[JBoss JIRA] (ELY-1431) JSP can't be rendered with LDAP auth with Elytron
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/ELY-1431?page=com.atlassian.jira.plugin.s... ]
Darran Lofthouse moved WFLY-9512 to ELY-1431:
---------------------------------------------
Project: WildFly Elytron (was: WildFly)
Key: ELY-1431 (was: WFLY-9512)
Component/s: Realms
(was: Security)
(was: Web (Undertow))
Affects Version/s: 1.1.6.Final
(was: 11.0.0.Final)
> JSP can't be rendered with LDAP auth with Elytron
> -------------------------------------------------
>
> Key: ELY-1431
> URL: https://issues.jboss.org/browse/ELY-1431
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Realms
> Affects Versions: 1.1.6.Final
> Reporter: Yves Peter
> Assignee: Darran Lofthouse
> Attachments: application-roles.properties, application-users.properties, sampleapp.war.zip, standalone.xml
>
>
> When I try to access the attached war (http://localhost:8080/sampleapp/index.jsp) with the attached standalone.xml I get the exception below.
> The index.jsp contains only static html. I used ActiveDirectory as LDAP server. The WAR uses the "other" security domain, which uses LDAP for auth and roles.
> Accessing the test.html (http://localhost:8080/sampleapp/test.html) with the same content as the index.jsp works fine over LDAP.
> Changing the "default-realm" of security-domain "ApplicationDomain" from "ldap-realm" to "ApplicationRealm" (user/pw: test/test) the index.jsp gets displayed correctly and without an exception.
> Exception:
> {code}
> 11:13:06,305 ERROR [io.undertow.request] (default task-6) UT005023: Exception handling request to /sampleapp/index.jsp: org.apache.jasper.JasperException: JBWEB004062: Unable to compile class for JSP:
> JBWEB004061: An error occurred at line: 15 in the generated java file
> org.apache.jasper.runtime.HttpJspBase cannot be resolved to a type
> JBWEB004061: An error occurred at line: 16 in the generated java file
> org.apache.jasper.runtime.JspSourceDependent cannot be resolved to a type
> JBWEB004061: An error occurred at line: 17 in the generated java file
> org.apache.jasper.runtime.JspSourceImports cannot be resolved to a type
> JBWEB004061: An error occurred at line: 19 in the generated java file
> javax.servlet.jsp.JspFactory cannot be resolved to a type
> JBWEB004061: An error occurred at line: 20 in the generated java file
> javax.servlet.jsp.JspFactory cannot be resolved to a type
> JBWEB004061: An error occurred at line: 36 in the generated java file
> javax.el.ExpressionFactory cannot be resolved to a type
> JBWEB004061: An error occurred at line: 37 in the generated java file
> org.apache.tomcat.InstanceManager cannot be resolved to a type
> JBWEB004061: An error occurred at line: 52 in the generated java file
> _el_expressionfactory cannot be resolved to a variable
> JBWEB004061: An error occurred at line: 52 in the generated java file
> _jspxFactory cannot be resolved
> JBWEB004061: An error occurred at line: 52 in the generated java file
> The method getServletConfig() is undefined for the type index_jsp
> JBWEB004061: An error occurred at line: 53 in the generated java file
> _jsp_instancemanager cannot be resolved to a variable
> JBWEB004061: An error occurred at line: 53 in the generated java file
> org.apache.jasper.runtime.InstanceManagerFactory cannot be resolved to a type
> JBWEB004061: An error occurred at line: 53 in the generated java file
> The method getServletConfig() is undefined for the type index_jsp
> JBWEB004061: An error occurred at line: 59 in the generated java file
> javax.servlet.http.HttpServletRequest cannot be resolved to a type
> JBWEB004061: An error occurred at line: 59 in the generated java file
> javax.servlet.http.HttpServletResponse cannot be resolved to a type
> JBWEB004061: An error occurred at line: 60 in the generated java file
> javax.servlet.ServletException cannot be resolved to a type
> JBWEB004061: An error occurred at line: 63 in the generated java file
> javax.servlet.DispatcherType.ERROR cannot be resolved to a type
> JBWEB004061: An error occurred at line: 64 in the generated java file
> HttpServletResponse.SC_METHOD_NOT_ALLOWED cannot be resolved to a type
> JBWEB004061: An error occurred at line: 68 in the generated java file
> javax.servlet.jsp.PageContext cannot be resolved to a type
> JBWEB004061: An error occurred at line: 69 in the generated java file
> javax.servlet.http.HttpSession cannot be resolved to a type
> JBWEB004061: An error occurred at line: 70 in the generated java file
> javax.servlet.ServletContext cannot be resolved to a type
> JBWEB004061: An error occurred at line: 71 in the generated java file
> javax.servlet.ServletConfig cannot be resolved to a type
> JBWEB004061: An error occurred at line: 72 in the generated java file
> javax.servlet.jsp.JspWriter cannot be resolved to a type
> JBWEB004061: An error occurred at line: 74 in the generated java file
> javax.servlet.jsp.JspWriter cannot be resolved to a type
> JBWEB004061: An error occurred at line: 75 in the generated java file
> javax.servlet.jsp.PageContext cannot be resolved to a type
> JBWEB004061: An error occurred at line: 81 in the generated java file
> _jspxFactory cannot be resolved
> JBWEB004061: An error occurred at line: 100 in the generated java file
> javax.servlet.jsp.SkipPageException cannot be resolved to a type
> JBWEB004061: An error occurred at line: 111 in the generated java file
> ServletException cannot be resolved to a type
> JBWEB004061: An error occurred at line: 114 in the generated java file
> _jspxFactory cannot be resolved
> Stacktrace:
> at org.apache.jasper.compiler.DefaultErrorHandler.javacError(DefaultErrorHandler.java:95)
> at org.apache.jasper.compiler.ErrorDispatcher.javacError(ErrorDispatcher.java:198)
> at org.apache.jasper.compiler.JDTCompiler.generateClass(JDTCompiler.java:449)
> at org.apache.jasper.compiler.Compiler.compile(Compiler.java:359)
> at org.apache.jasper.compiler.Compiler.compile(Compiler.java:334)
> at org.apache.jasper.compiler.Compiler.compile(Compiler.java:321)
> at org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.java:652)
> at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:358)
> at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:403)
> at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:347)
> at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
> at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:85)
> at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
> at io.undertow.jsp.JspFileHandler.handleRequest(JspFileHandler.java:32)
> at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
> at org.wildfly.elytron.web.undertow.server.ElytronRunAsHandler.lambda$handleRequest$1(ElytronRunAsHandler.java:68)
> at org.wildfly.security.auth.server.FlexibleIdentityAssociation.runAsFunctionEx(FlexibleIdentityAssociation.java:101)
> at org.wildfly.security.auth.server.Scoped.runAsFunctionEx(Scoped.java:150)
> at org.wildfly.security.auth.server.Scoped.runAs(Scoped.java:62)
> at org.wildfly.elytron.web.undertow.server.ElytronRunAsHandler.handleRequest(ElytronRunAsHandler.java:67)
> at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:131)
> at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
> at io.undertow.server.handlers.DisableCacheHandler.handleRequest(DisableCacheHandler.java:33)
> at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
> at io.undertow.security.handlers.AuthenticationConstraintHandler.handleRequest(AuthenticationConstraintHandler.java:53)
> at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
> at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
> at io.undertow.servlet.handlers.security.ServletSecurityConstraintHandler.handleRequest(ServletSecurityConstraintHandler.java:59)
> at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
> at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
> at org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.handleRequest(JACCContextIdHandler.java:61)
> at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
> at org.wildfly.extension.undertow.deployment.GlobalRequestControllerHandler.handleRequest(GlobalRequestControllerHandler.java:68)
> at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
> at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:292)
> at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:81)
> at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:138)
> at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:135)
> at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
> at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
> at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1508)
> at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1508)
> at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1508)
> at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1508)
> at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:272)
> at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:81)
> at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:104)
> at io.undertow.server.Connectors.executeRootHandler(Connectors.java:326)
> at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:812)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> {code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFCORE-3398) Elytron, wrong capabilities registered
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3398?page=com.atlassian.jira.plugi... ]
Darran Lofthouse updated WFCORE-3398:
-------------------------------------
Description:
I wen throught resources and
* trust-manager is registered as credential-store besides trust-manager
{code}
"trust-manager" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"model-description" => {"*" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"capabilities" => [
{
"name" => "org.wildfly.security.trust-manager",
"dynamic" => true
},
{
"name" => "org.wildfly.security.credential-store",
"dynamic" => true
}
],
{code}
was:
I wen throught resources and
* trust-manager is registered as credential-store besides trust-manager
* some *-principal-decoder are registered as principal-transformer besided principal-decoder
{code}
"trust-manager" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"model-description" => {"*" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"capabilities" => [
{
"name" => "org.wildfly.security.trust-manager",
"dynamic" => true
},
{
"name" => "org.wildfly.security.credential-store",
"dynamic" => true
}
],
"constant-principal-decoder" => {
"description" => "Definition of a principal decoder that always returns the same constant.",
"model-description" => {"*" => {
"description" => "Definition of a principal decoder that always returns the same constant.",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
"x500-attribute-principal-decoder" => {
"description" => "Definition of a X.500 attribute based principal decoder",
"model-description" => {"*" => {
"description" => "Definition of a X.500 attribute based principal decoder",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
"concatenating-principal-decoder" => {
"description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
"model-description" => {"*" => {
"description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
{code}
> Elytron, wrong capabilities registered
> --------------------------------------
>
> Key: WFCORE-3398
> URL: https://issues.jboss.org/browse/WFCORE-3398
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Martin Choma
> Assignee: Darran Lofthouse
>
> I wen throught resources and
> * trust-manager is registered as credential-store besides trust-manager
> {code}
> "trust-manager" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "model-description" => {"*" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.trust-manager",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.credential-store",
> "dynamic" => true
> }
> ],
> {code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFCORE-3398) Elytron, wrong capabilities registered
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3398?page=com.atlassian.jira.plugi... ]
Darran Lofthouse commented on WFCORE-3398:
------------------------------------------
The principal decoder / principal transformer in a single resource is not a bug.
> Elytron, wrong capabilities registered
> --------------------------------------
>
> Key: WFCORE-3398
> URL: https://issues.jboss.org/browse/WFCORE-3398
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Martin Choma
> Assignee: Darran Lofthouse
>
> I wen throught resources and
> * trust-manager is registered as credential-store besides trust-manager
> * some *-principal-decoder are registered as principal-transformer besided principal-decoder
> {code}
> "trust-manager" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "model-description" => {"*" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.trust-manager",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.credential-store",
> "dynamic" => true
> }
> ],
> "constant-principal-decoder" => {
> "description" => "Definition of a principal decoder that always returns the same constant.",
> "model-description" => {"*" => {
> "description" => "Definition of a principal decoder that always returns the same constant.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> "x500-attribute-principal-decoder" => {
> "description" => "Definition of a X.500 attribute based principal decoder",
> "model-description" => {"*" => {
> "description" => "Definition of a X.500 attribute based principal decoder",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> "concatenating-principal-decoder" => {
> "description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
> "model-description" => {"*" => {
> "description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> {code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFCORE-3398) Elytron, wrong capabilities registered
by Ilia Vassilev (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3398?page=com.atlassian.jira.plugi... ]
Ilia Vassilev commented on WFCORE-3398:
---------------------------------------
some *-principal-decoder are registered as principal-transformer besided principal-decoder - This change was introduced by the fix for WFCORE-3016
> Elytron, wrong capabilities registered
> --------------------------------------
>
> Key: WFCORE-3398
> URL: https://issues.jboss.org/browse/WFCORE-3398
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Martin Choma
> Assignee: Darran Lofthouse
>
> I wen throught resources and
> * trust-manager is registered as credential-store besides trust-manager
> * some *-principal-decoder are registered as principal-transformer besided principal-decoder
> {code}
> "trust-manager" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "model-description" => {"*" => {
> "description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.trust-manager",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.credential-store",
> "dynamic" => true
> }
> ],
> "constant-principal-decoder" => {
> "description" => "Definition of a principal decoder that always returns the same constant.",
> "model-description" => {"*" => {
> "description" => "Definition of a principal decoder that always returns the same constant.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> "x500-attribute-principal-decoder" => {
> "description" => "Definition of a X.500 attribute based principal decoder",
> "model-description" => {"*" => {
> "description" => "Definition of a X.500 attribute based principal decoder",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> "concatenating-principal-decoder" => {
> "description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
> "model-description" => {"*" => {
> "description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
> "capabilities" => [
> {
> "name" => "org.wildfly.security.principal-transformer",
> "dynamic" => true
> },
> {
> "name" => "org.wildfly.security.principal-decoder",
> "dynamic" => true
> }
> ],
> {code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFCORE-3398) Elytron, wrong capabilities registered
by Martin Choma (JIRA)
Martin Choma created WFCORE-3398:
------------------------------------
Summary: Elytron, wrong capabilities registered
Key: WFCORE-3398
URL: https://issues.jboss.org/browse/WFCORE-3398
Project: WildFly Core
Issue Type: Bug
Components: Security
Reporter: Martin Choma
Assignee: Darran Lofthouse
I wen throught resources and
* trust-manager is registered as credential-store besides trust-manager
* some *-principal-decoder are registered as principal-transformer besided principal-decoder
{code}
"trust-manager" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"model-description" => {"*" => {
"description" => "A trust manager definition for creating the TrustManager[] as used to create an SSLContext.",
"capabilities" => [
{
"name" => "org.wildfly.security.trust-manager",
"dynamic" => true
},
{
"name" => "org.wildfly.security.credential-store",
"dynamic" => true
}
],
"constant-principal-decoder" => {
"description" => "Definition of a principal decoder that always returns the same constant.",
"model-description" => {"*" => {
"description" => "Definition of a principal decoder that always returns the same constant.",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
"x500-attribute-principal-decoder" => {
"description" => "Definition of a X.500 attribute based principal decoder",
"model-description" => {"*" => {
"description" => "Definition of a X.500 attribute based principal decoder",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
"concatenating-principal-decoder" => {
"description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
"model-description" => {"*" => {
"description" => "A principal decoder definition where the principal decoder is a concatenation of other principal decoders.",
"capabilities" => [
{
"name" => "org.wildfly.security.principal-transformer",
"dynamic" => true
},
{
"name" => "org.wildfly.security.principal-decoder",
"dynamic" => true
}
],
{code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFLY-9514) EJB client exception when authentication fails is too long
by Jiri Ondrusek (JIRA)
[ https://issues.jboss.org/browse/WFLY-9514?page=com.atlassian.jira.plugin.... ]
Jiri Ondrusek moved JBEAP-13687 to WFLY-9514:
---------------------------------------------
Project: WildFly (was: JBoss Enterprise Application Platform)
Key: WFLY-9514 (was: JBEAP-13687)
Workflow: GIT Pull Request workflow (was: CDW with loose statuses v1)
Component/s: EJB
(was: EJB)
(was: User Experience)
Affects Version/s: 12.0.0.Alpha1
(was: 7.1.0.ER2)
> EJB client exception when authentication fails is too long
> ----------------------------------------------------------
>
> Key: WFLY-9514
> URL: https://issues.jboss.org/browse/WFLY-9514
> Project: WildFly
> Issue Type: Bug
> Components: EJB
> Affects Versions: 12.0.0.Alpha1
> Reporter: Jiri Ondrusek
> Assignee: Jiri Ondrusek
>
> This occurs when an EJB client fails an authentication attempt. Could we get rid of the excessive suppressed exceptions so that it's not this long and complicated? The "Server rejected authentication" message should probably occur just once.
> {noformat}
> Exception in thread "main" javax.ejb.NoSuchEJBException: EJBCLIENT000079: Unable to discover destination for request for EJB StatelessEJBLocator for "/server/HelloBean", view is interface ejb.HelloBeanRemote, affinity is None
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:570)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
> at org.jboss.ejb.protocol.remote.RemotingEJBClientInterceptor.handleInvocationResult(RemotingEJBClientInterceptor.java:56)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
> at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.handleInvocationResult(DiscoveryEJBClientInterceptor.java:98)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
> at org.jboss.ejb.client.TransactionInterceptor.handleInvocationResult(TransactionInterceptor.java:86)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
> at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
> at org.jboss.ejb.client.EJBClientInvocationContext.awaitResponse(EJBClientInvocationContext.java:912)
> at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:174)
> at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:107)
> at com.sun.proxy.$Proxy3.hello(Unknown Source)
> at client.Client.main(Client.java:44)
> Suppressed: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
> DIGEST-MD5: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
> at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
> at ...asynchronous invocation...(Unknown Source)
> at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
> at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
> at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
> at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
> at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
> at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
> at org.jboss.remoting3.UncloseableEndpoint.getConnectedIdentity(UncloseableEndpoint.java:51)
> at org.jboss.remoting3.Endpoint.getConnectedIdentity(Endpoint.java:122)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.lambda$connectAndDiscover$0(RemotingEJBDiscoveryProvider.java:333)
> at java.security.AccessController.doPrivileged(Native Method)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.connectAndDiscover(RemotingEJBDiscoveryProvider.java:333)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider.discover(RemotingEJBDiscoveryProvider.java:132)
> at org.jboss.ejb.protocol.remote.RemoteEJBDiscoveryConfigurator.lambda$configure$0(RemoteEJBDiscoveryConfigurator.java:42)
> at org.wildfly.discovery.ConfiguredProvider.discover(ConfiguredProvider.java:45)
> at org.wildfly.discovery.Discovery.discover(Discovery.java:100)
> at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.discover(DiscoveryEJBClientInterceptor.java:184)
> at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.doAnyDiscovery(DiscoveryEJBClientInterceptor.java:304)
> at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.executeDiscovery(DiscoveryEJBClientInterceptor.java:246)
> at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.handleInvocation(DiscoveryEJBClientInterceptor.java:82)
> at org.jboss.ejb.client.EJBClientInvocationContext.sendRequest(EJBClientInvocationContext.java:470)
> at org.jboss.ejb.client.TransactionInterceptor.handleInvocation(TransactionInterceptor.java:81)
> at org.jboss.ejb.client.EJBClientInvocationContext.sendRequest(EJBClientInvocationContext.java:470)
> at org.wildfly.common.context.Contextual.runExConsumer(Contextual.java:203)
> at org.jboss.ejb.client.EJBClientInvocationContext.sendRequestInitial(EJBClientInvocationContext.java:306)
> at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:170)
> ... 3 more
> Suppressed: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:730)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:572)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
> Suppressed: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
> DIGEST-MD5: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
> at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
> at ...asynchronous invocation...(Unknown Source)
> at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
> at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
> at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
> at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
> at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
> at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
> at org.jboss.remoting3.UncloseableEndpoint.getConnectedIdentity(UncloseableEndpoint.java:51)
> at org.jboss.remoting3.Endpoint.getConnectedIdentity(Endpoint.java:122)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.lambda$connectAndDiscover$0(RemotingEJBDiscoveryProvider.java:333)
> at java.security.AccessController.doPrivileged(Native Method)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.connectAndDiscover(RemotingEJBDiscoveryProvider.java:333)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.countDown(RemotingEJBDiscoveryProvider.java:410)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt$1.handleFailed(RemotingEJBDiscoveryProvider.java:299)
> at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt$1.handleFailed(RemotingEJBDiscoveryProvider.java:291)
> at org.xnio.IoFuture$HandlingNotifier.notify(IoFuture.java:215)
> at org.xnio.AbstractIoFuture$NotifierRunnable.run(AbstractIoFuture.java:720)
> at org.jboss.remoting3.EndpointImpl$TrackingExecutor.lambda$execute$0(EndpointImpl.java:898)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> Suppressed: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:730)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:572)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
> {noformat}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months
[JBoss JIRA] (WFLY-9515) EJB client exception when authentication fails is too long
by Jiri Ondrusek (JIRA)
Jiri Ondrusek created WFLY-9515:
-----------------------------------
Summary: EJB client exception when authentication fails is too long
Key: WFLY-9515
URL: https://issues.jboss.org/browse/WFLY-9515
Project: WildFly
Issue Type: Bug
Components: EJB
Affects Versions: 12.0.0.Alpha1
Reporter: Jiri Ondrusek
Assignee: Jiri Ondrusek
This occurs when an EJB client fails an authentication attempt. Could we get rid of the excessive suppressed exceptions so that it's not this long and complicated? The "Server rejected authentication" message should probably occur just once.
{noformat}
Exception in thread "main" javax.ejb.NoSuchEJBException: EJBCLIENT000079: Unable to discover destination for request for EJB StatelessEJBLocator for "/server/HelloBean", view is interface ejb.HelloBeanRemote, affinity is None
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:570)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
at org.jboss.ejb.protocol.remote.RemotingEJBClientInterceptor.handleInvocationResult(RemotingEJBClientInterceptor.java:56)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.handleInvocationResult(DiscoveryEJBClientInterceptor.java:98)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
at org.jboss.ejb.client.TransactionInterceptor.handleInvocationResult(TransactionInterceptor.java:86)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:572)
at org.jboss.ejb.client.EJBClientInvocationContext.getResult(EJBClientInvocationContext.java:507)
at org.jboss.ejb.client.EJBClientInvocationContext.awaitResponse(EJBClientInvocationContext.java:912)
at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:174)
at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:107)
at com.sun.proxy.$Proxy3.hello(Unknown Source)
at client.Client.main(Client.java:44)
Suppressed: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
DIGEST-MD5: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
at ...asynchronous invocation...(Unknown Source)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
at org.jboss.remoting3.UncloseableEndpoint.getConnectedIdentity(UncloseableEndpoint.java:51)
at org.jboss.remoting3.Endpoint.getConnectedIdentity(Endpoint.java:122)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.lambda$connectAndDiscover$0(RemotingEJBDiscoveryProvider.java:333)
at java.security.AccessController.doPrivileged(Native Method)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.connectAndDiscover(RemotingEJBDiscoveryProvider.java:333)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider.discover(RemotingEJBDiscoveryProvider.java:132)
at org.jboss.ejb.protocol.remote.RemoteEJBDiscoveryConfigurator.lambda$configure$0(RemoteEJBDiscoveryConfigurator.java:42)
at org.wildfly.discovery.ConfiguredProvider.discover(ConfiguredProvider.java:45)
at org.wildfly.discovery.Discovery.discover(Discovery.java:100)
at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.discover(DiscoveryEJBClientInterceptor.java:184)
at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.doAnyDiscovery(DiscoveryEJBClientInterceptor.java:304)
at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.executeDiscovery(DiscoveryEJBClientInterceptor.java:246)
at org.jboss.ejb.client.DiscoveryEJBClientInterceptor.handleInvocation(DiscoveryEJBClientInterceptor.java:82)
at org.jboss.ejb.client.EJBClientInvocationContext.sendRequest(EJBClientInvocationContext.java:470)
at org.jboss.ejb.client.TransactionInterceptor.handleInvocation(TransactionInterceptor.java:81)
at org.jboss.ejb.client.EJBClientInvocationContext.sendRequest(EJBClientInvocationContext.java:470)
at org.wildfly.common.context.Contextual.runExConsumer(Contextual.java:203)
at org.jboss.ejb.client.EJBClientInvocationContext.sendRequestInitial(EJBClientInvocationContext.java:306)
at org.jboss.ejb.client.EJBInvocationHandler.invoke(EJBInvocationHandler.java:170)
... 3 more
Suppressed: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:730)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:572)
at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
Suppressed: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
DIGEST-MD5: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
at ...asynchronous invocation...(Unknown Source)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
at org.jboss.remoting3.UncloseableEndpoint.getConnectedIdentity(UncloseableEndpoint.java:51)
at org.jboss.remoting3.Endpoint.getConnectedIdentity(Endpoint.java:122)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.lambda$connectAndDiscover$0(RemotingEJBDiscoveryProvider.java:333)
at java.security.AccessController.doPrivileged(Native Method)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.connectAndDiscover(RemotingEJBDiscoveryProvider.java:333)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt.countDown(RemotingEJBDiscoveryProvider.java:410)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt$1.handleFailed(RemotingEJBDiscoveryProvider.java:299)
at org.jboss.ejb.protocol.remote.RemotingEJBDiscoveryProvider$DiscoveryAttempt$1.handleFailed(RemotingEJBDiscoveryProvider.java:291)
at org.xnio.IoFuture$HandlingNotifier.notify(IoFuture.java:215)
at org.xnio.AbstractIoFuture$NotifierRunnable.run(AbstractIoFuture.java:720)
at org.jboss.remoting3.EndpointImpl$TrackingExecutor.lambda$execute$0(EndpointImpl.java:898)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
Suppressed: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:730)
at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.handleEvent(ClientConnectionOpenListener.java:572)
at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
{noformat}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 12 months