Encrypted password in patch 6.7.6 (i.e. 6.7.0b576) does not work
search cancel

Encrypted password in patch 6.7.6 (i.e. 6.7.0b576) does not work

book

Article ID: 245849

calendar_today

Updated On:

Products

CA Release Automation - Release Operations Center (Nolio)

Issue/Introduction

While validating upgrade of Nolio Release Automation to the latest 6.7.6 patch update (6.7b576), we observed that patch update is no more compatible with this security configuration 'Encrypt the Keystore Password' documented here :

https://techdocs.broadcom.com/us/en/ca-enterprise-software/intelligent-automation/release-automation-nolio/6-7/installation/ca-release-automation-security/security-configuration.html#concept.dita_56c5f6b721b883a5e2fe1b48b95caba2b0d1f12b_EncrypttheKeystorePassword

When trying to apply this security recommendation, the catalina.out file shows this error:

Apr 04, 2022 6:06:21 PM org.apache.tomcat.util.digester.Digester <clinit>
SEVERE: Error loading property source [com.nolio.tomcat.utils.PropertyDecoder]
java.lang.ClassNotFoundException: com.nolio.tomcat.utils.PropertyDecoder
        at java.net.URLClassLoader.findClass(URLClassLoader.java:382)
        at java.lang.ClassLoader.loadClass(ClassLoader.java:418)
        at java.lang.ClassLoader.loadClass(ClassLoader.java:351)
        at java.lang.Class.forName0(Native Method)
      at java.lang.Class.forName(Class.java:348)

This error does not permit to decode encrypted keystore password and secure https port 8443 is not bound during server startup.

I've also tried to set the password in the 'server.xml' file without encryption and the NAC server starts without error (but this not expected behavior, we need to encrypt passwords in files).

Environment

Release : 6.7

Component : CA RELEASE AUTOMATION CORE

Cause

The issue reported is identified as a valid defect with Id NOLIO-5138.

Resolution

The defect NOLIO-5138 will be fixed in release 6.7.7 and 6.8

 

Additional Information

Customer can subscribe to proactive notifications from Broadcom on areas around security vulnerability, product releases and cumulative patches as illustrated in document below.