[JBoss JIRA] (ELY-1474) GssapiCompatibilitySuiteChild fails on solaris
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1474?page=com.atlassian.jira.plugin.s... ]
Jan Kalina closed ELY-1474.
---------------------------
Resolution: Out of Date
> GssapiCompatibilitySuiteChild fails on solaris
> ----------------------------------------------
>
> Key: ELY-1474
> URL: https://issues.jboss.org/browse/ELY-1474
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Testsuite
> Reporter: Martin Choma
> Assignee: Jan Kalina
> Priority: Critical
> Fix For: 1.2.0.Beta13
>
>
> - On same java (Oracle java) test does not fail on other OS
> - We don't test other javas on solaris OS
> Problem is on line comparing expected sasl message witch actual.
> {code:java|title=GssapiCompatibilitySuiteChild}
> exchange = evaluateByClient(exchange);
> assertEquals("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", ByteIterator.ofBytes(exchange).hexEncode().drainToString());
> {code}
> Stacktrace
> {noformat}
> org.junit.ComparisonFailure: expected:<...03020110a281bf0481bc[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]> but was:<...03020110a281bf0481bc[59648f5dc4d9b99a3af4b5af86b9c84b5bb2b9c19066939f43aafc6d5d8cf0b846cb09a517c1e1c9ff4b8f1eec751f3b47352b06f068041e48b9599de8957b08fd1ae3cb6c47b154e6cabb9b5a683f3f0ee2cf916856819fedd9df5b8ca48866402c0fa71fc6fd6755bee222bbe1b93c42c10b2cc73f4a2e6b7a6a672d449959cc86feb4bd74808a5f787363162507992c773a78f5027da2beddc4cad781bb3866c9084cda12f471abcbf787b4ce12f7d68b931a8894fb68966981cda481ca3081c7a003020110a281bf0481bcb3ecd98b1c8ecd9148984926d4198e2da5dfd7132625a1856877aeeaf1b2201bd611983250879a00918689add1741b4b40f5ab90ebbb6aa66c486a13bfc2f3afea0d741ef7bbf4cee8399d924f580ff804461328f9846a9f00579862ae0e80a62b06c4d32ce278b51bdb101c3e69ccb5f3244d01c84e7478ac3c011c1de83c3a23dfcc778f4dd271fb18f79b627b232f0f29f76261c13be22f573a13e1548ad849606e2b029ae2a43030caea6739a59f0579521fdbc63eb95fce8fa9]>
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:121)
> {noformat}
> Log
> {noformat}
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:52> loginClient
> Debug is true storeKey true useTicketCache false useKeyTab false doNotPrompt false ticketCache is null isInitiator true KeyTab is null refreshKrb5Config is true principal is null tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> [Krb5LoginModule] user entered username: jduke
> principal is jduke(a)WILDFLY.ORG
> EncryptionKey: keyType=16 keyBytes (hex dump)=0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> Added server's keyKerberos Principal jduke(a)WILDFLY.ORGKey Version 0key EncryptionKey: keyType=16 keyBytes (hex dump)=
> 0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> [Krb5LoginModule] added Krb5Principal jduke(a)WILDFLY.ORG to Subject
> Commit Succeeded
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:57> loginServer
> Debug is true storeKey true useTicketCache false useKeyTab true doNotPrompt true ticketCache is null isInitiator false KeyTab is /mnt/hudson_workspace/workspace/wildfly-elytron-unit-tests/20ff21f6/wildfly-elytron/./target/apache-ds/working/serverKeyTab refreshKrb5Config is true principal is sasl/test_server_1 tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> principal is sasl/test_server_1(a)WILDFLY.ORG
> Will use keytab
> Commit Succeeded
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:68> Acceptor Name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:100> CallbackHandler does not support CredentialCallback: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$NoCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:421)
> at org.wildfly.security.sasl.util.AbstractSaslParticipant.tryHandleCallbacks(AbstractSaslParticipant.java:120)
> at org.wildfly.security.sasl.gssapi.GssapiClient.<init>(GssapiClient.java:93)
> at org.wildfly.security.sasl.gssapi.GssapiClientFactory.createSaslClient(GssapiClientFactory.java:42)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$0(GssapiCompatibilitySuiteChild.java:103)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:97)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:119> Delegating credential = false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:140> Setting requering mutual authentication to true
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:74> Obtaining GSSCredential for the service from callback handler...
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:80> Unable to obtain GSSCredential from CallbackHandler: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$AuthorizeOnlyCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:413)
> at org.wildfly.security.sasl.gssapi.GssapiServer.<init>(GssapiServer.java:75)
> at org.wildfly.security.sasl.gssapi.GssapiServerFactory.createSaslServer(GssapiServerFactory.java:44)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$1(GssapiCompatibilitySuiteChild.java:111)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:106)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:87> Our name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:229> GSSContext not established, expecting subsequent exchanges.
> {noformat}
> [1] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
> [2] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1474) GssapiCompatibilitySuiteChild fails on solaris
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1474?page=com.atlassian.jira.plugin.s... ]
Jan Kalina reassigned ELY-1474:
-------------------------------
Assignee: Jan Kalina
> GssapiCompatibilitySuiteChild fails on solaris
> ----------------------------------------------
>
> Key: ELY-1474
> URL: https://issues.jboss.org/browse/ELY-1474
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Testsuite
> Reporter: Martin Choma
> Assignee: Jan Kalina
> Priority: Critical
> Fix For: 1.2.0.Beta13
>
>
> - On same java (Oracle java) test does not fail on other OS
> - We don't test other javas on solaris OS
> Problem is on line comparing expected sasl message witch actual.
> {code:java|title=GssapiCompatibilitySuiteChild}
> exchange = evaluateByClient(exchange);
> assertEquals("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", ByteIterator.ofBytes(exchange).hexEncode().drainToString());
> {code}
> Stacktrace
> {noformat}
> org.junit.ComparisonFailure: expected:<...03020110a281bf0481bc[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]> but was:<...03020110a281bf0481bc[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]>
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:121)
> {noformat}
> Log
> {noformat}
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:52> loginClient
> Debug is true storeKey true useTicketCache false useKeyTab false doNotPrompt false ticketCache is null isInitiator true KeyTab is null refreshKrb5Config is true principal is null tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> [Krb5LoginModule] user entered username: jduke
> principal is jduke(a)WILDFLY.ORG
> EncryptionKey: keyType=16 keyBytes (hex dump)=0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> Added server's keyKerberos Principal jduke(a)WILDFLY.ORGKey Version 0key EncryptionKey: keyType=16 keyBytes (hex dump)=
> 0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> [Krb5LoginModule] added Krb5Principal jduke(a)WILDFLY.ORG to Subject
> Commit Succeeded
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:57> loginServer
> Debug is true storeKey true useTicketCache false useKeyTab true doNotPrompt true ticketCache is null isInitiator false KeyTab is /mnt/hudson_workspace/workspace/wildfly-elytron-unit-tests/20ff21f6/wildfly-elytron/./target/apache-ds/working/serverKeyTab refreshKrb5Config is true principal is sasl/test_server_1 tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> principal is sasl/test_server_1(a)WILDFLY.ORG
> Will use keytab
> Commit Succeeded
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:68> Acceptor Name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:100> CallbackHandler does not support CredentialCallback: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$NoCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:421)
> at org.wildfly.security.sasl.util.AbstractSaslParticipant.tryHandleCallbacks(AbstractSaslParticipant.java:120)
> at org.wildfly.security.sasl.gssapi.GssapiClient.<init>(GssapiClient.java:93)
> at org.wildfly.security.sasl.gssapi.GssapiClientFactory.createSaslClient(GssapiClientFactory.java:42)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$0(GssapiCompatibilitySuiteChild.java:103)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:97)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:119> Delegating credential = false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:140> Setting requering mutual authentication to true
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:74> Obtaining GSSCredential for the service from callback handler...
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:80> Unable to obtain GSSCredential from CallbackHandler: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$AuthorizeOnlyCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:413)
> at org.wildfly.security.sasl.gssapi.GssapiServer.<init>(GssapiServer.java:75)
> at org.wildfly.security.sasl.gssapi.GssapiServerFactory.createSaslServer(GssapiServerFactory.java:44)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$1(GssapiCompatibilitySuiteChild.java:111)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:106)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:87> Our name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:229> GSSContext not established, expecting subsequent exchanges.
> {noformat}
> [1] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
> [2] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1474) GssapiCompatibilitySuiteChild fails on solaris
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1474?page=com.atlassian.jira.plugin.s... ]
Jan Kalina commented on ELY-1474:
---------------------------------
GssCompatibilityTests was removed as part of ELY-483.
> GssapiCompatibilitySuiteChild fails on solaris
> ----------------------------------------------
>
> Key: ELY-1474
> URL: https://issues.jboss.org/browse/ELY-1474
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Testsuite
> Reporter: Martin Choma
> Priority: Critical
> Fix For: 1.2.0.Beta13
>
>
> - On same java (Oracle java) test does not fail on other OS
> - We don't test other javas on solaris OS
> Problem is on line comparing expected sasl message witch actual.
> {code:java|title=GssapiCompatibilitySuiteChild}
> exchange = evaluateByClient(exchange);
> assertEquals("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", ByteIterator.ofBytes(exchange).hexEncode().drainToString());
> {code}
> Stacktrace
> {noformat}
> org.junit.ComparisonFailure: expected:<...03020110a281bf0481bc[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]> but was:<...03020110a281bf0481bc[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]>
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:121)
> {noformat}
> Log
> {noformat}
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:52> loginClient
> Debug is true storeKey true useTicketCache false useKeyTab false doNotPrompt false ticketCache is null isInitiator true KeyTab is null refreshKrb5Config is true principal is null tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> [Krb5LoginModule] user entered username: jduke
> principal is jduke(a)WILDFLY.ORG
> EncryptionKey: keyType=16 keyBytes (hex dump)=0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> Added server's keyKerberos Principal jduke(a)WILDFLY.ORGKey Version 0key EncryptionKey: keyType=16 keyBytes (hex dump)=
> 0000: 9D A4 38 51 37 A7 83 F4 70 D6 FB A7 25 70 08 0B ..8Q7...p...%p..
> 0010: DC 97 23 0E C4 6B 68 3B ..#..kh;
> [Krb5LoginModule] added Krb5Principal jduke(a)WILDFLY.ORG to Subject
> Commit Succeeded
> 19:00:00,123 DEBUG (main) [org.wildfly.security.sasl.gssapi.JaasUtil] <JaasUtil.java:57> loginServer
> Debug is true storeKey true useTicketCache false useKeyTab true doNotPrompt true ticketCache is null isInitiator false KeyTab is /mnt/hudson_workspace/workspace/wildfly-elytron-unit-tests/20ff21f6/wildfly-elytron/./target/apache-ds/working/serverKeyTab refreshKrb5Config is true principal is sasl/test_server_1 tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> Refreshing Kerberos configuration
> principal is sasl/test_server_1(a)WILDFLY.ORG
> Will use keytab
> Commit Succeeded
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:68> Acceptor Name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:100> CallbackHandler does not support CredentialCallback: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$NoCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:421)
> at org.wildfly.security.sasl.util.AbstractSaslParticipant.tryHandleCallbacks(AbstractSaslParticipant.java:120)
> at org.wildfly.security.sasl.gssapi.GssapiClient.<init>(GssapiClient.java:93)
> at org.wildfly.security.sasl.gssapi.GssapiClientFactory.createSaslClient(GssapiClientFactory.java:42)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$0(GssapiCompatibilitySuiteChild.java:103)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:97)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:119> Delegating credential = false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:140> Setting requering mutual authentication to true
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <DelegatingBasicLogger.java:159> configuredMaxReceiveBuffer=0
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:96> relaxComplianceChecks=false
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <AbstractGssapiMechanism.java:105> QOP={AUTH}
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:74> Obtaining GSSCredential for the service from callback handler...
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:80> Unable to obtain GSSCredential from CallbackHandler: javax.security.auth.callback.UnsupportedCallbackException
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild$AuthorizeOnlyCallbackHandler.handle(GssapiCompatibilitySuiteChild.java:413)
> at org.wildfly.security.sasl.gssapi.GssapiServer.<init>(GssapiServer.java:75)
> at org.wildfly.security.sasl.gssapi.GssapiServerFactory.createSaslServer(GssapiServerFactory.java:44)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.lambda$test1Auth$1(GssapiCompatibilitySuiteChild.java:111)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.wildfly.security.sasl.gssapi.GssapiCompatibilitySuiteChild.test1Auth(GssapiCompatibilitySuiteChild.java:106)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeTestMethod(JUnit4TestRunnerDecorator.java:162)
> at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:71)
> at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
> at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
> at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.junit.runners.Suite.runChild(Suite.java:128)
> at org.junit.runners.Suite.runChild(Suite.java:27)
> at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:236)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:386)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:323)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:143)
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiServer.java:87> Our name 'sasl@test_server_1'
> 19:00:00,123 TRACE (main) [org.wildfly.security.sasl.gssapi] <GssapiClient.java:229> GSSContext not established, expecting subsequent exchanges.
> {noformat}
> [1] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
> [2] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-...
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1496) Test PKCS12 KeystoreCredentialStore on non-Oracle JDKs
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1496?page=com.atlassian.jira.plugin.s... ]
Jan Kalina updated ELY-1496:
----------------------------
Description:
As part of ELY-1494 was disabled testing with PKCS12 KeyStore on non-oracle JDKs, because following problems:
* IBM and HP (and some older Oracle too) requires provider in signed JAR, which fails on directory of classes used by surefire/junit elytron tests (see ELY-1494)
* * IBM does not allow storing custom objects in PKCS12 KeyStore - allows predefined set of specs/algorithms - this cannot be workarounded currently (see discussion in ELY-1295)
This testing should be re-enabled if this will be fixed in mentioned JDKs.
The first problem can be solved on our side too:
* rework junit testing to operate on generated (and possibly signed) elytron JAR
* test this from different module, outside of elytron - when elytron is dependency, it is packed in JAR
was:
As part of ELY-1494 was disabled testing with PKCS12 KeyStore on non-oracle JDKs, because following problems:
* IBM and HP (and some older Oracle too) requires provider in signed JAR, which fails on directory of classes used by surefire/junit elytron tests (see ELY-1494)
* * IBM does not allow storing custom objects in PKCS12 KeyStore - allows predefined set of specs/algorithms - this cannot be workarounded currently
This testing should be re-enabled if this will be fixed in mentioned JDKs.
The first problem can be solved on our side too:
* rework junit testing to operate on generated (and possibly signed) elytron JAR
* test this from different module, outside of elytron - when elytron is dependency, it is packed in JAR
> Test PKCS12 KeystoreCredentialStore on non-Oracle JDKs
> ------------------------------------------------------
>
> Key: ELY-1496
> URL: https://issues.jboss.org/browse/ELY-1496
> Project: WildFly Elytron
> Issue Type: Task
> Components: Credential Store
> Affects Versions: 1.2.0.Beta11
> Reporter: Jan Kalina
> Priority: Minor
>
> As part of ELY-1494 was disabled testing with PKCS12 KeyStore on non-oracle JDKs, because following problems:
> * IBM and HP (and some older Oracle too) requires provider in signed JAR, which fails on directory of classes used by surefire/junit elytron tests (see ELY-1494)
> * * IBM does not allow storing custom objects in PKCS12 KeyStore - allows predefined set of specs/algorithms - this cannot be workarounded currently (see discussion in ELY-1295)
> This testing should be re-enabled if this will be fixed in mentioned JDKs.
> The first problem can be solved on our side too:
> * rework junit testing to operate on generated (and possibly signed) elytron JAR
> * test this from different module, outside of elytron - when elytron is dependency, it is packed in JAR
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1295) KeyStoreCredentialStoreTest fails on IBM JDK
by Priyanka Nag (JIRA)
[ https://issues.jboss.org/browse/ELY-1295?page=com.atlassian.jira.plugin.s... ]
Priyanka Nag reassigned ELY-1295:
---------------------------------
Assignee: Priyanka Nag (was: Jan Kalina)
> KeyStoreCredentialStoreTest fails on IBM JDK
> --------------------------------------------
>
> Key: ELY-1295
> URL: https://issues.jboss.org/browse/ELY-1295
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Credential Store
> Reporter: Peter Palaga
> Assignee: Priyanka Nag
> Priority: Critical
> Labels: ibm-java
> Fix For: 1.2.0.Beta12
>
>
> {code}
> export JAVA_HOME=path/to/ibm/java8
>
> $JAVA_HOME/bin/java -version
> java version "1.8.0"
> Java(TM) SE Runtime Environment (build pxa6480sr3fp12-20160919_01(SR3 FP12))
> IBM J9 VM (build 2.8, JRE 1.8.0 Linux amd64-64 Compressed References 20160915_318796 (JIT enabled, AOT enabled)
> J9VM - R28_Java8_SR3_20160915_0912_B318796
> JIT - tr.r14.java.green_20160818_122998
> GC - R28_Java8_SR3_20160915_0912_B318796_CMPRSS
> J9CL - 20160915_318796)
> JCL - 20160914_01 based on Oracle jdk8u101-b13
>
> mvn clean test -Dtest=KeyStoreCredentialStoreTest
> {code}
> Expected: KeyStoreCredentialStoreTest should pass
> Actual: First, the "hack to make JCE believe that it has verified the signature of the WildFlyElytronProvider JAR" [1] throws
> {code}
> java.lang.ClassNotFoundException: javax.crypto.JceSecurity
> at java.lang.Class.forNameImpl(Native Method)
> at java.lang.Class.forName(Class.java:278)
> at org.wildfly.security.credential.store.impl.KeyStoreCredentialStoreTest.installWildFlyElytronProvider(KeyStoreCredentialStoreTest.java:89)
> ...
> {code}
> because {{javax.crypto.JceSecurity}} does not exist in IBM JRE.
> It looks like the hack is actually not necessary anymore, because {{KeyStoreCredentialStoreTest}} is passing also without the hack on both Oracle JDK and OpenJDK.
> But once the hack is removed, on IBM JDK, {{shouldSupportKeyStoreFormat}} passes with format=JCEKS but fails with format=PKCS12 throwing the following exeception:
> {code}
> org.wildfly.security.credential.store.CredentialStoreException: ELY09504: Cannot acquire a credential from the credential store
> at org.wildfly.security.credential.store.impl.KeyStoreCredentialStore.retrieve(KeyStoreCredentialStore.java:464)
> at org.wildfly.security.credential.store.impl.KeyStoreCredentialStoreTest.shouldSupportKeyStoreFormat(KeyStoreCredentialStoreTest.java:137)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at java.lang.reflect.Method.invoke(Method.java:508)
> at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:367)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:274)
> at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
> at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:161)
> at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:290)
> at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:242)
> at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:121)
> Caused by: java.security.UnrecoverableKeyException: Get Key failed: 1.2.840.113549.1.7.1 SecretKeyFactory not available
> at java.security.KeyStore.getEntry(KeyStore.java:1532)
> at org.wildfly.security.credential.store.impl.KeyStoreCredentialStore.retrieve(KeyStoreCredentialStore.java:462)
> ... 10 more
> Caused by: java.security.NoSuchAlgorithmException: 1.2.840.113549.1.7.1 SecretKeyFactory not available
> ... 12 more
> {code}
> [1] https://github.com/wildfly-security/wildfly-elytron/pull/661/commits/7296...
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1427) Credential store type PKCS12 works fine when using OracleJDK and OpenJDK but doesn't work using IBM JDK.
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1427?page=com.atlassian.jira.plugin.s... ]
Jan Kalina commented on ELY-1427:
---------------------------------
This is property of IBM Java - its implementation of PKCS12 KeyStore does not allow to store custom objects.
See discussion in ELY-1295.
> Credential store type PKCS12 works fine when using OracleJDK and OpenJDK but doesn't work using IBM JDK.
> --------------------------------------------------------------------------------------------------------
>
> Key: ELY-1427
> URL: https://issues.jboss.org/browse/ELY-1427
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Credential Store
> Reporter: Hynek Švábek
> Priority: Critical
>
> Credential store type PKCS12 works fine when using OracleJDK and OpenJDK.
> Problem occurs when we use IBM JDK, add-alias works fine for first time, but for add-alias for second time with same alias name we expect message about duplicity rather than current error message about SecretKeyFactory not availability.
> {code}
> "WFLYCTL0158: Operation handler failed: java.lang.RuntimeException: WFLYELY00009: Unable to complete operation. 'ELY09504: Cannot acquire a credential from the credential store->Get Key failed: 1.2.840.113549.1.7.1 SecretKeyFactory not available->1.2.840.113549.1.7.1 SecretKeyFactory not available'",
> {code}
> *NOTE*
> I met same problem with Oracle JDK 1.8 u66, with u144 is everythink ok.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months
[JBoss JIRA] (ELY-1427) Credential store type PKCS12 works fine when using OracleJDK and OpenJDK but doesn't work using IBM JDK.
by Jan Kalina (JIRA)
[ https://issues.jboss.org/browse/ELY-1427?page=com.atlassian.jira.plugin.s... ]
Jan Kalina edited comment on ELY-1427 at 1/25/18 9:51 AM:
----------------------------------------------------------
This is property of IBM Java - its implementation of PKCS12 KeyStore does not allow to store custom objects.
This cannot be supported on IBM Java.
See discussion in ELY-1295.
was (Author: honza889):
This is property of IBM Java - its implementation of PKCS12 KeyStore does not allow to store custom objects.
See discussion in ELY-1295.
> Credential store type PKCS12 works fine when using OracleJDK and OpenJDK but doesn't work using IBM JDK.
> --------------------------------------------------------------------------------------------------------
>
> Key: ELY-1427
> URL: https://issues.jboss.org/browse/ELY-1427
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Credential Store
> Reporter: Hynek Švábek
> Priority: Critical
>
> Credential store type PKCS12 works fine when using OracleJDK and OpenJDK.
> Problem occurs when we use IBM JDK, add-alias works fine for first time, but for add-alias for second time with same alias name we expect message about duplicity rather than current error message about SecretKeyFactory not availability.
> {code}
> "WFLYCTL0158: Operation handler failed: java.lang.RuntimeException: WFLYELY00009: Unable to complete operation. 'ELY09504: Cannot acquire a credential from the credential store->Get Key failed: 1.2.840.113549.1.7.1 SecretKeyFactory not available->1.2.840.113549.1.7.1 SecretKeyFactory not available'",
> {code}
> *NOTE*
> I met same problem with Oracle JDK 1.8 u66, with u144 is everythink ok.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
8 years, 3 months