[Red Hat JIRA] (WFWIP-369) EAP metrics are shown on Metrics dashboard but not in linked Prometheus UI in OCP web console
by Jan Kasik (Jira)
[ https://issues.redhat.com/browse/WFWIP-369?page=com.atlassian.jira.plugin... ]
Jan Kasik updated WFWIP-369:
----------------------------
Summary: EAP metrics are shown on Metrics dashboard but not in linked Prometheus UI in OCP web console (was: EAP metrics are shown on Metrics dashboard but not from linked Prometheus UI in OCP web console)
> EAP metrics are shown on Metrics dashboard but not in linked Prometheus UI in OCP web console
> ---------------------------------------------------------------------------------------------
>
> Key: WFWIP-369
> URL: https://issues.redhat.com/browse/WFWIP-369
> Project: WildFly WIP
> Issue Type: Bug
> Components: OpenShift
> Reporter: Jan Kasik
> Assignee: Jeff Mesnil
> Priority: Blocker
> Labels: operator
>
> The Prometheus instance linked to "Prometheus UI" link is not able to query metrics from EAP. If this intentional, the integration and user experience is flawed because users can be confused since the link is not labeled properly.
> This is a bug in integration of Prometheus, OpenShift and EAP.
> cc [~jdenise]
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (ELY-2062) Unexpected order of security-manager permission checks on Eclipse OpenJ9 VM AdoptOpenJDK 11
by Marek Kopecky (Jira)
[ https://issues.redhat.com/browse/ELY-2062?page=com.atlassian.jira.plugin.... ]
Marek Kopecky commented on ELY-2062:
------------------------------------
[~dlofthouse] Any news here? Or what is your time plans for this jira? This issue is still valid in wf-core master.
> Unexpected order of security-manager permission checks on Eclipse OpenJ9 VM AdoptOpenJDK 11
> -------------------------------------------------------------------------------------------
>
> Key: ELY-2062
> URL: https://issues.redhat.com/browse/ELY-2062
> Project: WildFly Elytron
> Issue Type: Bug
> Affects Versions: 1.14.1.Final
> Reporter: Marek Kopecky
> Assignee: Darran Lofthouse
> Priority: Major
>
> [AlternateSecurityManagerTest|https://github.com/wildfly-security/wildfly-...] fails on Eclipse OpenJ9 VM AdoptOpenJDK 11 because of unexpected order of security-manager permission checks.
> Stacktrace:
> {noformat}
> testDoPrivilegedWithParameter_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.05 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoPrivilegedWithParameter_WithContext(AlternateSecurityManagerTest.java:314)
> testDoChecked_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/> but was:<file:/home/mkopecky/.m2/repository/junit/junit/4.13.1/junit-4.13.1.jar>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoChecked_WithContext(AlternateSecurityManagerTest.java:268)
> testDoUnchecked_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/.m2/repository/junit/junit/4.13.1/junit-4.13.1.jar> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoUnchecked_WithContext(AlternateSecurityManagerTest.java:210)
> testDoUnchecked(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoUnchecked(AlternateSecurityManagerTest.java:187)
> testDoPrivilegedWithParameter(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoPrivilegedWithParameter(AlternateSecurityManagerTest.java:291)
> testGetPropertyPrivileged(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Our CodeSource expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/.m2/repository/org/wildfly/security/wildfly-elytron-security-manager-action/1.14.1.CR1-SNAPSHOT/wildfly-elytron-security-manager-action-1.14.1.CR1-SNAPSHOT.jar>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testGetPropertyPrivileged(AlternateSecurityManagerTest.java:161)
> {noformat}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (ELY-2062) Unexpected order of security-manager permission checks on Eclipse OpenJ9 VM AdoptOpenJDK 11
by Marek Kopecky (Jira)
[ https://issues.redhat.com/browse/ELY-2062?page=com.atlassian.jira.plugin.... ]
Marek Kopecky updated ELY-2062:
-------------------------------
Affects Version/s: 1.14.1.Final
> Unexpected order of security-manager permission checks on Eclipse OpenJ9 VM AdoptOpenJDK 11
> -------------------------------------------------------------------------------------------
>
> Key: ELY-2062
> URL: https://issues.redhat.com/browse/ELY-2062
> Project: WildFly Elytron
> Issue Type: Bug
> Affects Versions: 1.14.1.Final
> Reporter: Marek Kopecky
> Assignee: Darran Lofthouse
> Priority: Major
>
> [AlternateSecurityManagerTest|https://github.com/wildfly-security/wildfly-...] fails on Eclipse OpenJ9 VM AdoptOpenJDK 11 because of unexpected order of security-manager permission checks.
> Stacktrace:
> {noformat}
> testDoPrivilegedWithParameter_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.05 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoPrivilegedWithParameter_WithContext(AlternateSecurityManagerTest.java:314)
> testDoChecked_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/> but was:<file:/home/mkopecky/.m2/repository/junit/junit/4.13.1/junit-4.13.1.jar>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoChecked_WithContext(AlternateSecurityManagerTest.java:268)
> testDoUnchecked_WithContext(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/.m2/repository/junit/junit/4.13.1/junit-4.13.1.jar> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoUnchecked_WithContext(AlternateSecurityManagerTest.java:210)
> testDoUnchecked(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoUnchecked(AlternateSecurityManagerTest.java:187)
> testDoPrivilegedWithParameter(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Matching CodeSource Location expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/classes/>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testDoPrivilegedWithParameter(AlternateSecurityManagerTest.java:291)
> testGetPropertyPrivileged(org.wildfly.security.manager.AlternateSecurityManagerTest) Time elapsed: 0.001 sec <<< FAILURE!
> java.lang.AssertionError: Our CodeSource expected:<file:/home/mkopecky/playground/elytron/1.x/manager/base/target/test-classes/> but was:<file:/home/mkopecky/.m2/repository/org/wildfly/security/wildfly-elytron-security-manager-action/1.14.1.CR1-SNAPSHOT/wildfly-elytron-security-manager-action-1.14.1.CR1-SNAPSHOT.jar>
> at org.wildfly.security.manager.AlternateSecurityManagerTest.testGetPropertyPrivileged(AlternateSecurityManagerTest.java:161)
> {noformat}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (WFLY-14303) Regression failures when deploy JMS webservice endpoint and session endpoint
by Jim Ma (Jira)
Jim Ma created WFLY-14303:
-----------------------------
Summary: Regression failures when deploy JMS webservice endpoint and session endpoint
Key: WFLY-14303
URL: https://issues.redhat.com/browse/WFLY-14303
Project: WildFly
Issue Type: Bug
Components: Web Services
Affects Versions: 22.0.0.Final
Reporter: Jim Ma
Assignee: Jim Ma
Fix For: 23.0.0.Beta1, 22.0.1.Final
When run jbossws-cxf testsuite against WFLY 22.0.0.Final release and get these regression test failures :
{code:java}
[ERROR] SessionEndpointTestCase.testSession:77->JBossWSTest.assertEquals:332->Assert.assertEquals:144->Assert.assertEquals:115 expected:<Number is [1]0> but was:<Number is [2]0>
[ERROR] Errors:
[ERROR] JMSEndpointAPITestCase.org.jboss.test.ws.jaxws.cxf.jms.JMSEndpointAPITestCase » Deployment
[ERROR] JMSEndpointOnlyDeploymentTestCase.org.jboss.test.ws.jaxws.cxf.jms.JMSEndpointOnlyDeploymentTestCase » Deployment
[ERROR] JMSHTTPEndpointDeploymentTestCase.org.jboss.test.ws.jaxws.cxf.jms_http.JMSHTTPEndpointDeploymentTestCase » Deployment{code}
The jms deployment failure error statck trace is :
{code:java}
2021-01-13 18:22:29,119 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-2) MSC000001: Failed to start service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: org.jboss.msc.service.StartException in service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: WFLYSRV0153: Failed to process phase INSTALL of deployment "jaxws-cxf-jms-http-deployment.war"2021-01-13 18:22:29,119 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-2) MSC000001: Failed to start service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: org.jboss.msc.service.StartException in service jboss.deployment.unit."jaxws-cxf-jms-http-deployment.war".INSTALL: WFLYSRV0153: Failed to process phase INSTALL of deployment "jaxws-cxf-jms-http-deployment.war" at org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:189) at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739) at org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701) at org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559) at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35) at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990) at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486) at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1363) at java.lang.Thread.run(Thread.java:748)Caused by: org.jboss.msc.service.DuplicateServiceException: Service jboss.ws.endpoint.context=jaxws-cxf-jms-http-deployment."org.jboss.test.ws.jaxws.cxf.jms_http.HelloWorldImpl" is already registered at org.jboss.msc.service.ServiceRegistrationImpl.set(ServiceRegistrationImpl.java:135) at org.jboss.msc.service.ServiceControllerImpl.startInstallation(ServiceControllerImpl.java:243) at org.jboss.msc.service.ServiceContainerImpl.install(ServiceContainerImpl.java:747) at org.jboss.msc.service.ServiceTargetImpl.install(ServiceTargetImpl.java:260) at org.jboss.msc.service.ServiceControllerImpl$ChildServiceTarget.install(ServiceControllerImpl.java:2065) at org.jboss.msc.service.ServiceTargetImpl.install(ServiceTargetImpl.java:260) at org.jboss.msc.service.ServiceControllerImpl$ChildServiceTarget.install(ServiceControllerImpl.java:2065) at org.jboss.msc.service.ServiceBuilderImpl.install(ServiceBuilderImpl.java:192) at org.jboss.as.webservices.service.EndpointService.install(EndpointService.java:280) at org.jboss.as.webservices.deployers.EndpointServiceDeploymentAspect.start(EndpointServiceDeploymentAspect.java:50) at org.jboss.as.webservices.deployers.AspectDeploymentProcessor.deploy(AspectDeploymentProcessor.java:73) at org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182) ... 8 more
{code}
It looks these regression failures are caused by https://issues.redhat.com/browse/WFLY-11999
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (WFLY-14302) WARN java.lang.NoClassDefFoundError: Failed to link javax/servlet/jsp/tagext/TagSupport
by Josep Jiménez (Jira)
Josep Jiménez created WFLY-14302:
------------------------------------
Summary: WARN java.lang.NoClassDefFoundError: Failed to link javax/servlet/jsp/tagext/TagSupport
Key: WFLY-14302
URL: https://issues.redhat.com/browse/WFLY-14302
Project: WildFly
Issue Type: Bug
Components: Class Loading
Affects Versions: 22.0.0.Final
Reporter: Josep Jiménez
Assignee: Richard Opalka
Over V16 and V21 the same project run correctly.
The project uses javax.servlet.jsp.tagext.TagSupport
During the deploiment shows this WARN the same times number of TagLib are defined on two tld's files of project.
11:52:58,637 WARN [org.jboss.modules.define] (MSC service thread 1-8) Failed to define class webui.tags.framework.BPlanSelector in Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader: java.lang.NoClassDefFoundError: Failed to link webui/tags/framework/BPlanSelector (Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader): javax/servlet/jsp/tagext/TagSupport11:52:58,637 WARN [org.jboss.modules.define] (MSC service thread 1-8) Failed to define class webui.tags.framework.BPlanSelector in Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader: java.lang.NoClassDefFoundError: Failed to link webui/tags/framework/BPlanSelector (Module "deployment.Awebpfcw2-1.0.war" from Service Module Loader): javax/servlet/jsp/tagext/TagSupport at java.base/java.lang.ClassLoader.defineClass1(Native Method) at java.base/java.lang.ClassLoader.defineClass(ClassLoader.java:1016) at java.base/java.lang.ClassLoader.defineClass(ClassLoader.java:1095) at org.jboss.modules.ModuleClassLoader.doDefineOrLoadClass(ModuleClassLoader.java:424) at org.jboss.modules.ModuleClassLoader.defineClass(ModuleClassLoader.java:555) at org.jboss.modules.ModuleClassLoader.loadClassLocal(ModuleClassLoader.java:339) at org.jboss.modules.ModuleClassLoader$1.loadClassLocal(ModuleClassLoader.java:126) at org.jboss.modules.Module.loadModuleClass(Module.java:753) at org.jboss.modules.ModuleClassLoader.findClass(ModuleClassLoader.java:247) at org.jboss.modules.ConcurrentClassLoader.performLoadClassUnchecked(ConcurrentClassLoader.java:410) at org.jboss.modules.ConcurrentClassLoader.performLoadClass(ConcurrentClassLoader.java:398) at org.jboss.modules.ConcurrentClassLoader.loadClass(ConcurrentClassLoader.java:116) at java.base/java.lang.Class.forName0(Native Method) at java.base/java.lang.Class.forName(Class.java:468) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.utils.ClassLoadingUtils.loadClass(ClassLoadingUtils.java:21) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.utils.ClassLoadingUtils.loadClass(ClassLoadingUtils.java:14) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.component.deployers.InterceptorAnnotationProcessor.processComponentConfig(InterceptorAnnotationProcessor.java:84) at org.jboss.as.ee@22.0.0.Final//org.jboss.as.ee.component.deployers.InterceptorAnnotationProcessor.deploy(InterceptorAnnotationProcessor.java:77) at org.jboss.as.server@14.0.0.Final//org.jboss.as.server.deployment.DeploymentUnitPhaseService.start(DeploymentUnitPhaseService.java:182) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1739) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$StartTask.execute(ServiceControllerImpl.java:1701) at org.jboss.msc@1.4.12.Final//org.jboss.msc.service.ServiceControllerImpl$ControllerTask.run(ServiceControllerImpl.java:1559) at org.jboss.threads@2.4.0.Final//org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1990) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1486) at org.jboss.threads@2.4.0.Final//org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1377) at java.base/java.lang.Thread.run(Thread.java:832)
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow commented on WFLY-14299:
-------------------------------------
[~dlofthouse] I think that you resolved this already previously for the Full Platform (standalone-full.xml) configuration. Could you please take a look at our Web Profile (standalone-web.xml) configuration and see if similar changes are needed.
Thank you!
Scott
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Darran Lofthouse
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow reassigned WFLY-14299:
-----------------------------------
Assignee: Darran Lofthouse (was: Scott Marlow)
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Darran Lofthouse
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months
[Red Hat JIRA] (WFLY-14299) securityapi has 84 TCK test failures with Web Profile configuration
by Scott Marlow (Jira)
[ https://issues.redhat.com/browse/WFLY-14299?page=com.atlassian.jira.plugi... ]
Scott Marlow updated WFLY-14299:
--------------------------------
Description:
Here is one of the 84 test failures:
{quote}
test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
01-16-2021 15:03:00: Test setup OK
01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
Algorithm: RSA; Serial number: 0x68deca39
Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
adding as trusted cert:
Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
Algorithm: RSA; Serial number: 0x40e9240d
Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
adding as trusted cert:
Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
Algorithm: RSA; Serial number: 0x401ed588
Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
trigger seeding of SecureRandom
done seeding SecureRandom
Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
INFO: statusCode=[404] contentType=[text/html]
Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
01-16-2021 15:03:03: ERROR: Should get unauthorized response.
01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
01-16-2021 15:03:03: ERROR: Exception at:
01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
01-16-2021 15:03:03: cleanup
STATUS:Failed.Test case throws exception: testAutoApplySession failed:
result: Failed. Test case throws exception: testAutoApplySession failed:
test result: Failed. Test case throws exception: testAutoApplySession failed:
{quote}
was:I need to run the tests again but wanted to create the issue now so I don't forget.
> securityapi has 84 TCK test failures with Web Profile configuration
> -------------------------------------------------------------------
>
> Key: WFLY-14299
> URL: https://issues.redhat.com/browse/WFLY-14299
> Project: WildFly
> Issue Type: Sub-task
> Components: Security
> Reporter: Scott Marlow
> Assignee: Scott Marlow
> Priority: Major
> Labels: EE9
> Fix For: 23.0.0.Beta1
>
>
> Here is one of the 84 test failures:
> {quote}
> test=com/sun/ts/tests/securityapi/ham/autoapplysession/Client.java\#testAutoApplySession
> 01-16-2021 15:03:00: Test setup OK
> 01-16-2021 15:03:02: setThrowExceptionOnFailingStatusCode is set to: false
> Ignoring disabled cipher suite: SSL_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
> Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> trustStore is: /mnt/hudson_workspace/customWorkspaceName/wildfly/standalone/configuration/keystores/tomcat.keystore
> trustStore type is : jks
> trustStore provider is :
> init truststore
> adding as trusted cert:
> Subject: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Issuer: CN=CTS, OU=Java Software, O=Sun Microsystems Inc., L=Burlington, ST=MA, C=US
> Algorithm: RSA; Serial number: 0x68deca39
> Valid from Mon Dec 23 01:21:39 EST 2019 until Sat Aug 13 02:21:39 EDT 2044
> adding as trusted cert:
> Subject: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Issuer: CN=Dimitris Andreadis, OU=Unknown, O=JBoss Inc., L=Athens, ST=Unknown, C=GR
> Algorithm: RSA; Serial number: 0x40e9240d
> Valid from Mon Jul 05 05:49:01 EDT 2004 until Thu Jul 03 05:49:01 EDT 2014
> adding as trusted cert:
> Subject: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Issuer: CN=S1AS, OU=Sun Java System, O=Sun Microsystems, L=Santa Clara, ST=California, C=US
> Algorithm: RSA; Serial number: 0x401ed588
> Valid from Mon Feb 02 17:56:08 EST 2004 until Sun Feb 02 17:56:08 EST 2014
> trigger seeding of SecureRandom
> done seeding SecureRandom
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: statusCode=[404] contentType=[text/html]
> Jan 16, 2021 3:03:02 PM com.gargoylesoftware.htmlunit.WebClient printContentIfNecessary
> INFO: <html><head><title>Error</title></head><body>404 - Not Found</body></html>
> com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: ERROR: Should get unauthorized response.
> 01-16-2021 15:03:03: ERROR: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Caught exception: testAutoApplySession failed.
> 01-16-2021 15:03:03: ERROR: Test case throws exception: testAutoApplySession failed:
> 01-16-2021 15:03:03: ERROR: Exception at:
> 01-16-2021 15:03:03: ERROR: com.sun.ts.lib.harness.EETest$Fault: testAutoApplySession failed.
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.testAutoApplySession(Client.java:89)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> at java.lang.reflect.Method.invoke(Method.java:498)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
> at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
> at com.sun.ts.lib.harness.EETest.run(EETest.java:337)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.run(Client.java:58)
> at com.sun.ts.tests.securityapi.ham.autoapplysession.Client.main(Client.java:48)
> 01-16-2021 15:03:03: cleanup
> STATUS:Failed.Test case throws exception: testAutoApplySession failed:
> result: Failed. Test case throws exception: testAutoApplySession failed:
> test result: Failed. Test case throws exception: testAutoApplySession failed:
> {quote}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 3 months