Z DEBUG Process finished, return code=0
  9462. 2017-05-11T02:35:55Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  9463. Principal "HTTP/[email protected]" created.
  9464.  
  9465. 2017-05-11T02:35:55Z DEBUG stderr=WARNING: no policy specified for HTTP/[email protected]; defaulting to no policy
  9466.  
  9467. 2017-05-11T02:35:55Z DEBUG Starting external process
  9468. 2017-05-11T02:35:55Z DEBUG args=kadmin.local -q ktadd -k /etc/httpd/conf/ipa.keytab HTTP/[email protected] -x ipa-setup-override-restrictions
  9469. 2017-05-11T02:35:55Z DEBUG Process finished, return code=0
  9470. 2017-05-11T02:35:55Z DEBUG stdout=Authenticating as principal root/[email protected] with password.
  9471. Entry for principal HTTP/[email protected] with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9472. Entry for principal HTTP/[email protected] with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9473. Entry for principal HTTP/[email protected] with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9474. Entry for principal HTTP/[email protected] with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9475. Entry for principal HTTP/[email protected] with kvno 2, encryption type camellia128-cts-cmac added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9476. Entry for principal HTTP/[email protected] with kvno 2, encryption type camellia256-cts-cmac added to keytab WRFILE:/etc/httpd/conf/ipa.keytab.
  9477.  
  9478. 2017-05-11T02:35:55Z DEBUG stderr=
  9479. 2017-05-11T02:35:55Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9480. 2017-05-11T02:35:55Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0xa445128>
  9481. 2017-05-11T02:35:55Z DEBUG duration: 1 seconds
  9482. 2017-05-11T02:35:55Z DEBUG [10/21]: setting up ssl
  9483. 2017-05-11T02:35:55Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  9484. 2017-05-11T02:35:55Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  9485. 2017-05-11T02:35:55Z DEBUG Starting external process
  9486. 2017-05-11T02:35:55Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -R -s CN=ipa.rdlg.net,O=RDLG.NET -o /var/lib/ipa/ipa-m3fgLc/tmpcertreq -k rsa -g 2048 -z /etc/httpd/alias/noise.txt -f /etc/httpd/alias/pwdfile.txt -a
  9487. 2017-05-11T02:35:55Z DEBUG Process finished, return code=0
  9488. 2017-05-11T02:35:55Z DEBUG stdout=
  9489. 2017-05-11T02:35:55Z DEBUG stderr=
  9490.  
  9491. Generating key. This may take a few moments...
  9492.  
  9493.  
  9494. 2017-05-11T02:35:55Z DEBUG request POST https://ipa.rdlg.net:8443/ca/ee/ca/profileSubmitSSLClient
  9495. 2017-05-11T02:35:55Z DEBUG request body 'profileId=caIPAserviceCert&requestor_name=IPA+Installer&cert_request=MIICbzCCAVcCAQAwKjERMA8GA1UEChMIUkRMRy5ORVQxFTATBgNVBAMTDGlwYS5y%0D%0AZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOf3CmynQVHo%0D%0AOeJWCxBxxd0s1UmNMflddGAW4R7VWzPAmVBFNdFE7nSbqFisUdVASoTmxQaM3A1D%0D%0A6Pzh1Pc95ld0maf7vJg2MV%2FUYu9ekUtpPeGl2hQyAzGT%2ByyslwKOJPdDK5lC7%2Bhy%0D%0AIH%2FJR3c%2FwO7r3JwHm%2Fj0RbURlPiVkUbYSPYf3XftjagyeLEeFBayl%2BtXh4uPrwQE%0D%0Atx64AyRkoWgrNwnvyYm7nVvh6ef6wKi%2Fe53GiZL5tkUDqmWWNvH0CMq%2FLxibRFje%0D%0Ak31hLjk7wsV5wFmzKlZVX7piY4ldc3Fjf%2BtoAk4RBSj8w0f4yHSe1NDE7L5qviHb%0D%0AbYt11wfz9b0CAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQAH1z8bOtgIub0uxaSV%0D%0AXVNrQpS0LGCHiX2stagaiAKcQ431tLVwrFOKA4DmS5HzSXKg6Rzo7xvwEYpq6FeZ%0D%0AflglrFvea%2FjUM8PI6lh90o4Cl7odtJANVxo2b1ix4xfsQjQoVtNH9JOqQTa%2BL3KO%0D%0AswIxJXctiHCz480g%2BA9q4%2FyYQdLdh9aP2PWBFMWkIfyIgweVNCxmCGmkcyZsq21G%0D%0A3mpPaV%2BXWpr%2BVkVScNaLmgUqnuBhOl7wkN3Qu5G%2BmHtfkrpChSskUeE6jpekXi8Z%0D%0AAq%2F2ez6uWkSCit9n33RJ4DlDjTradkjXmuOyYYrYUOAURmArpJSJScsPN0Hs3diK%0D%0A%2B96Z%0A&cert_request_type=pkcs10&xmlOutput=true'
  9496. 2017-05-11T02:35:55Z DEBUG NSSConnection init ipa.rdlg.net
  9497. 2017-05-11T02:35:55Z DEBUG Connecting: 172.20.0.200:0
  9498. 2017-05-11T02:35:55Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  9499. 2017-05-11T02:35:55Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  9500. 2017-05-11T02:35:55Z DEBUG handshake complete, peer = 172.20.0.200:8443
  9501. 2017-05-11T02:35:55Z DEBUG Protocol: TLS1.2
  9502. 2017-05-11T02:35:55Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  9503. 2017-05-11T02:35:55Z DEBUG response status 200
  9504. 2017-05-11T02:35:55Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:35:55 GMT', 'content-length': '1599', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  9505. 2017-05-11T02:35:55Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><Status>0</Status><Requests><Request><Id>9</Id><SubjectDN>CN=ipa.rdlg.net,O=RDLG.NET</SubjectDN><serialno>9</serialno><b64>MIID/jCCAuagAwIBAgIBCTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExHLk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAyMzU1NVoXDTE5MDUxMjAyMzU1NVowKjERMA8GA1UECgwIUkRMRy5ORVQxFTATBgNVBAMMDGlwYS5yZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOf3CmynQVHoOeJWCxBxxd0s1UmNMflddGAW4R7VWzPAmVBFNdFE7nSbqFisUdVASoTmxQaM3A1D6Pzh1Pc95ld0maf7vJg2MV/UYu9ekUtpPeGl2hQyAzGT+yyslwKOJPdDK5lC7+hyIH/JR3c/wO7r3JwHm/j0RbURlPiVkUbYSPYf3XftjagyeLEeFBayl+tXh4uPrwQEtx64AyRkoWgrNwnvyYm7nVvh6ef6wKi/e53GiZL5tkUDqmWWNvH0CMq/LxibRFjek31hLjk7wsV5wFmzKlZVX7piY4ldc3Fjf+toAk4RBSj8w0f4yHSe1NDE7L5qviHbbYt11wfz9b0CAwEAAaOCASQwggEgMB8GA1UdIwQYMBaAFMoUcnP4TmDj4h+ZfLwirZhDNd7zMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5yZGxnLm5ldC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5yZGxnLm5ldC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCgX5aGyq1OOdV+Xm5P02A4icX0hMA0GCSqGSIb3DQEBCwUAA4IBAQCfMmA1pH82o8TTDmpMU0wYXm7/2IyLq54ZidGTa1pBQC57W9hTb2KkG2SjQutUmLLB21b88mXIbNSbvJpgSFlTpbaf2l+hRb3AQFdj3PTdHAOfC+/z5nPZwpf2PXfMKhfNSGZF3ACimY2HhcKOm/26oabERoVJzSFr5yTGI+HvARKc0IZ+cMP9tpGU+nTov3NsKq9SEg7gboJ81Zpo8ohFc67ZJqVFIytBowP0Gex1AS7xFU5zYJNTWtjF31XK9ejzY4mxfnR4JS+XMLO9N2819kNHUTuXuXsWYeUf5cInXHTjaDN+vIYV+5vv36TCzqibKMEOYPtsGDbpeM2QrSoT</b64></Request></Requests></XMLResponse>'
  9506. 2017-05-11T02:35:55Z DEBUG Starting external process
  9507. 2017-05-11T02:35:55Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -A -n Server-Cert -t u,u,u -i /var/lib/ipa/ipa-m3fgLc/tmpcert.der -f /etc/httpd/alias/pwdfile.txt
  9508. 2017-05-11T02:35:56Z DEBUG Process finished, return code=0
  9509. 2017-05-11T02:35:56Z DEBUG stdout=
  9510. 2017-05-11T02:35:56Z DEBUG stderr=Notice: Trust flag u is set automatically if the private key is present.
  9511.  
  9512. 2017-05-11T02:35:56Z DEBUG Starting external process
  9513. 2017-05-11T02:35:56Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -n Server-Cert -a
  9514. 2017-05-11T02:35:56Z DEBUG Process finished, return code=0
  9515. 2017-05-11T02:35:56Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  9516. MIID/jCCAuagAwIBAgIBCTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  9517. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  9518. MzU1NVoXDTE5MDUxMjAyMzU1NVowKjERMA8GA1UECgwIUkRMRy5ORVQxFTATBgNV
  9519. BAMMDGlwYS5yZGxnLm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
  9520. AOf3CmynQVHoOeJWCxBxxd0s1UmNMflddGAW4R7VWzPAmVBFNdFE7nSbqFisUdVA
  9521. SoTmxQaM3A1D6Pzh1Pc95ld0maf7vJg2MV/UYu9ekUtpPeGl2hQyAzGT+yyslwKO
  9522. JPdDK5lC7+hyIH/JR3c/wO7r3JwHm/j0RbURlPiVkUbYSPYf3XftjagyeLEeFBay
  9523. l+tXh4uPrwQEtx64AyRkoWgrNwnvyYm7nVvh6ef6wKi/e53GiZL5tkUDqmWWNvH0
  9524. CMq/LxibRFjek31hLjk7wsV5wFmzKlZVX7piY4ldc3Fjf+toAk4RBSj8w0f4yHSe
  9525. 1NDE7L5qviHbbYt11wfz9b0CAwEAAaOCASQwggEgMB8GA1UdIwQYMBaAFMoUcnP4
  9526. TmDj4h+ZfLwirZhDNd7zMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0
  9527. cDovL2lwYS1jYS5yZGxnLm5ldC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNV
  9528. HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0
  9529. cDovL2lwYS1jYS5yZGxnLm5ldC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAx
  9530. DjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkw
  9531. HQYDVR0OBBYEFCgX5aGyq1OOdV+Xm5P02A4icX0hMA0GCSqGSIb3DQEBCwUAA4IB
  9532. AQCfMmA1pH82o8TTDmpMU0wYXm7/2IyLq54ZidGTa1pBQC57W9hTb2KkG2SjQutU
  9533. mLLB21b88mXIbNSbvJpgSFlTpbaf2l+hRb3AQFdj3PTdHAOfC+/z5nPZwpf2PXfM
  9534. KhfNSGZF3ACimY2HhcKOm/26oabERoVJzSFr5yTGI+HvARKc0IZ+cMP9tpGU+nTo
  9535. v3NsKq9SEg7gboJ81Zpo8ohFc67ZJqVFIytBowP0Gex1AS7xFU5zYJNTWtjF31XK
  9536. 9ejzY4mxfnR4JS+XMLO9N2819kNHUTuXuXsWYeUf5cInXHTjaDN+vIYV+5vv36TC
  9537. zqibKMEOYPtsGDbpeM2QrSoT
  9538. -----END CERTIFICATE-----
  9539.  
  9540. 2017-05-11T02:35:56Z DEBUG stderr=
  9541. 2017-05-11T02:35:56Z DEBUG Starting external process
  9542. 2017-05-11T02:35:56Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -R -s CN=Object Signing Cert,O=RDLG.NET -o /var/lib/ipa/ipa-m3fgLc/tmpcertreq -k rsa -g 2048 -z /etc/httpd/alias/noise.txt -f /etc/httpd/alias/pwdfile.txt -a
  9543. 2017-05-11T02:35:56Z DEBUG Process finished, return code=0
  9544. 2017-05-11T02:35:56Z DEBUG stdout=
  9545. 2017-05-11T02:35:56Z DEBUG stderr=
  9546.  
  9547. Generating key. This may take a few moments...
  9548.  
  9549.  
  9550. 2017-05-11T02:35:56Z DEBUG request POST https://ipa.rdlg.net:8443/ca/ee/ca/profileSubmitSSLClient
  9551. 2017-05-11T02:35:56Z DEBUG request body 'profileId=caJarSigningCert&requestor_name=IPA+Installer&cert_request=MIICdjCCAV4CAQAwMTERMA8GA1UEChMIUkRMRy5ORVQxHDAaBgNVBAMTE09iamVj%0D%0AdCBTaWduaW5nIENlcnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDw%0D%0AI5AOZ7FB%2FOYj9K4zfAohWZQINCBQlOIRva5Zv07d%2F7rhbefmeCXh0bL7es5tUOHp%0D%0AkCiY7C3ql9m%2Fyjxeys3YC%2FHBTSz%2B0KH8ZMEPszRFqj07x9bR0kwFFwBRz4nA5v4a%0D%0Aa%2B6zVLXdiG9rBG3dF7YwfXInQ3P1y32ldrDo1lPOnr7Byl9PWZrNQlKHQjXZN8qv%0D%0AM7xHcZQWSahyd0gOLGaoyGDt0opLXi49aWLePWGhJkBRtTXcZy9elBBaFZFXz4io%0D%0AqcWXyGXbQTZYVci9Vz1Sa0t7XzlLVEbu3ssom88W8eET%2FXjvJs5vAGB%2BBympU8Zr%0D%0AIc4afra7vN8NknUDRqE3AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAKxJFWbYR%0D%0AqGCP5%2BlxjyCZa7u6yiGmi0lMioP94HpKLnmL9Gi1%2F9s7q6iAq1LT8C6CH68pV22d%0D%0AqPDjsKpM6qpX%2BwybZi4mfMQNaLuj%2Fm2I%2FLA%2BGWP2vvSGPgAU76vXIGMUOSTdx9t1%0D%0AEwy9HgoRGUTf%2F5G%2BnkFoie%2Bn59kyn8WZSMVN%2BJcuFDyw1gZ21OG%2FuIbpo4fkQuBB%0D%0ATbByaP9lwWfxNjttlcMmOr2pGchZcPVu4QTlnJHfPi6N2DMcaxm%2BzO58uq6pFK4G%0D%0AJXCsK93RmVnj%2B3e1KANBPtUgF%2B6Mo6qxBWXby0n%2FIP7Se9M4jsZSinDsSmPl0u07%0D%0Aos7reNmMu3pPoQ%3D%3D%0A&cert_request_type=pkcs10&xmlOutput=true'
  9552. 2017-05-11T02:35:56Z DEBUG NSSConnection init ipa.rdlg.net
  9553. 2017-05-11T02:35:56Z DEBUG Connecting: 172.20.0.200:0
  9554. 2017-05-11T02:35:56Z DEBUG approved_usage = SSL Server intended_usage = SSL Server
  9555. 2017-05-11T02:35:56Z DEBUG cert valid True for "CN=ipa.rdlg.net,O=RDLG.NET"
  9556. 2017-05-11T02:35:56Z DEBUG handshake complete, peer = 172.20.0.200:8443
  9557. 2017-05-11T02:35:56Z DEBUG Protocol: TLS1.2
  9558. 2017-05-11T02:35:56Z DEBUG Cipher: TLS_RSA_WITH_AES_256_CBC_SHA
  9559. 2017-05-11T02:35:56Z DEBUG response status 200
  9560. 2017-05-11T02:35:56Z DEBUG response headers {'date': 'Thu, 11 May 2017 02:35:55 GMT', 'content-length': '1275', 'content-type': 'application/xml', 'server': 'Apache-Coyote/1.1'}
  9561. 2017-05-11T02:35:56Z DEBUG response body '<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><Status>0</Status><Requests><Request><Id>10</Id><SubjectDN>CN=Object Signing Cert,O=RDLG.NET</SubjectDN><serialno>a</serialno><b64>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</b64></Request></Requests></XMLResponse>'
  9562. 2017-05-11T02:35:56Z DEBUG Starting external process
  9563. 2017-05-11T02:35:56Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -A -n Signing-Cert -t u,u,u -i /var/lib/ipa/ipa-m3fgLc/tmpcert.der -f /etc/httpd/alias/pwdfile.txt
  9564. 2017-05-11T02:35:56Z DEBUG Process finished, return code=0
  9565. 2017-05-11T02:35:56Z DEBUG stdout=
  9566. 2017-05-11T02:35:56Z DEBUG stderr=Notice: Trust flag u is set automatically if the private key is present.
  9567.  
  9568. 2017-05-11T02:35:56Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket from SchemaCache
  9569. 2017-05-11T02:35:56Z DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-RDLG-NET.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x2252560>
  9570. 2017-05-11T02:35:57Z DEBUG Starting external process
  9571. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L
  9572. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9573. 2017-05-11T02:35:57Z DEBUG stdout=
  9574. Certificate Nickname Trust Attributes
  9575. SSL,S/MIME,JAR/XPI
  9576.  
  9577. Signing-Cert u,u,u
  9578. RDLG.NET IPA CA CT,C,C
  9579. ipaCert u,u,u
  9580. Server-Cert u,u,u
  9581.  
  9582. 2017-05-11T02:35:57Z DEBUG stderr=
  9583. 2017-05-11T02:35:57Z DEBUG Starting external process
  9584. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -O -n Signing-Cert
  9585. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9586. 2017-05-11T02:35:57Z DEBUG stdout="RDLG.NET IPA CA" [CN=Certificate Authority,O=RDLG.NET]
  9587.  
  9588. "Signing-Cert" [CN=Object Signing Cert,O=RDLG.NET]
  9589.  
  9590.  
  9591. 2017-05-11T02:35:57Z DEBUG stderr=
  9592. 2017-05-11T02:35:57Z DEBUG Starting external process
  9593. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -n RDLG.NET IPA CA -a
  9594. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9595. 2017-05-11T02:35:57Z DEBUG stdout=-----BEGIN CERTIFICATE-----
  9596. MIIDgjCCAmqgAwIBAgIBATANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhSRExH
  9597. Lk5FVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTE3MDUxMTAy
  9598. Mjk1NloXDTM3MDUxMTAyMjk1NlowMzERMA8GA1UECgwIUkRMRy5ORVQxHjAcBgNV
  9599. BAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  9600. ADCCAQoCggEBAL7p94qOWxiCMRT+Engmh3SKl6MFWOgXWnYfZYd8DikRR+Lhstl0
  9601. LYHb9OEbJW7VjhHu6TYfAyunXx1i/FWbDQy+5H/qWUZDUPNeg6D7HsJOnWjEpWsf
  9602. 0Y8IR4dqb0nsbvscGZOY6IfxWBvTcoUpb6fATZnjJYJEXKvbwk3Fnedb/yt3Xu4j
  9603. mPa59Ey0M43q2oRtgwZKyxn2Jjqkoze27Q6sdvCeHOlFy3kX5tzoTtmQ1moZlkYY
  9604. a5crBdiZjG+PIv3VocYU2RzA4/r08Cs173Qpe1TLou/4zJ4Ru7qq1gbWHIN0ZDXB
  9605. eO/CGO4iutUTzFZmrKh/eGr5l1EAXEQry+0CAwEAAaOBoDCBnTAfBgNVHSMEGDAW
  9606. gBTKFHJz+E5g4+IfmXy8Iq2YQzXe8zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB
  9607. /wQEAwIBxjAdBgNVHQ4EFgQUyhRyc/hOYOPiH5l8vCKtmEM13vMwOgYIKwYBBQUH
  9608. AQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLnJkbGcubmV0L2NhL29j
  9609. c3AwDQYJKoZIhvcNAQELBQADggEBAAe2GwBcMyjzUn24OAMxBSDmJTr49ByS4+zu
  9610. 7Y7gXVuS5lvMOm+DaM9UZXkQtvPwB3XtOrhX0USUhq1uhDuh2bYfkxKekGPWYyo0
  9611. 1jDpvBp8IQaD9tcAJcc+KcAmdN2hV5r372xhWosMlT+gkqNm1tpQ15kzrHJHgGRy
  9612. 243aRtXVr1RdTCNOm7Qplj5+xXtFyElcSFkrsqvoQrKnp0GY81zw6OmdQaC4GYAv
  9613. uZazc5OlNNpGLDYtN5iT4VR4fIdYkfi174VtNlR1O9ZGZ+on863r9CTUhHmnzz5I
  9614. /EfCR4uOA6jCe2XbGJMVhdZzMFWKH1ddo6WHyuzBQANOuqlAt5E=
  9615. -----END CERTIFICATE-----
  9616.  
  9617. 2017-05-11T02:35:57Z DEBUG stderr=
  9618. 2017-05-11T02:35:57Z DEBUG Starting external process
  9619. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/selinuxenabled
  9620. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9621. 2017-05-11T02:35:57Z DEBUG stdout=
  9622. 2017-05-11T02:35:57Z DEBUG stderr=
  9623. 2017-05-11T02:35:57Z DEBUG Starting external process
  9624. 2017-05-11T02:35:57Z DEBUG args=/sbin/restorecon /etc/httpd/alias/cert8.db
  9625. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9626. 2017-05-11T02:35:57Z DEBUG stdout=
  9627. 2017-05-11T02:35:57Z DEBUG stderr=
  9628. 2017-05-11T02:35:57Z DEBUG Starting external process
  9629. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/selinuxenabled
  9630. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9631. 2017-05-11T02:35:57Z DEBUG stdout=
  9632. 2017-05-11T02:35:57Z DEBUG stderr=
  9633. 2017-05-11T02:35:57Z DEBUG Starting external process
  9634. 2017-05-11T02:35:57Z DEBUG args=/sbin/restorecon /etc/httpd/alias/key3.db
  9635. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9636. 2017-05-11T02:35:57Z DEBUG stdout=
  9637. 2017-05-11T02:35:57Z DEBUG stderr=
  9638. 2017-05-11T02:35:57Z DEBUG duration: 1 seconds
  9639. 2017-05-11T02:35:57Z DEBUG [11/21]: importing CA certificates from LDAP
  9640. 2017-05-11T02:35:57Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  9641. 2017-05-11T02:35:57Z DEBUG Starting external process
  9642. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -A -n RDLG.NET IPA CA -t CT,C,C
  9643. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9644. 2017-05-11T02:35:57Z DEBUG stdout=
  9645. 2017-05-11T02:35:57Z DEBUG stderr=
  9646. 2017-05-11T02:35:57Z DEBUG duration: 0 seconds
  9647. 2017-05-11T02:35:57Z DEBUG [12/21]: setting up browser autoconfig
  9648. 2017-05-11T02:35:57Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  9649. 2017-05-11T02:35:57Z DEBUG Starting external process
  9650. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L
  9651. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9652. 2017-05-11T02:35:57Z DEBUG stdout=
  9653. Certificate Nickname Trust Attributes
  9654. SSL,S/MIME,JAR/XPI
  9655.  
  9656. Signing-Cert u,u,u
  9657. ipaCert u,u,u
  9658. Server-Cert u,u,u
  9659. RDLG.NET IPA CA CT,C,C
  9660.  
  9661. 2017-05-11T02:35:57Z DEBUG stderr=
  9662. 2017-05-11T02:35:57Z DEBUG Starting external process
  9663. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/signtool -d /etc/httpd/alias -p 2320ee37e45f78b95550 -k Signing-Cert -p 2320ee37e45f78b95550 -X -Z /usr/share/ipa/html/kerberosauth.xpi /tmp/tmp-ObzLQE/ext
  9664. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9665. 2017-05-11T02:35:57Z DEBUG stdout=Generating /tmp/tmp-ObzLQE/ext/META-INF/manifest.mf file..
  9666. --> bootstrap.js
  9667. --> chrome/content/kerberosauth.js
  9668. --> chrome/content/kerberosauth_overlay.xul
  9669. --> chrome.manifest
  9670. --> install.rdf
  9671. --> locale/en-US/kerberosauth.properties
  9672. Generating zigbert.sf file..
  9673. Creating XPI Compatible Archive
  9674. adding /tmp/tmp-ObzLQE/ext/META-INF/zigbert.rsa to /usr/share/ipa/html/kerberosauth.xpi...(deflated 11%)
  9675. --> bootstrap.js
  9676. adding /tmp/tmp-ObzLQE/ext/bootstrap.js to /usr/share/ipa/html/kerberosauth.xpi...(deflated 67%)
  9677. --> chrome/content/kerberosauth.js
  9678. adding /tmp/tmp-ObzLQE/ext/chrome/content/kerberosauth.js to /usr/share/ipa/html/kerberosauth.xpi...(deflated 66%)
  9679. --> chrome/content/kerberosauth_overlay.xul
  9680. adding /tmp/tmp-ObzLQE/ext/chrome/content/kerberosauth_overlay.xul to /usr/share/ipa/html/kerberosauth.xpi...(deflated 34%)
  9681. --> chrome.manifest
  9682. adding /tmp/tmp-ObzLQE/ext/chrome.manifest to /usr/share/ipa/html/kerberosauth.xpi...(deflated 51%)
  9683. --> install.rdf
  9684. adding /tmp/tmp-ObzLQE/ext/install.rdf to /usr/share/ipa/html/kerberosauth.xpi...(deflated 55%)
  9685. --> locale/en-US/kerberosauth.properties
  9686. adding /tmp/tmp-ObzLQE/ext/locale/en-US/kerberosauth.properties to /usr/share/ipa/html/kerberosauth.xpi...(deflated 36%)
  9687. adding /tmp/tmp-ObzLQE/ext/META-INF/manifest.mf to /usr/share/ipa/html/kerberosauth.xpi...(deflated 47%)
  9688. adding /tmp/tmp-ObzLQE/ext/META-INF/zigbert.sf to /usr/share/ipa/html/kerberosauth.xpi...(deflated 48%)
  9689. tree "/tmp/tmp-ObzLQE/ext" signed successfully
  9690.  
  9691. 2017-05-11T02:35:57Z DEBUG stderr=warning: password (-p) option specified more than once.
  9692. Only last specification will be used.
  9693.  
  9694. 2017-05-11T02:35:57Z DEBUG duration: 0 seconds
  9695. 2017-05-11T02:35:57Z DEBUG [13/21]: publish CA cert
  9696. 2017-05-11T02:35:57Z DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
  9697. 2017-05-11T02:35:57Z DEBUG duration: 0 seconds
  9698. 2017-05-11T02:35:57Z DEBUG [14/21]: clean up any existing httpd ccache
  9699. 2017-05-11T02:35:57Z DEBUG Starting external process
  9700. 2017-05-11T02:35:57Z DEBUG args=/usr/bin/kdestroy -A
  9701. 2017-05-11T02:35:57Z DEBUG runas=apache (UID 48, GID 48)
  9702. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9703. 2017-05-11T02:35:57Z DEBUG stdout=
  9704. 2017-05-11T02:35:57Z DEBUG stderr=
  9705. 2017-05-11T02:35:57Z DEBUG duration: 0 seconds
  9706. 2017-05-11T02:35:57Z DEBUG [15/21]: configuring SELinux for httpd
  9707. 2017-05-11T02:35:57Z DEBUG Starting external process
  9708. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/selinuxenabled
  9709. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9710. 2017-05-11T02:35:57Z DEBUG stdout=
  9711. 2017-05-11T02:35:57Z DEBUG stderr=
  9712. 2017-05-11T02:35:57Z DEBUG Starting external process
  9713. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/getsebool httpd_can_network_connect
  9714. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9715. 2017-05-11T02:35:57Z DEBUG stdout=httpd_can_network_connect --> off
  9716.  
  9717. 2017-05-11T02:35:57Z DEBUG stderr=
  9718. 2017-05-11T02:35:57Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9719. 2017-05-11T02:35:57Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9720. 2017-05-11T02:35:57Z DEBUG Starting external process
  9721. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/getsebool httpd_run_ipa
  9722. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9723. 2017-05-11T02:35:57Z DEBUG stdout=httpd_run_ipa --> off
  9724.  
  9725. 2017-05-11T02:35:57Z DEBUG stderr=
  9726. 2017-05-11T02:35:57Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9727. 2017-05-11T02:35:57Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9728. 2017-05-11T02:35:57Z DEBUG Starting external process
  9729. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/getsebool httpd_manage_ipa
  9730. 2017-05-11T02:35:57Z DEBUG Process finished, return code=0
  9731. 2017-05-11T02:35:57Z DEBUG stdout=httpd_manage_ipa --> off
  9732.  
  9733. 2017-05-11T02:35:57Z DEBUG stderr=
  9734. 2017-05-11T02:35:57Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9735. 2017-05-11T02:35:57Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9736. 2017-05-11T02:35:57Z DEBUG Starting external process
  9737. 2017-05-11T02:35:57Z DEBUG args=/usr/sbin/setsebool -P httpd_can_network_connect=on httpd_run_ipa=on httpd_manage_ipa=on
  9738. 2017-05-11T02:35:59Z DEBUG Process finished, return code=0
  9739. 2017-05-11T02:35:59Z DEBUG stdout=
  9740. 2017-05-11T02:35:59Z DEBUG stderr=
  9741. 2017-05-11T02:35:59Z DEBUG duration: 1 seconds
  9742. 2017-05-11T02:35:59Z DEBUG [16/21]: create KDC proxy user
  9743. 2017-05-11T02:35:59Z DEBUG Adding group kdcproxy
  9744. 2017-05-11T02:35:59Z DEBUG Starting external process
  9745. 2017-05-11T02:35:59Z DEBUG args=/usr/sbin/groupadd -r kdcproxy
  9746. 2017-05-11T02:36:00Z DEBUG Process finished, return code=0
  9747. 2017-05-11T02:36:00Z DEBUG stdout=
  9748. 2017-05-11T02:36:00Z DEBUG stderr=
  9749. 2017-05-11T02:36:00Z DEBUG Done adding group
  9750. 2017-05-11T02:36:00Z DEBUG Adding user kdcproxy
  9751. 2017-05-11T02:36:00Z DEBUG Starting external process
  9752. 2017-05-11T02:36:00Z DEBUG args=/usr/sbin/useradd -g kdcproxy -d /var/lib/kdcproxy -s /sbin/nologin -r kdcproxy -c IPA KDC Proxy User -m
  9753. 2017-05-11T02:36:00Z DEBUG Process finished, return code=0
  9754. 2017-05-11T02:36:00Z DEBUG stdout=
  9755. 2017-05-11T02:36:00Z DEBUG stderr=
  9756. 2017-05-11T02:36:00Z DEBUG Done adding user
  9757. 2017-05-11T02:36:00Z DEBUG duration: 1 seconds
  9758. 2017-05-11T02:36:00Z DEBUG [17/21]: create KDC proxy config
  9759. 2017-05-11T02:36:00Z DEBUG Backing up system configuration file '/etc/ipa/kdcproxy/ipa-kdc-proxy.conf'
  9760. 2017-05-11T02:36:00Z DEBUG -> Not backing up - '/etc/ipa/kdcproxy/ipa-kdc-proxy.conf' doesn't exist
  9761. 2017-05-11T02:36:00Z DEBUG duration: 0 seconds
  9762. 2017-05-11T02:36:00Z DEBUG [18/21]: enable KDC proxy
  9763. 2017-05-11T02:36:00Z DEBUG service KDCPROXY enabled
  9764. 2017-05-11T02:36:00Z DEBUG duration: 0 seconds
  9765. 2017-05-11T02:36:00Z DEBUG [19/21]: restarting httpd
  9766. 2017-05-11T02:36:00Z DEBUG Starting external process
  9767. 2017-05-11T02:36:00Z DEBUG args=/bin/systemctl is-active httpd.service
  9768. 2017-05-11T02:36:00Z DEBUG Process finished, return code=3
  9769. 2017-05-11T02:36:00Z DEBUG stdout=unknown
  9770.  
  9771. 2017-05-11T02:36:00Z DEBUG stderr=
  9772. 2017-05-11T02:36:00Z DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
  9773. 2017-05-11T02:36:00Z DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state'
  9774. 2017-05-11T02:36:00Z DEBUG Starting external process
  9775. 2017-05-11T02:36:00Z DEBUG args=/bin/systemctl restart httpd.service
  9776. 2017-05-11T02:36:00Z DEBUG Process finished, return code=1
  9777. 2017-05-11T02:36:00Z DEBUG stdout=
  9778. 2017-05-11T02:36:00Z DEBUG stderr=Job for httpd.service failed because the control process exited with error code. See "systemctl status httpd.service" and "journalctl -xe" for details.
  9779.  
  9780. 2017-05-11T02:36:01Z DEBUG Traceback (most recent call last):
  9781. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 449, in start_creation
  9782. run_step(full_msg, method)
  9783. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 439, in run_step
  9784. method()
  9785. File "/usr/lib/python2.7/site-packages/ipaserver/install/httpinstance.py", line 193, in __start
  9786. self.restart()
  9787. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 349, in restart
  9788. self.service.restart(instance_name, capture_output=capture_output, wait=wait)
  9789. File "/usr/lib/python2.7/site-packages/ipaplatform/base/services.py", line 301, in restart
  9790. skip_output=not capture_output)
  9791. File "/usr/lib/python2.7/site-packages/ipapython/ipautil.py", line 494, in run
  9792. raise CalledProcessError(p.returncode, arg_string, str(output))
  9793. CalledProcessError: Command '/bin/systemctl restart httpd.service' returned non-zero exit status 1
  9794.  
  9795. 2017-05-11T02:36:01Z DEBUG [error] CalledProcessError: Command '/bin/systemctl restart httpd.service' returned non-zero exit status 1
  9796. 2017-05-11T02:36:01Z DEBUG File "/usr/lib/python2.7/site-packages/ipapython/admintool.py", line 171, in execute
  9797. return_value = self.run()
  9798. File "/usr/lib/python2.7/site-packages/ipapython/install/cli.py", line 318, in run
  9799. cfgr.run()
  9800. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 310, in run
  9801. self.execute()
  9802. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 332, in execute
  9803. for nothing in self._executor():
  9804. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 372, in __runner
  9805. self._handle_exception(exc_info)
  9806. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 394, in _handle_exception
  9807. six.reraise(*exc_info)
  9808. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 362, in __runner
  9809. step()
  9810. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 359, in <lambda>
  9811. step = lambda: next(self.__gen)
  9812. File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 81, in run_generator_with_yield_from
  9813. six.reraise(*exc_info)
  9814. File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 59, in run_generator_with_yield_from
  9815. value = gen.send(prev_value)
  9816. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 586, in _configure
  9817. next(executor)
  9818. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 372, in __runner
  9819. self._handle_exception(exc_info)
  9820. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 449, in _handle_exception
  9821. self.__parent._handle_exception(exc_info)
  9822. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 394, in _handle_exception
  9823. six.reraise(*exc_info)
  9824. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 446, in _handle_exception
  9825. super(ComponentBase, self)._handle_exception(exc_info)
  9826. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 394, in _handle_exception
  9827. six.reraise(*exc_info)
  9828. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 362, in __runner
  9829. step()
  9830. File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 359, in <lambda>
  9831. step = lambda: next(self.__gen)
  9832. File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 81, in run_generator_with_yield_from
  9833. six.reraise(*exc_info)
  9834. File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 59, in run_generator_with_yield_from
  9835. value = gen.send(prev_value)
  9836. File "/usr/lib/python2.7/site-packages/ipapython/install/common.py", line 63, in _install
  9837. for nothing in self._installer(self.parent):
  9838. File "/usr/lib/python2.7/site-packages/ipaserver/install/server/install.py", line 1357, in main
  9839. install(self)
  9840. File "/usr/lib/python2.7/site-packages/ipaserver/install/server/install.py", line 267, in decorated
  9841. func(installer)
  9842. File "/usr/lib/python2.7/site-packages/ipaserver/install/server/install.py", line 830, in install
  9843. ca_is_configured=setup_ca)
  9844. File "/usr/lib/python2.7/site-packages/ipaserver/install/httpinstance.py", line 189, in create_instance
  9845. self.start_creation(runtime=60)
  9846. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 449, in start_creation
  9847. run_step(full_msg, method)
  9848. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 439, in run_step
  9849. method()
  9850. File "/usr/lib/python2.7/site-packages/ipaserver/install/httpinstance.py", line 193, in __start
  9851. self.restart()
  9852. File "/usr/lib/python2.7/site-packages/ipaserver/install/service.py", line 349, in restart
  9853. self.service.restart(instance_name, capture_output=capture_output, wait=wait)
  9854. File "/usr/lib/python2.7/site-packages/ipaplatform/base/services.py", line 301, in restart
  9855. skip_output=not capture_output)
  9856. File "/usr/lib/python2.7/site-packages/ipapython/ipautil.py", line 494, in run
  9857. raise CalledProcessError(p.returncode, arg_string, str(output))
  9858.  
  9859. 2017-05-11T02:36:01Z DEBUG The ipa-server-install command failed, exception: CalledProcessError: Command '/bin/systemctl restart httpd.service' returned non-zero exit status 1
  9860. 2017-05-11T02:36:01Z ERROR Command '/bin/systemctl restart httpd.service' returned non-zero exit status 1
  9861. 2017-05-11T02:36:01Z ERROR The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information
Add Comment
Please, Sign In to add comment