]
Darran Lofthouse commented on WFLY-11123:
-----------------------------------------
Dropping to major, this method is presently available in the currently supported JVMs,
additionally it fails safe if not.
Illegal reflective access by
org.wildfly.extension.elytron.SSLDefinitions
-------------------------------------------------------------------------
Key: WFLY-11123
URL:
https://issues.jboss.org/browse/WFLY-11123
Project: WildFly
Issue Type: Bug
Components: Security
Affects Versions: 14.0.1.Final
Environment: Windows 7 x64. Java 11: OpenJDK 64-Bit Server VM AdoptOpenJDK (build
11+28-201810022317, mixed mode)
Reporter: Marco Del Percio
Priority: Major
Labels: Java11, access, elytron, illegal, reflective, wildfly
After configuring HTTPS using the following guide: [Enable One-way SSL/TLS for
Applications|http://docs.wildfly.org/14/WildFly_Elytron_Security.html#con...],
configuration seems ok and server boots fine however an illegal reflective access warning
comes up from jar within Elytron:
{color:red}
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions
(jar:file:/D:/wildfly-14.0.1.Final_FleetManager/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-6.0.2.Final.jar!/)
to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
WARNING: Please consider reporting this to the maintainers of
org.wildfly.extension.elytron.SSLDefinitions
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective
access operations
WARNING: All illegal access operations will be denied in a future release
{color}