[JBoss JIRA] (SWSQE-655) Kiali tableue reports-Test execution report does not show all the sprints
by Sunil Kondkar (Jira)
[ https://issues.jboss.org/browse/SWSQE-655?page=com.atlassian.jira.plugin.... ]
Sunil Kondkar commented on SWSQE-655:
-------------------------------------
Added sprint iterations to polarion- added sprint 19 and sprint 20 iterations
Linked test runs in each sprint to related iterations
To do: Check if Kiali Test execution report shows all sprints in Tableue.
> Kiali tableue reports-Test execution report does not show all the sprints
> -------------------------------------------------------------------------
>
> Key: SWSQE-655
> URL: https://issues.jboss.org/browse/SWSQE-655
> Project: Kiali QE
> Issue Type: QE Task
> Reporter: Sunil Kondkar
> Assignee: Prachi Yadav
> Priority: Major
> Labels: pqi
>
> Kiali tableue reports-Test execution report does not show all the sprints
> To-do:
> -Search if the sprint milestones exist, if not then create
> -Link existing test plans of each sprint to related milestone sprint
> -Verify if reports show all test cases and sprints
--
This message was sent by Atlassian Jira
(v7.12.1#712002)
5 years, 9 months
[JBoss JIRA] (WFLY-11007) Using OpenShift generated certificates and client auth cause TLS errors
by Sebastian Laskawiec (Jira)
[ https://issues.jboss.org/browse/WFLY-11007?page=com.atlassian.jira.plugin... ]
Sebastian Laskawiec edited comment on WFLY-11007 at 3/28/19 10:55 AM:
----------------------------------------------------------------------
Unfortunately I'm having some difficulties extracting the reproducer. Even when I export the list of CA Certificates, it works without any problems when using {{docker run -v...}} options. So there must be something that OpenShift does extra in this use case. I guess the only way to reproduce it locally is to use {{oc cluster up}}.
I also updated the steps to reproduce to make it a bit easier for you [~iankko][~mchoma].
==== Update ====
Ha! I managed to create a reproducer for you based on {{docker run}} command: https://github.com/slaskawi/WFLY-11007
was (Author: sebastian.laskawiec):
Unfortunately I'm having some difficulties extracting the reproducer. Even when I export the list of CA Certificates, it works without any problems when using {{docker run -v...}} options. So there must be something that OpenShift does extra in this use case. I guess the only way to reproduce it locally is to use {{oc cluster up}}.
I also updated the steps to reproduce to make it a bit easier for you [~iankko][~mchoma].
> Using OpenShift generated certificates and client auth cause TLS errors
> -----------------------------------------------------------------------
>
> Key: WFLY-11007
> URL: https://issues.jboss.org/browse/WFLY-11007
> Project: WildFly
> Issue Type: Bug
> Components: Security, Web (Undertow)
> Affects Versions: 13.0.0.Final
> Reporter: Sebastian Laskawiec
> Assignee: Stuart Douglas
> Priority: Major
>
> h2. Summary
> It seems that when using OpenShift generated certificates and client auth (with {{want-client-auth="true"}}) the TLS handshake fails with {{RECV TLSv1.2 ALERT: fatal, record_overflow}} message.
> h2. Explanation
> I'm using {{oc cluster up}} and deploying Keycloak (WF 13 based) on OpenShift local cluster using the (1) template. The service in the the template uses OpenShift generated certificates ({{"service.alpha.openshift.io/serving-cert-secret-name": "keycloak-x509-https-secret"}}). Both files are mounted in the Keycloak pod and translated into keystore and truststore (see the configuration after the transformation (2)). Once the pod is up and running, I'm issuing a {{curl}} command as shown in (3). {{curl}} fails saying that {{* error:1408F092:SSL routines:ssl3_get_record:data length too long}}. The server logs with TLS Handshake debugging turned on might be found here (4). As shown in the link, the server has written {{16384}} bytes.
> I also did a test with manually created certificates (5). The result might be found here (6). As shown in the link, we've written {{16050}} bytes instead of {{16384}} and the handshake was successful.
> h2. Possible solution
> Perhaps we should cut the list CAs transmitted by the server when asking for client auth when it exceeds certain number of bytes. It would be helpful to write a warn message too.
> Links:
> - (1) Keycloak OCP Template https://gist.github.com/slaskawi/57ed810a7109a02a9d884b61ce2e7f13
> - (2) Transformed configuration https://gist.github.com/slaskawi/92aead6c519b867621129b640b4a3c88
> - (3) curl command https://gist.github.com/slaskawi/3bc32b8e96c2499cb7b48c3c5cb28616
> - (4) https://gist.github.com/slaskawi/b6477fe3cd65890c879cfe6f95359450#file-lo...
> - (5) Keycloak and OpenShift integration demo https://github.com/keycloak/openshift-integration/blob/master/install-key...
> - (6) https://gist.github.com/slaskawi/7fd87e1f2e6c4faf657d9e8289ed3392#file-lo...
--
This message was sent by Atlassian Jira
(v7.12.1#712002)
5 years, 9 months
[JBoss JIRA] (WFLY-11007) Using OpenShift generated certificates and client auth cause TLS errors
by Martin Choma (Jira)
[ https://issues.jboss.org/browse/WFLY-11007?page=com.atlassian.jira.plugin... ]
Martin Choma commented on WFLY-11007:
-------------------------------------
I have followed your reproducer on OCP 3.11 and I don't see this error:
{code}
curl -vk https://10.128.0.37:8443/auth
* About to connect() to 10.128.0.37 port 8443 (#0)
* Trying 10.128.0.37...
* Connected to 10.128.0.37 (10.128.0.37) port 8443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
* skipping SSL peer certificate verification
* NSS: client certificate not found (nickname not specified)
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA256
* Server certificate:
* subject: CN=keycloak.default.svc
* start date: Mar 28 14:49:47 2019 GMT
* expire date: Mar 27 14:49:48 2021 GMT
* common name: keycloak.default.svc
* issuer: CN=openshift-service-serving-signer@1553780535
> GET /auth HTTP/1.1
> User-Agent: curl/7.29.0
> Host: 10.128.0.37:8443
> Accept: */*
>
< HTTP/1.1 303 See Other
< Connection: keep-alive
< Location: https://10.128.0.37:8443/auth/
< Content-Length: 0
< Date: Thu, 28 Mar 2019 14:51:45 GMT
<
* Connection #0 to host 10.128.0.37 left intact
{code}
> Using OpenShift generated certificates and client auth cause TLS errors
> -----------------------------------------------------------------------
>
> Key: WFLY-11007
> URL: https://issues.jboss.org/browse/WFLY-11007
> Project: WildFly
> Issue Type: Bug
> Components: Security, Web (Undertow)
> Affects Versions: 13.0.0.Final
> Reporter: Sebastian Laskawiec
> Assignee: Stuart Douglas
> Priority: Major
>
> h2. Summary
> It seems that when using OpenShift generated certificates and client auth (with {{want-client-auth="true"}}) the TLS handshake fails with {{RECV TLSv1.2 ALERT: fatal, record_overflow}} message.
> h2. Explanation
> I'm using {{oc cluster up}} and deploying Keycloak (WF 13 based) on OpenShift local cluster using the (1) template. The service in the the template uses OpenShift generated certificates ({{"service.alpha.openshift.io/serving-cert-secret-name": "keycloak-x509-https-secret"}}). Both files are mounted in the Keycloak pod and translated into keystore and truststore (see the configuration after the transformation (2)). Once the pod is up and running, I'm issuing a {{curl}} command as shown in (3). {{curl}} fails saying that {{* error:1408F092:SSL routines:ssl3_get_record:data length too long}}. The server logs with TLS Handshake debugging turned on might be found here (4). As shown in the link, the server has written {{16384}} bytes.
> I also did a test with manually created certificates (5). The result might be found here (6). As shown in the link, we've written {{16050}} bytes instead of {{16384}} and the handshake was successful.
> h2. Possible solution
> Perhaps we should cut the list CAs transmitted by the server when asking for client auth when it exceeds certain number of bytes. It would be helpful to write a warn message too.
> Links:
> - (1) Keycloak OCP Template https://gist.github.com/slaskawi/57ed810a7109a02a9d884b61ce2e7f13
> - (2) Transformed configuration https://gist.github.com/slaskawi/92aead6c519b867621129b640b4a3c88
> - (3) curl command https://gist.github.com/slaskawi/3bc32b8e96c2499cb7b48c3c5cb28616
> - (4) https://gist.github.com/slaskawi/b6477fe3cd65890c879cfe6f95359450#file-lo...
> - (5) Keycloak and OpenShift integration demo https://github.com/keycloak/openshift-integration/blob/master/install-key...
> - (6) https://gist.github.com/slaskawi/7fd87e1f2e6c4faf657d9e8289ed3392#file-lo...
--
This message was sent by Atlassian Jira
(v7.12.1#712002)
5 years, 9 months