[JBoss JIRA] (ELY-2026) UnsupportedOperationException in SSLEngine using jdk 251+
by Ricardo Martin Camarero (Jira)
[ https://issues.redhat.com/browse/ELY-2026?page=com.atlassian.jira.plugin.... ]
Ricardo Martin Camarero commented on ELY-2026:
----------------------------------------------
I can pass the test doing some reflection in the JDKSpecific for 8 as I commented in teh related JIRA. See this [commit|https://github.com/rmartinc/wildfly-elytron/commit/56f48d602e6e168...], it was just a quick hack, but it pass the test. Hope it helps!
> UnsupportedOperationException in SSLEngine using jdk 251+
> ---------------------------------------------------------
>
> Key: ELY-2026
> URL: https://issues.redhat.com/browse/ELY-2026
> Project: WildFly Elytron
> Issue Type: Bug
> Components: SSL
> Affects Versions: 1.10.9.Final
> Reporter: Ricardo Martin Camarero
> Assignee: Darran Lofthouse
> Priority: Major
>
> Some SSLEngines provided by elytron does not implement the new TLS methods that jdk-8 251+ incorporated from jdk-11. That makes some tests in the wildfly-http-client to fail with the following exception:
> {code}
> 12:07:31,031 ERROR (XNIO-3 I/O-1) [org.xnio.listener] <ChannelListeners.java:94> XNIO001007: A channel event listener threw an exception: java.lang.RuntimeException:
> java.lang.reflect.InvocationTargetException
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:99)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:81)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:77)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at io.undertow.protocols.ssl.SslConduit$SslReadReadyHandler.readReady(SslConduit.java:1211)
> at io.undertow.protocols.ssl.SslConduit$SslWriteReadyHandler.writeReady(SslConduit.java:1286)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:94)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:591)
> Caused by: java.lang.reflect.InvocationTargetException
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:97)
> ... 8 more
> Caused by: java.lang.UnsupportedOperationException
> at org.wildfly.security.ssl.JDKSpecific.getApplicationProtocol(JDKSpecific.java:35)
> at org.wildfly.security.ssl.AbstractDelegatingSSLEngine.getApplicationProtocol(AbstractDelegatingSSLEngine.java:166)
> ... 13 more
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
5 years, 2 months
[JBoss JIRA] (ELY-2026) UnsupportedOperationException in SSLEngine using jdk 251+
by Darran Lofthouse (Jira)
[ https://issues.redhat.com/browse/ELY-2026?page=com.atlassian.jira.plugin.... ]
Darran Lofthouse commented on ELY-2026:
---------------------------------------
Thanks [~rhn-support-rmartinc] I will try some debugging, just wanted to eliminate if we already had a fix that just needed backporting but looks like there is still an issue.
> UnsupportedOperationException in SSLEngine using jdk 251+
> ---------------------------------------------------------
>
> Key: ELY-2026
> URL: https://issues.redhat.com/browse/ELY-2026
> Project: WildFly Elytron
> Issue Type: Bug
> Components: SSL
> Affects Versions: 1.10.9.Final
> Reporter: Ricardo Martin Camarero
> Assignee: Darran Lofthouse
> Priority: Major
>
> Some SSLEngines provided by elytron does not implement the new TLS methods that jdk-8 251+ incorporated from jdk-11. That makes some tests in the wildfly-http-client to fail with the following exception:
> {code}
> 12:07:31,031 ERROR (XNIO-3 I/O-1) [org.xnio.listener] <ChannelListeners.java:94> XNIO001007: A channel event listener threw an exception: java.lang.RuntimeException:
> java.lang.reflect.InvocationTargetException
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:99)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:81)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:77)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at io.undertow.protocols.ssl.SslConduit$SslReadReadyHandler.readReady(SslConduit.java:1211)
> at io.undertow.protocols.ssl.SslConduit$SslWriteReadyHandler.writeReady(SslConduit.java:1286)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:94)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:591)
> Caused by: java.lang.reflect.InvocationTargetException
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:97)
> ... 8 more
> Caused by: java.lang.UnsupportedOperationException
> at org.wildfly.security.ssl.JDKSpecific.getApplicationProtocol(JDKSpecific.java:35)
> at org.wildfly.security.ssl.AbstractDelegatingSSLEngine.getApplicationProtocol(AbstractDelegatingSSLEngine.java:166)
> ... 13 more
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
5 years, 2 months
[JBoss JIRA] (ELY-2026) UnsupportedOperationException in SSLEngine using jdk 251+
by Ricardo Martin Camarero (Jira)
[ https://issues.redhat.com/browse/ELY-2026?page=com.atlassian.jira.plugin.... ]
Ricardo Martin Camarero commented on ELY-2026:
----------------------------------------------
Yep, same result, the project uses elytron 1.12.1.Final but if you change it to current 1.x upstream the same exception is in the log.
> UnsupportedOperationException in SSLEngine using jdk 251+
> ---------------------------------------------------------
>
> Key: ELY-2026
> URL: https://issues.redhat.com/browse/ELY-2026
> Project: WildFly Elytron
> Issue Type: Bug
> Components: SSL
> Affects Versions: 1.10.9.Final
> Reporter: Ricardo Martin Camarero
> Assignee: Darran Lofthouse
> Priority: Major
>
> Some SSLEngines provided by elytron does not implement the new TLS methods that jdk-8 251+ incorporated from jdk-11. That makes some tests in the wildfly-http-client to fail with the following exception:
> {code}
> 12:07:31,031 ERROR (XNIO-3 I/O-1) [org.xnio.listener] <ChannelListeners.java:94> XNIO001007: A channel event listener threw an exception: java.lang.RuntimeException:
> java.lang.reflect.InvocationTargetException
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:99)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:81)
> at io.undertow.client.ALPNClientSelector$2.handleEvent(ALPNClientSelector.java:77)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at io.undertow.protocols.ssl.SslConduit$SslReadReadyHandler.readReady(SslConduit.java:1211)
> at io.undertow.protocols.ssl.SslConduit$SslWriteReadyHandler.writeReady(SslConduit.java:1286)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:94)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:591)
> Caused by: java.lang.reflect.InvocationTargetException
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at io.undertow.protocols.alpn.JDK9AlpnProvider.getSelectedProtocol(JDK9AlpnProvider.java:97)
> ... 8 more
> Caused by: java.lang.UnsupportedOperationException
> at org.wildfly.security.ssl.JDKSpecific.getApplicationProtocol(JDKSpecific.java:35)
> at org.wildfly.security.ssl.AbstractDelegatingSSLEngine.getApplicationProtocol(AbstractDelegatingSSLEngine.java:166)
> ... 13 more
> {code}
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
5 years, 2 months
[JBoss JIRA] (WFCORE-5143) Bouncycastle - Failing tests in RESTEasy TS
by Darran Lofthouse (Jira)
[ https://issues.redhat.com/browse/WFCORE-5143?page=com.atlassian.jira.plug... ]
Darran Lofthouse commented on WFCORE-5143:
------------------------------------------
I need to run some tests, for KeyCloak I believe the main requirement is going to be - for our zip distribution the org.bouncycastle module must be present.
For the provisioned cases I am going to test but the KeyCloak feature pack should trigger the dependency as it is installed I hope.
> Bouncycastle - Failing tests in RESTEasy TS
> -------------------------------------------
>
> Key: WFCORE-5143
> URL: https://issues.redhat.com/browse/WFCORE-5143
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Affects Versions: 13.0.0.Beta6
> Reporter: Emmanuel Hugonnet
> Assignee: Emmanuel Hugonnet
> Priority: Blocker
> Fix For: 13.0.0.Beta7
>
>
> [~ehugonnet] please set the component. I cannot find anything suitable.
> I noticed it in the context of a bootable JAR execution but [~jfdenise] confirmed this happens with WF 21 Beta1.
> This is about some tests in the RESTEasy TS which has been adapted to execute against bootable JARs through a specific profile [1].
> The tests are running successfully with WildFly 20.0.1.Final (the {{ejb}} layer needs to be removed for this experiment to be run [2]) but fail against 21.0.0.Beta1, so it is a regression.
> There are 108 tests failing but this JIRA is reporting just one as a reference, see "Steps to reproduce" in order to have a full list:
> {code}
> org.jboss.resteasy.test.providers.mediatype.BlacklistedMediaTypeTest.org.jboss.resteasy.test.providers.mediatype.BlacklistedMediaTypeTest
> Error Details
> Cannot deploy BlacklistedMediaTypeTest.war: {"WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:" => {"Operation step-1" => {"WFLYCTL0080: Failed services" => {"jboss.module.service.\"deployment.BlacklistedMediaTypeTest.war\".main" => "WFLYSRV0179: Failed to load module: deployment.BlacklistedMediaTypeTest.war
> Caused by: org.jboss.modules.ModuleNotFoundException: org.bouncycastle"}}}}
> {code}
> *Steps to reproduce*:
> 1. clone https://github.com/fabiobrz/Resteasy/tree/bootable-jar-support
> 2. build RESTEasy:
> {code}
> $ mvn install -Dmaven.test.skip=true -Dmaven.repo.local=/home/my-local-repo
> {code}
> 3. cd to testsuite directory:
> {code}
> cd testsuite
> {code}
> 4. run the test against WF 21.0.0.Beta1 with bootable JAR:
> {code}
> mvn clean verify -am -pl integration-tests -Dmaven.repo.local=/home/my-local-repo -Dserver.version=21.0.0.Beta1 -Dtest=org.jboss.resteasy.test.providers.mediatype.BlacklistedMediaTypeTest -Ddisable.microprofile.tests -Dserver.home=foo -Dts.bootable
> {code}
> The test should *fail*
> 5. run the test against WF 20.0.1.Final with bootable JAR:
> {code}
> mvn clean verify -am -pl integration-tests -Dmaven.repo.local=/home/my-local-repo -Dserver.version=20.0.1.Final -Dtest=org.jboss.resteasy.test.providers.mediatype.BlacklistedMediaTypeTest -Ddisable.microprofile.tests -Dserver.home=foo -Dts.bootable
> {code}
> The test should *pass*
> [1]
> https://github.com/resteasy/Resteasy/pull/2526/files#diff-8c7ea03eb619e46...
> [2]
> https://github.com/resteasy/Resteasy/pull/2526/files#diff-8c7ea03eb619e46...
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
5 years, 2 months