Eric,
Thanks for the info... indeed the problem was that I was trying to change the base url for
the gateway... Apparently it's not done by changing the gateway configuration. I
figured that out via the User Manual.
If you can give some guidance as to how to change the gateway url from
'apiman-gateway' to whatever I like that would be great. I tried modifying the
resource element of the configuration file... that busted a bunch of other things.
- Joel
-----Original Message-----
From: Eric Wittmann [mailto:eric.wittmann@redhat.com]
Sent: Tuesday, March 15, 2016 1:02 PM
To: Joel Schuster; apiman-user(a)lists.jboss.org
Subject: Re: [Apiman-user] Trying to get echo example working...
WARNING: This email originated outside of DaVita.
DO NOT CLICK links or attachments unless you recognize the sender and know the content is
safe.
Can you provide any other details about your configuration? Are you using mysql or
postgres, for example? E.g. anything changed from the defaults?
"Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext
connection?"
This usually means that your gateway is configured incorrectly - specifically that the
Configuration Endpoint setting for your gateway indicates a protocol of "https"
but the port is *not* (e.g. port 8080).
So for example:
https://localhost:8080/apiman-gateway-api/
This would fail because port 8080 is not an SSL port. I would need to change the port to
8443.
Can you indicate whether you have data in the various admin UI pages, such as Roles,
Policy Definitions, Gateways, etc?
-Eric
On 3/15/2016 12:22 PM, Joel Schuster wrote:
Folks,
I'm working through the echo example and I'm running into a couple of
issues:
java version "1.8.0_73"
Java(TM) SE Runtime Environment (build 1.8.0_73-b02)
Java HotSpot(TM) 64-Bit Server VM (build 25.73-b02, mixed mode)
wildfly-10.0.0.Final
apiman-distro-wildfly10-1.2.2.Final-overlay
When I try to add the basic authentication policy the 'Add Policy'
button never becomes enabled.
So I skipped that step and tried to publish as-is. I get this error
(Full stack trace below):
Caused by: javax.net.ssl.SSLException: Unrecognized SSL message,
plaintext connection?
The only reference I find to this is in this bug, which should be
fixed in this version:
https://issues.jboss.org/browse/APIMAN-443
Any help would be appreciated.
Thanks!
-Joel
io.apiman.manager.api.rest.contract.exceptions.ActionException: Failed
to publish API.
at
io.apiman.manager.api.rest.impl.util.ExceptionFactory.actionException(
ExceptionFactory.java:311)
at
io.apiman.manager.api.rest.impl.ActionResourceImpl.publishApi(ActionRe
sourceImpl.java:229)
at
io.apiman.manager.api.rest.impl.ActionResourceImpl.performAction(Actio
nResourceImpl.java:105)
at
io.apiman.manager.api.rest.impl.ActionResourceImpl$Proxy$_$$_WeldClien
tProxy.performAction(Unknown
Source)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native
Method)
at
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.j
ava:62)
at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccess
orImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at
org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.j
ava:139)
at
org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceM
ethodInvoker.java:295)
at
org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInv
oker.java:249)
at
org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInv
oker.java:236)
at
org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispat
cher.java:395)
at
org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispat
cher.java:202)
at
org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.s
ervice(ServletContainerDispatcher.java:221)
at
org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.servic
e(HttpServletDispatcher.java:56)
at
org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.servic
e(HttpServletDispatcher.java:51)
at
javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
at
io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandl
er.java:85)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:129)
at
io.apiman.common.servlet.RootResourceFilter.doFilter(RootResourceFilte
r.java:59)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.apiman.manager.api.war.TransactionWatchdogFilter.doFilter(Transacti
onWatchdogFilter.java:57)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.apiman.manager.api.security.impl.DefaultSecurityContextFilter.doFil
ter(DefaultSecurityContextFilter.java:56)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.apiman.common.servlet.DisableCachingFilter.doFilter(DisableCachingF
ilter.java:59)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.apiman.common.servlet.ApimanCorsFilter.doFilter(ApimanCorsFilter.ja
va:71)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.apiman.common.servlet.LocaleFilter.doFilter(LocaleFilter.java:61)
at
io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:60)
at
io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(Fi
lterHandler.java:131)
at
io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler
.java:84)
at
io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handl
eRequest(ServletSecurityRoleHandler.java:62)
at
io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(S
ervletDispatchingHandler.java:36)
at
org.wildfly.extension.undertow.security.SecurityContextAssociationHand
ler.handleRequest(SecurityContextAssociationHandler.java:78)
at
io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
ndler.java:43)
at
org.keycloak.adapters.undertow.UndertowAuthenticatedActionsHandler.han
dleRequest(UndertowAuthenticatedActionsHandler.java:66)
at
io.undertow.servlet.handlers.security.SSLInformationAssociationHandler
.handleRequest(SSLInformationAssociationHandler.java:131)
at
io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler
.handleRequest(ServletAuthenticationCallHandler.java:57)
at
io.undertow.server.handlers.DisableCacheHandler.handleRequest(DisableC
acheHandler.java:33)
at
io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
ndler.java:43)
at
io.undertow.security.handlers.AuthenticationConstraintHandler.handleRe
quest(AuthenticationConstraintHandler.java:51)
at
io.undertow.security.handlers.AbstractConfidentialityHandler.handleReq
uest(AbstractConfidentialityHandler.java:46)
at
io.undertow.servlet.handlers.security.ServletConfidentialityConstraint
Handler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
at
io.undertow.servlet.handlers.security.ServletSecurityConstraintHandler
.handleRequest(ServletSecurityConstraintHandler.java:56)
at
io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRe
quest(AuthenticationMechanismsHandler.java:60)
at
io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandle
r.handleRequest(CachedAuthenticatedSessionHandler.java:77)
at
io.undertow.security.handlers.NotificationReceiverHandler.handleReques
t(NotificationReceiverHandler.java:50)
at
io.undertow.security.handlers.AbstractSecurityContextAssociationHandle
r.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
at
io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
ndler.java:43)
at
org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.hand
leRequest(JACCContextIdHandler.java:61)
at
io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
ndler.java:43)
at
org.keycloak.adapters.undertow.ServletPreAuthActionsHandler.handleRequ
est(ServletPreAuthActionsHandler.java:69)
at
io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHa
ndler.java:43)
at
io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(
ServletInitialHandler.java:284)
at
io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(Ser
vletInitialHandler.java:263)
at
io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletI
nitialHandler.java:81)
at
io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(Ser
vletInitialHandler.java:174)
at
io.undertow.server.Connectors.executeRootHandler(Connectors.java:202)
at
io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:79
3)
at
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.j
ava:1142)
at
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.
java:617)
at java.lang.Thread.run(Thread.java:745)
Caused by: java.lang.RuntimeException: javax.net.ssl.SSLException:
Unrecognized SSL message, plaintext connection?
at
io.apiman.manager.api.gateway.rest.GatewayClient.getStatus(GatewayClie
nt.java:98)
at
io.apiman.manager.api.gateway.rest.RestGatewayLink.isGatewayUp(RestGat
ewayLink.java:134)
at
io.apiman.manager.api.gateway.rest.RestGatewayLink.publishApi(RestGate
wayLink.java:160)
at
io.apiman.manager.api.rest.impl.ActionResourceImpl.publishApi(ActionRe
sourceImpl.java:203)
... 68 more
Caused by: javax.net.ssl.SSLException: Unrecognized SSL message,
plaintext connection?
at
sun.security.ssl.InputRecord.handleUnknownRecord(InputRecord.java:710)
at sun.security.ssl.InputRecord.read(InputRecord.java:527)
at
sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973)
at
sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.j
ava:1375)
at
sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
at
sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
at
org.apache.http.conn.ssl.SSLConnectionSocketFactory.createLayeredSocke
t(SSLConnectionSocketFactory.java:394)
at
org.apache.http.conn.ssl.SSLConnectionSocketFactory.connectSocket(SSLC
onnectionSocketFactory.java:353)
at
org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(
DefaultHttpClientConnectionOperator.java:134)
at
org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(P
oolingHttpClientConnectionManager.java:353)
at
org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClien
tExec.java:380)
at
org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.j
ava:236)
at
org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:
184)
at
org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:88)
at
org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:
110)
at
org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpC
lient.java:184)
at
org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpC
lient.java:82)
at
org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpC
lient.java:107)
at
io.apiman.manager.api.gateway.rest.GatewayClient.getStatus(GatewayClie
nt.java:86)
... 71 more
CONFIDENTIALITY NOTICE: THIS MESSAGE IS CONFIDENTIAL, INTENDED FOR THE
NAMED RECIPIENT(S) AND MAY CONTAIN INFORMATION THAT IS (I) PROPRIETARY
TO THE SENDER, AND/OR, (II) PRIVILEGED, CONFIDENTIAL, AND/OR OTHERWISE
EXEMPT FROM DISCLOSURE UNDER APPLICABLE STATE AND FEDERAL LAW,
INCLUDING, BUT NOT LIMITED TO, PRIVACY STANDARDS IMPOSED PURSUANT TO
THE FEDERAL HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF
1996 ("HIPAA"). IF YOU ARE NOT THE INTENDED RECIPIENT, OR THE EMPLOYEE
OR AGENT RESPONSIBLE FOR DELIVERING THE MESSAGE TO THE INTENDED
RECIPIENT, YOU ARE HEREBY NOTIFIED THAT ANY DISSEMINATION,
DISTRIBUTION OR COPYING OF THIS COMMUNICATION IS STRICTLY PROHIBITED.
IF YOU HAVE RECEIVED THIS TRANSMISSION IN ERROR, PLEASE (I) NOTIFY US
IMMEDIATELY BY REPLY E-MAIL OR BY TELEPHONE AT (855.472.9822), (II)
REMOVE IT FROM YOUR SYSTEM, AND
(III) DESTROY THE ORIGINAL TRANSMISSION AND ITS ATTACHMENTS WITHOUT
READING OR SAVING THEM. THANK YOU.
-DaVita Healthcare Partners Inc.-
_______________________________________________
Apiman-user mailing list
Apiman-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/apiman-user
CONFIDENTIALITY NOTICE: THIS MESSAGE IS CONFIDENTIAL, INTENDED FOR THE NAMED RECIPIENT(S)
AND MAY CONTAIN INFORMATION THAT IS (I) PROPRIETARY TO THE SENDER, AND/OR, (II)
PRIVILEGED, CONFIDENTIAL, AND/OR OTHERWISE EXEMPT FROM DISCLOSURE UNDER APPLICABLE STATE
AND FEDERAL LAW, INCLUDING, BUT NOT LIMITED TO, PRIVACY STANDARDS IMPOSED PURSUANT TO THE
FEDERAL HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ("HIPAA").
IF YOU ARE NOT THE INTENDED RECIPIENT, OR THE EMPLOYEE OR AGENT RESPONSIBLE FOR DELIVERING
THE MESSAGE TO THE INTENDED RECIPIENT, YOU ARE HEREBY NOTIFIED THAT ANY DISSEMINATION,
DISTRIBUTION OR COPYING OF THIS COMMUNICATION IS STRICTLY PROHIBITED. IF YOU HAVE RECEIVED
THIS TRANSMISSION IN ERROR, PLEASE (I) NOTIFY US IMMEDIATELY BY REPLY E-MAIL OR BY
TELEPHONE AT (855.472.9822), (II) REMOVE IT FROM YOUR SYSTEM, AND (III) DESTROY THE
ORIGINAL TRANSMISSION AND ITS ATTACHMENTS WITHOUT READING OR SAVING THEM. THANK YOU.
-DaVita Healthcare Partners Inc.-