[JBoss JIRA] (WFLY-8272) HttpServerExchange logout not happening after sessiontime out
by Ramesh khot (JIRA)
Ramesh khot created WFLY-8272:
---------------------------------
Summary: HttpServerExchange logout not happening after sessiontime out
Key: WFLY-8272
URL: https://issues.jboss.org/browse/WFLY-8272
Project: WildFly
Issue Type: Bug
Components: JSF, Security
Affects Versions: 10.1.0.Final
Reporter: Ramesh khot
Assignee: Farah Juma
I have an application deployed on wildfly-10.1.0.Final, using picketbox form based authentication integrated with SSO, we are using Jsf framework
After ExternalContext.invalidateSession(); call UsernamePasswordLoginModule.logout() method is not triggered, which is used to happen in Jboss EAP 6.*, now I am calling request.logout() to flush the session data, which works for me
After session time out invalidateSession is called but its not flushing session data, log says exchange null
io.undertow.session trace log:
*When request.logout():*
00:19:14,602 DEBUG [io.undertow.session] (default task-45) Invalidating session WUZTg0SSQXsbqgByND0Mpz1SMtcLExt7vGgrVr-E for exchange HttpServerExchange{ POST /plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml request {Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8], Accept-Language=[en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,en-GB;q=0.2], Accept-Encoding=[gzip, deflate], DNT=[1], User-Agent=[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0; Firefox 45.7.0 - 11712-1502320053-1.34], Connection=[keep-alive], Cookie=[j_username=guest1; j_password=passguest1; JSESSIONID=WUZTg0SSQXsbqgByND0Mpz1SMtcLExt7vGgrVr-E.bmh1058602; JSESSIONIDSSO=PSz_b3ZYOtUYMPDC5_rdS-volKYXMH2j0pY-NLfe], Content-Type=[application/x-www-form-urlencoded], Content-Length=[116], Referer=[http://localhost:8090/plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml], Host=[localhost:8090]} response {Expires=[0], Cache-Control=[no-cache, no-store, must-revalidate], X-Powered-By=[Undertow/1], Server=[WildFly/10], Pragma=[no-cache]}}
00:19:18,864 DEBUG [io.undertow.request.security] (default task-45) Logging out user guest1 for HttpServerExchange{ POST /plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml request {Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8], Accept-Language=[en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,en-GB;q=0.2], Accept-Encoding=[gzip, deflate], DNT=[1], User-Agent=[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0; Firefox 45.7.0 - 11712-1502320053-1.34], Connection=[keep-alive], Cookie=[j_username=guest1; j_password=passguest1; JSESSIONID=WUZTg0SSQXsbqgByND0Mpz1SMtcLExt7vGgrVr-E.bmh1058602; JSESSIONIDSSO=PSz_b3ZYOtUYMPDC5_rdS-volKYXMH2j0pY-NLfe], Content-Type=[application/x-www-form-urlencoded], Content-Length=[116], Referer=[http://localhost:8090/plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml], Host=[localhost:8090]} response {Expires=[0], Cache-Control=[no-cache, no-store, must-revalidate], X-Powered-By=[Undertow/1], Server=[WildFly/10], Pragma=[no-cache]}}
00:19:18,864 DEBUG [io.undertow.request.security] (default task-45) Logged out HttpServerExchange{ POST /plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml request {Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8], Accept-Language=[en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,en-GB;q=0.2], Accept-Encoding=[gzip, deflate], DNT=[1], User-Agent=[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0; Firefox 45.7.0 - 11712-1502320053-1.34], Connection=[keep-alive], Cookie=[j_username=guest1; j_password=passguest1; JSESSIONID=WUZTg0SSQXsbqgByND0Mpz1SMtcLExt7vGgrVr-E.bmh1058602; JSESSIONIDSSO=PSz_b3ZYOtUYMPDC5_rdS-volKYXMH2j0pY-NLfe], Content-Type=[application/x-www-form-urlencoded], Content-Length=[116], Referer=[http://localhost:8090/plcdng_slim_dev/BootstrapUI/pages/protected/user/bootstrap.xhtml], Host=[localhost:8090]} response {Expires=[0], Cache-Control=[no-cache, no-store, must-revalidate], X-Powered-By=[Undertow/1], Server=[WildFly/10], Pragma=[no-cache]}}
*After session time out:*
Invalidating session H3Gy64JardrjwVMSxvKswFibxq136utoEnjZLdeG for exchange null
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 10 months
[JBoss JIRA] (WFCORE-1351) FilePermission for XNIO and Marshalling modules are required for Remoting to run with security manager
by Ivo Studensky (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1351?page=com.atlassian.jira.plugi... ]
Ivo Studensky reassigned WFCORE-1351:
-------------------------------------
Assignee: Ivo Studensky (was: David Lloyd)
> FilePermission for XNIO and Marshalling modules are required for Remoting to run with security manager
> ------------------------------------------------------------------------------------------------------
>
> Key: WFCORE-1351
> URL: https://issues.jboss.org/browse/WFCORE-1351
> Project: WildFly Core
> Issue Type: Bug
> Components: Remoting, Security
> Reporter: Ondrej Kotek
> Assignee: Ivo Studensky
> Priority: Critical
> Fix For: 3.0.0.Beta7
>
> Attachments: 1-no-createEndpoint-permission.stacktrace, 2-no-createXnioWorker-permission.stacktrace, 3-no-addConnectionProvider-permission.stacktrace, 4-no-accessDeclaredMembers-permission.stractrace, 5-no-suppressAccessChecks-permission.stracktrace
>
>
> # Running _NestedRemoteContextTestCase_ (from WildFly _testsuite/integration/basic_) with security manager, like
> {noformat}
> ./integration-tests.sh -Dts.basic -Dts.noSmoke -Dtest=NestedRemoteContextTestCase -Dsecurity.manager
> {noformat}
> results in exception:
> {noformat}
> java.io.IOException: java.lang.IllegalArgumentException: XNIO001001: No XNIO provider found
> {noformat}
> To make it work, permissions like following need to be added to _permissions.xml_ of _ejb.ear_:
> {noformat}
> new FilePermission("/home/okotek/git/wildfly/dist/target/wildfly-10.0.0.CR5-SNAPSHOT/modules/system/layers/base/org/jboss/xnio/nio/main/*", "read"),
> new FilePermission("/home/okotek/git/wildfly/dist/target/wildfly-10.0.0.CR5-SNAPSHOT/modules/system/layers/base/org/jboss/marshalling/river/main/*", "read"),
> new RemotingPermission("createEndpoint"),
> new RuntimePermission("createXnioWorker"),
> new RemotingPermission("addConnectionProvider"),
> new RuntimePermission("modifyThread"),
> new RuntimePermission("accessDeclaredMembers"),
> new ReflectPermission("suppressAccessChecks")
> {noformat}
> which is very confusing.
> Why do I need add seemingly unrelated permissions, like _FilePermission_ for XNIO and marshalling or _RuntimePermission_ for createXnioWorker? Such behavior should be fixed or properly documented.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 10 months
[JBoss JIRA] (WFLY-8268) Obtain password from external source (CMD, EXT) doesn't work on Windows.
by Hynek Švábek (JIRA)
[ https://issues.jboss.org/browse/WFLY-8268?page=com.atlassian.jira.plugin.... ]
Hynek Švábek updated WFLY-8268:
-------------------------------
Description:
Obtain password from external source (CMD, EXT) doesn't work on Windows.
Try to create new CS which obtains password from external source:
{code}
/subsystem=elytron/credential-store=myCredStore:add(uri="cr-store://test/myCredStore.jceks?create=true", credential-reference={clear-text="{CMD}C:\path\to\scrit\pass.bat,VerySecretPassword", type=COMMAND}, relative-to=jboss.server.config.dir)
{code}
pass.bat file contains only this
{code}
echo %1
{code}
Because of https://issues.jboss.org/browse/JBEAP-9211 you must do this extra step:
Add new alias to CS -> JCEKS file is created
Please try it open directly with pass "VerySecretPassword" -> *it doesn't work* on Windows.
In my opinion there is problem with back slashes in script path.
https://github.com/wildfly/wildfly-core/blob/3.0.0.Alpha22/controller/src...
Because when I add there back slashed to path then it works.
was:
Obtain password from external source (CMD, EXT) doesn't work on Windows.
Try to create new CS which obtains password from external source:
{code}
/subsystem=elytron/credential-store=myCredStore:add(uri="cr-store://test/myCredStore.jceks?create=true", credential-reference={clear-text="{CMD}C:\path\to\scrit\pass.bat,VerySecretPassword", type=COMMAND}, relative-to=jboss.server.config.dir)
pass.bat file contains only this
{code}
echo %1
{code}
Because of https://issues.jboss.org/browse/JBEAP-9211 you must do this extra step:
Add new alias to CS -> JCEKS file is created
Please try it open directly with pass "VerySecretPassword" -> *it doesn't work* on Windows.
In my opinion there is problem with back slashes in script path.
https://github.com/wildfly/wildfly-core/blob/3.0.0.Alpha22/controller/src...
Because when I add there back slashed to path then it works.
> Obtain password from external source (CMD, EXT) doesn't work on Windows.
> ------------------------------------------------------------------------
>
> Key: WFLY-8268
> URL: https://issues.jboss.org/browse/WFLY-8268
> Project: WildFly
> Issue Type: Bug
> Components: Security
> Reporter: Hynek Švábek
> Assignee: Darran Lofthouse
>
> Obtain password from external source (CMD, EXT) doesn't work on Windows.
> Try to create new CS which obtains password from external source:
> {code}
> /subsystem=elytron/credential-store=myCredStore:add(uri="cr-store://test/myCredStore.jceks?create=true", credential-reference={clear-text="{CMD}C:\path\to\scrit\pass.bat,VerySecretPassword", type=COMMAND}, relative-to=jboss.server.config.dir)
> {code}
> pass.bat file contains only this
> {code}
> echo %1
> {code}
> Because of https://issues.jboss.org/browse/JBEAP-9211 you must do this extra step:
> Add new alias to CS -> JCEKS file is created
> Please try it open directly with pass "VerySecretPassword" -> *it doesn't work* on Windows.
> In my opinion there is problem with back slashes in script path.
> https://github.com/wildfly/wildfly-core/blob/3.0.0.Alpha22/controller/src...
> Because when I add there back slashed to path then it works.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 10 months