Repackage aveksa.ear to /tmp/repackaged_ear_dir
Deploying aveksa.ear...
{"WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:" => {"Operation step-2" =>
{"WFLYCTL0180: Services with missing/unavailable dependencies" => undefined}}}
Failed to deploy aveksa.ear
Step failed! See /tmp/aveksa-install.log for more information.
<EOF>
... Creating new keystore directory /home/oracle/keystore ... Existing aveksa.keystore found under /home/oracle/jboss-4.2.2.GA/server/default/conf/keystore Moving aveksa.keystore to the new keystore directory: /home/oracle/keystore ... [Tue May 22 18:15:26 EDT 2018] Configuring SSL Certificates completed ...
2018-05-22 18:18:15,097 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([ ("core-service" => "management"), ("security-realm" => "AveksaRealm") ]) - failure description: { "WFLYCTL0080: Failed services" => {"jboss.server.controller.management.security_realm.AveksaRealm.key-manager" => "org.jboss.msc.service.StartException in service jboss.server.controller.management.security_realm.AveksaRealm.key-manager: Failed to start service Caused by: java.lang.IllegalStateException: org.jboss.msc.service.StartException in anonymous service: WFLYDM0085: The alias specified 'server' does not exist in the KeyStore, valid aliases are {alias-list} Caused by: org.jboss.msc.service.StartException in anonymous service: WFLYDM0085: The alias specified 'server' does not exist in the KeyStore, valid aliases are {alias-list}"}, "WFLYCTL0412: Required services that are not installed:" => ["jboss.server.controller.management.security_realm.AveksaRealm.key-manager"], "WFLYCTL0180: Services with missing/unavailable dependencies" => undefined }
# pwd /home/oracle/keystore # keytool -list -v -storepass Av3k5a15num83r0n3 -keystore aveksa.keystore Keystore type: JKS Keystore provider: SUN Your keystore contains 1 entry Alias name: server Creation date: Mar 2, 2015 Entry type: PrivateKeyEntry Certificate chain length: 1 Certificate[1]: Owner: CN=ACM, OU=Aveksa, O=Aveksa, L=Waltham, ST=Massachusetts, C=US Issuer: CN=ACM, OU=Aveksa, O=Aveksa, L=Waltham, ST=Massachusetts, C=US Serial number: 54f4946a Valid from: Mon Mar 02 11:48:42 EST 2015 until: Thu Jun 12 12:48:42 EDT 2064 Certificate fingerprints: MD5: DF:D2:91:7E:12:95:3A:89:6E:1B:7E:F1:B3:10:E5:A0 SHA1: 8E:F8:3C:68:1A:39:0F:57:F6:B0:6D:37:AB:F0:28:E9:FE:45:10:79 Signature algorithm name: SHA256withRSA Version: 3
The use cases where this may occur are:
Please note that the RSA Identity Governance and Lifecycle 7.1 Installation Guide does suggest that the alias can be changed from server but this is not the case.
cd $AVEKSA_HOME/keystore keytool -list -v -storepass Av3k5a15num83r0n3 -keystore aveksa.keystore
Alias name: server
# mv aveksa.keystore aveksa.keystore.bak
-changealias [-v] [-protected] -alias <alias> -destalias <destalias> [-keypass <keypass>] [-keystore <keystore>] [-storepass <storepass>] [-storetype <storetype>] [-providername <name>] [-providerclass <provider_class_name> [-providerarg <arg>]] ... [-providerpath <pathlist>] Move an existing keystore entry from the specified alias to a new alias, destalias. If no destination alias is provided, the command will prompt for one. If the original entry is protected with an entry password, the password can be supplied via the "-keypass" option. If no key password is provided, the storepass (if given) will be attempted first. If that attempt fails, the user will be prompted for a password.
# keytool -changealias -alias server711 -destalias server -storepass Av3k5a15num83r0n3 -keystore aveksa.keystore
cd $AVEKSA_HOME/wildfly/standalone/configuration vi aveksa-standalone-full.xml
<keystore path="/home/oracle/keystore/aveksa.keystore" keystore-password="Av3k5a15num83r0n3" alias="server" key-password="Av3k5a15num83r0n3"/>
alias="server"