[Freeipa-users] certificate list problems using web ui after upgrading to FreeIPA 4.2.0-15 SOLVED
Marco Antonio Carcano
mc at carcano.ch
Sat Oct 8 13:00:11 UTC 2016
Thank you Fraser,
it solved - despite the error about replacing Jettison with Jackson
pki-server-upgrade
Upgrading from version 10.1.99 to 10.2.0:
1. Move web application context file (Yes/No) [Y]: Y
2. Replace Jettison with Jackson (Yes/No) [Y]: Y
ERROR:
Failed upgrading pki-tomcat instance. Continue (Yes/No) [Y]? Y
3. Added RESTEasy client (Yes/No) [Y]: Y
4. Replace RESTEasy application class (Yes/No) [Y]: Y
5. Remove config path from web.xml (Yes/No) [Y]: Y
Upgrading from version 10.2.0 to 10.2.1:
1. Add TLS Range Support (Yes/No) [Y]: Y
Upgrading from version 10.2.1 to 10.2.2:
1. Add TLS Range Support (Yes/No) [Y]: Y
Upgrading from version 10.2.2 to 10.2.3:
1. Move Web application deployment locations (Yes/No) [Y]: Y
2. Enabled Web application auto deploy (Yes/No) [Y]: Y
3. Remove dependency on Jackson 2 (Yes/No) [Y]: Y
Upgrading from version 10.2.3 to 10.2.4:
1. Fix instance work folder ownership (Yes/No) [Y]: Y
2. Fix bindPWPrompt for internalDB (Yes/No) [Y]: Y
Upgrading from version 10.2.4 to 10.2.5:
1. Add missing OCSP Get Servlet Mapping to upgraded Dogtag 9 instances
(Yes/No) [Y]: Y
2. Fix nuxwdog listener class (Yes/No) [Y]: Y
Upgrading from version 10.2.5 to 10.2.5:
1. Add new KRA audit events (Yes/No) [Y]: Y
pki-tomcat instance:
Configuration version: 10.1.99
Last completed scriptlet: 1
pki-tomcat/ca subsystem:
Configuration version: 10.2.5
Upgrade incomplete.
Il 05/10/16 02:20, Fraser Tweedale ha scritto:
> On Thu, Sep 29, 2016 at 11:13:22PM +0200, Marco Antonio Carcano wrote:
>> Hi all,
>>
>> I’ve just upgraded from FreeIPA 4.1 to FreeIPA 4.2.0-15 on a CentOS 7
>> (7.2.1511) and I’m no more able to list certificates using the web ui
>>
>> when I go on “Authentication”, “Certificates” and chose “Certificates” I
>> got the following error
>>
>> Certificate operation cannot be completed: Unable to communicate with CMS
>> (Internal Server Error)
>>
>> and tomcat logs contain the following exception:
>>
>> Sep 29, 2016 4:54:35 PM org.apache.catalina.core.StandardWrapperValve invoke
>> SEVERE: Allocate exception for servlet Resteasy
>> java.lang.ClassNotFoundException:
>> com.netscape.ca.CertificateAuthorityApplication
>> at org.apache.catalina.loader.WebappClassLoader.loadClass(WebappClassLoader.java:1720)
>> at org.apache.catalina.loader.WebappClassLoader.loadClass(WebappClassLoader.java:1571)
>> at org.jboss.resteasy.spi.ResteasyDeployment.createApplication(ResteasyDeployment.java:28
>> at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.init(ServletContainerDispatcher.java:95)
>> at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.init(HttpServletDispatcher.java:36)
>> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>> at
>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
>> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>> at java.lang.reflect.Method.invoke(Method.java:606)
>> at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:277)
>> at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:274)
>> at java.security.AccessController.doPrivileged(Native Method)
>> at javax.security.auth.Subject.doAsPrivileged(Subject.java:536)
>> at
>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:309)
>> at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:169)
>> at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:123)
>> at org.apache.catalina.core.StandardWrapper.initServlet(StandardWrapper.java:1272)
>> at org.apache.catalina.core.StandardWrapper.loadServlet(StandardWrapper.java:1197)
>> at
>> org.apache.catalina.core.StandardWrapper.allocate(StandardWrapper.java:864)
>> at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:134)
>> at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122)
>> at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:501)
>> at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:171)
>> at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
>> at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
>> at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:40
>> at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1040)
>> at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:607)
>> at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:314)
>> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
>> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
>> at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
>> at java.lang.Thread.run(Thread.java:745)
>>
>> So it complains it cannot find class
>> com.netscape.ca.CertificateAuthorityApplication - that’s right
>>
>> The funny thing is that command line works like a charm
>>
>> pa caacl-find
>> ----------------
>> 1 CA ACL matched
>> ----------------
>> ACL name: hosts_services_caIPAserviceCert
>> Enabled: TRUE
>> Host category: all
>> Service category: all
>> Profiles: caIPAserviceCert
>> ----------------------------
>> Number of entries returned 1
>> ——————————————
>>
>> ipa cert-show
>> Serial number: 1
>> Certificate:
>> MIIDjzCCAnegAwIBAgIBATANBgkqhkiG9w0BAQsFADA2MRQwEgYDVQQKEwtJVEM0
>> VS5MT0NBTDEeMBwGA1UEAxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5
>> …
>> iI2rFqRTA+AF3xpqYBtOP+WwcBaue+OZ/GEsPOiyvcV1ZX6FWcKsmBf/T
>> t7A9
>> Subject: CN=Certificate Authority,O=ME.LOCAL
>> Issuer: CN=Certificate Authority,O=ME.LOCAL
>> Not Before: Tue Dec 02 08:05:42 2014 UTC
>> Not After: Sat Dec 02 08:05:42 2034 UTC
>> Fingerprint (MD5): 59:4c:bb:dc:6a:e2:ff:17:6c:34:3e:f4:7e:fa:69:2e
>> Fingerprint (SHA1):
>> 74:c1:b3:a1:a1:25:5c:02:e8:ef:c5:30:14:fd:f0:58:79:6d:60:33
>> Serial number (hex): 0x1
>> Serial number: 1
>>
>> By the way, the weird thing is that before migrating I added a replica node
>> (so a fresh installation of FreeIPA 4.2.0-15) and the replica works
>> perfectly, without this problem
>>
>> It seems to be a problem somehow related to the upgrade process
>>
>> How can I manage? Any suggestion? By the way, does anybody know which JAR
>> contains com.netscape.ca.CertificateAuthorityApplication? I suppose it was
>> /usr/share/java/pki/pki-ca.jar, but it contains only CertificateAuthority
>> class:
>>
>> jar tf /usr/share/java/pki/pki-ca.jar |grep "CertificateAuthority"
>> com/netscape/ca/CertificateAuthority.class
>>
>> Thanks
>>
>> Marco
>>
> As you guess, something went awry during the uprade process -
> specifically: the follow upgrade scriptlet was not executed for some
> reason:
>
> /usr/share/pki/server/upgrade/10.1.99/04-ReplaceRESTEasyApplicationClass
>
> Perhaps it was not the only one.
>
> Run `pki-server-upgrade' manually, as root, and see if that fixes
> it. If not, let us spend some time off-list examining the state of
> your PKI deployment and what needs to be done to fix it up.
>
> Cheers,
> Fraser
More information about the Freeipa-users
mailing list