2021-06-04 07:21:11,869 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-06-04 07:21:15,558 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-06-04 07:21:18.177  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-06-04 07:21:29.161 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-06-04 07:21:29.959  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-06-04 07:21:30.559  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-06-04 07:21:43.684  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 34.008 seconds (JVM running for 40.522) 2021-06-04 07:29:12.280  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 07:29:12.369 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 07:29:12.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-06-04 07:29:12.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 07:29:12.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-06-04 07:29:12.663  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 07:29:12.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 07:29:12.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 07:29:12.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 07:29:12.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 07:29:12.682  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 07:29:12.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 07:29:12.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 07:29:12.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 07:29:12.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 07:29:14.547  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 07:29:14.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 07:29:14.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 07:29:14.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 07:29:14.560  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 07:29:14.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 07:29:14.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 07:29:14.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 07:29:14.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 07:29:14.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 07:29:14.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 07:29:14.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 07:29:14.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 07:29:14.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 07:29:14.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 07:29:14.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 07:29:14.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 07:29:14.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:72:cf:56:b8:b0:71:c0:2d:01:cc:8e:6a:3c:d2:ba:f3:5d:97:76] modulus: 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 public exponent: 10001 ] 2021-06-04 08:46:18.782  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:46:18.784 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:46:18.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:46:18.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:46:18.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:46:18.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:46:18.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:46:18.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:46:18.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:46:18.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:46:18.856  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:46:18.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:46:18.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:46:19.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:46:19.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:46:19.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:46:19.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:46:19.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:46:19.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:46:19.156  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:46:19.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:46:19.158  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:46:19.158  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:46:19.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:46:19.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:46:19.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:46:19.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:46:19.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:46:19.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:46:19.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:46:19.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:47:18:f5:b6:94:a7:6c:fa:94:7b:a5:80:cf:09:10:40:74:d9:9a] modulus: ad81a116050724cd53338af23ff24e36931b0f87ebf16242f6a5b63d0183a324e17f8598e19d73225dd63fd58b633df2d77b037d87d376156428b05e93c1c28126c1a48223c56581a62dde80237fa7bb73fd8be2e638e0c20e474442cd947922aee9cadd5d76c1985d84ae498927f1c58e993d3fcbddde5bf5c0ed340b892e07f9d9ca46da18e370d3a0a0f19a6abb9988d6bac8a06180ecf7a6c91c09c11a39d7fbc68c5deb6b11307b70f81fef73d630cc5e5074e1b7a4341a1317792209c6d8f3270c31b71a0fb650544753fedfcc4a2fd7790cf0256da85ea5e8a00e190e12530c82e93abb784cb2150583a3f3e6803eacf9a967a3b8d6a2116c867f983b public exponent: 10001 ] 2021-06-04 08:48:14.139  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:48:14.140 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:48:14.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-04 08:48:14.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:48:14.144  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-04 08:48:14.145  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:48:14.145  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:48:14.145  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:48:14.146  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:48:14.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:48:14.152  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:48:14.152  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:48:14.155  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:48:14.262  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:48:14.263  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:48:14.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:48:14.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:48:14.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:48:14.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:48:14.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:48:14.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:48:14.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:48:14.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:48:14.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:48:14.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:48:14.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:48:14.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:48:14.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:48:14.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:48:14.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:48:14.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: b0b6afb351b41eb930eac5d5957540cb7324b61de78820b8115489a073a3e0c00fa711f60f7249bc81b043ee19893136d05e5cf77a17ef3f8cc9da1195e0f40192cf426e8bbfeb80b180cfb63ba3238495de782ed526219db0e734fcd381a266a524294c35b47335cd04def100e36adfe4b364731b5776202d99b33a751e9adf6671a5158e745e68a8fe3b4c3e02988f6c85cbe1ced2d5a9dd4ab8b03032c1eac4557f664be4212d97de174ca36604c96b627ffe245a20ca159aeac47f666408f4d7a70caeb7a13dcc39a99a8fc9c7f1d98c127cd8b31937974532340d2e8c891fc9feb8aa4cc92f6ab2f283d917a2ab5b5650fd3057bfe3fd7f91eae52cc8e507a0827314649bc749a339d6c200f58848d23a3a1125d6488089664049f96b4837c6339f3bfc4976b7d7de1dfea7f72ee83ba941fba1f60badcff95b61e2cfbed795a02606bef5b2c03ac2b5650feb04595233652c9f6e66556e6d22741f2bf019323255ba54a6b0f064cedef78f858350954f1f7a6eba25ff5203bbe829f7c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:60:69:9a:93:bf:73:db:ee:d8:ed:a3:f6:a7:cc:95:5c:fd:0c:a8] modulus: 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 public exponent: 10001 ] 2021-06-04 08:51:20.378  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:51:20.379 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:51:20.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 08:51:20.381 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:51:20.381  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 08:51:20.382  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:51:20.382  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:51:20.382  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:51:20.383  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:51:20.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:51:20.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:51:20.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:51:20.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:51:20.586  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:51:20.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:51:20.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:51:20.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:51:20.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:51:20.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:51:20.593  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:51:20.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:51:20.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:51:20.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:51:20.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:51:20.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:51:20.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:51:20.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:51:20.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:51:20.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:51:20.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:51:20.659 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:64:40:1c:4b:ff:af:e1:69:f9:64:8f:9b:8b:04:be:07:41:d2:10] modulus: 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 public exponent: 10001 ] 2021-06-04 08:51:31.320  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:51:31.358 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:51:31.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 08:51:31.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:51:31.360  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 08:51:31.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:51:31.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:51:31.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:51:31.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:51:31.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:51:31.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:51:31.366  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:51:31.367  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:51:31.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:51:31.460  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:51:31.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:51:31.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:51:31.462  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:51:31.463  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:51:31.464  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:51:31.465  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:51:31.465  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:51:31.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:51:31.466 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:51:31.466 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:51:31.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:51:31.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:51:31.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:51:31.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:51:31.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:51:31.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: b0b6afb351b41eb930eac5d5957540cb7324b61de78820b8115489a073a3e0c00fa711f60f7249bc81b043ee19893136d05e5cf77a17ef3f8cc9da1195e0f40192cf426e8bbfeb80b180cfb63ba3238495de782ed526219db0e734fcd381a266a524294c35b47335cd04def100e36adfe4b364731b5776202d99b33a751e9adf6671a5158e745e68a8fe3b4c3e02988f6c85cbe1ced2d5a9dd4ab8b03032c1eac4557f664be4212d97de174ca36604c96b627ffe245a20ca159aeac47f666408f4d7a70caeb7a13dcc39a99a8fc9c7f1d98c127cd8b31937974532340d2e8c891fc9feb8aa4cc92f6ab2f283d917a2ab5b5650fd3057bfe3fd7f91eae52cc8e507a0827314649bc749a339d6c200f58848d23a3a1125d6488089664049f96b4837c6339f3bfc4976b7d7de1dfea7f72ee83ba941fba1f60badcff95b61e2cfbed795a02606bef5b2c03ac2b5650feb04595233652c9f6e66556e6d22741f2bf019323255ba54a6b0f064cedef78f858350954f1f7a6eba25ff5203bbe829f7c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:32:03:a8:f4:43:c5:1f:44:27:4f:19:b2:fa:05:48:73:ff:2c:85] modulus: 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 public exponent: 10001 ] 2021-06-04 08:52:24.533  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:52:24.535 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:52:24.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-04 08:52:24.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:52:24.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-04 08:52:24.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:52:24.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:52:24.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:52:24.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:52:24.542  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:52:24.543  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:52:24.543  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:52:24.544  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:52:24.639  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:52:24.639  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:52:24.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:52:24.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:52:24.659  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:52:24.660  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:52:24.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:52:24.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:52:24.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:52:24.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:52:24.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:52:24.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:52:24.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:52:24.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:52:24.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:52:24.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:52:24.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:52:24.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:b5:1d:8a:5e:6b:ec:7a:47:ae:b7:1c:f1:a8:22:a5:43:99:01:4c] modulus: 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 public exponent: 10001 ] 2021-06-04 08:52:36.354  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:52:36.355 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:52:36.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-04 08:52:36.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:52:36.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-04 08:52:36.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:52:36.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:52:36.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:52:36.360  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:52:36.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:52:36.365  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:52:36.365  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:52:36.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:52:36.468  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:52:36.469  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:52:36.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:52:36.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:52:36.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:52:36.472  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:52:36.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:52:36.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:52:36.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:52:36.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:52:36.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:52:36.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:52:36.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:52:36.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:52:36.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:52:36.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:52:36.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:52:36.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:60:28:69:db:5f:16:f0:a3:ae:9a:67:3a:3a:84:67:d4:02:4f:57] modulus: 95a4baba80798b144733c9492df8d5197df09d86cdf0be6b11b1cbd37f63895e3d13e6c33e62ebf0493407fec92737944ee87dd5f135df182cc331f217230e6d56f9d109e4f4b5eca9540ae757d3ffa82f53e84cc54af12058f092fd879af15b8724755c0fcfdb804e389c7d6175fb8ed0a36a518ff1c941c52f3d35db16142a5ed0f602f6161b2c36c82e146fec8504acb764b19a7080609e105fc12b5efdf067c030ae8ce00f7f103fdb357e9f857960f29bfeaa67c78e339db22dc6b976bc7132b5a076be15cde1e50d4f65423efe3ad15feb9b71e367b82d02394ca67fa7f4080ee2aa9b3e438bd5666792ef8210b8e07bee896892a93fe19303e4dac839 public exponent: 10001 ] 2021-06-04 08:53:43.976  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:53:43.977 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:53:43.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-04 08:53:43.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:53:43.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-04 08:53:43.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:53:43.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:53:43.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:53:43.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:53:43.984  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:53:43.985  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:53:43.985  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:53:43.986  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:53:44.119  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:53:44.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:53:44.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:53:44.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:53:44.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:53:44.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:53:44.125  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:53:44.126  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:53:44.127  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:53:44.127  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:53:44.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:53:44.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:53:44.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:53:44.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:53:44.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:53:44.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:53:44.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:53:44.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:91:d9:29:fc:4e:4d:73:8d:e9:3e:ed:97:5a:77:32:d8:65:e9:c3] modulus: 9ff15d6e3930cd90eb17954cd024c8edbff1b7b9c0e95a3fc8fb8973552765b623de220d7f58992574184e8c2528f5ecfb18779ff678ec6a0775fd8832cb03f5baeb703f74bcf629414e911d47830148d746c7b6279c76d7d19e2414b05cc831cd6a1135cbeb78a86e29d0cb6bd6a14ef28f0205fdf595357de7146866a253cdf051f93d4c032c0561107c03ef7bc4347ffe1251ecf664982c4cd0c6491035df4aa0c944f2010301cb1687747df1b4b62fe406acaa6ff018eaca5a893a8f9a177f4699ad34f20a63a8194863439fa5f05dd6549cf0ad576e329942678b5cf821914cea198cbea7f249e6469ba12ced0a382e7cd3afcd296dca205a9c9109e6df public exponent: 10001 ] 2021-06-04 08:54:47.220  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:54:47.222 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:54:47.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-04 08:54:47.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:54:47.224  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-04 08:54:47.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:54:47.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:54:47.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:54:47.226  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:54:47.229  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:54:47.230  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:54:47.230  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:54:47.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:54:47.336  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 08:54:47.337  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 08:54:47.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 08:54:47.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 08:54:47.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 08:54:47.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 08:54:47.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 08:54:47.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 08:54:47.347  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 08:54:47.347  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 08:54:47.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:54:47.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:54:47.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:54:47.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 08:54:47.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 08:54:47.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 08:54:47.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 08:54:47.352 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: b0b6afb351b41eb930eac5d5957540cb7324b61de78820b8115489a073a3e0c00fa711f60f7249bc81b043ee19893136d05e5cf77a17ef3f8cc9da1195e0f40192cf426e8bbfeb80b180cfb63ba3238495de782ed526219db0e734fcd381a266a524294c35b47335cd04def100e36adfe4b364731b5776202d99b33a751e9adf6671a5158e745e68a8fe3b4c3e02988f6c85cbe1ced2d5a9dd4ab8b03032c1eac4557f664be4212d97de174ca36604c96b627ffe245a20ca159aeac47f666408f4d7a70caeb7a13dcc39a99a8fc9c7f1d98c127cd8b31937974532340d2e8c891fc9feb8aa4cc92f6ab2f283d917a2ab5b5650fd3057bfe3fd7f91eae52cc8e507a0827314649bc749a339d6c200f58848d23a3a1125d6488089664049f96b4837c6339f3bfc4976b7d7de1dfea7f72ee83ba941fba1f60badcff95b61e2cfbed795a02606bef5b2c03ac2b5650feb04595233652c9f6e66556e6d22741f2bf019323255ba54a6b0f064cedef78f858350954f1f7a6eba25ff5203bbe829f7c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:0b:19:37:89:ea:e0:99:c0:1e:92:23:69:b0:27:7c:e7:21:78:4f] modulus: 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 public exponent: 10001 ] 2021-06-04 08:58:58.715  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:58:58.716 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:58:58.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:58:58.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:58:58.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:58:58.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:58:58.719  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:58:58.719  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:58:58.719  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:58:58.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:58:58.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:58:58.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:58:58.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:58:59.745 ERROR 1 [nio-8443-exec-2] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 08:58:59.750 ERROR 1 [nio-8443-exec-2] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 08:59:04.833  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:59:04.834 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:59:04.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:59:04.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:59:04.835  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:59:04.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:59:04.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:59:04.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:59:04.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:59:04.840  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:59:04.840  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:59:04.840  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:59:04.841  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:59:05.855 ERROR 1 [nio-8443-exec-8] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 08:59:05.856 ERROR 1 [nio-8443-exec-8] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 08:59:26.920  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 08:59:26.921 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 08:59:26.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:59:26.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 08:59:26.922  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 08:59:26.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 08:59:26.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 08:59:26.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 08:59:26.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 08:59:26.927  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 08:59:26.927  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:59:26.928  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 08:59:26.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 08:59:27.967 ERROR 1 [nio-8443-exec-5] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 08:59:27.967 ERROR 1 [nio-8443-exec-5] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 09:00:00.562  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:00:00.563 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:00:00.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:00:00.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:00:00.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:00:00.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:00:00.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:00:00.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:00:00.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:00:00.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:00:00.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:00:00.570  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:00:00.571  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:00:01.604 ERROR 1 [nio-8443-exec-9] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:00:01.605 ERROR 1 [nio-8443-exec-9] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 09:00:59.449  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:00:59.450 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:00:59.451 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:00:59.451 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:00:59.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:00:59.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:00:59.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:00:59.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:00:59.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:00:59.456  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:00:59.456  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:00:59.457  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:00:59.458  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:01:00.479 ERROR 1 [nio-8443-exec-1] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:01:00.479 ERROR 1 [nio-8443-exec-1] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 09:02:27.066  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:02:27.067 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:02:27.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:02:27.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:02:27.069  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:02:27.069  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:02:27.069  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:02:27.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:02:27.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:02:27.075  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:02:27.075  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:02:27.075  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:02:27.077  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:02:28.193 ERROR 1 [nio-8443-exec-5] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:02:28.194 ERROR 1 [nio-8443-exec-5] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 09:06:50.287  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:06:50.288 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:06:50.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:06:50.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:06:50.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:06:50.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:06:50.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:06:50.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:06:50.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:06:50.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:06:50.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:06:50.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:06:50.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:06:51.330 ERROR 1 [nio-8443-exec-2] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:06:51.331 ERROR 1 [nio-8443-exec-2] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 61 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 82 more 2021-06-04 09:06:56.535  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:06:56.536 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:06:56.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:06:56.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:06:56.538  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:06:56.539  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:06:56.539  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:06:56.539  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:06:56.540  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:06:56.545  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:06:56.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:06:56.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:06:56.548  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:06:57.567 ERROR 1 [nio-8443-exec-9] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:06:57.568 ERROR 1 [nio-8443-exec-9] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at jdk.internal.reflect.GeneratedMethodAccessor151.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 60 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 81 more 2021-06-04 09:07:17.673  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:07:17.674 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:07:17.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:07:17.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:07:17.675  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:07:17.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:07:17.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:07:17.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:07:17.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:07:17.680  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:07:17.680  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:07:17.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:07:17.682  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:07:18.719 ERROR 1 [nio-8443-exec-2] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:07:18.720 ERROR 1 [nio-8443-exec-2] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at jdk.internal.reflect.GeneratedMethodAccessor151.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 60 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 81 more 2021-06-04 09:07:50.148  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:07:50.149 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:07:50.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:07:50.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:07:50.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:07:50.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:07:50.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:07:50.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:07:50.152  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:07:50.155  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:07:50.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:07:50.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:07:50.157  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:07:51.199 ERROR 1 [nio-8443-exec-5] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-06-04 09:07:51.199 ERROR 1 [nio-8443-exec-5] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106) at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57) at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92) at jdk.internal.reflect.GeneratedMethodAccessor151.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.17.173] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$21fb8c4d.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 60 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 81 more 2021-06-04 09:08:36.757  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:08:36.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:08:36.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:08:36.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:08:36.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:08:36.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:08:36.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:08:36.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:08:36.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:08:36.763  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:08:36.764  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:08:36.764  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:08:36.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:08:37.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 09:08:37.100  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 09:08:37.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 09:08:37.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 09:08:37.101  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 09:08:37.101  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 09:08:37.102  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 09:08:37.102  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 09:08:37.102  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 09:08:37.103  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:08:37.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:08:37.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 09:08:37.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:7c:a9:34:a7:a6:d6:c5:41:d8:7b:25:5a:c8:92:a0:cb:dc:48:b1] modulus: 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 public exponent: 10001 ] 2021-06-04 09:12:42.039  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:12:42.040 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:12:42.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 09:12:42.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:12:42.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-04 09:12:42.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:12:42.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:12:42.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:12:42.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:12:42.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:12:42.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:12:42.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:12:42.050  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:12:42.357  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 09:12:42.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 09:12:42.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 09:12:42.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 09:12:42.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 09:12:42.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 09:12:42.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 09:12:42.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 09:12:42.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 09:12:42.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 09:12:42.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:12:42.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:12:42.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:12:42.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:12:42.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:12:42.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:12:42.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 09:12:42.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:0d:ea:6d:93:69:f2:8b:2c:63:b0:1f:54:77:e7:86:3d:47:34:4a] modulus: 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 public exponent: 10001 ] 2021-06-04 09:13:45.735  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:13:45.736 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:13:45.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-04 09:13:45.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:13:45.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-04 09:13:45.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:13:45.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:13:45.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:13:45.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:13:45.744  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:13:45.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:13:45.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:13:45.746  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:13:45.948  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 09:13:45.949  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 09:13:45.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 09:13:45.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 09:13:45.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 09:13:45.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 09:13:45.953  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 09:13:45.953  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 09:13:45.954  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 09:13:45.954  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 09:13:45.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:13:45.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:13:45.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:13:45.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:13:45.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:13:45.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:13:45.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 09:13:45.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: b0b6afb351b41eb930eac5d5957540cb7324b61de78820b8115489a073a3e0c00fa711f60f7249bc81b043ee19893136d05e5cf77a17ef3f8cc9da1195e0f40192cf426e8bbfeb80b180cfb63ba3238495de782ed526219db0e734fcd381a266a524294c35b47335cd04def100e36adfe4b364731b5776202d99b33a751e9adf6671a5158e745e68a8fe3b4c3e02988f6c85cbe1ced2d5a9dd4ab8b03032c1eac4557f664be4212d97de174ca36604c96b627ffe245a20ca159aeac47f666408f4d7a70caeb7a13dcc39a99a8fc9c7f1d98c127cd8b31937974532340d2e8c891fc9feb8aa4cc92f6ab2f283d917a2ab5b5650fd3057bfe3fd7f91eae52cc8e507a0827314649bc749a339d6c200f58848d23a3a1125d6488089664049f96b4837c6339f3bfc4976b7d7de1dfea7f72ee83ba941fba1f60badcff95b61e2cfbed795a02606bef5b2c03ac2b5650feb04595233652c9f6e66556e6d22741f2bf019323255ba54a6b0f064cedef78f858350954f1f7a6eba25ff5203bbe829f7c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:a6:29:72:34:54:9f:23:57:5f:4f:de:49:e9:fd:2f:30:6e:f4:65] modulus: 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 public exponent: 10001 ] 2021-06-04 09:15:52.550  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:15:52.551 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:15:52.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-04 09:15:52.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:15:52.553  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-04 09:15:52.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:15:52.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:15:52.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:15:52.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:15:52.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:15:52.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:15:52.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:15:52.560  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:15:52.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 09:15:52.676  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 09:15:52.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 09:15:52.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 09:15:52.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 09:15:52.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 09:15:52.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 09:15:52.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 09:15:52.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 09:15:52.682  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 09:15:52.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:15:52.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:15:52.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:15:52.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:15:52.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:15:52.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:15:52.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 09:15:52.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: b0b6afb351b41eb930eac5d5957540cb7324b61de78820b8115489a073a3e0c00fa711f60f7249bc81b043ee19893136d05e5cf77a17ef3f8cc9da1195e0f40192cf426e8bbfeb80b180cfb63ba3238495de782ed526219db0e734fcd381a266a524294c35b47335cd04def100e36adfe4b364731b5776202d99b33a751e9adf6671a5158e745e68a8fe3b4c3e02988f6c85cbe1ced2d5a9dd4ab8b03032c1eac4557f664be4212d97de174ca36604c96b627ffe245a20ca159aeac47f666408f4d7a70caeb7a13dcc39a99a8fc9c7f1d98c127cd8b31937974532340d2e8c891fc9feb8aa4cc92f6ab2f283d917a2ab5b5650fd3057bfe3fd7f91eae52cc8e507a0827314649bc749a339d6c200f58848d23a3a1125d6488089664049f96b4837c6339f3bfc4976b7d7de1dfea7f72ee83ba941fba1f60badcff95b61e2cfbed795a02606bef5b2c03ac2b5650feb04595233652c9f6e66556e6d22741f2bf019323255ba54a6b0f064cedef78f858350954f1f7a6eba25ff5203bbe829f7c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:06:9e:75:4d:78:cf:87:13:33:6b:0a:69:7a:59:d5:8d:21:93:6a] modulus: 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 public exponent: 10001 ] 2021-06-04 09:20:16.108  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-04 09:20:16.110 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-04 09:20:16.111 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:20:16.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-04 09:20:16.112  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-04 09:20:16.113  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-04 09:20:16.113  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-04 09:20:16.113  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-04 09:20:16.114  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-04 09:20:16.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-04 09:20:16.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:20:16.118  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-04 09:20:16.118  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-04 09:20:16.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-04 09:20:16.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-04 09:20:16.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-04 09:20:16.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-04 09:20:16.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1662 2021-06-04 09:20:16.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-04 09:20:16.284  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-04 09:20:16.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-04 09:20:16.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-04 09:20:16.285  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-04 09:20:16.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:20:16.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:20:16.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:20:16.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-04 09:20:16.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-04 09:20:16.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-04 09:20:16.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-04 09:20:16.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 273500033320367524563555098419427018399069156894 IssuerDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 04 07:16:40 UTC 2021 Final Date: Wed Jun 04 07:16:40 UTC 2031 SubjectDN: UID=c-02bed63b0a3e4f3d3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:0c:81:43:b9:ff:14:89:99:78:36:3e:28:7e:26:04:ad:fe:c2:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 662e57b9236420190b70e8bf2dda3612b55843e4 994b6480c189602b1f6e984e713f630686d4824f ba7a822166b5c2134de2993d477ca342dd44364b 3392f24c8188722fb0a084f8f1a5f34515d69f76 b40ff0e7d657b877b9f549fd53a098a8fb6897ec 8f31a120bfb3df02e1978b191142a3086e25322f 3d8aeb5cd13311ee48fbbd42cc94a3d3b9adac94 ba19e67262a5fd13c564afb54a02841c148c8e5e ef356c3f52591e13274134386810e34cf0f53fb6 16b721c27fefaaa4c409b0408ee6e0996da46e47 069b30831ec2200ba0f23316d28eb5aa0c365749 9c596cedcf0f33e3f0d212ada4b7222f5fffbfa4 292ab567ff58e6fa2e5cca7075b6ebfc189cfec0 7fd6ed88dc3a2762dcebba3d6da36cadcf44727f 7053fe18d1fffc9b985ac18313c1d1d6d8a0c0fe 72f0293bd128e3718d661fa6c40bb8bedcfc9165 4a56a24216eb030763492d52d211ac7ee10c7729 c6842b17b853efe64ade62b52544081f48db6f78 a5ae406ac845b2099db7b048e8e34221a033a759 96bd78bd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:fb:8d:bb:5c:bd:1c:d5:26:89:3a:05:af:7f:e3:61:f3:77:7d:b7] modulus: 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 public exponent: 10001 ]