I was tailing several logs in /var/log/pki/pki-tomcat/ca/ (debug, system, and 
transactions) and though the replica installation failed again at the same 
point, this is what I got from the logs throughout the installation process:

[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
SecurityDomainResource.getDomainInfo()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
mapping: default
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
required auth methods: [*]
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
anonymous access allowed
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: 
SecurityDomainResource.getDomainInfo()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: No ACL 
mapping.
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: SecurityDomainResource.getDomainInfo()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: content-type: null
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: accept: [application/json]
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: response format: application/json
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: according to ccMode, 
authorization for servlet: securitydomain is LDAP based, not XML {1}, use 
default authz mgr: {2}.
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: LdapBoundConnFactory: 
init 
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
LdapBoundConnFactory:doCloning true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: LdapAuthInfo: init()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: LdapAuthInfo: init begins
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: LdapAuthInfo: init ends
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: init: before 
makeConnection errorIfDown is false
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: makeConnection: 
errorIfDown false
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: LdapJssSSLSocket set 
client auth cert nicknamesubsystemCert cert-pki-ca
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SSL handshake happened
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: Established LDAP 
connection with SSL client auth to ipa1.our.net:636
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: initializing with 
mininum 3 and maximum 15 connections to host ipa1.our.net port 636, secure 
connection, true, authentication type 2
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: increasing minimum 
connections by 3
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: new total available 
connections 3
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: new number of 
connections 3
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: In 
LdapBoundConnFactory::getConn()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: masterConn is connected: 
true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: conn is 
connected true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: mNumConns now 2
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
name: IPA
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: CA
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
 - cn=ipa1.our.net:443,cn=CAList,ou=Security Domain,o=ipaca
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - objectClass: top
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - host: ipa1.our.net
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - SecurePort: 443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - SecureAgentPort: 443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - SecureAdminPort: 443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - SecureEEClientAuthPort: 443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - UnSecurePort: 80
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - Clone: FALSE
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - SubsystemName: CA ipa1.our.net 8443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - cn: ipa1.our.net:443
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
   - DomainManager: TRUE
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: OCSP
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: KRA
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: RA
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: TKS
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SecurityDomainProcessor: 
subtype: TPS
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: Releasing ldap connection
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 3
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: Authentication: UID=admin
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: In 
LdapBoundConnFactory::getConn()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: masterConn is connected: 
true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: conn is 
connected true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: mNumConns now 2
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
LdapAnonConnFactory::getConn
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: 
LdapAnonConnFactory.getConn(): num avail conns now 2
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 3
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: SSL handshake happened
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 2
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: In 
LdapBoundConnFactory::getConn()
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: masterConn is connected: 
true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: conn is 
connected true
[08/Jun/2021:06:35:45][ajp-bio-127.0.0.1-8009-exec-2]: getConn: mNumConns now 2
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 3
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: In 
LdapBoundConnFactory::getConn()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: masterConn is connected: 
true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: getConn: conn is 
connected true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: getConn: mNumConns now 2
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 3
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: In 
LdapBoundConnFactory::getConn()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: masterConn is connected: 
true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: getConn: conn is 
connected true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: getConn: mNumConns now 2
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: returnConn: mNumConns 
now 3
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
AccountResource.login()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
mapping: account
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
required auth methods: [passwdUserDBAuthMgr, certUserDBAuthMgr]
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
authentication manager: passwdUserDBAuthMgr
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
access granted
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: 
AccountResource.login()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: mapping: 
account.login
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: 
principal: admin
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: ACL: 
certServer.ca.account,login
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: checkACLS(): ACLEntry 
expressions= user="anybody"
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: evaluating expressions: 
user="anybody"
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: evaluated expression: 
user="anybody" to be true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: DirAclAuthz: 
authorization passed
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: access 
granted
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: AccountResource.login()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: content-type: null
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: accept: [application/json]
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: response format: application/json
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
AccountResource.logout()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
mapping: account
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
required auth methods: [passwdUserDBAuthMgr, certUserDBAuthMgr]
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
authentication manager: passwdUserDBAuthMgr
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: AuthMethodInterceptor: 
access granted
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: 
AccountResource.logout()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: mapping: 
account.logout
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: 
principal: admin
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: ACL: 
certServer.ca.account,logout
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: checkACLS(): ACLEntry 
expressions= user="anybody"
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: evaluating expressions: 
user="anybody"
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: evaluated expression: 
user="anybody" to be true
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: DirAclAuthz: 
authorization passed
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: ACLInterceptor: access 
granted
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: AccountResource.logout()
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: content-type: null
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: accept: [application/json]
[08/Jun/2021:06:35:46][ajp-bio-127.0.0.1-8009-exec-2]: 
MessageFormatInterceptor: response format: application/json

It again failed at this point:

Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
  [1/30]: configuring certificate server instance
ipaserver.install.dogtaginstance: CRITICAL Failed to configure CA instance: 
Command '/usr/sbin/pkispawn -s CA -f /tmp/tmph2SUT4' returned non-zero exit 
status 1
ipaserver.install.dogtaginstance: CRITICAL See the installation logs and the 
following files/directories for more information:
ipaserver.install.dogtaginstance: CRITICAL   /var/log/pki/pki-tomcat
  [error] RuntimeError: CA configuration failed.
Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.

ipapython.admintool: ERROR    CA configuration failed.
ipapython.admintool: ERROR    The ipa-replica-install command failed. See 
/var/log/ipareplica-install.log for more information


Is there another way to transfer or duplicate the CA? We are ultimately 
planning to shut this box down due to its age, and currently it is the only CA, 
but it seems to be trying to hang on to its job security... ;-)


-- 
  Bret Wortman
  bret.wort...@damascusgrp.com

On Mon, Jun 7, 2021, at 11:13 AM, Bret Wortman via FreeIPA-users wrote:
> You were absolutely correct, the flag worked, and the config-show did 
> not show a CRL server at all.
> 
> I'll dig into the ca logs next.
> 
> 
> -- 
>   Bret Wortman
>   bret.wort...@damascusgrp.com
> 
> On Mon, Jun 7, 2021, at 11:07 AM, Rob Crittenden wrote:
> > Bret Wortman wrote:
> > > I cleaned up the contents of our ldap manually, re-created the replica 
> > > file, and got a lot further than we have before but ipa-replica-install 
> > > still failed as below:
> > > 
> > > Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
> > >   [1/30]: configuring certificate server instance
> > > ipaserver.install.dogtaginstance: CRITICAL Failed to configure CA 
> > > instance: Command '/usr/sbin/pkispawn -s CA -f /tmp/tmphvJyRY' returned 
> > > non-zero exit status 1
> > > ipaserver.install.dogtaginstance: CRITICAL See the installation logs and 
> > > the following files/directories for more information:
> > > ipaserver.install.dogtaginstance: CRITICAL   /var/log/pki/pki-tomcat
> > >   [error] RuntimeError: CA configuration failed.
> > > Your system may be partly configured.
> > > Run /usr/sbin/ipa-server-install --uninstall to clean up.
> > 
> > If the pkispawn fails you need to dig into the CA logging for any
> > details. It just gives us a pass/fail to IPA.
> > 
> > > ipapython.admintool: ERROR    CA configuration failed.
> > > ipapython.admintool: ERROR    The ipa-replica-install command failed. See 
> > > /var/log/ipareplica-install.log for more information
> > > [root@ipa2c7 ~]# ipa-server-install --uninstall -U
> > > ipapython.admintool: ERROR    Unable to read 
> > > /etc/httpd/conf.d/ipa-pki-proxy.conf
> > > ipapython.admintool: ERROR    The ipa-server-install command failed. See 
> > > /var/log/ipaserver-uninstall.log for more information
> > > [root@ipa2c7 ~]# touch /etc/httpd/conf.d/ipa-pki-proxy.conf
> > > [root@ipa2c7 ~]# ipa-server-install --uninstall -U
> > > Deleting this server will leave your installation without a CRL 
> > > generation master.
> > > ipapython.admintool: ERROR    Aborting uninstall operation.
> > > ipapython.admintool: ERROR    The ipa-server-install command failed. See 
> > > /var/log/ipaserver-uninstall.log for more information
> > 
> > This is most likely a red herring. Your current version is old enough
> > that it may not store who the CRL management server is.  On the existing
> > server us ipa config-show to find out.
> > 
> > You can add --igore-last-of-role to skip this I believe.
> > 
> > rob
> > 
> > > 
> > > It looks to have failed in such a way that it doesn't know how to back 
> > > out again, which I haven't seen before. Thoughts? The error in 
> > > ipa-uninstall.log looks like a generic admintool.py error:
> > > 
> > > 2021-06-07T12:31:38Z DEBUG retrieving schema for SchemaCache 
> > > url=ldapi://%2fvar%2frun%2fslapd-OUR-NET.socket 
> > > conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7f05289fdf80>
> > > 2021-06-07T12:31:38Z DEBUG raw: config_show(version=u'2.237')
> > > 2021-06-07T12:31:38Z DEBUG config_show(rights=False, all=False, 
> > > raw=False, version=u'2.237')
> > > 2021-06-07T12:31:38Z DEBUG   File 
> > > "/usr/lib/python2.7/site-packages/ipapython/admintool.py", line 178, in 
> > > execute
> > >     return_value = self.run()
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/cli.py", line 
> > > 319, in run
> > >     return cfgr.run()
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 358, in run
> > >     self.validate()
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 368, in validate
> > >     for _nothing in self._validator():
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 431, in __runner
> > >     exc_handler(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 455, in _handle_validate_exception
> > >     self._handle_exception(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 450, in _handle_exception
> > >     six.reraise(*exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 421, in __runner
> > >     step()
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 418, in <lambda>
> > >     step = lambda: next(self.__gen)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 
> > > 81, in run_generator_with_yield_from
> > >     six.reraise(*exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 
> > > 59, in run_generator_with_yield_from
> > >     value = gen.send(prev_value)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 633, in _configure
> > >     next(validator)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 431, in __runner
> > >     exc_handler(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 455, in _handle_validate_exception
> > >     self._handle_exception(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 518, in _handle_exception
> > >     self.__parent._handle_exception(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 450, in _handle_exception
> > >     six.reraise(*exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 515, in _handle_exception
> > >     super(ComponentBase, self)._handle_exception(exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 450, in _handle_exception
> > >     six.reraise(*exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 421, in __runner
> > >     step()
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 
> > > 418, in <lambda>
> > >     step = lambda: next(self.__gen)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 
> > > 81, in run_generator_with_yield_from
> > >     six.reraise(*exc_info)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 
> > > 59, in run_generator_with_yield_from
> > >     value = gen.send(prev_value)
> > >   File "/usr/lib/python2.7/site-packages/ipapython/install/common.py", 
> > > line 73, in _uninstall
> > >     for unused in self._uninstaller(self.parent):
> > >   File 
> > > "/usr/lib/python2.7/site-packages/ipaserver/install/server/__init__.py", 
> > > line 594, in main
> > >     uninstall_check(self)
> > >   File 
> > > "/usr/lib/python2.7/site-packages/ipaserver/install/server/install.py", 
> > > line 250, in decorated
> > >     func(installer)
> > >   File 
> > > "/usr/lib/python2.7/site-packages/ipaserver/install/server/install.py", 
> > > line 1030, in uninstall_check
> > >     ca.uninstall_check(options)
> > >   File "/usr/lib/python2.7/site-packages/ipaserver/install/ca.py", line 
> > > 127, in uninstall_check
> > >     raise ScriptError("Aborting uninstall operation.")
> > > 
> > > 2021-06-07T12:31:38Z DEBUG The ipa-server-install command failed, 
> > > exception: ScriptError: Aborting uninstall operation.
> > > 2021-06-07T12:31:38Z ERROR Aborting uninstall operation.
> > > 2021-06-07T12:31:38Z ERROR The ipa-server-install command failed. See 
> > > /var/log/ipaserver-uninstall.log for more information
> > > 
> > > 
> > 
> > 
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to 
> freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure
> 
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to