RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1754845 - number range depletion when multiple clones created from same master [rhel-7.7.z]
Summary: number range depletion when multiple clones created from same master [rhel-7....
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: pki-core
Version: 7.7
Hardware: Unspecified
OS: Unspecified
high
unspecified
Target Milestone: rc
: ---
Assignee: Fraser Tweedale
QA Contact: PKI QE
URL:
Whiteboard:
: 1797707 1810683 (view as bug list)
Depends On: 1748766
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-09-24 08:37 UTC by RAD team bot copy to z-stream
Modified: 2024-03-25 15:26 UTC (History)
10 users (show)

Fixed In Version: pki-core-10.5.16-6.el7_7
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1748766
Environment:
Last Closed: 2020-02-04 07:47:19 UTC
Target Upstream Version:
Embargoed:
gkapoor: needinfo-


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Fedora Pagure 3055 0 None None None 2019-09-24 08:37:17 UTC
Red Hat Product Errata RHBA-2020:0325 0 None None None 2020-02-04 07:47:22 UTC

Description RAD team bot copy to z-stream 2019-09-24 08:37:15 UTC
This bug has been copied from bug #1748766 and has been proposed to be backported to 7.7 z-stream (EUS).

Comment 2 Fraser Tweedale 2019-09-24 09:26:35 UTC
Moving to POST.  The same commits mentioned in https://bugzilla.redhat.com/show_bug.cgi?id=1748766#c6
should be fine for RHEL 7.7.z too.

Comment 4 Matthew Harmsen 2019-09-27 22:28:13 UTC
Checked into DOGTAG_10_5_16_RHEL_BRANCH:

commit 57edb3ee50b3ae634ee31ed643e2bb3a891b80fa
Author: Fraser Tweedale <ftweedal>
Date:   Wed Aug 29 22:22:10 2018 +1000

    Add missing synchronisation for range management
    
    Several methods in Repository (and CertificateRepository) need
    synchronisation on the intrisic lock.  Make these methods
    synchronised.
    
    Also take the lock in UpdateNumberRange so that no serial numbers
    can be handed out in other threads between peekNextSerialNumber()
    and set(Next)?MaxSerial().  Without this synchronisation, it is
    possible that the master instance will use some of the serial
    numbers it transfers to the clone.
    
    Fixes: https://pagure.io/dogtagpki/issue/3055
    (cherry picked from commit 851a0bdd79c12c627a04cfc376338c1727cd50d9)

commit 26586f3e711f1e238d4692f801dd8de42b88fc53
Author: Fraser Tweedale <ftweedal>
Date:   Wed Aug 29 21:42:40 2018 +1000

    checkRange: small refactor and add commentary
    
    Add some commentary about the behaviour and proper usage of
    Repository.checkRange().  Also perform a small refactor, avoiding
    a redundant stringify and parse.
    
    Part of: https://pagure.io/dogtagpki/issue/3055
    
    (cherry picked from commit 5a606e83719272fb488047b28a9ca7d5ce2ea30b)

commit e1345a22c1d5236754fbeb93b0d3f8f2c447d918
Author: Fraser Tweedale <ftweedal>
Date:   Wed Aug 29 17:31:34 2018 +1000

    rename method getTheSerialNumber -> peekNextSerialNumber
    
    Rename Repository.getTheSerialNumber -> peekNextSerialNumber to more
    accurately reflect what it does: peek at the next serial number
    without actually consuming it.
    
    Part of: https://pagure.io/dogtagpki/issue/3055
    
    (cherry picked from commit 85e356580f64f87c0b01736b71dc3d385db0bcba)

commit 35714763d32425f18a0ac8817aad96c8cfab589b
Author: Fraser Tweedale <ftweedal>
Date:   Mon Sep 3 15:55:35 2018 +1000

    Repository: handle depleted range in initCache()
    
    Repository.initCache() does not handle the case where the current
    range has been fully depleted, but the switch to the next range has
    not occurred yet.  This situation arises when the range has been
    fully depleted by servicing UpdateNumberRange requests for clones.
    
    Detect this situation and handle it by switching to the next range
    (when available).
    
    Part of: https://pagure.io/dogtagpki/issue/3055
    
    (cherry picked from commit 2fb3611db5145dbdd5e7e14daaad1470691494f0)

commit 93b1ecae5aff7a18e16556f749c8aba5806dc512
Author: Fraser Tweedale <ftweedal>
Date:   Wed Aug 29 16:55:31 2018 +1000

    getTheSerialNumber: only return null if next range not available
    
    When cloning, if the master's current number range has been depleted
    due to a previous UpdateNumberRange request,
    Repository.getTheSerialNumber() returns null because the next serial
    number is out of the current range, but the next range has not been
    activated yet.  NullPointerException ensues.
    
    Update getTheSerialNumber() to return the next serial number even
    when it exceeds the current number range, as long as there is a next
    range.  If there is no next range, return null (as before).  It is
    assumed that the next range is non-empty
    
    Also do a couple of drive-by method extractions to improve
    readability.
    
    Part of: https://pagure.io/dogtagpki/issue/3055
    
    (cherry picked from commit f1615df509053a8f474b82ea6a2fa0883ab06d09)

Comment 6 Geetika Kapoor 2019-11-14 10:05:01 UTC
Hi Fraser,

I think here we just need to have master with multiple clones and they should work without any errors.

Thanks
Geetika

Comment 9 Geetika Kapoor 2019-11-14 18:40:09 UTC
Hi Fraser,

If we execute same test cases as mentioned in https://bugzilla.redhat.com/show_bug.cgi?id=1402280#c8, we see exception :

In Clone:
=========

pkispawn    : DEBUG    ........... <?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><State>0</State><Type>CA</Type><Status>running</Status><Version>10.5.16-6.el7_7</Version><ProductVersion>Red Hat Certificate System 9.5 (Batch Update 3)</ProductVersion></XMLResponse>
pkispawn    : INFO     ....... constructing PKI configuration data.
pkispawn    : INFO     ....... configuring PKI configuration data.

Installation failed:
<html><head><title>Apache Tomcat/7.0.76 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:16px;} H3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} BODY {font-family:Tahoma,Arial,sans-serif;color:black;background-color:white;} B {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} P {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}A {color : black;}A.name {color : black;}HR {color : #525D76;}--></style> </head><body><h1>HTTP Status 500 - java.io.IOException: Error: Failed to update number range.</h1><HR size="1" noshade="noshade"><p><b>type</b> Exception report</p><p><b>message</b> <u>java.io.IOException: Error: Failed to update number range.</u></p><p><b>description</b> <u>The server encountered an internal error that prevented it from fulfilling this request.</u></p><p><b>exception</b> <pre>org.jboss.resteasy.spi.UnhandledException: java.io.IOException: Error: Failed to update number range.
	org.jboss.resteasy.core.ExceptionHandler.handleApplicationException(ExceptionHandler.java:76)
	org.jboss.resteasy.core.ExceptionHandler.handleException(ExceptionHandler.java:212)
	org.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:149)
	org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)
	org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)
	org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)
	org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
	org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
	javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
	sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	java.lang.reflect.Method.invoke(Method.java:498)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	java.security.AccessController.doPrivileged(Native Method)
	javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
	java.security.AccessController.doPrivileged(Native Method)
	org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
	sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	java.lang.reflect.Method.invoke(Method.java:498)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	java.security.AccessController.doPrivileged(Native Method)
	javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
</pre></p><p><b>root cause</b> <pre>java.io.IOException: Error: Failed to update number range.
	com.netscape.cms.servlet.csadmin.ConfigurationUtils.updateNumberRange(ConfigurationUtils.java:706)
	com.netscape.cms.servlet.csadmin.ConfigurationUtils.getConfigEntriesFromMaster(ConfigurationUtils.java:574)
	org.dogtagpki.server.rest.SystemConfigService.configureClone(SystemConfigService.java:839)
	org.dogtagpki.server.rest.SystemConfigService.configureSubsystem(SystemConfigService.java:987)
	org.dogtagpki.server.rest.SystemConfigService.configure(SystemConfigService.java:144)
	org.dogtagpki.server.rest.SystemConfigService.configure(SystemConfigService.java:101)
	sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	java.lang.reflect.Method.invoke(Method.java:498)
	org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:137)
	org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:280)
	org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:234)
	org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:221)
	org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:356)
	org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)
	org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)
	org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
	org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
	javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
	sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	java.lang.reflect.Method.invoke(Method.java:498)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	java.security.AccessController.doPrivileged(Native Method)
	javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
	java.security.AccessController.doPrivileged(Native Method)
	org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
	sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	java.lang.reflect.Method.invoke(Method.java:498)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	java.security.AccessController.doPrivileged(Native Method)
	javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
</pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/7.0.76 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/7.0.76</h3></body></html>
================================================================

[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: ConfigurationUtils: POST https://pki1.example.com:20443/ca/admin/ca/updateNumberRange
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: content from admin interface =<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><Status>0</Status><beginNumber>9990001</beginNumber><endNumber>10000000</endNumber></XMLResponse>
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: updateNumberRange(): status=0
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: updateNumberRange start host=pki1.example.com adminPort=20443 eePort=20443
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: updateNumberRange content: {xmlOutput=[true], sessionID=[8644362465422372547], type=[serialNo]}
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: ConfigurationUtils: POST https://pki1.example.com:20443/ca/admin/ca/updateNumberRange
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: content from admin interface =<?xml version="1.0" encoding="UTF-8" standalone="no"?><XMLResponse><Status>1</Status><Error>Error: Failed to update number range.</Error></XMLResponse>
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: updateNumberRange(): status=1
java.io.IOException: Error: Failed to update number range.
	at com.netscape.cms.servlet.csadmin.ConfigurationUtils.updateNumberRange(ConfigurationUtils.java:706)
	at com.netscape.cms.servlet.csadmin.ConfigurationUtils.getConfigEntriesFromMaster(ConfigurationUtils.java:574)
	at org.dogtagpki.server.rest.SystemConfigService.configureClone(SystemConfigService.java:839)
	at org.dogtagpki.server.rest.SystemConfigService.configureSubsystem(SystemConfigService.java:987)
	at org.dogtagpki.server.rest.SystemConfigService.configure(SystemConfigService.java:144)
	at org.dogtagpki.server.rest.SystemConfigService.configure(SystemConfigService.java:101)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:137)
	at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:280)
	at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:234)
	at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:221)
	at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:356)
	at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)
	at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)
	at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
	at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	at java.security.AccessController.doPrivileged(Native Method)
	at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	at org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:297)
	at org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
	at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
	at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
	at java.security.AccessController.doPrivileged(Native Method)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
	at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
	at java.security.AccessController.doPrivileged(Native Method)
	at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
	at org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
	at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:237)
	at org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
	at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
	at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
	at java.security.AccessController.doPrivileged(Native Method)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:218)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:498)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
	at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
	at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1091)
	at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
	at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:316)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.lang.Thread.run(Thread.java:748)
[14/Nov/2019:13:28:55][http-bio-28443-exec-2]: SignedAuditLogger: event ACCESS_SESSION_TERMINATED


In Master:
========

[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: SignedAuditLogger: event ROLE_ASSUME
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: CMSServlet: in auditSubjectID
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: CMSServlet: auditSubjectID auditContext {locale=en_US, groupid=Enterprise CA Administrators, userid=caadmin, ipAddress=10.19.34.79, authManagerId=TokenAuth}
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: CMSServlet auditSubjectID: subjectID: caadmin
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: Repository:In getTheSerialNumber
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: UpdateNumberRange: Failed to update number range: java.lang.NullPointerException
java.lang.NullPointerException
        at java.math.BigInteger.compareTo(BigInteger.java:3620)
        at com.netscape.cms.servlet.csadmin.UpdateNumberRange.process(UpdateNumberRange.java:196)
        at com.netscape.cms.servlet.base.CMSServlet.service(CMSServlet.java:493)
        at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.lang.reflect.Method.invoke(Method.java:498)
        at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
        at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
        at org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
        at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:297)
        at org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
        at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
        at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
        at java.security.AccessController.doPrivileged(Native Method)
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
        at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.lang.reflect.Method.invoke(Method.java:498)
        at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
        at org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
        at org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
        at org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:237)
        at org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
        at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
        at org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
        at java.security.AccessController.doPrivileged(Native Method)
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:218)
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:498)
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
        at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
        at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1091)
        at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
        at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:316)
        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
        at java.lang.Thread.run(Thread.java:748)
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: SignedAuditLogger: event CONFIG_SERIAL_NUMBER
[14/Nov/2019:13:28:55][http-bio-20443-exec-20]: CMSServlet: curDate=Thu Nov 14 13:28:55 EST 2019 id=caUpdateNumberRange time=62
[14/Nov/2019:13:28:55][http-bio-20443-exec-1]: SignedAuditLogger: event ACCESS_SESSION_TERMINATED
[14/Nov/2019:13:31:12][Timer-0]: SessionTimer: run()
[14/Nov/2019:13:31:12][Timer-0]: LDAPSecurityDomainSessionTable: getSessionIds()
[14/Nov/2019:13:31:12][Timer-0]: LDAPSecurityDomainSessionTable: searching ou=sessions,ou=Security Domain,o=topology-02-CA-CA
[14/Nov/2019:13:31:12][Timer-0]: In LdapBoundConnFactory::getConn()
[14/Nov/2019:13:31:12][Timer-0]: masterConn is connected: true
[14/Nov/2019:13:31:12][Timer-0]: getConn: conn is connected true
[14/Nov/2019:13:31:12][Timer-0]: getConn: mNumConns

Comment 16 Fraser Tweedale 2019-11-21 02:11:48 UTC
Per Comment 14, moving back to ON_QA.

Comment 17 Geetika Kapoor 2019-11-21 10:03:38 UTC
Opened bug : https://bugzilla.redhat.com/show_bug.cgi?id=1774928 
Moving this bug to verified.

Comment 19 errata-xmlrpc 2020-02-04 07:47:19 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:0325

Comment 20 Fraser Tweedale 2020-02-13 10:19:09 UTC
*** Bug 1797707 has been marked as a duplicate of this bug. ***

Comment 21 Fraser Tweedale 2020-04-28 22:17:51 UTC
*** Bug 1810683 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.