Bug 1905919

Summary: ipa-server-upgrade fails with traceback "exception: KeyError: 'DOMAIN'"
Product: Red Hat Enterprise Linux 8 Reporter: Mohammad Rizwan <myusuf>
Component: ipaAssignee: Thomas Woerner <twoerner>
Status: CLOSED ERRATA QA Contact: ipa-qe <ipa-qe>
Severity: unspecified Docs Contact:
Priority: urgent    
Version: 8.4CC: abokovoy, ndehadra, pcech, rcritten, tscherf
Target Milestone: rcKeywords: Regression, Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ipa-4.9.0-0.5.rc3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 15:48:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1569011, 1902727    

Description Mohammad Rizwan 2020-12-09 10:41:18 UTC
Description of problem:
ipa-server-upgrade fails with traceback "exception: KeyError: 'DOMAIN'"

Version-Release number of selected component (if applicable):
ipa-server-4.9.0-0.3.rc2.module+el8.4.0+9015+e4c6695a.x86_64

How reproducible:
always

Steps to Reproduce:
1. Install ipa-server
2. Install latest ipa packages
3. run $ ipa-server-upgrade or check /var/log/ipaupgrade.log

Actual results:
ipa-server-upgrade fails

[root@master ~]# ipa-server-upgrade
Upgrading IPA:. Estimated time: 1 minute 30 seconds
  [1/11]: stopping directory server
  [2/11]: saving configuration
  [3/11]: disabling listeners
  [4/11]: enabling DS global lock
  [5/11]: disabling Schema Compat
  [6/11]: starting directory server
  [7/11]: updating schema
  [8/11]: upgrading server
  [9/11]: stopping directory server
  [10/11]: restoring configuration
  [11/11]: starting directory server
Done.
Update complete
Upgrading IPA services
Upgrading the configuration of the IPA services
Disabled p11-kit-proxy
[Verifying that root certificate is published]
[Migrate CRL publish directory]
CRL tree already moved
IPA server upgrade failed: Inspect /var/log/ipaupgrade.log and run command ipa-server-upgrade manually.
Unexpected error - see /var/log/ipaupgrade.log for details:
KeyError: 'DOMAIN'
The ipa-server-upgrade command failed. See /var/log/ipaupgrade.log for more information

Expected results:
ipa-upgrade success

Additional info:

Comment 1 Mohammad Rizwan 2020-12-09 11:03:27 UTC
It is observed when  upgrading the ipa packages from ipa-server-4.8.7-13 to ipa-server-4.9.0-0.3.rc2.module+el8.4.0+9015+e4c6695a.x86_64

Comment 2 Alexander Bokovoy 2020-12-09 11:36:09 UTC
Upstream PR: https://github.com/freeipa/freeipa/pull/5328

Comment 7 Nikhil Dehadrai 2020-12-17 12:32:06 UTC
Tested the bug on the basis of following observations using Nightly Compose for RC3:
IPA build: ipa-server-4.9.0-0.5.rc3.module+el8.4.0+9124+ced20601.x86_64
TestCompose: Nightly



Scenario: After Upgrade (RHEL83z > RHEL84-Nightly(rc3)):
--------------------------------------------------------
root@master /]# rpm -q ipa-server
ipa-server-4.9.0-0.5.rc3.module+el8.4.0+9124+ced20601.x86_64
[root@master /]# ipa-server-upgrade
Upgrading IPA:. Estimated time: 1 minute 30 seconds
  [1/11]: stopping directory server
  [2/11]: saving configuration
  [3/11]: disabling listeners
  [4/11]: enabling DS global lock
  [5/11]: disabling Schema Compat
  [6/11]: starting directory server
  [7/11]: updating schema
  [8/11]: upgrading server
  [9/11]: stopping directory server
  [10/11]: restoring configuration
  [11/11]: starting directory server
Done.
Update complete
Upgrading IPA services
Upgrading the configuration of the IPA services
Disabled p11-kit-proxy
[Verifying that root certificate is published]
[Migrate CRL publish directory]
CRL tree already moved
[Verifying that KDC configuration is using ipa-kdb backend]
[Fix DS schema file syntax]
Syntax already fixed
[Removing RA cert from DS NSS database]
RA cert already removed
[Enable sidgen and extdom plugins by default]
[Updating HTTPD service IPA configuration]
[Updating HTTPD service IPA WSGI configuration]
Nothing to do for configure_httpd_wsgi_conf
[Migrating from mod_nss to mod_ssl]
Already migrated to mod_ssl
[Moving HTTPD service keytab to gssproxy]
[Removing self-signed CA]
[Removing Dogtag 9 CA]
[Checking for deprecated KDC configuration files]
[Checking for deprecated backups of Samba configuration files]
dnssec-validation yes
[Add missing CA DNS records]
IPA CA DNS records already processed
named user config '/etc/named/ipa-ext.conf' already exists
named user config '/etc/named/ipa-options-ext.conf' already exists
[Upgrading CA schema]
CA schema update complete
[Update certmonger certificate renewal configuration]
Certmonger certificate renewal configuration already up-to-date
[Enable PKIX certificate path discovery and validation]
PKIX already enabled
[Authorizing RA Agent to modify profiles]
[Authorizing RA Agent to manage lightweight CAs]
[Ensuring Lightweight CAs container exists in Dogtag database]
[Adding default OCSP URI configuration]
[Disabling cert publishing]
pki-tomcat configuration changed, restart pki-tomcat
[Ensuring CA is using LDAPProfileSubsystem]
[Migrating certificate profiles to LDAP]
Profile 'AdminCert' is already in LDAP and enabled; skipping
Profile 'DomainController' is already in LDAP and enabled; skipping
Profile 'ECAdminCert' is already in LDAP and enabled; skipping
Profile 'acmeServerCert' is already in LDAP and enabled; skipping
Profile 'caAdminCert' is already in LDAP and enabled; skipping
Profile 'caAgentFileSigning' is already in LDAP and enabled; skipping
Profile 'caAgentServerCert' is already in LDAP and enabled; skipping
Profile 'caAuditSigningCert' is already in LDAP and enabled; skipping
Profile 'caCACert' is already in LDAP and enabled; skipping
Profile 'caCMCECUserCert' is already in LDAP and enabled; skipping
Profile 'caCMCECserverCert' is already in LDAP and enabled; skipping
Profile 'caCMCECsubsystemCert' is already in LDAP and enabled; skipping
Profile 'caCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caCMCauditSigningCert' is already in LDAP and enabled; skipping
Profile 'caCMCcaCert' is already in LDAP and enabled; skipping
Profile 'caCMCcaCert' is already in LDAP and enabled; skipping
Profile 'caCMCkraStorageCert' is already in LDAP and enabled; skipping
Profile 'caCMCkraTransportCert' is already in LDAP and enabled; skipping
Profile 'caCMCocspCert' is already in LDAP and enabled; skipping
Profile 'caCMCserverCert' is already in LDAP and enabled; skipping
Profile 'caCMCsubsystemCert' is already in LDAP and enabled; skipping
Profile 'caCrossSignedCACert' is already in LDAP and enabled; skipping
Profile 'caDirBasedDualCert' is already in LDAP and enabled; skipping
Profile 'caDirPinUserCert' is already in LDAP and enabled; skipping
Profile 'caDirUserCert' is already in LDAP and enabled; skipping
Profile 'caDirUserRenewal' is already in LDAP and enabled; skipping
Profile 'caDualCert' is already in LDAP and enabled; skipping
Profile 'caDualRAuserCert' is already in LDAP and enabled; skipping
Profile 'caECAdminCert' is already in LDAP and enabled; skipping
Profile 'caECAgentServerCert' is already in LDAP and enabled; skipping
Profile 'caECDirPinUserCert' is already in LDAP and enabled; skipping
Profile 'caECDirUserCert' is already in LDAP and enabled; skipping
Profile 'caECFullCMCSharedTokenCert' is already in LDAP and enabled; skipping
Profile 'caECFullCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caECFullCMCUserSignedCert' is already in LDAP and enabled; skipping
Profile 'caECInternalAuthServerCert' is already in LDAP and enabled; skipping
Profile 'caECInternalAuthSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caECServerCert' is already in LDAP and enabled; skipping
Profile 'caECServerCertWithSCT' is already in LDAP and enabled; skipping
Profile 'caECSimpleCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caECSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caECUserCert' is already in LDAP and enabled; skipping
Profile 'caEncUserCert' is already in LDAP and enabled; skipping
Profile 'caFullCMCSharedTokenCert' is already in LDAP and enabled; skipping
Profile 'caFullCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caFullCMCUserSignedCert' is already in LDAP and enabled; skipping
Profile 'caIPAserviceCert' is already in LDAP and enabled; skipping
Profile 'caInstallCACert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthAuditSigningCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthDRMstorageCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthOCSPCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthServerCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthTransportCert' is already in LDAP and enabled; skipping
Profile 'caJarSigningCert' is already in LDAP and enabled; skipping
Profile 'caManualRenewal' is already in LDAP and enabled; skipping
Profile 'caOCSPCert' is already in LDAP and enabled; skipping
Profile 'caOtherCert' is already in LDAP and enabled; skipping
Profile 'caRACert' is already in LDAP and enabled; skipping
Profile 'caRARouterCert' is already in LDAP and enabled; skipping
Profile 'caRAagentCert' is already in LDAP and enabled; skipping
Profile 'caRAserverCert' is already in LDAP and enabled; skipping
Profile 'caRouterCert' is already in LDAP and enabled; skipping
Profile 'caSSLClientSelfRenewal' is already in LDAP and enabled; skipping
Profile 'caServerCert' is already in LDAP and enabled; skipping
Profile 'caServerCertWithSCT' is already in LDAP and enabled; skipping
Profile 'caServerKeygen_DirUserCert' is already in LDAP and enabled; skipping
Profile 'caServerKeygen_UserCert' is already in LDAP and enabled; skipping
Profile 'caSignedLogCert' is already in LDAP and enabled; skipping
Profile 'caSigningUserCert' is already in LDAP and enabled; skipping
Profile 'caSimpleCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caStorageCert' is already in LDAP and enabled; skipping
Profile 'caSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caTPSCert' is already in LDAP and enabled; skipping
Profile 'caTempTokenDeviceKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTempTokenUserEncryptionKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTempTokenUserSigningKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenDeviceKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenMSLoginEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserAuthKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caTokenUserDelegateAuthKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserDelegateSigningKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserEncryptionKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserEncryptionKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caTokenUserSigningKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserSigningKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caTransportCert' is already in LDAP and enabled; skipping
Profile 'caUUIDdeviceCert' is already in LDAP and enabled; skipping
Profile 'caUserCert' is already in LDAP and enabled; skipping
Profile 'caUserSMIMEcapCert' is already in LDAP and enabled; skipping
[Ensuring presence of included profiles]
Profile 'KDCs_PKINIT_Certs' is already in LDAP; skipping
Profile 'caIPAserviceCert' is already in LDAP; skipping
Profile 'IECUserRoles' is already in LDAP; skipping
Profile 'acmeIPAServerCert' is already in LDAP; skipping
[Add default CA ACL]
Default CA ACL already added
[Migrating to authselect profile]
Already migrated to authselect profile
[Create systemd-user hbac service and rule]
hbac service systemd-user already exists
[Add root alias to admin account]
Alias already exists
[Setup SPAKE]
[Setup PKINIT]
[Enable server krb5.conf snippet]
[Adding ipa-ca alias to HTTP certificate]
Certificate is OK; nothing to do
The IPA services were upgraded
The ipa-server-upgrade command was successful
[root@master /]# tail -1 /var/log/ipaupgrade.log
2020-12-17T12:28:58Z INFO The ipa-server-upgrade command was successful
[root@master /]#


Scenario2: Plain installation
--------------------------------
[root@master ~]# rpm -qa ipa-server
ipa-server-4.9.0-0.5.rc3.module+el8.4.0+9124+ced20601.x86_64
[root@master ~]# 
[root@master ~]# ipa-server-upgrade 
Upgrading IPA:. Estimated time: 1 minute 30 seconds
  [1/11]: stopping directory server
  [2/11]: saving configuration
  [3/11]: disabling listeners
  [4/11]: enabling DS global lock
  [5/11]: disabling Schema Compat
  [6/11]: starting directory server
  [7/11]: updating schema
  [8/11]: upgrading server
  [9/11]: stopping directory server
  [10/11]: restoring configuration
  [11/11]: starting directory server
Done.
Update complete
Upgrading IPA services
Upgrading the configuration of the IPA services
Disabled p11-kit-proxy
[Verifying that root certificate is published]
[Migrate CRL publish directory]
Publish directory already set to new location
[Verifying that KDC configuration is using ipa-kdb backend]
[Fix DS schema file syntax]
[Removing RA cert from DS NSS database]
[Enable sidgen and extdom plugins by default]
[Updating HTTPD service IPA configuration]
[Updating HTTPD service IPA WSGI configuration]
Nothing to do for configure_httpd_wsgi_conf
[Migrating from mod_nss to mod_ssl]
Already migrated to mod_ssl
[Moving HTTPD service keytab to gssproxy]
[Removing self-signed CA]
[Removing Dogtag 9 CA]
[Checking for deprecated KDC configuration files]
[Checking for deprecated backups of Samba configuration files]
dnssec-validation yes
[Add missing CA DNS records]
Updating DNS system records
named user config '/etc/named/ipa-ext.conf' already exists
named user config '/etc/named/ipa-options-ext.conf' already exists
[Upgrading CA schema]
CA schema update complete
[Update certmonger certificate renewal configuration]
Certmonger certificate renewal configuration already up-to-date
[Enable PKIX certificate path discovery and validation]
[Authorizing RA Agent to modify profiles]
[Authorizing RA Agent to manage lightweight CAs]
[Ensuring Lightweight CAs container exists in Dogtag database]
[Adding default OCSP URI configuration]
[Disabling cert publishing]
pki-tomcat configuration changed, restart pki-tomcat
[Ensuring CA is using LDAPProfileSubsystem]
[Migrating certificate profiles to LDAP]
Profile 'acmeServerCert' is already in LDAP and enabled; skipping
Profile 'caCMCserverCert' is already in LDAP and enabled; skipping
Profile 'caCMCECserverCert' is already in LDAP and enabled; skipping
Profile 'caCMCECsubsystemCert' is already in LDAP and enabled; skipping
Profile 'caCMCsubsystemCert' is already in LDAP and enabled; skipping
Profile 'caCMCauditSigningCert' is already in LDAP and enabled; skipping
Profile 'caCMCcaCert' is already in LDAP and enabled; skipping
Profile 'caCMCocspCert' is already in LDAP and enabled; skipping
Profile 'caCMCkraTransportCert' is already in LDAP and enabled; skipping
Profile 'caCMCkraStorageCert' is already in LDAP and enabled; skipping
Profile 'caServerKeygen_UserCert' is already in LDAP and enabled; skipping
Profile 'caServerKeygen_DirUserCert' is already in LDAP and enabled; skipping
Profile 'caUserCert' is already in LDAP and enabled; skipping
Profile 'caECUserCert' is already in LDAP and enabled; skipping
Profile 'caUserSMIMEcapCert' is already in LDAP and enabled; skipping
Profile 'caDualCert' is already in LDAP and enabled; skipping
Profile 'caDirBasedDualCert' is already in LDAP and disabled; skipping
Profile 'AdminCert' is already in LDAP and enabled; skipping
Profile 'ECAdminCert' is already in LDAP and enabled; skipping
Profile 'caSignedLogCert' is already in LDAP and enabled; skipping
Profile 'caTPSCert' is already in LDAP and enabled; skipping
Profile 'caRARouterCert' is already in LDAP and enabled; skipping
Profile 'caRouterCert' is already in LDAP and enabled; skipping
Profile 'caServerCert' is already in LDAP and enabled; skipping
Profile 'caECServerCert' is already in LDAP and enabled; skipping
Profile 'caServerCertWithSCT' is already in LDAP and enabled; skipping
Profile 'caECServerCertWithSCT' is already in LDAP and enabled; skipping
Profile 'caSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caECSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caOtherCert' is already in LDAP and enabled; skipping
Profile 'caCACert' is already in LDAP and enabled; skipping
Profile 'caCMCcaCert' is already in LDAP and enabled; skipping
Profile 'caCrossSignedCACert' is already in LDAP and disabled; skipping
Profile 'caInstallCACert' is already in LDAP and enabled; skipping
Profile 'caRACert' is already in LDAP and disabled; skipping
Profile 'caOCSPCert' is already in LDAP and enabled; skipping
Profile 'caStorageCert' is already in LDAP and enabled; skipping
Profile 'caTransportCert' is already in LDAP and enabled; skipping
Profile 'caDirPinUserCert' is already in LDAP and disabled; skipping
Profile 'caECDirPinUserCert' is already in LDAP and disabled; skipping
Profile 'caDirUserCert' is already in LDAP and enabled; skipping
Profile 'caECDirUserCert' is already in LDAP and enabled; skipping
Profile 'caAgentServerCert' is already in LDAP and enabled; skipping
Profile 'caECAgentServerCert' is already in LDAP and enabled; skipping
Profile 'caAgentFileSigning' is already in LDAP and enabled; skipping
Profile 'caCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caCMCECUserCert' is already in LDAP and enabled; skipping
Profile 'caFullCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caECFullCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caFullCMCUserSignedCert' is already in LDAP and disabled; skipping
Profile 'caECFullCMCUserSignedCert' is already in LDAP and disabled; skipping
Profile 'caFullCMCSharedTokenCert' is already in LDAP and disabled; skipping
Profile 'caECFullCMCSharedTokenCert' is already in LDAP and disabled; skipping
Profile 'caSimpleCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caECSimpleCMCUserCert' is already in LDAP and enabled; skipping
Profile 'caTokenDeviceKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserEncryptionKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserSigningKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTempTokenDeviceKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTempTokenUserEncryptionKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTempTokenUserSigningKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caAdminCert' is already in LDAP and enabled; skipping
Profile 'caECAdminCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthServerCert' is already in LDAP and enabled; skipping
Profile 'caECInternalAuthServerCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthTransportCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthDRMstorageCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caECInternalAuthSubsystemCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthOCSPCert' is already in LDAP and enabled; skipping
Profile 'caInternalAuthAuditSigningCert' is already in LDAP and enabled; skipping
Profile 'DomainController' is already in LDAP and enabled; skipping
Profile 'caDualRAuserCert' is already in LDAP and enabled; skipping
Profile 'caRAagentCert' is already in LDAP and enabled; skipping
Profile 'caRAserverCert' is already in LDAP and enabled; skipping
Profile 'caUUIDdeviceCert' is already in LDAP and disabled; skipping
Profile 'caSSLClientSelfRenewal' is already in LDAP and enabled; skipping
Profile 'caDirUserRenewal' is already in LDAP and enabled; skipping
Profile 'caManualRenewal' is already in LDAP and enabled; skipping
Profile 'caTokenMSLoginEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserSigningKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caTokenUserEncryptionKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caTokenUserAuthKeyRenewal' is already in LDAP and enabled; skipping
Profile 'caJarSigningCert' is already in LDAP and enabled; skipping
Profile 'caIPAserviceCert' is already in LDAP and enabled; skipping
Profile 'caAuditSigningCert' is already in LDAP and enabled; skipping
Profile 'caEncUserCert' is already in LDAP and enabled; skipping
Profile 'caSigningUserCert' is already in LDAP and enabled; skipping
Profile 'caTokenUserDelegateAuthKeyEnrollment' is already in LDAP and enabled; skipping
Profile 'caTokenUserDelegateSigningKeyEnrollment' is already in LDAP and enabled; skipping
[Ensuring presence of included profiles]
Profile 'KDCs_PKINIT_Certs' is already in LDAP; skipping
Profile 'IECUserRoles' is already in LDAP; skipping
Profile 'acmeIPAServerCert' is already in LDAP; skipping
Profile 'caIPAserviceCert' is already in LDAP; skipping
[Add default CA ACL]
[Migrating to authselect profile]
[Create systemd-user hbac service and rule]
hbac service systemd-user already exists
[Add root alias to admin account]
Alias already exists
[Setup SPAKE]
[Setup PKINIT]
[Enable server krb5.conf snippet]
[Adding ipa-ca alias to HTTP certificate]
Certificate is OK; nothing to do
The IPA services were upgraded
The ipa-server-upgrade command was successful
[root@master ~]# ipactl status
Directory Service: RUNNING
krb5kdc Service: RUNNING
kadmin Service: RUNNING
named Service: RUNNING
httpd Service: RUNNING
ipa-custodia Service: RUNNING
pki-tomcatd Service: RUNNING
ipa-otpd Service: RUNNING
ipa-dnskeysyncd Service: RUNNING
ipa: INFO: The ipactl command was successful
[root@master ~]# ipactl restart
Restarting Directory Service
Restarting krb5kdc Service
Restarting kadmin Service
Restarting named Service
Restarting httpd Service
Restarting ipa-custodia Service
Restarting pki-tomcatd Service
Restarting ipa-otpd Service
Restarting ipa-dnskeysyncd Service
ipa: INFO: The ipactl command was successful
[root@master ~]# ipactl status
Directory Service: RUNNING
krb5kdc Service: RUNNING
kadmin Service: RUNNING
named Service: RUNNING
httpd Service: RUNNING
ipa-custodia Service: RUNNING
pki-tomcatd Service: RUNNING
ipa-otpd Service: RUNNING
ipa-dnskeysyncd Service: RUNNING
ipa: INFO: The ipactl command was successful
# tail -1 /var/log/ipaupgrade.log 
The ipa-server-upgrade command was successful

Thus on the basis ob above observations, marking the status of bug to "VERIFIED"

Comment 9 errata-xmlrpc 2021-05-18 15:48:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:1846