Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
DescriptionMatthew Harmsen
2016-06-10 03:31:23 UTC
Created attachment 1166455[details]
pkispawn.log typescript
Doing the following smoke test, the CA Agent page failed to load in the Firefox Browser.
Used the following procedure:
* git clone -b DOGTAG_10_3_RHEL_BRANCH ssh://git.app.eng.bos.redhat.com/srv/git/pki.git (NOTE: All source code from master has been checked into this branch and the spec files have all been updated and checked-in)
* used compose scripts to build and install RHEL 7.3 pki packages and the redhat-pki-server-theme package from RHCS 9.1 for testing.
* pkispawn -s CA -f /root/pki/ca.cfg -vvv
where 'ca.cfg' contains:
[DEFAULT]
pki_admin_password=<password>
pki_client_pkcs12_password=<password>
pki_ds_password=<password>
* launched Firefox with a new profile
* Admin page loaded successfully
* EE page loaded successfully
* Successfully imported CA Certificate and trusted it
* Used preferences to successfully import the Admin Certificate
* Choose this Admin Certificate to load Agent Page which FAILED with the following errors:
HTTP Status 500 - org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String;
type Exception report
message org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String;
description The server encountered an internal error that prevented it from fulfilling this request.
exception
javax.servlet.ServletException: org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String;
org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:343)
org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
java.security.AccessController.doPrivileged(Native Method)
org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
sun.reflect.GeneratedMethodAccessor35.invoke(Unknown Source)
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
java.lang.reflect.Method.invoke(Method.java:498)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
java.security.AccessController.doPrivileged(Native Method)
javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
root cause
java.lang.AbstractMethodError: org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String;
org.apache.coyote.http11.Http11Processor.actionInternal(Http11Processor.java:268)
org.apache.coyote.http11.AbstractHttp11Processor.action(AbstractHttp11Processor.java:910)
org.apache.coyote.Request.action(Request.java:347)
org.apache.catalina.connector.Request.getAttribute(Request.java:961)
org.apache.catalina.connector.RequestFacade.getAttribute(RequestFacade.java:283)
com.netscape.cms.servlet.base.CMSServlet.getSSLClientCertificate(CMSServlet.java:859)
com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1744)
com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1691)
com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1681)
com.netscape.cms.servlet.base.DisplayHtmlServlet.process(DisplayHtmlServlet.java:65)
com.netscape.cms.servlet.base.CMSServlet.service(CMSServlet.java:514)
javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
sun.reflect.GeneratedMethodAccessor36.invoke(Unknown Source)
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
java.lang.reflect.Method.invoke(Method.java:498)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
java.security.AccessController.doPrivileged(Native Method)
javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
java.security.AccessController.doPrivileged(Native Method)
org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
sun.reflect.GeneratedMethodAccessor35.invoke(Unknown Source)
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
java.lang.reflect.Method.invoke(Method.java:498)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
java.security.AccessController.doPrivileged(Native Method)
javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
note The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs.
Apache Tomcat/7.0.69
Machine Operating System:
# cat /etc/redhat-release
Red Hat Enterprise Linux Workstation release 7.2 (Maipo)
RPMS of interest:
* java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64
* java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64
* java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64
* jss-4.2.6-40.el7.x86_64
* pki-base-10.3.2-3.el7pki.noarch
* pki-base-java-10.3.2-3.el7pki.noarch
* pki-ca-10.3.2-3.el7pki.noarch
* pki-kra-10.3.2-3.el7pki.noarch
* pki-server-10.3.2-3.el7pki.noarch
* pki-symkey-10.3.2-3.el7pki.x86_64
* pki-tools-10.3.2-3.el7pki.x86_64
* redhat-pki-server-theme-10.3.2-2.el7pki.noarch
* tomcat-7.0.69-2.el7.noarch
* tomcat-el-2.2-api-7.0.69-2.el7.noarch
* tomcat-jsp-2.2-api-7.0.69-2.el7.noarch
* tomcat-lib-7.0.69-2.el7.noarch
* tomcat-servlet-3.0-api-7.0.69-2.el7.noarch
* tomcatjss-7.1.2-1.el7.noarch
This bug was caused by using an older version of tomcatjss.
Since Tomcat moved from 7.0.54 ==> 7.0.69, an upstream patch required being back-ported to tomcatjss in RHEL 7.3.
Ergo, marking this bug as a duplicate of [https://bugzilla.redhat.com/show_bug.cgi?id=1344804 Bugzilla Bug #1344804 - Build failure on RHEL 7.3].
*** This bug has been marked as a duplicate of bug 1344804 ***
Created attachment 1166455 [details] pkispawn.log typescript Doing the following smoke test, the CA Agent page failed to load in the Firefox Browser. Used the following procedure: * git clone -b DOGTAG_10_3_RHEL_BRANCH ssh://git.app.eng.bos.redhat.com/srv/git/pki.git (NOTE: All source code from master has been checked into this branch and the spec files have all been updated and checked-in) * used compose scripts to build and install RHEL 7.3 pki packages and the redhat-pki-server-theme package from RHCS 9.1 for testing. * pkispawn -s CA -f /root/pki/ca.cfg -vvv where 'ca.cfg' contains: [DEFAULT] pki_admin_password=<password> pki_client_pkcs12_password=<password> pki_ds_password=<password> * launched Firefox with a new profile * Admin page loaded successfully * EE page loaded successfully * Successfully imported CA Certificate and trusted it * Used preferences to successfully import the Admin Certificate * Choose this Admin Certificate to load Agent Page which FAILED with the following errors: HTTP Status 500 - org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String; type Exception report message org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String; description The server encountered an internal error that prevented it from fulfilling this request. exception javax.servlet.ServletException: org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String; org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:343) org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175) java.security.AccessController.doPrivileged(Native Method) org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) sun.reflect.GeneratedMethodAccessor35.invoke(Unknown Source) sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) java.lang.reflect.Method.invoke(Method.java:498) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285) java.security.AccessController.doPrivileged(Native Method) javax.security.auth.Subject.doAsPrivileged(Subject.java:549) org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320) org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260) root cause java.lang.AbstractMethodError: org.apache.tomcat.util.net.jss.JSSSupport.getProtocol()Ljava/lang/String; org.apache.coyote.http11.Http11Processor.actionInternal(Http11Processor.java:268) org.apache.coyote.http11.AbstractHttp11Processor.action(AbstractHttp11Processor.java:910) org.apache.coyote.Request.action(Request.java:347) org.apache.catalina.connector.Request.getAttribute(Request.java:961) org.apache.catalina.connector.RequestFacade.getAttribute(RequestFacade.java:283) com.netscape.cms.servlet.base.CMSServlet.getSSLClientCertificate(CMSServlet.java:859) com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1744) com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1691) com.netscape.cms.servlet.base.CMSServlet.authenticate(CMSServlet.java:1681) com.netscape.cms.servlet.base.DisplayHtmlServlet.process(DisplayHtmlServlet.java:65) com.netscape.cms.servlet.base.CMSServlet.service(CMSServlet.java:514) javax.servlet.http.HttpServlet.service(HttpServlet.java:731) sun.reflect.GeneratedMethodAccessor36.invoke(Unknown Source) sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) java.lang.reflect.Method.invoke(Method.java:498) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285) java.security.AccessController.doPrivileged(Native Method) javax.security.auth.Subject.doAsPrivileged(Subject.java:549) org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320) org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175) java.security.AccessController.doPrivileged(Native Method) org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) sun.reflect.GeneratedMethodAccessor35.invoke(Unknown Source) sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) java.lang.reflect.Method.invoke(Method.java:498) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288) org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285) java.security.AccessController.doPrivileged(Native Method) javax.security.auth.Subject.doAsPrivileged(Subject.java:549) org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320) org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260) note The full stack trace of the root cause is available in the Apache Tomcat/7.0.69 logs. Apache Tomcat/7.0.69 Machine Operating System: # cat /etc/redhat-release Red Hat Enterprise Linux Workstation release 7.2 (Maipo) RPMS of interest: * java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64 * java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64 * java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64 * jss-4.2.6-40.el7.x86_64 * pki-base-10.3.2-3.el7pki.noarch * pki-base-java-10.3.2-3.el7pki.noarch * pki-ca-10.3.2-3.el7pki.noarch * pki-kra-10.3.2-3.el7pki.noarch * pki-server-10.3.2-3.el7pki.noarch * pki-symkey-10.3.2-3.el7pki.x86_64 * pki-tools-10.3.2-3.el7pki.x86_64 * redhat-pki-server-theme-10.3.2-2.el7pki.noarch * tomcat-7.0.69-2.el7.noarch * tomcat-el-2.2-api-7.0.69-2.el7.noarch * tomcat-jsp-2.2-api-7.0.69-2.el7.noarch * tomcat-lib-7.0.69-2.el7.noarch * tomcat-servlet-3.0-api-7.0.69-2.el7.noarch * tomcatjss-7.1.2-1.el7.noarch