[JBoss JIRA] (ISPN-11873) Add report failure for RxJava Undelivered Errors
by Will Burns (Jira)
Will Burns created ISPN-11873:
---------------------------------
Summary: Add report failure for RxJava Undelivered Errors
Key: ISPN-11873
URL: https://issues.redhat.com/browse/ISPN-11873
Project: Infinispan
Issue Type: Bug
Components: Test Suite
Reporter: Will Burns
Assignee: Will Burns
Fix For: 11.0.0.CR1
We should install an error handler into RxJava during the test suite so that if we get any undelivered exceptions they will be reported, similar to uncaught exception handler that was added.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11872) CertificateTest test blocking
by Will Burns (Jira)
[ https://issues.redhat.com/browse/ISPN-11872?page=com.atlassian.jira.plugi... ]
Will Burns updated ISPN-11872:
------------------------------
Status: Open (was: New)
> CertificateTest test blocking
> -----------------------------
>
> Key: ISPN-11872
> URL: https://issues.redhat.com/browse/ISPN-11872
> Project: Infinispan
> Issue Type: Bug
> Reporter: Will Burns
> Assignee: Will Burns
> Priority: Major
> Fix For: 11.0.0.CR1
>
>
> The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
> Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
> {code}
> java.lang.AssertionError: Blocking call! java.io.FileInputStream#readBytes on thread Thread[REST-CertificateTest-ServerIO-3-1,5,main]
> at org.infinispan.util.CoreTestBlockHoundIntegration.lambda$applyTo$0(CoreTestBlockHoundIntegration.java:44)
> at reactor.blockhound.BlockHound$Builder.lambda$install$8(BlockHound.java:383)
> at reactor.blockhound.BlockHoundRuntime.checkBlocking(BlockHoundRuntime.java:89)
> at java.base/java.io.FileInputStream.readBytes(FileInputStream.java)
> at java.base/java.io.FileInputStream.read(FileInputStream.java:279)
> at java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252)
> at java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271)
> at java.base/sun.security.util.DerValue.init(DerValue.java:388)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:331)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:344)
> at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:1993)
> at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:222)
> at java.base/java.security.KeyStore.load(KeyStore.java:1479)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.loadKeyStore(TrustStoreManager.java:365)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.getTrustedCerts(TrustStoreManager.java:313)
> at java.base/sun.security.ssl.TrustStoreManager.getTrustedCerts(TrustStoreManager.java:55)
> at java.base/sun.security.ssl.TrustManagerFactoryImpl.engineInit(TrustManagerFactoryImpl.java:49)
> at java.base/javax.net.ssl.TrustManagerFactory.init(TrustManagerFactory.java:278)
> at java.base/sun.security.ssl.SSLContextImpl.engineInit(SSLContextImpl.java:88)
> at java.base/javax.net.ssl.SSLContext.init(SSLContext.java:297)
> at io.netty.handler.ssl.JdkSslContext.<clinit>(JdkSslContext.java:74)
> at org.infinispan.server.core.utils.SslUtils.createSslContext(SslUtils.java:50)
> at org.infinispan.server.core.utils.SslUtils.createNettySslContext(SslUtils.java:25)
> at org.infinispan.server.core.transport.NettyChannelInitializer.initializeChannel(NettyChannelInitializer.java:50)
> at org.infinispan.rest.RestChannelInitializer.initializeChannel(RestChannelInitializer.java:43)
> at org.infinispan.server.core.transport.NettyInitializers.initChannel(NettyInitializers.java:20)
> at io.netty.channel.ChannelInitializer.initChannel(ChannelInitializer.java:129)
> at io.netty.channel.ChannelInitializer.handlerAdded(ChannelInitializer.java:112)
> at io.netty.channel.AbstractChannelHandlerContext.callHandlerAdded(AbstractChannelHandlerContext.java:938)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAdded0(DefaultChannelPipeline.java:609)
> at io.netty.channel.DefaultChannelPipeline.access$100(DefaultChannelPipeline.java:46)
> at io.netty.channel.DefaultChannelPipeline$PendingHandlerAddedTask.execute(DefaultChannelPipeline.java:1463)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAddedForAllHandlers(DefaultChannelPipeline.java:1115)
> at io.netty.channel.DefaultChannelPipeline.invokeHandlerAddedIfNeeded(DefaultChannelPipeline.java:650)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.register0(AbstractChannel.java:502)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.access$200(AbstractChannel.java:417)
> at io.netty.channel.AbstractChannel$AbstractUnsafe$1.run(AbstractChannel.java:474)
> at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164)
> at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472)
> at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:387)
> at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
> at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
> at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
> at java.base/java.lang.Thread.run(Thread.java:834)
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11872) CertificateTest test blocking
by Will Burns (Jira)
[ https://issues.redhat.com/browse/ISPN-11872?page=com.atlassian.jira.plugi... ]
Will Burns updated ISPN-11872:
------------------------------
Fix Version/s: 11.0.0.CR1
> CertificateTest test blocking
> -----------------------------
>
> Key: ISPN-11872
> URL: https://issues.redhat.com/browse/ISPN-11872
> Project: Infinispan
> Issue Type: Bug
> Reporter: Will Burns
> Assignee: Will Burns
> Priority: Major
> Fix For: 11.0.0.CR1
>
>
> The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
> Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
> {code}
> java.lang.AssertionError: Blocking call! java.io.FileInputStream#readBytes on thread Thread[REST-CertificateTest-ServerIO-3-1,5,main]
> at org.infinispan.util.CoreTestBlockHoundIntegration.lambda$applyTo$0(CoreTestBlockHoundIntegration.java:44)
> at reactor.blockhound.BlockHound$Builder.lambda$install$8(BlockHound.java:383)
> at reactor.blockhound.BlockHoundRuntime.checkBlocking(BlockHoundRuntime.java:89)
> at java.base/java.io.FileInputStream.readBytes(FileInputStream.java)
> at java.base/java.io.FileInputStream.read(FileInputStream.java:279)
> at java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252)
> at java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271)
> at java.base/sun.security.util.DerValue.init(DerValue.java:388)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:331)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:344)
> at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:1993)
> at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:222)
> at java.base/java.security.KeyStore.load(KeyStore.java:1479)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.loadKeyStore(TrustStoreManager.java:365)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.getTrustedCerts(TrustStoreManager.java:313)
> at java.base/sun.security.ssl.TrustStoreManager.getTrustedCerts(TrustStoreManager.java:55)
> at java.base/sun.security.ssl.TrustManagerFactoryImpl.engineInit(TrustManagerFactoryImpl.java:49)
> at java.base/javax.net.ssl.TrustManagerFactory.init(TrustManagerFactory.java:278)
> at java.base/sun.security.ssl.SSLContextImpl.engineInit(SSLContextImpl.java:88)
> at java.base/javax.net.ssl.SSLContext.init(SSLContext.java:297)
> at io.netty.handler.ssl.JdkSslContext.<clinit>(JdkSslContext.java:74)
> at org.infinispan.server.core.utils.SslUtils.createSslContext(SslUtils.java:50)
> at org.infinispan.server.core.utils.SslUtils.createNettySslContext(SslUtils.java:25)
> at org.infinispan.server.core.transport.NettyChannelInitializer.initializeChannel(NettyChannelInitializer.java:50)
> at org.infinispan.rest.RestChannelInitializer.initializeChannel(RestChannelInitializer.java:43)
> at org.infinispan.server.core.transport.NettyInitializers.initChannel(NettyInitializers.java:20)
> at io.netty.channel.ChannelInitializer.initChannel(ChannelInitializer.java:129)
> at io.netty.channel.ChannelInitializer.handlerAdded(ChannelInitializer.java:112)
> at io.netty.channel.AbstractChannelHandlerContext.callHandlerAdded(AbstractChannelHandlerContext.java:938)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAdded0(DefaultChannelPipeline.java:609)
> at io.netty.channel.DefaultChannelPipeline.access$100(DefaultChannelPipeline.java:46)
> at io.netty.channel.DefaultChannelPipeline$PendingHandlerAddedTask.execute(DefaultChannelPipeline.java:1463)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAddedForAllHandlers(DefaultChannelPipeline.java:1115)
> at io.netty.channel.DefaultChannelPipeline.invokeHandlerAddedIfNeeded(DefaultChannelPipeline.java:650)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.register0(AbstractChannel.java:502)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.access$200(AbstractChannel.java:417)
> at io.netty.channel.AbstractChannel$AbstractUnsafe$1.run(AbstractChannel.java:474)
> at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164)
> at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472)
> at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:387)
> at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
> at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
> at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
> at java.base/java.lang.Thread.run(Thread.java:834)
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11872) CertificateTest test blocking
by Will Burns (Jira)
[ https://issues.redhat.com/browse/ISPN-11872?page=com.atlassian.jira.plugi... ]
Will Burns updated ISPN-11872:
------------------------------
Status: Pull Request Sent (was: Open)
Git Pull Request: https://github.com/infinispan/infinispan/pull/8354
> CertificateTest test blocking
> -----------------------------
>
> Key: ISPN-11872
> URL: https://issues.redhat.com/browse/ISPN-11872
> Project: Infinispan
> Issue Type: Bug
> Reporter: Will Burns
> Assignee: Will Burns
> Priority: Major
> Fix For: 11.0.0.CR1
>
>
> The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
> Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
> {code}
> java.lang.AssertionError: Blocking call! java.io.FileInputStream#readBytes on thread Thread[REST-CertificateTest-ServerIO-3-1,5,main]
> at org.infinispan.util.CoreTestBlockHoundIntegration.lambda$applyTo$0(CoreTestBlockHoundIntegration.java:44)
> at reactor.blockhound.BlockHound$Builder.lambda$install$8(BlockHound.java:383)
> at reactor.blockhound.BlockHoundRuntime.checkBlocking(BlockHoundRuntime.java:89)
> at java.base/java.io.FileInputStream.readBytes(FileInputStream.java)
> at java.base/java.io.FileInputStream.read(FileInputStream.java:279)
> at java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252)
> at java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271)
> at java.base/sun.security.util.DerValue.init(DerValue.java:388)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:331)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:344)
> at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:1993)
> at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:222)
> at java.base/java.security.KeyStore.load(KeyStore.java:1479)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.loadKeyStore(TrustStoreManager.java:365)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.getTrustedCerts(TrustStoreManager.java:313)
> at java.base/sun.security.ssl.TrustStoreManager.getTrustedCerts(TrustStoreManager.java:55)
> at java.base/sun.security.ssl.TrustManagerFactoryImpl.engineInit(TrustManagerFactoryImpl.java:49)
> at java.base/javax.net.ssl.TrustManagerFactory.init(TrustManagerFactory.java:278)
> at java.base/sun.security.ssl.SSLContextImpl.engineInit(SSLContextImpl.java:88)
> at java.base/javax.net.ssl.SSLContext.init(SSLContext.java:297)
> at io.netty.handler.ssl.JdkSslContext.<clinit>(JdkSslContext.java:74)
> at org.infinispan.server.core.utils.SslUtils.createSslContext(SslUtils.java:50)
> at org.infinispan.server.core.utils.SslUtils.createNettySslContext(SslUtils.java:25)
> at org.infinispan.server.core.transport.NettyChannelInitializer.initializeChannel(NettyChannelInitializer.java:50)
> at org.infinispan.rest.RestChannelInitializer.initializeChannel(RestChannelInitializer.java:43)
> at org.infinispan.server.core.transport.NettyInitializers.initChannel(NettyInitializers.java:20)
> at io.netty.channel.ChannelInitializer.initChannel(ChannelInitializer.java:129)
> at io.netty.channel.ChannelInitializer.handlerAdded(ChannelInitializer.java:112)
> at io.netty.channel.AbstractChannelHandlerContext.callHandlerAdded(AbstractChannelHandlerContext.java:938)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAdded0(DefaultChannelPipeline.java:609)
> at io.netty.channel.DefaultChannelPipeline.access$100(DefaultChannelPipeline.java:46)
> at io.netty.channel.DefaultChannelPipeline$PendingHandlerAddedTask.execute(DefaultChannelPipeline.java:1463)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAddedForAllHandlers(DefaultChannelPipeline.java:1115)
> at io.netty.channel.DefaultChannelPipeline.invokeHandlerAddedIfNeeded(DefaultChannelPipeline.java:650)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.register0(AbstractChannel.java:502)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.access$200(AbstractChannel.java:417)
> at io.netty.channel.AbstractChannel$AbstractUnsafe$1.run(AbstractChannel.java:474)
> at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164)
> at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472)
> at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:387)
> at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
> at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
> at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
> at java.base/java.lang.Thread.run(Thread.java:834)
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-9466) org.infinispan.query.clustered.QueryBox does not implement eviction for zombie iterators
by Gustavo Fernandes (Jira)
[ https://issues.redhat.com/browse/ISPN-9466?page=com.atlassian.jira.plugin... ]
Gustavo Fernandes reassigned ISPN-9466:
---------------------------------------
Assignee: Gustavo Fernandes (was: Nistor Adrian)
> org.infinispan.query.clustered.QueryBox does not implement eviction for zombie iterators
> ----------------------------------------------------------------------------------------
>
> Key: ISPN-9466
> URL: https://issues.redhat.com/browse/ISPN-9466
> Project: Infinispan
> Issue Type: Task
> Components: Embedded Querying
> Reporter: Nistor Adrian
> Assignee: Gustavo Fernandes
> Priority: Major
> Labels: query-ispn11
>
> Although the javadoc hints to some eviction mechanism this is not actually implemented.
> A linked list 'ageOrderedQueries' is maintained so that active queries move to the head of the list and the list is limited to 3000 items. Still, there is no mechanism that actually removes the zombie queries from the 'queries' ConcurrentMap.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11872) CertificateTest test blocking
by Will Burns (Jira)
[ https://issues.redhat.com/browse/ISPN-11872?page=com.atlassian.jira.plugi... ]
Will Burns updated ISPN-11872:
------------------------------
Description:
The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
{code}
java.lang.AssertionError: Blocking call! java.io.FileInputStream#readBytes on thread Thread[REST-CertificateTest-ServerIO-3-1,5,main]
at org.infinispan.util.CoreTestBlockHoundIntegration.lambda$applyTo$0(CoreTestBlockHoundIntegration.java:44)
at reactor.blockhound.BlockHound$Builder.lambda$install$8(BlockHound.java:383)
at reactor.blockhound.BlockHoundRuntime.checkBlocking(BlockHoundRuntime.java:89)
at java.base/java.io.FileInputStream.readBytes(FileInputStream.java)
at java.base/java.io.FileInputStream.read(FileInputStream.java:279)
at java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252)
at java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271)
at java.base/sun.security.util.DerValue.init(DerValue.java:388)
at java.base/sun.security.util.DerValue.<init>(DerValue.java:331)
at java.base/sun.security.util.DerValue.<init>(DerValue.java:344)
at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:1993)
at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:222)
at java.base/java.security.KeyStore.load(KeyStore.java:1479)
at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.loadKeyStore(TrustStoreManager.java:365)
at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.getTrustedCerts(TrustStoreManager.java:313)
at java.base/sun.security.ssl.TrustStoreManager.getTrustedCerts(TrustStoreManager.java:55)
at java.base/sun.security.ssl.TrustManagerFactoryImpl.engineInit(TrustManagerFactoryImpl.java:49)
at java.base/javax.net.ssl.TrustManagerFactory.init(TrustManagerFactory.java:278)
at java.base/sun.security.ssl.SSLContextImpl.engineInit(SSLContextImpl.java:88)
at java.base/javax.net.ssl.SSLContext.init(SSLContext.java:297)
at io.netty.handler.ssl.JdkSslContext.<clinit>(JdkSslContext.java:74)
at org.infinispan.server.core.utils.SslUtils.createSslContext(SslUtils.java:50)
at org.infinispan.server.core.utils.SslUtils.createNettySslContext(SslUtils.java:25)
at org.infinispan.server.core.transport.NettyChannelInitializer.initializeChannel(NettyChannelInitializer.java:50)
at org.infinispan.rest.RestChannelInitializer.initializeChannel(RestChannelInitializer.java:43)
at org.infinispan.server.core.transport.NettyInitializers.initChannel(NettyInitializers.java:20)
at io.netty.channel.ChannelInitializer.initChannel(ChannelInitializer.java:129)
at io.netty.channel.ChannelInitializer.handlerAdded(ChannelInitializer.java:112)
at io.netty.channel.AbstractChannelHandlerContext.callHandlerAdded(AbstractChannelHandlerContext.java:938)
at io.netty.channel.DefaultChannelPipeline.callHandlerAdded0(DefaultChannelPipeline.java:609)
at io.netty.channel.DefaultChannelPipeline.access$100(DefaultChannelPipeline.java:46)
at io.netty.channel.DefaultChannelPipeline$PendingHandlerAddedTask.execute(DefaultChannelPipeline.java:1463)
at io.netty.channel.DefaultChannelPipeline.callHandlerAddedForAllHandlers(DefaultChannelPipeline.java:1115)
at io.netty.channel.DefaultChannelPipeline.invokeHandlerAddedIfNeeded(DefaultChannelPipeline.java:650)
at io.netty.channel.AbstractChannel$AbstractUnsafe.register0(AbstractChannel.java:502)
at io.netty.channel.AbstractChannel$AbstractUnsafe.access$200(AbstractChannel.java:417)
at io.netty.channel.AbstractChannel$AbstractUnsafe$1.run(AbstractChannel.java:474)
at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164)
at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472)
at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:387)
at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
at java.base/java.lang.Thread.run(Thread.java:834)
{code}
was:
The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
> CertificateTest test blocking
> -----------------------------
>
> Key: ISPN-11872
> URL: https://issues.redhat.com/browse/ISPN-11872
> Project: Infinispan
> Issue Type: Bug
> Reporter: Will Burns
> Assignee: Will Burns
> Priority: Major
>
> The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
> Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
> {code}
> java.lang.AssertionError: Blocking call! java.io.FileInputStream#readBytes on thread Thread[REST-CertificateTest-ServerIO-3-1,5,main]
> at org.infinispan.util.CoreTestBlockHoundIntegration.lambda$applyTo$0(CoreTestBlockHoundIntegration.java:44)
> at reactor.blockhound.BlockHound$Builder.lambda$install$8(BlockHound.java:383)
> at reactor.blockhound.BlockHoundRuntime.checkBlocking(BlockHoundRuntime.java:89)
> at java.base/java.io.FileInputStream.readBytes(FileInputStream.java)
> at java.base/java.io.FileInputStream.read(FileInputStream.java:279)
> at java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252)
> at java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271)
> at java.base/sun.security.util.DerValue.init(DerValue.java:388)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:331)
> at java.base/sun.security.util.DerValue.<init>(DerValue.java:344)
> at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:1993)
> at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:222)
> at java.base/java.security.KeyStore.load(KeyStore.java:1479)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.loadKeyStore(TrustStoreManager.java:365)
> at java.base/sun.security.ssl.TrustStoreManager$TrustAnchorManager.getTrustedCerts(TrustStoreManager.java:313)
> at java.base/sun.security.ssl.TrustStoreManager.getTrustedCerts(TrustStoreManager.java:55)
> at java.base/sun.security.ssl.TrustManagerFactoryImpl.engineInit(TrustManagerFactoryImpl.java:49)
> at java.base/javax.net.ssl.TrustManagerFactory.init(TrustManagerFactory.java:278)
> at java.base/sun.security.ssl.SSLContextImpl.engineInit(SSLContextImpl.java:88)
> at java.base/javax.net.ssl.SSLContext.init(SSLContext.java:297)
> at io.netty.handler.ssl.JdkSslContext.<clinit>(JdkSslContext.java:74)
> at org.infinispan.server.core.utils.SslUtils.createSslContext(SslUtils.java:50)
> at org.infinispan.server.core.utils.SslUtils.createNettySslContext(SslUtils.java:25)
> at org.infinispan.server.core.transport.NettyChannelInitializer.initializeChannel(NettyChannelInitializer.java:50)
> at org.infinispan.rest.RestChannelInitializer.initializeChannel(RestChannelInitializer.java:43)
> at org.infinispan.server.core.transport.NettyInitializers.initChannel(NettyInitializers.java:20)
> at io.netty.channel.ChannelInitializer.initChannel(ChannelInitializer.java:129)
> at io.netty.channel.ChannelInitializer.handlerAdded(ChannelInitializer.java:112)
> at io.netty.channel.AbstractChannelHandlerContext.callHandlerAdded(AbstractChannelHandlerContext.java:938)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAdded0(DefaultChannelPipeline.java:609)
> at io.netty.channel.DefaultChannelPipeline.access$100(DefaultChannelPipeline.java:46)
> at io.netty.channel.DefaultChannelPipeline$PendingHandlerAddedTask.execute(DefaultChannelPipeline.java:1463)
> at io.netty.channel.DefaultChannelPipeline.callHandlerAddedForAllHandlers(DefaultChannelPipeline.java:1115)
> at io.netty.channel.DefaultChannelPipeline.invokeHandlerAddedIfNeeded(DefaultChannelPipeline.java:650)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.register0(AbstractChannel.java:502)
> at io.netty.channel.AbstractChannel$AbstractUnsafe.access$200(AbstractChannel.java:417)
> at io.netty.channel.AbstractChannel$AbstractUnsafe$1.run(AbstractChannel.java:474)
> at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164)
> at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472)
> at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:387)
> at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
> at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
> at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
> at java.base/java.lang.Thread.run(Thread.java:834)
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11872) CertificateTest test blocking
by Will Burns (Jira)
Will Burns created ISPN-11872:
---------------------------------
Summary: CertificateTest test blocking
Key: ISPN-11872
URL: https://issues.redhat.com/browse/ISPN-11872
Project: Infinispan
Issue Type: Bug
Reporter: Will Burns
Assignee: Will Burns
The CertificateTest is now failing as being blocking. It is unclear how this was not caught by ISPN-11831, as it didn't fail there in any run.
Either way we need to add an exclusion for blockhound to let the JDK initialize the SSL context.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months
[JBoss JIRA] (ISPN-11717) Deprecate ConsistentHashFactory customization
by Dan Berindei (Jira)
[ https://issues.redhat.com/browse/ISPN-11717?page=com.atlassian.jira.plugi... ]
Dan Berindei updated ISPN-11717:
--------------------------------
Status: Pull Request Sent (was: Open)
Git Pull Request: https://github.com/infinispan/infinispan/pull/8339
> Deprecate ConsistentHashFactory customization
> ---------------------------------------------
>
> Key: ISPN-11717
> URL: https://issues.redhat.com/browse/ISPN-11717
> Project: Infinispan
> Issue Type: Task
> Components: Configuration, Core
> Affects Versions: 11.0.0.Dev04
> Reporter: Dan Berindei
> Assignee: Dan Berindei
> Priority: Major
> Fix For: 11.0.0.CR1, 11.0.0.Final
>
>
> There aren't any good reasons to use a {{ConsistentHashFactory}} implementation different than the default selected by {{StateTransferManagerImpl#pickConsistentHashFactory}}.
> The configuration attribute made sense when the default was {{DefaultConsistentHashFactory}}, but {{SyncConsistentHashFactory}} is much better nowadays, and it's pretty much impossible to come up with an implementation that works in more than one cache mode with the current API.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 5 months