[JBoss JIRA] (WFCORE-2867) Credential store reload operation doesn't has effect in dependent resources.
by Peter Skopek (JIRA)
[ https://issues.jboss.org/browse/WFCORE-2867?page=com.atlassian.jira.plugi... ]
Peter Skopek reassigned WFCORE-2867:
------------------------------------
Assignee: Peter Skopek
> Credential store reload operation doesn't has effect in dependent resources.
> ----------------------------------------------------------------------------
>
> Key: WFCORE-2867
> URL: https://issues.jboss.org/browse/WFCORE-2867
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Hynek Švábek
> Assignee: Peter Skopek
> Priority: Blocker
>
> Credential store reload operation doesn't has effect in dependent resources.
> When we have keystore which obtains password from credential store, we change on file system backed storage file which contains wrong password to keystore and reload it. Credential store is right state, but keystore still works.
> There is expected fail.
> *How to reproduce*
> For simplifying we only update value in credential store and reload it (it should work too JBEAP-6614).
> In my opinion is there same problem and solving one will solve both problems.
> {code}
> /subsystem=elytron/credential-store=cs001:add(uri="cr-store://cs001.jceks?create=true", relative-to="jboss.server.data.dir", credential-reference={clear-text=pass123})
> /subsystem=elytron/credential-store=cs001/alias=ff:add(secret-value=Elytron)
> /subsystem=elytron/key-store=firefly:add(path=firefly.keystore,relative-to=jboss.server.data.dir,type=JKS,credential-reference= {store=cs001,alias=ff}
> this command show all aliases
> /subsystem=elytron/key-store=firefly:read-children-names(child-type=alias)
> {code}
> *Now we change keystore password to wrong and reload credential store*
> OR
> *You can replace storage file which contains wrong password to keystore and call RELOAD command only*
> {code}
> /subsystem=elytron/credential-store=cs001/alias=ff:remove
> /subsystem=elytron/credential-store=cs001/alias=ff:add(secret-value=ElytronWrong)
> /subsystem=elytron/credential-store=cs001:reload
> {code}
> *This command wrongly prints all aliases*
> {code}
> /subsystem=elytron/key-store=firefly:read-children-names(child-type=alias)
> {code}
> *We expect error message about wrong password to access to keystore*
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (WFCORE-2867) Credential store reload operation doesn't has effect in dependent resources.
by Peter Skopek (JIRA)
[ https://issues.jboss.org/browse/WFCORE-2867?page=com.atlassian.jira.plugi... ]
Peter Skopek moved ELY-1116 to WFCORE-2867:
-------------------------------------------
Project: WildFly Core (was: WildFly Elytron)
Key: WFCORE-2867 (was: ELY-1116)
Component/s: Security
(was: Credential Store)
> Credential store reload operation doesn't has effect in dependent resources.
> ----------------------------------------------------------------------------
>
> Key: WFCORE-2867
> URL: https://issues.jboss.org/browse/WFCORE-2867
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Hynek Švábek
> Priority: Blocker
>
> Credential store reload operation doesn't has effect in dependent resources.
> When we have keystore which obtains password from credential store, we change on file system backed storage file which contains wrong password to keystore and reload it. Credential store is right state, but keystore still works.
> There is expected fail.
> *How to reproduce*
> For simplifying we only update value in credential store and reload it (it should work too JBEAP-6614).
> In my opinion is there same problem and solving one will solve both problems.
> {code}
> /subsystem=elytron/credential-store=cs001:add(uri="cr-store://cs001.jceks?create=true", relative-to="jboss.server.data.dir", credential-reference={clear-text=pass123})
> /subsystem=elytron/credential-store=cs001/alias=ff:add(secret-value=Elytron)
> /subsystem=elytron/key-store=firefly:add(path=firefly.keystore,relative-to=jboss.server.data.dir,type=JKS,credential-reference= {store=cs001,alias=ff}
> this command show all aliases
> /subsystem=elytron/key-store=firefly:read-children-names(child-type=alias)
> {code}
> *Now we change keystore password to wrong and reload credential store*
> OR
> *You can replace storage file which contains wrong password to keystore and call RELOAD command only*
> {code}
> /subsystem=elytron/credential-store=cs001/alias=ff:remove
> /subsystem=elytron/credential-store=cs001/alias=ff:add(secret-value=ElytronWrong)
> /subsystem=elytron/credential-store=cs001:reload
> {code}
> *This command wrongly prints all aliases*
> {code}
> /subsystem=elytron/key-store=firefly:read-children-names(child-type=alias)
> {code}
> *We expect error message about wrong password to access to keystore*
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (WFLY-7351) JAX-RS Http Client does not support SNI even though underlying Apache HttpClient version supports it
by Alessio Soldano (JIRA)
[ https://issues.jboss.org/browse/WFLY-7351?page=com.atlassian.jira.plugin.... ]
Alessio Soldano commented on WFLY-7351:
---------------------------------------
[~rsearls], does your comment above imply that the issue here is already solved (in 3.0.22.Final / 3.1.2.Final) ? If that's the case, please close this issue as out-of-date.
> JAX-RS Http Client does not support SNI even though underlying Apache HttpClient version supports it
> ----------------------------------------------------------------------------------------------------
>
> Key: WFLY-7351
> URL: https://issues.jboss.org/browse/WFLY-7351
> Project: WildFly
> Issue Type: Bug
> Components: REST
> Affects Versions: 10.1.0.Final
> Environment: N/A
> Reporter: Edvin Syse
> Assignee: Alessio Soldano
> Labels: httpclient, https, jax-rs
> Attachments: httpclient-sni-bug.zip
>
>
> When creating a JAX-RS client using ClientBuilder.newClient() and accessing an SSL resource configured with SNI, the request fails.
> When the request is made you get the default certificate for the ip as it is configured on the web server instead of the certificate corresponding to the host name you entered.
> Attached is a simple Maven project with a rest endpoint that will make a request to https://www.syse.no/, which is a host configured with SNI. If you access this host with a client that is not SNI capable, you will get the default certificate instead of the one corresponding to www.syse.no. (That cert is actually expired, so that is the underlying cause reported by the http client in this case. In other cases you will most probably just get a name mismatch type of error).
> This effectively prevents the Http client from being used reliably against a rapidly growing number of SSL enabled sites, as SNI is the new standard "everywhere" SSL is configured these days.
> The underlying Apache HttpClient version does indeed support SNI. I have tested the version of Apache HttpClient that is bundled with Wildfly 10.1 and it works correctly.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (WFLY-8831) libwfssl and aplnc syntax errors MSVC doesn't know how to deal with
by Michal Karm Babacek (JIRA)
Michal Karm Babacek created WFLY-8831:
-----------------------------------------
Summary: libwfssl and aplnc syntax errors MSVC doesn't know how to deal with
Key: WFLY-8831
URL: https://issues.jboss.org/browse/WFLY-8831
Project: WildFly
Issue Type: Bug
Components: Security, Web (Undertow)
Environment: Windows
Reporter: Michal Karm Babacek
Assignee: Stuart Douglas
Priority: Blocker
CI build broken on Windows on master since May 19th:
{code}
C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2>unzip arch=64,label=w2k12r2\OpenSSL*.zip -d .\openssl
Archive: arch=64,label=w2k12r2/OpenSSL_1_0_2h-64.zip
creating: ./openssl/bin/
inflating: ./openssl/bin/libeay32.dll
inflating: ./openssl/bin/openssl.exe
inflating: ./openssl/bin/ssleay32.dll
creating: ./openssl/include/
creating: ./openssl/include/openssl/
inflating: ./openssl/include/openssl/aes.h
inflating: ./openssl/include/openssl/applink.c
inflating: ./openssl/include/openssl/asn1.h
inflating: ./openssl/include/openssl/asn1t.h
inflating: ./openssl/include/openssl/asn1_mac.h
inflating: ./openssl/include/openssl/bio.h
inflating: ./openssl/include/openssl/blowfish.h
inflating: ./openssl/include/openssl/bn.h
inflating: ./openssl/include/openssl/buffer.h
inflating: ./openssl/include/openssl/camellia.h
inflating: ./openssl/include/openssl/cast.h
inflating: ./openssl/include/openssl/cmac.h
inflating: ./openssl/include/openssl/cms.h
inflating: ./openssl/include/openssl/comp.h
inflating: ./openssl/include/openssl/conf.h
inflating: ./openssl/include/openssl/conf_api.h
inflating: ./openssl/include/openssl/crypto.h
inflating: ./openssl/include/openssl/des.h
inflating: ./openssl/include/openssl/des_old.h
inflating: ./openssl/include/openssl/dh.h
inflating: ./openssl/include/openssl/dsa.h
inflating: ./openssl/include/openssl/dso.h
inflating: ./openssl/include/openssl/dtls1.h
inflating: ./openssl/include/openssl/ebcdic.h
inflating: ./openssl/include/openssl/ec.h
inflating: ./openssl/include/openssl/ecdh.h
inflating: ./openssl/include/openssl/ecdsa.h
inflating: ./openssl/include/openssl/engine.h
inflating: ./openssl/include/openssl/err.h
inflating: ./openssl/include/openssl/evp.h
inflating: ./openssl/include/openssl/e_os2.h
inflating: ./openssl/include/openssl/hmac.h
inflating: ./openssl/include/openssl/idea.h
inflating: ./openssl/include/openssl/krb5_asn.h
inflating: ./openssl/include/openssl/kssl.h
inflating: ./openssl/include/openssl/lhash.h
inflating: ./openssl/include/openssl/md4.h
inflating: ./openssl/include/openssl/md5.h
inflating: ./openssl/include/openssl/mdc2.h
inflating: ./openssl/include/openssl/modes.h
inflating: ./openssl/include/openssl/objects.h
inflating: ./openssl/include/openssl/obj_mac.h
inflating: ./openssl/include/openssl/ocsp.h
inflating: ./openssl/include/openssl/opensslconf.h
inflating: ./openssl/include/openssl/opensslv.h
inflating: ./openssl/include/openssl/ossl_typ.h
inflating: ./openssl/include/openssl/pem.h
inflating: ./openssl/include/openssl/pem2.h
inflating: ./openssl/include/openssl/pkcs12.h
inflating: ./openssl/include/openssl/pkcs7.h
inflating: ./openssl/include/openssl/pqueue.h
inflating: ./openssl/include/openssl/rand.h
inflating: ./openssl/include/openssl/rc2.h
inflating: ./openssl/include/openssl/rc4.h
inflating: ./openssl/include/openssl/ripemd.h
inflating: ./openssl/include/openssl/rsa.h
inflating: ./openssl/include/openssl/safestack.h
inflating: ./openssl/include/openssl/seed.h
inflating: ./openssl/include/openssl/sha.h
inflating: ./openssl/include/openssl/srp.h
inflating: ./openssl/include/openssl/srtp.h
inflating: ./openssl/include/openssl/ssl.h
inflating: ./openssl/include/openssl/ssl2.h
inflating: ./openssl/include/openssl/ssl23.h
inflating: ./openssl/include/openssl/ssl3.h
inflating: ./openssl/include/openssl/stack.h
inflating: ./openssl/include/openssl/symhacks.h
inflating: ./openssl/include/openssl/tls1.h
inflating: ./openssl/include/openssl/ts.h
inflating: ./openssl/include/openssl/txt_db.h
inflating: ./openssl/include/openssl/ui.h
inflating: ./openssl/include/openssl/ui_compat.h
inflating: ./openssl/include/openssl/whrlpool.h
inflating: ./openssl/include/openssl/x509.h
inflating: ./openssl/include/openssl/x509v3.h
inflating: ./openssl/include/openssl/x509_vfy.h
creating: ./openssl/lib/
creating: ./openssl/lib/engines/
inflating: ./openssl/lib/engines/4758cca.dll
inflating: ./openssl/lib/engines/aep.dll
inflating: ./openssl/lib/engines/atalla.dll
inflating: ./openssl/lib/engines/capi.dll
inflating: ./openssl/lib/engines/chil.dll
inflating: ./openssl/lib/engines/cswift.dll
inflating: ./openssl/lib/engines/gmp.dll
inflating: ./openssl/lib/engines/gost.dll
inflating: ./openssl/lib/engines/nuron.dll
inflating: ./openssl/lib/engines/padlock.dll
inflating: ./openssl/lib/engines/sureware.dll
inflating: ./openssl/lib/engines/ubsec.dll
inflating: ./openssl/lib/libeay32.lib
inflating: ./openssl/lib/ssleay32.lib
inflating: ./openssl/LICENSE
creating: ./openssl/ssl/
inflating: ./openssl/ssl/openssl.cnf
C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2>IF NOT 0 == 0 (exit 1 )
C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2>if "64" EQU "64" (
call vcvars64
set "JAVA_HOME=C:\Program Files\Java\latest\"
) else (
set "JAVA_HOME=C:\Program Files (x86)\Java\latest\"
set "PATH=C:\Program Files (x86)\Microsoft Visual Studio 14.0\VC\bin;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Windows Kits\8.1\Windows Performance Toolkit\;C:\Program Files (x86)\CMake\bin;C:\Strawberry\c\bin;C:\Strawberry\perl\site\bin;C:\Strawberry\perl\bin;C:\Program Files (x86)\Microsoft Visual Studio 14.0\VC\bin\amd64;C:\Program Files (x86)\Gawk\bin;C:\Program Files (x86)\Zip\bin;C:\Program Files (x86)\Unzip\bin;C:\Program Files (x86)\Bzip2\bin;C:\Users\Administrator\Tools\cmder\vendor\git-for-windows\bin;C:\Program Files\TortoiseSVN\bin;C:\apache-maven-3.3.9\bin;C:\Users\Administrator\Tools\cmder\vendor\git-for-windows\usr\bin\;"
call vcvars32
)
C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2>mvn clean package -Dorg.wildfly.openssl.path.crypto="C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2\openssl\bin\libeay32.dll" -Dorg.wildfly.openssl.path.ssl="C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2\openssl\bin\ssleay32.dll"
[INFO] Scanning for projects...
[INFO] ------------------------------------------------------------------------
[INFO] Reactor Build Order:
[INFO]
[INFO] wildfly-openssl-parent
[INFO] wildfly-openssl-windows-x86_64
[INFO] wildfly-openssl-java
[INFO] wildfly-openssl
[INFO]
[INFO] ------------------------------------------------------------------------
[INFO] Building wildfly-openssl-parent 1.0.0.CR4-SNAPSHOT
[INFO] ------------------------------------------------------------------------
[INFO]
[INFO] --- maven-clean-plugin:3.0.0:clean (default-clean) @ wildfly-openssl-parent ---
[INFO]
[INFO] --- maven-enforcer-plugin:1.4.1:enforce (enforce-java-version) @ wildfly-openssl-parent ---
[INFO]
[INFO] --- maven-enforcer-plugin:1.4.1:enforce (enforce-maven-version) @ wildfly-openssl-parent ---
[INFO]
[INFO] --- buildnumber-maven-plugin:1.4:create (get-scm-revision) @ wildfly-openssl-parent ---
[INFO] Executing: cmd.exe /X /C "git rev-parse --verify HEAD"
[INFO] Working directory: C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2
[INFO] Storing buildNumber: 140b3b271904d699fc9636ccd42832dd16564647 at timestamp: 1495619130493
[WARNING] Cannot get the branch information from the git repository:
Detecting the current branch failed: fatal: ref HEAD is not a symbolic ref
[INFO] Executing: cmd.exe /X /C "git rev-parse --verify HEAD"
[INFO] Working directory: C:\workspace\workspace\wildfly-openssl-windows\arch\64\label\w2k12r2
[INFO] Storing buildScmBranch: UNKNOWN
[INFO]
[INFO] --- maven-source-plugin:3.0.0:jar-no-fork (attach-sources) @ wildfly-openssl-parent ---
[INFO]
[INFO] ------------------------------------------------------------------------
[INFO] Building wildfly-openssl-windows-x86_64 1.0.0.CR4-SNAPSHOT
[INFO] ------------------------------------------------------------------------
[INFO]
[INFO] --- maven-clean-plugin:3.0.0:clean (default-clean) @ wildfly-openssl-windows-x86_64 ---
[INFO]
[INFO] --- maven-enforcer-plugin:1.4.1:enforce (enforce-java-version) @ wildfly-openssl-windows-x86_64 ---
[INFO]
[INFO] --- maven-enforcer-plugin:1.4.1:enforce (enforce-maven-version) @ wildfly-openssl-windows-x86_64 ---
[INFO]
[INFO] --- buildnumber-maven-plugin:1.4:create (get-scm-revision) @ wildfly-openssl-windows-x86_64 ---
[INFO]
[INFO] --- exec-maven-plugin:1.5.0:exec (default) @ wildfly-openssl-windows-x86_64 ---
Microsoft (R) Program Maintenance Utility Version 14.00.24210.0
Copyright (C) Microsoft Corporation. All rights reserved.
mkdir target
mkdir target\classes
mkdir target\classes\win-x86_64
cl ../libwfssl/src\alpn.c /machine:AMD64 /Fotarget\alpn.obj -I..\libwfssl\include -I"C:\Program Files\Java\latest\\include" -I"C:\Program Files\Java\latest\\include\win32" /LD /c
Microsoft (R) C/C++ Optimizing Compiler Version 19.00.24213.1 for x64
Copyright (C) Microsoft Corporation. All rights reserved.
cl : Command line warning D9002 : ignoring unknown option '/machine:AMD64'
alpn.c
..\libwfssl\include\wfssl.h(46): warning C4068: unknown pragma
..\libwfssl\include\wfssl.h(520): error C2146: syntax error: missing ')' before identifier 'opts'
..\libwfssl\include\wfssl.h(520): error C2146: syntax error: missing ';' before identifier 'opts'
..\libwfssl\include\wfssl.h(520): error C2061: syntax error: identifier 'opts'
..\libwfssl\include\wfssl.h(520): error C2059: syntax error: ')'
..\libwfssl\include\wfssl.h(550): error C2059: syntax error: '}'
../libwfssl/src\alpn.c(6): error C2061: syntax error: identifier 'ssl_methods'
../libwfssl/src\alpn.c(6): error C2059: syntax error: ';'
../libwfssl/src\alpn.c(208): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(208): error C2224: left of '.SSL_set_alpn_protos' must have struct/union type
../libwfssl/src\alpn.c(217): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(217): error C2224: left of '.SSL_set_alpn_protos' must have struct/union type
../libwfssl/src\alpn.c(228): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(228): error C2224: left of '.SSL_set_alpn_protos' must have struct/union type
../libwfssl/src\alpn.c(235): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(235): error C2224: left of '.SSL_CTX_set_alpn_select_cb' must have struct/union type
../libwfssl/src\alpn.c(250): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(250): error C2224: left of '.SSL_get0_alpn_selected' must have struct/union type
../libwfssl/src\alpn.c(256): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(256): error C2224: left of '.SSL_get0_alpn_selected' must have struct/union type
../libwfssl/src\alpn.c(264): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(264): error C2224: left of '.SSL_set_alpn_protos' must have struct/union type
../libwfssl/src\alpn.c(280): error C2065: 'ssl_methods': undeclared identifier
../libwfssl/src\alpn.c(280): error C2224: left of '.SSL_set_alpn_protos' must have struct/union type
../libwfssl/src\alpn.c(280): warning C4033: 'Java_org_wildfly_openssl_SSLImpl_isAlpnSupported0' must return a value
NMAKE : fatal error U1077: '"C:\Program Files (x86)\Microsoft Visual Studio 14.0\VC\BIN\amd64\cl.EXE"' : return code '0x2'
Stop.
[ERROR] Command execution failed.
org.apache.commons.exec.ExecuteException: Process exited with an error: 2 (Exit value: 2)
at org.apache.commons.exec.DefaultExecutor.executeInternal(DefaultExecutor.java:404)
at org.apache.commons.exec.DefaultExecutor.execute(DefaultExecutor.java:166)
at org.codehaus.mojo.exec.ExecMojo.executeCommandLine(ExecMojo.java:764)
at org.codehaus.mojo.exec.ExecMojo.executeCommandLine(ExecMojo.java:711)
at org.codehaus.mojo.exec.ExecMojo.execute(ExecMojo.java:289)
at org.apache.maven.plugin.DefaultBuildPluginManager.executeMojo(DefaultBuildPluginManager.java:134)
at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:207)
at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:153)
at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:145)
at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(LifecycleModuleBuilder.java:116)
at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(LifecycleModuleBuilder.java:80)
at org.apache.maven.lifecycle.internal.builder.singlethreaded.SingleThreadedBuilder.build(SingleThreadedBuilder.java:51)
at org.apache.maven.lifecycle.internal.LifecycleStarter.execute(LifecycleStarter.java:128)
at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:307)
at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:193)
at org.apache.maven.DefaultMaven.execute(DefaultMaven.java:106)
at org.apache.maven.cli.MavenCli.execute(MavenCli.java:863)
at org.apache.maven.cli.MavenCli.doMain(MavenCli.java:288)
at org.apache.maven.cli.MavenCli.main(MavenCli.java:199)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.codehaus.plexus.classworlds.launcher.Launcher.launchEnhanced(Launcher.java:289)
at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:229)
at org.codehaus.plexus.classworlds.launcher.Launcher.mainWithExitCode(Launcher.java:415)
at org.codehaus.plexus.classworlds.launcher.Launcher.main(Launcher.java:356)
[INFO] ------------------------------------------------------------------------
[INFO] Reactor Summary:
[INFO]
[INFO] wildfly-openssl-parent ............................. SUCCESS [ 1.599 s]
[INFO] wildfly-openssl-windows-x86_64 ..................... FAILURE [ 0.615 s]
[INFO] wildfly-openssl-java ............................... SKIPPED
[INFO] wildfly-openssl .................................... SKIPPED
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 2.509 s
[INFO] Finished at: 2017-05-24T02:45:31-07:00
[INFO] Final Memory: 15M/266M
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal org.codehaus.mojo:exec-maven-plugin:1.5.0:exec (default) on project wildfly-openssl-windows-x86_64: Command execution failed. Process exited with an error: 2 (Exit value: 2) -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoExecutionException
[ERROR]
[ERROR] After correcting the problems, you can resume the build with the command
[ERROR] mvn <goals> -rf :wildfly-openssl-windows-x86_64
Build step 'Execute Windows batch command' marked build as failure
Archiving artifacts
[WS-CLEANUP] Deleting project workspace...[WS-CLEANUP] done
Finished: FAILURE
{code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (WFCORE-2832) JBoss CLI run with IBM JDK is not able to use secure connection when server uses Elytron ssl-context
by Jean-Francois Denise (JIRA)
[ https://issues.jboss.org/browse/WFCORE-2832?page=com.atlassian.jira.plugi... ]
Jean-Francois Denise reassigned WFCORE-2832:
--------------------------------------------
Assignee: Jean-Francois Denise (was: Darran Lofthouse)
> JBoss CLI run with IBM JDK is not able to use secure connection when server uses Elytron ssl-context
> ----------------------------------------------------------------------------------------------------
>
> Key: WFCORE-2832
> URL: https://issues.jboss.org/browse/WFCORE-2832
> Project: WildFly Core
> Issue Type: Bug
> Components: CLI, Security
> Reporter: Ondrej Lukas
> Assignee: Jean-Francois Denise
> Priority: Blocker
>
> In case SSL through Elytron ssl-context is configured for management interface then JBoss CLI is not able to authenticate when it is run with IBM JDK.
> It works correctly when
> * Legacy SSL is used instead of Elytron ssl-context
> * or non-IBM JDK is used for JBoss CLI
> * or only authentication without SSL is used
> It fails for http-interface as well as native-interface.
> When different client is used for connection to management interface (I tried it with ModelControllerClient) then authentication and SSL works correctly.
> For http-interface following output of CLI is print:
> {code}
> Failed to connect to the controller: The controller is not available at localhost:9993: java.net.ConnectException: WFLYPRT0053: Could not connect to remote+https://localhost:9993. The connection failed: WFLYPRT0053: Could not connect to remote+https://localhost:9993. The connection failed: java.nio.channels.ClosedChannelException
> {code}
> For native-interface following output of CLI is print:
> {code}
> Failed to connect to the controller: Unable to negotiate SSL connection with controller at localhost:9999
> {code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (ELY-1191) Undertow CLIENT_CERT via Elytron and HTTP/2 does not work
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/ELY-1191?page=com.atlassian.jira.plugin.s... ]
Darran Lofthouse updated ELY-1191:
----------------------------------
Fix Version/s: 1.1.0.Beta47
> Undertow CLIENT_CERT via Elytron and HTTP/2 does not work
> ---------------------------------------------------------
>
> Key: ELY-1191
> URL: https://issues.jboss.org/browse/ELY-1191
> Project: WildFly Elytron
> Issue Type: Bug
> Reporter: Stuart Douglas
> Assignee: Stuart Douglas
> Priority: Blocker
> Fix For: 1.1.0.Beta47
>
>
> When I setup CLIENT_CERT authentication for an application (see Steps to Reproduce) and utilize HTTP/2 protocol, I get always 403 Forbidden even in case I use correct client certificate that should allow me access to a secured content.
> I can see following TRACE messages in server.log:
> {code}
> 2017-05-23 10:58:31,110 TRACE [org.wildfly.security] (default task-7) X500 principal [CN=client] decoded as name [client] (attribute values: [client])
> 2017-05-23 10:58:31,110 TRACE [org.wildfly.security] (default task-7) Principal assigning: [CN=client], pre-realm rewritten: [client], realm name: [ksRealm], post-realm rewritten: [client], realm rewritten: [client]
> 2017-05-23 10:58:31,110 TRACE [org.wildfly.security] (default task-7) Role mapping: principal [client] -> decoded roles [] -> realm mapped roles [] -> domain mapped roles [gooduser]
> 2017-05-23 10:58:31,110 TRACE [org.wildfly.security] (default task-7) Authorizing principal client.
> 2017-05-23 10:58:31,110 TRACE [org.wildfly.security] (default task-7) Authorizing against the following attributes: [] => []
> 2017-05-23 10:58:31,111 TRACE [org.wildfly.security] (default task-7) Permission mapping: identity [client] with roles [gooduser] implies ("org.wildfly.security.auth.permission.LoginPermission" "") = true
> 2017-05-23 10:58:31,111 TRACE [org.wildfly.security] (default task-7) Authorization succeed
> 2017-05-23 10:58:31,111 TRACE [org.wildfly.security] (default task-7) Authentication succeed for principal [CN=client]
> 2017-05-23 10:58:31,117 TRACE [org.wildfly.security] (default task-10) Handling MechanismInformationCallback type='HTTP' name='CLIENT_CERT' host-name='localhost' protocol='https'
> 2017-05-23 10:58:31,117 TRACE [org.wildfly.security] (default task-10) CLIENT-CERT no SSL session
> {code}
> Authentication seems that it succeed just fine. But notice the last line - {{CLIENT-CERT no SSL session}}.
> When I disable 'http2' in https-listener:
> {code}
> /subsystem=undertow/server=default-server/https-listener=https:write-attribute(name=enable-http2,value=false)
> reload
> {code}
> I can now access secured content as expected. Also trace log contains different (more healthy) messages now.
> This happens both when I utilize HTTP/2 with EAP 'alpn-hack' mechanism and also with ALPN provided by OpenSSL library.
> As described in JBEAP-9803, Undertow needs to write into ssl-context when HTTP/2 with ALPN is utilized. Maybe this might be the source of this problem?
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months
[JBoss JIRA] (WFLY-6475) WebSuspendTestCase fails with security manager
by Ivo Studensky (JIRA)
[ https://issues.jboss.org/browse/WFLY-6475?page=com.atlassian.jira.plugin.... ]
Ivo Studensky reopened WFLY-6475:
---------------------------------
> WebSuspendTestCase fails with security manager
> ----------------------------------------------
>
> Key: WFLY-6475
> URL: https://issues.jboss.org/browse/WFLY-6475
> Project: WildFly
> Issue Type: Bug
> Components: Test Suite
> Reporter: Jan Tymel
> Assignee: Ivo Studensky
> Fix For: 10.1.0.CR1, 10.1.0.Final
>
>
> *org.jboss.as.test.integration.web.suspend.WebSuspendTestCase#testRequestInShutdown*
> {{./integration-tests.sh -DtestLogToFile=false -Dts.noSmoke -Dts.basic -Dtest=org.jboss.as.test.integration.web.suspend.WebSuspendTestCase#testRequestInShutdown -Dsecurity.manager}}
> Fails with:
> {code}
> SEVERE [org.jboss.arquillian.protocol.jmx.JMXTestRunner] (pool-3-thread-1) Failed: org.jboss.as.test.integration.web.suspend.WebSuspendTestCase.testRequestInShutdown: java.security.AccessControlException: WFSM000001: Permission check failed (permission "("java.util.PropertyPermission" "management.address" "read")" in code source "(vfs:/content/web-suspend.war/WEB-INF/classes <no signer certificates>)" of "null")
> at org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:273)
> at org.wildfly.security.manager.WildFlySecurityManager.checkPropertyAccess(WildFlySecurityManager.java:496)
> at java.lang.System.getProperty(System.java:717)
> at org.jboss.as.test.shared.TestSuiteEnvironment.getServerAddress(TestSuiteEnvironment.java:77)
> at org.jboss.as.test.integration.web.suspend.WebSuspendTestCase.testRequestInShutdown(WebSuspendTestCase.java:74)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at org.jboss.arquillian.junit.Arquillian$8$1.invoke(Arquillian.java:370)
> at org.jboss.arquillian.container.test.impl.execution.LocalTestExecuter.execute(LocalTestExecuter.java:60)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:99)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:81)
> at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:145)
> at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:116)
> at org.jboss.arquillian.core.impl.EventImpl.fire(EventImpl.java:67)
> at org.jboss.arquillian.container.test.impl.execution.ContainerTestExecuter.execute(ContainerTestExecuter.java:38)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:99)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:81)
> at org.jboss.arquillian.test.impl.TestContextHandler.createTestContext(TestContextHandler.java:130)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.test.impl.TestContextHandler.createClassContext(TestContextHandler.java:92)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.test.impl.TestContextHandler.createSuiteContext(TestContextHandler.java:73)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:145)
> at org.jboss.arquillian.test.impl.EventTestRunnerAdaptor.test(EventTestRunnerAdaptor.java:136)
> at org.jboss.arquillian.junit.Arquillian$8.evaluate(Arquillian.java:363)
> at org.jboss.arquillian.junit.Arquillian$4.evaluate(Arquillian.java:245)
> at org.jboss.arquillian.junit.Arquillian.multiExecute(Arquillian.java:422)
> at org.jboss.arquillian.junit.Arquillian.access$200(Arquillian.java:54)
> at org.jboss.arquillian.junit.Arquillian$5.evaluate(Arquillian.java:259)
> at org.jboss.arquillian.junit.Arquillian$7$1.invoke(Arquillian.java:315)
> at org.jboss.arquillian.container.test.impl.execution.BeforeLifecycleEventExecuter.on(BeforeLifecycleEventExecuter.java:35)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:99)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:81)
> at org.jboss.arquillian.test.impl.TestContextHandler.createTestContext(TestContextHandler.java:130)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.test.impl.TestContextHandler.createClassContext(TestContextHandler.java:92)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.test.impl.TestContextHandler.createSuiteContext(TestContextHandler.java:73)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:94)
> at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:88)
> at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:145)
> at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:116)
> at org.jboss.arquillian.test.impl.EventTestRunnerAdaptor.fireCustomLifecycle(EventTestRunnerAdaptor.java:159)
> at org.jboss.arquillian.junit.Arquillian$7.evaluate(Arquillian.java:311)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.jboss.arquillian.junit.Arquillian$2.evaluate(Arquillian.java:204)
> at org.jboss.arquillian.junit.Arquillian.multiExecute(Arquillian.java:422)
> at org.jboss.arquillian.junit.Arquillian.access$200(Arquillian.java:54)
> at org.jboss.arquillian.junit.Arquillian$3.evaluate(Arquillian.java:218)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.jboss.arquillian.junit.Arquillian.run(Arquillian.java:166)
> at org.junit.runner.JUnitCore.run(JUnitCore.java:137)
> at org.junit.runner.JUnitCore.run(JUnitCore.java:115)
> at org.jboss.arquillian.junit.container.JUnitTestRunner.execute(JUnitTestRunner.java:66)
> at org.jboss.arquillian.protocol.jmx.JMXTestRunner.doRunTestMethod(JMXTestRunner.java:180)
> at org.jboss.as.arquillian.service.ArquillianService$ExtendedJMXTestRunner.doRunTestMethod(ArquillianService.java:247)
> at org.jboss.arquillian.protocol.jmx.JMXTestRunner.runTestMethodInternal(JMXTestRunner.java:162)
> at org.jboss.arquillian.protocol.jmx.JMXTestRunner.runTestMethod(JMXTestRunner.java:141)
> at org.jboss.as.arquillian.service.ArquillianService$ExtendedJMXTestRunner.runTestMethod(ArquillianService.java:223)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at sun.reflect.misc.Trampoline.invoke(MethodUtil.java:71)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at sun.reflect.misc.MethodUtil.invoke(MethodUtil.java:275)
> at com.sun.jmx.mbeanserver.StandardMBeanIntrospector.invokeM2(StandardMBeanIntrospector.java:112)
> at com.sun.jmx.mbeanserver.StandardMBeanIntrospector.invokeM2(StandardMBeanIntrospector.java:46)
> at com.sun.jmx.mbeanserver.MBeanIntrospector.invokeM(MBeanIntrospector.java:237)
> at com.sun.jmx.mbeanserver.PerInterface.invoke(PerInterface.java:138)
> at com.sun.jmx.mbeanserver.MBeanSupport.invoke(MBeanSupport.java:252)
> at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.invoke(DefaultMBeanServerInterceptor.java:819)
> at com.sun.jmx.mbeanserver.JmxMBeanServer.invoke(JmxMBeanServer.java:801)
> at org.jboss.as.jmx.PluggableMBeanServerImpl$TcclMBeanServer.invoke(PluggableMBeanServerImpl.java:1503)
> at org.jboss.as.jmx.PluggableMBeanServerImpl.invoke(PluggableMBeanServerImpl.java:724)
> at org.jboss.as.jmx.BlockingNotificationMBeanServer.invoke(BlockingNotificationMBeanServer.java:168)
> at org.jboss.remotingjmx.protocol.v2.ServerProxy$InvokeHandler.handle(ServerProxy.java:950)
> at org.jboss.remotingjmx.protocol.v2.ServerCommon$MessageReciever$1$1.run(ServerCommon.java:153)
> at org.jboss.as.jmx.ServerInterceptorFactory$Interceptor$1.run(ServerInterceptorFactory.java:75)
> at org.jboss.as.jmx.ServerInterceptorFactory$Interceptor$1.run(ServerInterceptorFactory.java:70)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.jboss.as.controller.AccessAuditContext.doAs(AccessAuditContext.java:92)
> at org.jboss.as.jmx.ServerInterceptorFactory$Interceptor.handleEvent(ServerInterceptorFactory.java:70)
> at org.jboss.remotingjmx.protocol.v2.ServerCommon$MessageReciever$1.run(ServerCommon.java:149)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> {code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
8 years, 11 months