[Apiman-user] Trying to get echo example working...

Joel Schuster Joel.Schuster at davita.com
Tue Mar 15 15:21:06 EDT 2016


Eric,

Thanks for the info... indeed the problem was that I was trying to change the base url for the gateway... Apparently it's not done by changing the gateway configuration. I figured that out via the User Manual.

If you can give some guidance as to how to change the gateway url from 'apiman-gateway' to whatever I like that would be great. I tried modifying the resource element of the configuration file... that busted a bunch of other things.

- Joel

-----Original Message-----
From: Eric Wittmann [mailto:eric.wittmann at redhat.com] 
Sent: Tuesday, March 15, 2016 1:02 PM
To: Joel Schuster; apiman-user at lists.jboss.org
Subject: Re: [Apiman-user] Trying to get echo example working...

WARNING: This email originated outside of DaVita.

DO NOT CLICK links or attachments unless you recognize the sender and know the content is safe.

Can you provide any other details about your configuration?  Are you using mysql or postgres, for example?  E.g. anything changed from the defaults?

"Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?"

This usually means that your gateway is configured incorrectly - specifically that the Configuration Endpoint setting for your gateway indicates a protocol of "https" but the port is *not* (e.g. port 8080). 
  So for example:

https://localhost:8080/apiman-gateway-api/

This would fail because port 8080 is not an SSL port.  I would need to change the port to 8443.

Can you indicate whether you have data in the various admin UI pages, such as Roles, Policy Definitions, Gateways, etc?

-Eric


On 3/15/2016 12:22 PM, Joel Schuster wrote:
> Folks,
>
> I'm working through the echo example and I'm running into a couple of
> issues:
>
> java version "1.8.0_73"
>
> Java(TM) SE Runtime Environment (build 1.8.0_73-b02)
>
> Java HotSpot(TM) 64-Bit Server VM (build 25.73-b02, mixed mode)
>
> wildfly-10.0.0.Final
>
> apiman-distro-wildfly10-1.2.2.Final-overlay
>
> When I try to add the basic authentication policy the 'Add Policy'
> button never becomes enabled.
>
> So I skipped that step and tried to publish as-is. I get this error 
> (Full stack trace below):
>
> Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, 
> plaintext connection?
>
> The only reference I find to this is in this bug, which should be 
> fixed in this version: https://issues.jboss.org/browse/APIMAN-443
>
> Any help would be appreciated.
>
> Thanks!
>
> -Joel
>
> io.apiman.manager.api.rest.contract.exceptions.ActionException: Failed 
> to publish API.
>
>            at
> io.apiman.manager.api.rest.impl.util.ExceptionFactory.actionException(
> ExceptionFactory.java:311)
>
>            at
> io.apiman.manager.api.rest.impl.ActionResourceImpl.publishApi(ActionRe
> sourceImpl.java:229)
>
>            at
> io.apiman.manager.api.rest.impl.ActionResourceImpl.performAction(Actio
> nResourceImpl.java:105)
>
>            at
> io.apiman.manager.api.rest.impl.ActionResourceImpl$Proxy$_$$_WeldClien
> tProxy.performAction(Unknown
> Source)
>
>            at sun.reflect.NativeMethodAccessorImpl.invoke0(Native 
> Method)
>
>            at
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.j
> ava:62)
>
>            at
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccess
> orImpl.java:43)
>
>            at java.lang.reflect.Method.invoke(Method.java:497)
>
>            at
> org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.j
> ava:139)
>
>            at
> org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceM
> ethodInvoker.java:295)
>
>            at
> org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInv
> oker.java:249)
>
>            at
> org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInv
> oker.java:236)
>
>            at
> org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispat
> cher.java:395)
>
>            at
> org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispat
> cher.java:202)
>
>            at
> org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.s
> ervice(ServletContainerDispatcher.java:221)
>
>            at
> org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.servic
> e(HttpServletDispatcher.java:56)
>
>            at
> org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.servic
> e(HttpServletDispatcher.java:51)
>
>            at 
> javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
>
>            at
> io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandl
> er.java:85)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:129)
>
>            at
> io.apiman.common.servlet.RootResourceFilter.doFilter(RootResourceFilte
> r.java:59)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.apiman.manager.api.war.TransactionWatchdogFilter.doFilter(Transacti
> onWatchdogFilter.java:57)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.apiman.manager.api.security.impl.DefaultSecurityContextFilter.doFil
> ter(DefaultSecurityContextFilter.java:56)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.apiman.common.servlet.DisableCachingFilter.doFilter(DisableCachingF
> ilter.java:59)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.apiman.common.servlet.ApimanCorsFilter.doFilter(ApimanCorsFilter.ja
> va:71)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.apiman.common.servlet.LocaleFilter.doFilter(LocaleFilter.java:61)
>
>            at
> io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
>
>            at
> io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
> lterHandler.java:131)
>
>            at
> io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler
> .java:84)
>
>            at
> io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handl
> eRequest(ServletSecurityRoleHandler.java:62)
>
>            at
> io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(S
> ervletDispatchingHandler.java:36)
>
>            at
> org.wildfly.extension.undertow.security.SecurityContextAssociationHand
> ler.handleRequest(SecurityContextAssociationHandler.java:78)
>
>            at
> io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
> ndler.java:43)
>
>            at
> org.keycloak.adapters.undertow.UndertowAuthenticatedActionsHandler.han
> dleRequest(UndertowAuthenticatedActionsHandler.java:66)
>
>            at
> io.undertow.servlet.handlers.security.SSLInformationAssociationHandler
> .handleRequest(SSLInformationAssociationHandler.java:131)
>
>            at
> io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler
> .handleRequest(ServletAuthenticationCallHandler.java:57)
>
>            at
> io.undertow.server.handlers.DisableCacheHandler.handleRequest(DisableC
> acheHandler.java:33)
>
>            at
> io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
> ndler.java:43)
>
>            at
> io.undertow.security.handlers.AuthenticationConstraintHandler.handleRe
> quest(AuthenticationConstraintHandler.java:51)
>
>            at
> io.undertow.security.handlers.AbstractConfidentialityHandler.handleReq
> uest(AbstractConfidentialityHandler.java:46)
>
>            at
> io.undertow.servlet.handlers.security.ServletConfidentialityConstraint
> Handler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
>
>            at
> io.undertow.servlet.handlers.security.ServletSecurityConstraintHandler
> .handleRequest(ServletSecurityConstraintHandler.java:56)
>
>            at
> io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRe
> quest(AuthenticationMechanismsHandler.java:60)
>
>            at
> io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandle
> r.handleRequest(CachedAuthenticatedSessionHandler.java:77)
>
>            at
> io.undertow.security.handlers.NotificationReceiverHandler.handleReques
> t(NotificationReceiverHandler.java:50)
>
>            at
> io.undertow.security.handlers.AbstractSecurityContextAssociationHandle
> r.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
>
>            at
> io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
> ndler.java:43)
>
>            at
> org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.hand
> leRequest(JACCContextIdHandler.java:61)
>
>            at
> io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
> ndler.java:43)
>
>            at
> org.keycloak.adapters.undertow.ServletPreAuthActionsHandler.handleRequ
> est(ServletPreAuthActionsHandler.java:69)
>
>            at
> io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
> ndler.java:43)
>
>            at
> io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(
> ServletInitialHandler.java:284)
>
>            at
> io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(Ser
> vletInitialHandler.java:263)
>
>            at
> io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletI
> nitialHandler.java:81)
>
>            at
> io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(Ser
> vletInitialHandler.java:174)
>
>            at
> io.undertow.server.Connectors.executeRootHandler(Connectors.java:202)
>
>            at
> io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:79
> 3)
>
>            at
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.j
> ava:1142)
>
>            at
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.
> java:617)
>
>            at java.lang.Thread.run(Thread.java:745)
>
> Caused by: java.lang.RuntimeException: javax.net.ssl.SSLException:
> Unrecognized SSL message, plaintext connection?
>
>            at
> io.apiman.manager.api.gateway.rest.GatewayClient.getStatus(GatewayClie
> nt.java:98)
>
>            at
> io.apiman.manager.api.gateway.rest.RestGatewayLink.isGatewayUp(RestGat
> ewayLink.java:134)
>
>            at
> io.apiman.manager.api.gateway.rest.RestGatewayLink.publishApi(RestGate
> wayLink.java:160)
>
>            at
> io.apiman.manager.api.rest.impl.ActionResourceImpl.publishApi(ActionRe
> sourceImpl.java:203)
>
>            ... 68 more
>
> Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, 
> plaintext connection?
>
>            at
> sun.security.ssl.InputRecord.handleUnknownRecord(InputRecord.java:710)
>
>            at sun.security.ssl.InputRecord.read(InputRecord.java:527)
>
>            at
> sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973)
>
>            at
> sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.j
> ava:1375)
>
>            at
> sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
>
>            at
> sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
>
>            at
> org.apache.http.conn.ssl.SSLConnectionSocketFactory.createLayeredSocke
> t(SSLConnectionSocketFactory.java:394)
>
>            at
> org.apache.http.conn.ssl.SSLConnectionSocketFactory.connectSocket(SSLC
> onnectionSocketFactory.java:353)
>
>            at
> org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(
> DefaultHttpClientConnectionOperator.java:134)
>
>            at
> org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(P
> oolingHttpClientConnectionManager.java:353)
>
>            at
> org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClien
> tExec.java:380)
>
>            at
> org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.j
> ava:236)
>
>            at
> org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:
> 184)
>
>            at
> org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:88)
>
>            at
> org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:
> 110)
>
>            at
> org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpC
> lient.java:184)
>
>            at
> org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpC
> lient.java:82)
>
>            at
> org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpC
> lient.java:107)
>
>            at
> io.apiman.manager.api.gateway.rest.GatewayClient.getStatus(GatewayClie
> nt.java:86)
>
>            ... 71 more
>
> CONFIDENTIALITY NOTICE: THIS MESSAGE IS CONFIDENTIAL, INTENDED FOR THE 
> NAMED RECIPIENT(S) AND MAY CONTAIN INFORMATION THAT IS (I) PROPRIETARY 
> TO THE SENDER, AND/OR, (II) PRIVILEGED, CONFIDENTIAL, AND/OR OTHERWISE 
> EXEMPT FROM DISCLOSURE UNDER APPLICABLE STATE AND FEDERAL LAW, 
> INCLUDING, BUT NOT LIMITED TO, PRIVACY STANDARDS IMPOSED PURSUANT TO 
> THE FEDERAL HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 
> 1996 ("HIPAA"). IF YOU ARE NOT THE INTENDED RECIPIENT, OR THE EMPLOYEE 
> OR AGENT RESPONSIBLE FOR DELIVERING THE MESSAGE TO THE INTENDED 
> RECIPIENT, YOU ARE HEREBY NOTIFIED THAT ANY DISSEMINATION, 
> DISTRIBUTION OR COPYING OF THIS COMMUNICATION IS STRICTLY PROHIBITED. 
> IF YOU HAVE RECEIVED THIS TRANSMISSION IN ERROR, PLEASE (I) NOTIFY US 
> IMMEDIATELY BY REPLY E-MAIL OR BY TELEPHONE AT (855.472.9822), (II) 
> REMOVE IT FROM YOUR SYSTEM, AND
> (III) DESTROY THE ORIGINAL TRANSMISSION AND ITS ATTACHMENTS WITHOUT 
> READING OR SAVING THEM. THANK YOU.
>
> -DaVita Healthcare Partners Inc.-
>
>
>
> _______________________________________________
> Apiman-user mailing list
> Apiman-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/apiman-user
>

CONFIDENTIALITY NOTICE: THIS MESSAGE IS CONFIDENTIAL, INTENDED FOR THE NAMED RECIPIENT(S) AND MAY CONTAIN INFORMATION THAT IS (I) PROPRIETARY TO THE SENDER, AND/OR, (II) PRIVILEGED, CONFIDENTIAL, AND/OR OTHERWISE EXEMPT FROM DISCLOSURE UNDER APPLICABLE STATE AND FEDERAL LAW, INCLUDING, BUT NOT LIMITED TO, PRIVACY STANDARDS IMPOSED PURSUANT TO THE FEDERAL HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ("HIPAA"). IF YOU ARE NOT THE INTENDED RECIPIENT, OR THE EMPLOYEE OR AGENT RESPONSIBLE FOR DELIVERING THE MESSAGE TO THE INTENDED RECIPIENT, YOU ARE HEREBY NOTIFIED THAT ANY DISSEMINATION, DISTRIBUTION OR COPYING OF THIS COMMUNICATION IS STRICTLY PROHIBITED. IF YOU HAVE RECEIVED THIS TRANSMISSION IN ERROR, PLEASE (I) NOTIFY US IMMEDIATELY BY REPLY E-MAIL OR BY TELEPHONE AT (855.472.9822), (II) REMOVE IT FROM YOUR SYSTEM, AND (III) DESTROY THE ORIGINAL TRANSMISSION AND ITS ATTACHMENTS WITHOUT READING OR SAVING THEM. THANK YOU.

-DaVita Healthcare Partners Inc.-




More information about the Apiman-user mailing list