Bug 946996
Summary: | Error in /var/log/rhsm/rhsm.log when rhsmcertd service is restarted on client with no installed products | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Shwetha Kallesh <skallesh> |
Component: | subscription-manager | Assignee: | candlepin-bugs |
Status: | CLOSED WORKSFORME | QA Contact: | IDM QE LIST <seceng-idm-qe-list> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 5.10 | CC: | alikins, bkearney, fsharath, jgalipea, jmolet, jsefler, redakkan, skallesh, spandey |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-06-04 18:35:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 840995 |
Description
Shwetha Kallesh
2013-04-01 07:06:53 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. I can not recreate. Can you please retest? Were you registering against a local candlepin? Its working fine [root@localhost ~]# subscription-manager version server type: Red Hat Subscription Management subscription management server: 0.8.5-1 subscription-manager: 1.8.6-1.git.4.b3f4bbf.el7 python-rhsm: 1.8.9-1.git.1.bbbb773.el7 Steps: [root@localhost ~]# subscription-manager register --org=admin --force The system with UUID 1b49e891-01d3-4430-8771-e2d4b3a56157 has been unregistered Username: admin Password: The system has been registered with ID: 1f759953-dd5e-4f8d-9fc7-9edefab10a4f [root@localhost ~]# subscription-manager list --installed No installed products to list [root@localhost ~]# service rhsmcertd restart Redirecting to /bin/systemctl restart rhsmcertd.service [root@localhost ~]# [root@localhost ~]# tail -f /var/log/rhsm/rhsm.log 2013-05-02 19:25:02,345 [DEBUG] @profile.py:95 - Loading current RPM profile. 2013-05-02 19:25:07,938 [INFO] @connection.py:586 - Using certificate authentication: key = /etc/pki/consumer/key.pem, cert = /etc/pki/consumer/cert.pem, ca = /etc/rhsm/ca/, insecure = False 2013-05-02 19:25:07,938 [INFO] @connection.py:597 - Connection Built: host: 10.70.35.193, port: 8443, handler: /candlepin 2013-05-02 19:25:07,939 [DEBUG] @plugins.py:508 - loaded plugin modules: [] 2013-05-02 19:25:07,939 [DEBUG] @plugins.py:509 - loaded plugins: {} 2013-05-02 19:25:07,939 [DEBUG] @plugins.py:481 - Calling PluginManager init 2013-05-02 19:25:07,951 [DEBUG] @connection.py:394 - Loading CA PEM certificates from: /etc/rhsm/ca/ 2013-05-02 19:25:07,951 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-ca.pem' 2013-05-02 19:25:07,952 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/10.pem' 2013-05-02 19:25:07,952 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-stage.pem' 2013-05-02 19:25:07,952 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/redhat-uep.pem' 2013-05-02 19:25:07,953 [DEBUG] @connection.py:415 - Making request: GET /candlepin/consumers/1f759953-dd5e-4f8d-9fc7-9edefab10a4f/certificates/serials 2013-05-02 19:25:08,034 [DEBUG] @connection.py:434 - Response status: 200 2013-05-02 19:25:08,035 [WARNING] @connection.py:438 - Clock skew detected, please check your system time 2013-05-02 19:25:08,036 [DEBUG] @injection.py:65 - Returning callable provider for feature ENT_DIR: <class 'subscription_manager.certdirectory.EntitlementDirectory'> 2013-05-02 19:25:08,036 [INFO] @certlib.py:236 - certs updated: Total updates: 0 Found (local) serial# [] Expected (UEP) serial# [] Added (new) <NONE> Deleted (rogue): <NONE> Expired (deleted): <NONE> 2013-05-02 19:25:08,038 [INFO] @cache.py:163 - Checking current system info against cache: /var/lib/rhsm/cache/installed_products.json 2013-05-02 19:25:08,048 [INFO] @cache.py:180 - No changes. 2013-05-02 19:25:08,050 [DEBUG] @connection.py:394 - Loading CA PEM certificates from: /etc/rhsm/ca/ 2013-05-02 19:25:08,050 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-ca.pem' 2013-05-02 19:25:08,050 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/10.pem' 2013-05-02 19:25:08,050 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-stage.pem' 2013-05-02 19:25:08,051 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/redhat-uep.pem' 2013-05-02 19:25:08,051 [DEBUG] @connection.py:415 - Making request: GET /candlepin/consumers/1f759953-dd5e-4f8d-9fc7-9edefab10a4f 2013-05-02 19:25:08,118 [DEBUG] @connection.py:434 - Response status: 200 2013-05-02 19:25:08,118 [WARNING] @connection.py:438 - Clock skew detected, please check your system time 2013-05-02 19:25:08,119 [INFO] @certlib.py:112 - Checking if system requires healing. 2013-05-02 19:25:08,119 [DEBUG] @injection.py:65 - Returning callable provider for feature CERT_SORTER: <class 'subscription_manager.cert_sorter.CertSorter'> 2013-05-02 19:25:08,120 [DEBUG] @injection.py:68 - Returning instance for feature IDENTITY 2013-05-02 19:25:08,120 [DEBUG] @certdirectory.py:188 - Installed product IDs: [] 2013-05-02 19:25:08,120 [DEBUG] @injection.py:65 - Returning callable provider for feature STATUS_CACHE: <class 'subscription_manager.cache.StatusCache'> 2013-05-02 19:25:08,120 [DEBUG] @connection.py:394 - Loading CA PEM certificates from: /etc/rhsm/ca/ 2013-05-02 19:25:08,121 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-ca.pem' 2013-05-02 19:25:08,121 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/10.pem' 2013-05-02 19:25:08,121 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/candlepin-stage.pem' 2013-05-02 19:25:08,122 [DEBUG] @connection.py:376 - Loading CA certificate: '/etc/rhsm/ca/redhat-uep.pem' 2013-05-02 19:25:08,122 [DEBUG] @connection.py:415 - Making request: GET /candlepin/consumers/1f759953-dd5e-4f8d-9fc7-9edefab10a4f/compliance 2013-05-02 19:25:08,179 [DEBUG] @connection.py:434 - Response status: 200 2013-05-02 19:25:08,179 [WARNING] @connection.py:438 - Clock skew detected, please check your system time 2013-05-02 19:25:08,180 [DEBUG] @cache.py:136 - Wrote cache: /var/lib/rhsm/cache/entitlement_status.json 2013-05-02 19:25:08,180 [DEBUG] @cert_sorter.py:168 - valid entitled products: [] 2013-05-02 19:25:08,181 [DEBUG] @cert_sorter.py:169 - expired entitled products: [] 2013-05-02 19:25:08,181 [DEBUG] @cert_sorter.py:170 - partially entitled products: [] 2013-05-02 19:25:08,181 [DEBUG] @cert_sorter.py:171 - unentitled products: [] 2013-05-02 19:25:08,181 [DEBUG] @cert_sorter.py:172 - future products: [] 2013-05-02 19:25:08,181 [DEBUG] @cert_sorter.py:173 - partial stacks: [] 2013-05-02 19:25:08,182 [DEBUG] @cert_sorter.py:174 - entitlements valid until: None 2013-05-02 19:25:08,182 [INFO] @certlib.py:136 - Entitlements are valid for today: 2013-05-02 13:55:08.119859+00:00 2013-05-02 19:25:08,182 [WARNING] @certlib.py:142 - Got valid status from server but no valid until date. 2013-05-02 19:25:08,182 [INFO] @certlib.py:159 - Auto-heal check complete. 2013-05-02 19:25:09,637 [DEBUG] @profile.py:95 - Loading current RPM profile Closing: appears to be working as demonstrated in comment 3 The log message indicates this failed because it couldn't open the rpmdb, and nothing handles that exception except the top level handler that logs it and exits. So rhsmcertd-worker will continue to fail if it can't read the rpm db. I suspect this may be more of an issue on rhel5 than 6 (6 seems happy to lazy load the db, and do it read only). So I think the bug summary is wrong, it's not related to no installed certs, but to something else having the rpmdb open (or otherwise causing rpmdb open failures) Should I reopen this guy, or spin it into a new bug? |