[JBoss JIRA] (WFLY-2653) HTTPS undertow listener select cipher-suites
by Tomaz Cerar (JIRA)
[ https://issues.jboss.org/browse/WFLY-2653?page=com.atlassian.jira.plugin.... ]
Tomaz Cerar reassigned WFLY-2653:
---------------------------------
Assignee: Tomaz Cerar (was: Stuart Douglas)
> HTTPS undertow listener select cipher-suites
> --------------------------------------------
>
> Key: WFLY-2653
> URL: https://issues.jboss.org/browse/WFLY-2653
> Project: WildFly
> Issue Type: Enhancement
> Security Level: Public(Everyone can see)
> Components: Web (Undertow)
> Affects Versions: 8.0.0.CR1
> Environment: fedora 18
> Reporter: Aleksandar Kostadinov
> Assignee: Tomaz Cerar
> Labels: https, security, security-hardening, ssl, undertow, wildfly
>
> At the moment I don't see any way to restrict allowed cipher suites for the https listener.
> {CODE}
> [standalone@localhost:9990 /] /core-service=management/security-realm=HttpsRealm:read-resource(recursive=true, include-defaults=true)
> {
> "outcome" => "success",
> "result" => {
> "map-groups-to-roles" => true,
> "authentication" => undefined,
> "authorization" => undefined,
> "plug-in" => undefined,
> "server-identity" => {"ssl" => {
> "alias" => undefined,
> "key-password" => undefined,
> "keystore-password" => "changeit",
> "keystore-path" => "localhost.keystore",
> "keystore-relative-to" => "jboss.server.config.dir",
> "protocol" => "TLS"
> }}
> }
> }
> [standalone@localhost:9990 /] /subsystem=undertow/server=default-server:read-resource(recursive=true, include-defaults=true)
> {
> "outcome" => "success",
> "result" => {
> <...>
> "https-listener" => {"https" => {
> "allow-encoded-slash" => false,
> "always-set-keep-alive" => true,
> "buffer-pipelined-data" => true,
> "buffer-pool" => "default",
> "decode-url" => true,
> "enabled" => true,
> "max-cookies" => 200,
> "max-header-size" => 51200,
> "max-headers" => 200,
> "max-parameters" => 1000,
> "max-post-size" => 10485760L,
> "security-realm" => "ApplicationRealm",
> "socket-binding" => "https",
> "url-charset" => "UTF-8",
> "verify-client" => "NOT_REQUESTED",
> "worker" => "default"
> }}
> }
> }
> {CODE}
> I have tested that default cipher suites used are pretty sane except RC4-SHA and RC4-MD5. Below is full list. But I think it is important for users to be able to support more or less ciphers depending on their environment and requirements. We also need good secure default settings IMO excluding the above mentioned two ciphers. See current recommendations here [1][2]
> {CODE}
> $ sslscan --no-failed localhost:8443
> _
> ___ ___| |___ ___ __ _ _ __
> / __/ __| / __|/ __/ _` | '_ \
> \__ \__ \ \__ \ (_| (_| | | | |
> |___/___/_|___/\___\__,_|_| |_|
> Version 1.8.2
> http://www.titania.co.uk
> Copyright Ian Ventura-Whiting 2009
> Testing SSL server localhost on port 8443
> Supported Server Cipher(s):
> Accepted SSLv3 256 bits DHE-RSA-AES256-SHA
> Accepted SSLv3 256 bits AES256-SHA
> Accepted SSLv3 168 bits EDH-RSA-DES-CBC3-SHA
> Accepted SSLv3 168 bits DES-CBC3-SHA
> Accepted SSLv3 128 bits DHE-RSA-AES128-SHA
> Accepted SSLv3 128 bits AES128-SHA
> Accepted SSLv3 128 bits RC4-SHA
> Accepted SSLv3 128 bits RC4-MD5
> Accepted TLSv1 256 bits DHE-RSA-AES256-SHA
> Accepted TLSv1 256 bits AES256-SHA
> Accepted TLSv1 168 bits EDH-RSA-DES-CBC3-SHA
> Accepted TLSv1 168 bits DES-CBC3-SHA
> Accepted TLSv1 128 bits DHE-RSA-AES128-SHA
> Accepted TLSv1 128 bits AES128-SHA
> Accepted TLSv1 128 bits RC4-SHA
> Accepted TLSv1 128 bits RC4-MD5
> {CODE}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months
[JBoss JIRA] (WFLY-2653) HTTPS undertow listener select cipher-suites
by Tomaz Cerar (JIRA)
[ https://issues.jboss.org/browse/WFLY-2653?page=com.atlassian.jira.plugin.... ]
Tomaz Cerar updated WFLY-2653:
------------------------------
Affects Version/s: 8.0.0.Beta1
(was: 8.0.0.CR1)
> HTTPS undertow listener select cipher-suites
> --------------------------------------------
>
> Key: WFLY-2653
> URL: https://issues.jboss.org/browse/WFLY-2653
> Project: WildFly
> Issue Type: Enhancement
> Security Level: Public(Everyone can see)
> Components: Web (Undertow)
> Affects Versions: 8.0.0.Beta1
> Environment: fedora 18
> Reporter: Aleksandar Kostadinov
> Assignee: Tomaz Cerar
> Labels: https, security, security-hardening, ssl, undertow, wildfly
>
> At the moment I don't see any way to restrict allowed cipher suites for the https listener.
> {CODE}
> [standalone@localhost:9990 /] /core-service=management/security-realm=HttpsRealm:read-resource(recursive=true, include-defaults=true)
> {
> "outcome" => "success",
> "result" => {
> "map-groups-to-roles" => true,
> "authentication" => undefined,
> "authorization" => undefined,
> "plug-in" => undefined,
> "server-identity" => {"ssl" => {
> "alias" => undefined,
> "key-password" => undefined,
> "keystore-password" => "changeit",
> "keystore-path" => "localhost.keystore",
> "keystore-relative-to" => "jboss.server.config.dir",
> "protocol" => "TLS"
> }}
> }
> }
> [standalone@localhost:9990 /] /subsystem=undertow/server=default-server:read-resource(recursive=true, include-defaults=true)
> {
> "outcome" => "success",
> "result" => {
> <...>
> "https-listener" => {"https" => {
> "allow-encoded-slash" => false,
> "always-set-keep-alive" => true,
> "buffer-pipelined-data" => true,
> "buffer-pool" => "default",
> "decode-url" => true,
> "enabled" => true,
> "max-cookies" => 200,
> "max-header-size" => 51200,
> "max-headers" => 200,
> "max-parameters" => 1000,
> "max-post-size" => 10485760L,
> "security-realm" => "ApplicationRealm",
> "socket-binding" => "https",
> "url-charset" => "UTF-8",
> "verify-client" => "NOT_REQUESTED",
> "worker" => "default"
> }}
> }
> }
> {CODE}
> I have tested that default cipher suites used are pretty sane except RC4-SHA and RC4-MD5. Below is full list. But I think it is important for users to be able to support more or less ciphers depending on their environment and requirements. We also need good secure default settings IMO excluding the above mentioned two ciphers. See current recommendations here [1][2]
> {CODE}
> $ sslscan --no-failed localhost:8443
> _
> ___ ___| |___ ___ __ _ _ __
> / __/ __| / __|/ __/ _` | '_ \
> \__ \__ \ \__ \ (_| (_| | | | |
> |___/___/_|___/\___\__,_|_| |_|
> Version 1.8.2
> http://www.titania.co.uk
> Copyright Ian Ventura-Whiting 2009
> Testing SSL server localhost on port 8443
> Supported Server Cipher(s):
> Accepted SSLv3 256 bits DHE-RSA-AES256-SHA
> Accepted SSLv3 256 bits AES256-SHA
> Accepted SSLv3 168 bits EDH-RSA-DES-CBC3-SHA
> Accepted SSLv3 168 bits DES-CBC3-SHA
> Accepted SSLv3 128 bits DHE-RSA-AES128-SHA
> Accepted SSLv3 128 bits AES128-SHA
> Accepted SSLv3 128 bits RC4-SHA
> Accepted SSLv3 128 bits RC4-MD5
> Accepted TLSv1 256 bits DHE-RSA-AES256-SHA
> Accepted TLSv1 256 bits AES256-SHA
> Accepted TLSv1 168 bits EDH-RSA-DES-CBC3-SHA
> Accepted TLSv1 168 bits DES-CBC3-SHA
> Accepted TLSv1 128 bits DHE-RSA-AES128-SHA
> Accepted TLSv1 128 bits AES128-SHA
> Accepted TLSv1 128 bits RC4-SHA
> Accepted TLSv1 128 bits RC4-MD5
> {CODE}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months
[JBoss JIRA] (WFLY-2653) HTTPS undertow listener select cipher-suites
by Aleksandar Kostadinov (JIRA)
Aleksandar Kostadinov created WFLY-2653:
-------------------------------------------
Summary: HTTPS undertow listener select cipher-suites
Key: WFLY-2653
URL: https://issues.jboss.org/browse/WFLY-2653
Project: WildFly
Issue Type: Enhancement
Security Level: Public (Everyone can see)
Components: Web (Undertow)
Affects Versions: 8.0.0.CR1
Environment: fedora 18
Reporter: Aleksandar Kostadinov
Assignee: Stuart Douglas
At the moment I don't see any way to restrict allowed cipher suites for the https listener.
{CODE}
[standalone@localhost:9990 /] /core-service=management/security-realm=HttpsRealm:read-resource(recursive=true, include-defaults=true)
{
"outcome" => "success",
"result" => {
"map-groups-to-roles" => true,
"authentication" => undefined,
"authorization" => undefined,
"plug-in" => undefined,
"server-identity" => {"ssl" => {
"alias" => undefined,
"key-password" => undefined,
"keystore-password" => "changeit",
"keystore-path" => "localhost.keystore",
"keystore-relative-to" => "jboss.server.config.dir",
"protocol" => "TLS"
}}
}
}
[standalone@localhost:9990 /] /subsystem=undertow/server=default-server:read-resource(recursive=true, include-defaults=true)
{
"outcome" => "success",
"result" => {
<...>
"https-listener" => {"https" => {
"allow-encoded-slash" => false,
"always-set-keep-alive" => true,
"buffer-pipelined-data" => true,
"buffer-pool" => "default",
"decode-url" => true,
"enabled" => true,
"max-cookies" => 200,
"max-header-size" => 51200,
"max-headers" => 200,
"max-parameters" => 1000,
"max-post-size" => 10485760L,
"security-realm" => "ApplicationRealm",
"socket-binding" => "https",
"url-charset" => "UTF-8",
"verify-client" => "NOT_REQUESTED",
"worker" => "default"
}}
}
}
{CODE}
I have tested that default cipher suites used are pretty sane except RC4-SHA and RC4-MD5. Below is full list. But I think it is important for users to be able to support more or less ciphers depending on their environment and requirements. We also need good secure default settings IMO excluding the above mentioned two ciphers. See current recommendations here [1][2]
{CODE}
$ sslscan --no-failed localhost:8443
_
___ ___| |___ ___ __ _ _ __
/ __/ __| / __|/ __/ _` | '_ \
\__ \__ \ \__ \ (_| (_| | | | |
|___/___/_|___/\___\__,_|_| |_|
Version 1.8.2
http://www.titania.co.uk
Copyright Ian Ventura-Whiting 2009
Testing SSL server localhost on port 8443
Supported Server Cipher(s):
Accepted SSLv3 256 bits DHE-RSA-AES256-SHA
Accepted SSLv3 256 bits AES256-SHA
Accepted SSLv3 168 bits EDH-RSA-DES-CBC3-SHA
Accepted SSLv3 168 bits DES-CBC3-SHA
Accepted SSLv3 128 bits DHE-RSA-AES128-SHA
Accepted SSLv3 128 bits AES128-SHA
Accepted SSLv3 128 bits RC4-SHA
Accepted SSLv3 128 bits RC4-MD5
Accepted TLSv1 256 bits DHE-RSA-AES256-SHA
Accepted TLSv1 256 bits AES256-SHA
Accepted TLSv1 168 bits EDH-RSA-DES-CBC3-SHA
Accepted TLSv1 168 bits DES-CBC3-SHA
Accepted TLSv1 128 bits DHE-RSA-AES128-SHA
Accepted TLSv1 128 bits AES128-SHA
Accepted TLSv1 128 bits RC4-SHA
Accepted TLSv1 128 bits RC4-MD5
{CODE}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months
[JBoss JIRA] (DROOLS-376) NullPointerException on JPAKnowledgeService.loadStatefulKnowledgeSession() when Collection is modified
by RH Bugzilla Integration (JIRA)
[ https://issues.jboss.org/browse/DROOLS-376?page=com.atlassian.jira.plugin... ]
RH Bugzilla Integration commented on DROOLS-376:
------------------------------------------------
Mario Fusco <mfusco(a)redhat.com> changed the Status of [bug 1040891|https://bugzilla.redhat.com/show_bug.cgi?id=1040891] from NEW to MODIFIED
> NullPointerException on JPAKnowledgeService.loadStatefulKnowledgeSession() when Collection is modified
> ------------------------------------------------------------------------------------------------------
>
> Key: DROOLS-376
> URL: https://issues.jboss.org/browse/DROOLS-376
> Project: Drools
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Affects Versions: 6.0.0.Final
> Reporter: Toshiya Kobayashi
> Assignee: Mario Fusco
> Fix For: 6.0.1.Final
>
>
> - Using JPAKnowledgeService
> - Add two or more elements to Collection property which is referred by 'from' in a rule.
> {noformat}
> package org.drools.test
> import org.drools.compiler.Person
> import org.drools.compiler.Address
> rule rule1
> when
> $p: Person($list : addresses)
> $a: Address(street == "y") from $list
> then
> $list.add( new Address("z") );
> $list.add( new Address("w") );
> end
> {noformat}
> - Call JPAKnowledgeService.loadStatefulKnowledgeSession()
> Then NullPointerException is thrown
> {noformat}
> 2013-12-12 18:03:31,329 [main] |org.drools.persistence.SingleSessionCommandService| WARN Could not commit session
> java.lang.RuntimeException: Unable to load session snapshot
> at org.drools.persistence.SessionMarshallingHelper.loadSnapshot(SessionMarshallingHelper.java:88) ~[classes/:na]
> at org.drools.persistence.SingleSessionCommandService.initExistingKnowledgeSession(SingleSessionCommandService.java:264) ~[classes/:na]
> at org.drools.persistence.SingleSessionCommandService.<init>(SingleSessionCommandService.java:196) ~[classes/:na]
> at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) [na:1.7.0_13]
> at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57) [na:1.7.0_13]
> at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) [na:1.7.0_13]
> at java.lang.reflect.Constructor.newInstance(Constructor.java:525) [na:1.7.0_13]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.buildCommandService(KnowledgeStoreServiceImpl.java:101) [classes/:na]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.loadKieSession(KnowledgeStoreServiceImpl.java:84) [classes/:na]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.loadKieSession(KnowledgeStoreServiceImpl.java:1) [classes/:na]
> at org.kie.internal.persistence.jpa.JPAKnowledgeService.loadStatefulKnowledgeSession(JPAKnowledgeService.java:130) [kie-internal-6.1.0-SNAPSHOT.jar:6.1.0-SNAPSHOT]
> at org.drools.persistence.session.JpaPersistentStatefulSessionTest.testFromNodeWithModifiedCollection(JpaPersistentStatefulSessionTest.java:562) [test-classes/:na]
> ...
> Caused by: java.lang.NullPointerException: null
> at org.drools.core.reteoo.FromNode.createRightTuple(FromNode.java:152) ~[classes/:na]
> at org.drools.core.phreak.PhreakFromNode.doLeftInserts(PhreakFromNode.java:96) ~[classes/:na]
> at org.drools.core.phreak.PhreakFromNode.doNode(PhreakFromNode.java:49) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.innerEval(RuleNetworkEvaluator.java:348) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.outerEval(RuleNetworkEvaluator.java:161) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.evaluateNetwork(RuleNetworkEvaluator.java:116) ~[classes/:na]
> at org.drools.core.phreak.RuleExecutor.reEvaluateNetwork(RuleExecutor.java:200) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller$PBActivationsFilter.fireRNEAs(ProtobufInputMarshaller.java:813) ~[classes/:na]
> at org.drools.core.reteoo.LeftInputAdapterNode.doInsertObject(LeftInputAdapterNode.java:258) ~[classes/:na]
> at org.drools.core.reteoo.LeftInputAdapterNode.assertObject(LeftInputAdapterNode.java:199) ~[classes/:na]
> at org.drools.core.reteoo.SingleObjectSinkAdapter.propagateAssertObject(SingleObjectSinkAdapter.java:60) ~[classes/:na]
> at org.drools.core.reteoo.ObjectTypeNode.assertObject(ObjectTypeNode.java:288) ~[classes/:na]
> at org.drools.core.reteoo.EntryPointNode.assertObject(EntryPointNode.java:260) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.assertHandleIntoOTN(ProtobufInputMarshaller.java:499) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readFactHandles(ProtobufInputMarshaller.java:476) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readSession(ProtobufInputMarshaller.java:250) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readSession(ProtobufInputMarshaller.java:157) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufMarshaller.unmarshall(ProtobufMarshaller.java:116) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufMarshaller.unmarshall(ProtobufMarshaller.java:1) ~[classes/:na]
> at org.drools.persistence.SessionMarshallingHelper.loadSnapshot(SessionMarshallingHelper.java:83) ~[classes/:na]
> {noformat}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months
[JBoss JIRA] (DROOLS-376) NullPointerException on JPAKnowledgeService.loadStatefulKnowledgeSession() when Collection is modified
by RH Bugzilla Integration (JIRA)
[ https://issues.jboss.org/browse/DROOLS-376?page=com.atlassian.jira.plugin... ]
RH Bugzilla Integration commented on DROOLS-376:
------------------------------------------------
Mario Fusco <mfusco(a)redhat.com> changed the Status of [bug 1040889|https://bugzilla.redhat.com/show_bug.cgi?id=1040889] from ASSIGNED to MODIFIED
> NullPointerException on JPAKnowledgeService.loadStatefulKnowledgeSession() when Collection is modified
> ------------------------------------------------------------------------------------------------------
>
> Key: DROOLS-376
> URL: https://issues.jboss.org/browse/DROOLS-376
> Project: Drools
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Affects Versions: 6.0.0.Final
> Reporter: Toshiya Kobayashi
> Assignee: Mario Fusco
> Fix For: 6.0.1.Final
>
>
> - Using JPAKnowledgeService
> - Add two or more elements to Collection property which is referred by 'from' in a rule.
> {noformat}
> package org.drools.test
> import org.drools.compiler.Person
> import org.drools.compiler.Address
> rule rule1
> when
> $p: Person($list : addresses)
> $a: Address(street == "y") from $list
> then
> $list.add( new Address("z") );
> $list.add( new Address("w") );
> end
> {noformat}
> - Call JPAKnowledgeService.loadStatefulKnowledgeSession()
> Then NullPointerException is thrown
> {noformat}
> 2013-12-12 18:03:31,329 [main] |org.drools.persistence.SingleSessionCommandService| WARN Could not commit session
> java.lang.RuntimeException: Unable to load session snapshot
> at org.drools.persistence.SessionMarshallingHelper.loadSnapshot(SessionMarshallingHelper.java:88) ~[classes/:na]
> at org.drools.persistence.SingleSessionCommandService.initExistingKnowledgeSession(SingleSessionCommandService.java:264) ~[classes/:na]
> at org.drools.persistence.SingleSessionCommandService.<init>(SingleSessionCommandService.java:196) ~[classes/:na]
> at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) [na:1.7.0_13]
> at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57) [na:1.7.0_13]
> at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) [na:1.7.0_13]
> at java.lang.reflect.Constructor.newInstance(Constructor.java:525) [na:1.7.0_13]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.buildCommandService(KnowledgeStoreServiceImpl.java:101) [classes/:na]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.loadKieSession(KnowledgeStoreServiceImpl.java:84) [classes/:na]
> at org.drools.persistence.jpa.KnowledgeStoreServiceImpl.loadKieSession(KnowledgeStoreServiceImpl.java:1) [classes/:na]
> at org.kie.internal.persistence.jpa.JPAKnowledgeService.loadStatefulKnowledgeSession(JPAKnowledgeService.java:130) [kie-internal-6.1.0-SNAPSHOT.jar:6.1.0-SNAPSHOT]
> at org.drools.persistence.session.JpaPersistentStatefulSessionTest.testFromNodeWithModifiedCollection(JpaPersistentStatefulSessionTest.java:562) [test-classes/:na]
> ...
> Caused by: java.lang.NullPointerException: null
> at org.drools.core.reteoo.FromNode.createRightTuple(FromNode.java:152) ~[classes/:na]
> at org.drools.core.phreak.PhreakFromNode.doLeftInserts(PhreakFromNode.java:96) ~[classes/:na]
> at org.drools.core.phreak.PhreakFromNode.doNode(PhreakFromNode.java:49) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.innerEval(RuleNetworkEvaluator.java:348) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.outerEval(RuleNetworkEvaluator.java:161) ~[classes/:na]
> at org.drools.core.phreak.RuleNetworkEvaluator.evaluateNetwork(RuleNetworkEvaluator.java:116) ~[classes/:na]
> at org.drools.core.phreak.RuleExecutor.reEvaluateNetwork(RuleExecutor.java:200) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller$PBActivationsFilter.fireRNEAs(ProtobufInputMarshaller.java:813) ~[classes/:na]
> at org.drools.core.reteoo.LeftInputAdapterNode.doInsertObject(LeftInputAdapterNode.java:258) ~[classes/:na]
> at org.drools.core.reteoo.LeftInputAdapterNode.assertObject(LeftInputAdapterNode.java:199) ~[classes/:na]
> at org.drools.core.reteoo.SingleObjectSinkAdapter.propagateAssertObject(SingleObjectSinkAdapter.java:60) ~[classes/:na]
> at org.drools.core.reteoo.ObjectTypeNode.assertObject(ObjectTypeNode.java:288) ~[classes/:na]
> at org.drools.core.reteoo.EntryPointNode.assertObject(EntryPointNode.java:260) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.assertHandleIntoOTN(ProtobufInputMarshaller.java:499) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readFactHandles(ProtobufInputMarshaller.java:476) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readSession(ProtobufInputMarshaller.java:250) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufInputMarshaller.readSession(ProtobufInputMarshaller.java:157) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufMarshaller.unmarshall(ProtobufMarshaller.java:116) ~[classes/:na]
> at org.drools.core.marshalling.impl.ProtobufMarshaller.unmarshall(ProtobufMarshaller.java:1) ~[classes/:na]
> at org.drools.persistence.SessionMarshallingHelper.loadSnapshot(SessionMarshallingHelper.java:83) ~[classes/:na]
> {noformat}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months
[JBoss JIRA] (JGRP-1740) Byteman tests fail on Windows
by Bela Ban (JIRA)
[ https://issues.jboss.org/browse/JGRP-1740?page=com.atlassian.jira.plugin.... ]
Bela Ban resolved JGRP-1740.
----------------------------
Resolution: Done
Please reopen if this still fails
> Byteman tests fail on Windows
> -----------------------------
>
> Key: JGRP-1740
> URL: https://issues.jboss.org/browse/JGRP-1740
> Project: JGroups
> Issue Type: Bug
> Affects Versions: 3.5
> Environment: Windows
> Reporter: Richard Achmatowicz
> Assignee: Bela Ban
> Priority: Minor
> Fix For: 3.5
>
>
> The Byteman tests in the Jgroups testsuite fail when running the testsuite on Windows. The error text is as follows:
> {noformat}
> byteman:
> [testng] -- onStart -- byteman
> [testng] failed config: java.io.FileNotFoundException: Rule file not found for Byteman test case org.jgroups.tests.byteman.BecomeServerTest#testSendingOfMsgsOnUnconnectedChannel
> [testng] FAIL: [1] org.jgroups.tests.byteman.BecomeServerTest.bmngBeforeTest-Method()
> [testng] SKIP: [1] org.jgroups.tests.byteman.BecomeServerTest.testSendingOfMsgsOnUnconnectedChannel()
> [testng] failed config: java.io.FileNotFoundException: Rule file not found for Byteman test case org.jgroups.tests.byteman.BecomeServerTest#testSendingOfMsgsOnUnconnectedChannel
> [testng] FAIL: [1] org.jgroups.tests.byteman.BecomeServerTest.bmngAfterTest-Method()
> [testng] SKIP: [1] org.jgroups.tests.byteman.ForwardToCoordFailoverTest.testSendingDuringViewChange()
> [testng] failed config: java.io.FileNotFoundException: Rule file not found for Byteman test case org.jgroups.tests.byteman.ForwardToCoordFailoverTest#testSendingDuringViewChange
> [testng] FAIL: [1] org.jgroups.tests.byteman.ForwardToCoordFailoverTest.bmngAfterTest-Method()
> [testng] SKIP: [1] org.jgroups.tests.byteman.MessageBeforeConnectedTest.testSendingOfMsgsOnUnconnectedChannel()
> [testng] failed config: java.io.FileNotFoundException: Rule file not found for Byteman test case org.jgroups.tests.byteman.MessageBeforeConnectedTest#testSendingOfMsgsOnUnconnectedChannel
> [testng] FAIL: [1] org.jgroups.tests.byteman.MessageBeforeConnectedTest.bmngAfterTest-Method()
> [testng] SKIP: [1] org.jgroups.tests.byteman.SequencerFailoverTest.testBroadcastSequenceSenderIsB()
> [testng] SKIP: [1] org.jgroups.tests.byteman.SequencerFailoverTest.testBroadcastSequenceSenderIsC()
> [testng] SKIP: [1] org.jgroups.tests.byteman.SequencerFailoverTest.testFailoverWithMultipleThreadsSendingMessages()
> [testng] SKIP: [1] org.jgroups.tests.byteman.SequencerFailoverTest.testResendingVersusNewMessages()
> [testng] failed config: java.io.FileNotFoundException: Rule file not found for Byteman test case org.jgroups.tests.byteman.SequencerFailoverTest#testResendingVersusNewMessages
> [testng] FAIL: [1] org.jgroups.tests.byteman.SequencerFailoverTest.bmngAfterTest-Method()
> [testng] The tests failed.
> {noformat}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
10 years, 11 months