[Red Hat JIRA] (WFLY-14303) Regression failures when deploy JMS webservice endpoint and session endpoint
by Jim Ma (Jira)
Jim Ma created WFLY-14303:
-----------------------------
Summary: Regression failures when deploy JMS webservice endpoint and session endpoint
Key: WFLY-14303
URL: https://issues.redhat.com/browse/WFLY-14303
Project: WildFly
Issue Type: Bug
Components: Web Services
Affects Versions: 22.0.0.Final
Reporter: Jim Ma
Assignee: Jim Ma
Fix For: 23.0.0.Beta1, 22.0.1.Final
When run jbossws-cxf testsuite against WFLY 22.0.0.Final release and get these regression test failures :
{code:java}
[ERROR] SessionEndpointTestCase.testSession:77->JBossWSTest.assertEquals:332->Assert.assertEquals:144->Assert.assertEquals:115 expected:<Number is [1]0> but was:<Number is [2]0>
[ERROR] Errors:
[ERROR] JMSEndpointAPITestCase.org.jboss.test.ws.jaxws.cxf.jms.JMSEndpointAPITestCase » Deployment
[ERROR] JMSEndpointOnlyDeploymentTestCase.org.jboss.test.ws.jaxws.cxf.jms.JMSEndpointOnlyDeploymentTestCase » Deployment
[ERROR] JMSHTTPEndpointDeploymentTestCase.org.jboss.test.ws.jaxws.cxf.jms_http.JMSHTTPEndpointDeploymentTestCase » Deployment{code}
The jms deployment failure error statck trace is :
{code:java}
2021-01-13 18:22:29,119 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-2) MSC000001: Failed to start service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: org.jboss.msc.service.StartException in service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: WFLYSRV0153: Failed to process phase INSTALL of deployment "jaxws-cxf-jms-http-deployment.war"2021-01-13 18:22:29,119 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-2) MSC000001: Failed to start service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: org.jboss.msc.service.StartException in service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: WFLYSRV0153: Failed to process phase INSTALL of deployment "jaxws-cxf-jms-http-deployment.war" at org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:189) at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739) at org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701) at org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559) at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35) at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990) at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486) at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1363) at java.lang.Thread.run(Thread.java:748)Caused by: org.jboss.msc.service.DuplicateServiceException: Service jboss.ws.endpoint.context=jaxws-cxf-jms-http-deployment."org.jboss.test.ws.jaxws.cxf.jms_http.HelloWorldImpl" is already registered at org.jboss.msc.service.ServiceRegistrationImpl.set(ServiceRegistrationImpl.java:135) at org.jboss.msc.service.ServiceControllerImpl.startInstallation(ServiceControllerImpl.java:243) at org.jboss.msc.service.ServiceContainerImpl.install(ServiceContainerImpl.java:747) at org.jboss.msc.service.ServiceTargetImpl.install(ServiceTargetImpl.java:260) at org.jboss.msc.service.ServiceControllerImpl$ChildServiceTarget.install(ServiceControllerImpl.java:2065) at org.jboss.msc.service.ServiceTargetImpl.install(ServiceTargetImpl.java:260) at org.jboss.msc.service.ServiceControllerImpl$ChildServiceTarget.install(ServiceControllerImpl.java:2065) at org.jboss.msc.service.ServiceBuilderImpl.install(ServiceBuilderImpl.java:192) at org.jboss.as.webservices.service.EndpointService.install(EndpointService.java:280) at org.jboss.as.webservices.deployers.EndpointServiceDeploymentAspect.start(EndpointServiceDeploymentAspect.java:50) at org.jboss.as.webservices.deployers.AspectDeploymentProcessor.deploy(AspectDeploymentProcessor.java:73) at org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182) ... 8 more
{code}
It looks these regression failures are caused by https://issues.redhat.com/browse/WFLY-11999
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14302) WARN java.lang.NoClassDefFoundError: Failed to link javax/servlet/jsp/tagext/TagSupport
by Josep Jiménez (Jira)
Josep Jiménez created WFLY-14302:
------------------------------------
Summary: WARN java.lang.NoClassDefFoundError: Failed to link javax/servlet/jsp/tagext/TagSupport
Key: WFLY-14302
URL: https://issues.redhat.com/browse/WFLY-14302
Project: WildFly
Issue Type: Bug
Components: Class Loading
Affects Versions: 22.0.0.Final
Reporter: Josep Jiménez
Assignee: Richard Opalka
Over V16 and V21 the same project run correctly.
The project uses javax.servlet.jsp.tagext.TagSupport
During the deploiment shows this WARN the same times number of TagLib are defined on two tld's files of project.
11:52:58,637 WARN [org.jboss.modules.define] (MSC service thread 1-8) Failed to define class webui.tags.framework.BPlanSelector in Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader: java.lang.NoClassDefFoundError: Failed to link webui/tags/framework/BPlanSelector (Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader): javax/servlet/jsp/tagext/TagSupport11:52:58,637 WARN [org.jboss.modules.define] (MSC service thread 1-8) Failed to define class webui.tags.framework.BPlanSelector in Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader: java.lang.NoClassDefFoundError: Failed to link webui/tags/framework/BPlanSelector (Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader): javax/servlet/jsp/tagext/TagSupport at java.base/java.lang.ClassLoader.defineClass1(Native Method) at java.base/java.lang.ClassLoader.defineClass(ClassLoader.java:1016) at java.base/java.lang.ClassLoader.defineClass(ClassLoader.java:1095) at org.jboss.modules.ModuleClassLoader.doDefineOrLoadClass(ModuleClassLoader.java:424) at org.jboss.modules.ModuleClassLoader.defineClass(ModuleClassLoader.java:555) at org.jboss.modules.ModuleClassLoader.loadClassLocal(ModuleClassLoader.java:339) at org.jboss.modules.ModuleClassLoader$1.loadClassLocal(ModuleClassLoader.java:126) at org.jboss.modules.Module.loadModuleClass(Module.java:753) at org.jboss.modules.ModuleClassLoader.findClass(ModuleClassLoader.java:247) at org.jboss.modules.ConcurrentClassLoader.performLoadClassUnchecked(ConcurrentClassLoader.java:410) at org.jboss.modules.ConcurrentClassLoader.performLoadClass(ConcurrentClassLoader.java:398) at org.jboss.modules.ConcurrentClassLoader.loadClass(ConcurrentClassLoader.java:116) at java.base/java.lang.Class.forName0(Native Method) at java.base/java.lang.Class.forName(Class.java:468) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.utils.ClassLoadingUtils.loadClass(ClassLoadingUtils.java:21) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.utils.ClassLoadingUtils.loadClass(ClassLoadingUtils.java:14) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.component.deployers.InterceptorAnnotationProcessor.processComponentConfig(InterceptorAnnotationProcessor.java:84) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.component.deployers.InterceptorAnnotationProcessor.deploy(InterceptorAnnotationProcessor.java:77) at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559) at org.jboss.threads@2.4.0.Final//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377) at java.base/java.lang.Thread.run(Thread.java:832)
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow commented on WFLY-14299:
-------------------------------------
[~dlofthouse] I think that you resolved this already previously for the Full Platform (standalone-full.xml) configuration. Could you please take a look at our Web Profile (standalone-web.xml) configuration and see if similar changes are needed.
Thank you!
Scott
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Darran Lofthouse
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow reassigned WFLY-14299:
-----------------------------------
Assignee: Darran Lofthouse (was: Scott Marlow)
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Darran Lofthouse
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow updated WFLY-14299:
--------------------------------
Description:
Here is one of the 84 test failures:
{quote}
test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
01-16-2021 15:03:00: Test setup OK
01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
Algorithm: RSA; Serial number: 0x68deca39
Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
adding as trusted cert:
Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
Algorithm: RSA; Serial number: 0x40e9240d
Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
adding as trusted cert:
Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
Algorithm: RSA; Serial number: 0x401ed588
Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
trigger seeding of SecureRandom
done seeding SecureRandom
Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
INFO: statusCode=[404] contentType=[text/html]
Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
01-16-2021 15:03:03: ERROR: Should get unauthorized response.
01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
01-16-2021 15:03:03: ERROR: Exception at:
01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
01-16-2021 15:03:03: cleanup
STATUS:Failed.Test case throws exception: testAutoApplySession failed:
result: Failed. Test case throws exception: testAutoApplySession failed:
test result: Failed. Test case throws exception: testAutoApplySession failed:
{quote}
was:I need to run the tests again but wanted to create the issue now so I don't forget.
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Scott Marlow
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14301) jandex exception when using @DataSourceDefinition and Pg driver
by hantsy bai (Jira)
hantsy bai created WFLY-14301:
---------------------------------
Summary: jandex exception when using @DataSourceDefinition and Pg driver
Key: WFLY-14301
URL: https://issues.redhat.com/browse/WFLY-14301
Project: WildFly
Issue Type: Bug
Components: EE
Affects Versions: 22.0.0.Final
Reporter: hantsy bai
Assignee: Brian Stansberry
I used `@DataSourceDeifnition` and included a postgres driver in the project dependencies, and it works well in Payara, but I encountered the deployment issue when running it on WildFly.
The original description is posted on Stackoverflow.
[https://stackoverflow.com/questions/65746765/datasourcedefinition-usage-o...]
The full exception when deploying to WildFly.
{code:java}
14:01:20,667 INFO [org.jboss.as.server.deployment] (MSC service thread 1-4) WFLYSRV0027: Starting deployment of "cargo-tracker.war" (runtime-name: "cargo-tracker.war")
14:01:22,027 WARN [org.jboss.as.server.deployment] (MSC service thread 1-8) WFLYSRV0003: Could not index class org/postgresql/jdbc/PgConnection$1.class at /D:/appsvr/wildfly-22.0.0.Final/bin/content/cargo-tracker.war/WEB-INF/lib/postgresql-42.2.18.jar: java.lang.IllegalStateException: Required class information is missing
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.rebuildNestedType(Indexer.java:932)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.resolveTypePath(Indexer.java:792)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.resolveTypeAnnotation(Indexer.java:711)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.resolveTypeAnnotations(Indexer.java:619)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.index(Indexer.java:1613)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.annotation.ResourceRootIndexer.indexResourceRoot(ResourceRootIndexer.java:99)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.annotation.AnnotationIndexProcessor.deploy(AnnotationIndexProcessor.java:51)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
at java.base/java.lang.Thread.run(Thread.java:834)14:01:22,090 WARN [org.jboss.as.server.deployment] (MSC service thread 1-8) WFLYSRV0003: Could not index class org/postgresql/util/LruCache.class at /D:/appsvr/wildfly-22.0.0.Final/bin/content/cargo-tracker.war/WEB-INF/lib/postgresql-42.2.18.jar: java.lang.ArrayIndexOutOfBoundsException: Index 1 out of bounds for length 1
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.updateTypeTarget(Indexer.java:847)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.updateTypeTargets(Indexer.java:630)
at org.jboss.jandex@2.1.4.Final//org.jboss.jandex.Indexer.index(Indexer.java:1614)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.annotation.ResourceRootIndexer.indexResourceRoot(ResourceRootIndexer.java:99)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.annotation.AnnotationIndexProcessor.deploy(AnnotationIndexProcessor.java:51)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
at java.base/java.lang.Thread.run(Thread.java:834)14:01:22,593 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-1) MSC000001: Failed to start service jboss.deployment.unit."cargo-tracker.war".PARSE: org.jboss.msc.service.StartException in service jboss.deployment.unit."cargo-tracker.war".PARSE: WFLYSRV0153: Failed to process phase PARSE of deployment "cargo-tracker.war"
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:189)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701)
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486)
at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377)
at java.base/java.lang.Thread.run(Thread.java:834)
Caused by: org.jboss.msc.service.ServiceNotFoundException: service jboss.ejb.default-resource-adapter-name-service not found
at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceContainerImpl.getRequiredService(ServiceContainerImpl.java:663)
at org.jboss.as.ejb3@22.0.0.Final//org.jboss.as.ejb3.deployment.processors.MessageDrivenComponentDescriptionFactory.getDefaultResourceAdapterName(MessageDrivenComponentDescriptionFactory.java:257)
at org.jboss.as.ejb3@22.0.0.Final//org.jboss.as.ejb3.deployment.processors.MessageDrivenComponentDescriptionFactory.processMessageBeans(MessageDrivenComponentDescriptionFactory.java:156)
at org.jboss.as.ejb3@22.0.0.Final//org.jboss.as.ejb3.deployment.processors.MessageDrivenComponentDescriptionFactory.processAnnotations(MessageDrivenComponentDescriptionFactory.java:83)
at org.jboss.as.ejb3@22.0.0.Final//org.jboss.as.ejb3.deployment.processors.AnnotatedEJBComponentDescriptionDeploymentUnitProcessor.processAnnotations(AnnotatedEJBComponentDescriptionDeploymentUnitProcessor.java:150)
at org.jboss.as.ejb3@22.0.0.Final//org.jboss.as.ejb3.deployment.processors.AnnotatedEJBComponentDescriptionDeploymentUnitProcessor.deploy(AnnotatedEJBComponentDescriptionDeploymentUnitProcessor.java:82)
at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182)
... 8 more14:01:22,593 ERROR [org.jboss.as.controller.management-operation] (management-handler-thread - 1) WFLYCTL0013: Operation ("add") failed - address: ([("deployment" => "cargo-tracker.war")]) - failure description: {"WFLYCTL0080: Failed services" => {"jboss.deployment.unit.\"cargo-tracker.war\".PARSE" => "WFLYSRV0153: Failed to process phase PARSE of deployment \"cargo-tracker.war\"
Caused by: org.jboss.msc.service.ServiceNotFoundException: service jboss.ejb.default-resource-adapter-name-service not found"}}
14:01:22,593 ERROR [org.jboss.as.server] (management-handler-thread - 1) WFLYSRV0021: Deploy of deployment "cargo-tracker.war" was rolled back with the following failure message:
{"WFLYCTL0080: Failed services" => {"jboss.deployment.unit.\"cargo-tracker.war\".PARSE" => "WFLYSRV0153: Failed to process phase PARSE of deployment \"cargo-tracker.war\"
Caused by: org.jboss.msc.service.ServiceNotFoundException: service jboss.ejb.default-resource-adapter-name-service not found"}}
14:01:22,718 INFO [org.jboss.as.server.deployment] (MSC service thread 1-1) WFLYSRV0028: Stopped deployment cargo-tracker.war (runtime-name: cargo-tracker.war) in 118ms
{code}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14287) NoClassDefFoundError: Failed to link org/bouncycastle/openpgp/PGPEncryptedDataList: org/bouncycastle/util/Iterable
by Brian Stansberry (Jira)
[ https://issues.redhat.com/browse/WFLY-14287?page=com.atlassian.jira.plugi... ]
Brian Stansberry commented on WFLY-14287:
-----------------------------------------
[~rady66] The org.bouncycastle.bcpg module is private and is only provided for our own specific internal use. This is reflected in its module.xml; it's what the 'jboss.api" property with value "private" means. If a deployments adds a dependency on it we should be logging a WARN. We don't add dependencies to modules unless our own uses need them, or if the module is available for end user use (i.e. no jboss.api=private) or we add it as a dependency to deployments.
We don't add dependencies otherwise because doing so 1) increases our server footprint 2) increases the possibility that we will be affected by CVEs and 3) makes it more possible that people who build on WildFly will depend on internal details and then be negatively affected when we change those details.
We recommend that users package not use the modules we mark private but instead package the relevant libraries in their application.
> NoClassDefFoundError: Failed to link org/bouncycastle/openpgp/PGPEncryptedDataList: org/bouncycastle/util/Iterable
> ------------------------------------------------------------------------------------------------------------------
>
> Key: WFLY-14287
> URL: https://issues.redhat.com/browse/WFLY-14287
> Project: WildFly
> Issue Type: Bug
> Affects Versions: 21.0.1.Final
> Reporter: Radoslav Ivanov
> Assignee: Sudeshna Sur
> Priority: Major
>
> Could you please add missing dependencies in Bouncycastle modules?
> Problem (we got):
> {code:java}
> Caused by: java.lang.NoClassDefFoundError: Failed to link org/bouncycastle/openpgp/PGPEncryptedDataList (Module "org.bouncycastle.bcpg" version 1.66.00.0 from local module loader @1d1f7216 (finder: local module finder @423e4cbb (roots: /data/avoka/transact/manager/server/modules,/data/avoka/transact/manager/server/modules/system/layers/base))): org/bouncycastle/util/Iterable
> {code}
>
> Solution (adding dependency from bcpg to bcprov modules solves the issue):
> {code:java}
> modules\system\layers\base\org\bouncycastle\bcpg\main\module.xml{code}
> {code:java}
> <dependencies>
> <module name="org.bouncycastle.bcprov" export="true" services="export"/>
> </dependencies>
> {code}
>
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months
[Red Hat JIRA] (WFLY-14298) Using fault-tolerance in Wildfly 22 causes WELD-001408
by Brian Stansberry (Jira)
[ https://issues.redhat.com/browse/WFLY-14298?page=com.atlassian.jira.plugi... ]
Brian Stansberry reassigned WFLY-14298:
---------------------------------------
Component/s: MP Fault Tolerance
MP Metrics
(was: EE)
Assignee: Jason Lee (was: Brian Stansberry)
> Using fault-tolerance in Wildfly 22 causes WELD-001408
> ------------------------------------------------------
>
> Key: WFLY-14298
> URL: https://issues.redhat.com/browse/WFLY-14298
> Project: WildFly
> Issue Type: Bug
> Components: MP Fault Tolerance, MP Metrics
> Affects Versions: 22.0.0.Final
> Reporter: sdfsd fsdfsdf
> Assignee: Jason Lee
> Priority: Major
>
> In wildfly 21, I used to put these lines into the standalone-full-ha.xml:
> <extension module="org.wildfly.extension.microprofile.fault-tolerance-smallrye"/>
> ...
> <subsystem xmlns="urn:wildfly:microprofile-fault-tolerance-smallrye:1.0"/>
> If I put those lines into the standalone-full-ha.xml of Wildfly 22 I get the following error when deploying an appliction that uses fault-tolerance:
> WELD-001408: Unsatisfied dependencies for type MetricRegistry with qualifiers @Default
> @Inject io.smallrye.faulttolerance.metrics.MetricsCollectorFactory.registry
>
> I already have these lines in the standalone:
> <extension module="org.wildfly.extension.metrics"/>
> <extension module="org.wildfly.extension.health"/>
>
> Is there something else I need to add in the standalone in order to keep using fault-tolerance in Wildfly 22?
>
>
>
>
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 8 months