[Red Hat JIRA] (WFWIP-373) :resolve-expression does not resolve encrypted expressions
by Brian Stansberry (Jira)
[ https://issues.redhat.com/browse/WFWIP-373?page=com.atlassian.jira.plugin... ]
Brian Stansberry edited comment on WFWIP-373 at 2/19/21 1:42 PM:
-----------------------------------------------------------------
[~dlofthouse] Not resolving is not a bug. It is by design. We should not support resolving via a management API call, and the resolve-expressions op is specifically meant to not do that.
If the credential-store handling is different from vault (e.g. the weird result" => ":RUxZAUMQHrI7PMuvU+0pJ9EgITJmFPWa9iIb5yZ6i9K3mtgnY2kLo3AIL4d/GIeo7GKzSkXB") then that is something to fix for this RFE.
If vault behaves the same way, then it's a general, low-priority, bug to not do the weird stripping of the vault equivalent of ENC:
Simply returning the unresolved expression is IMHO ok. IIRC that is what we decided to do, with due consideration first. Doing something else would be an enhancement.
was (Author: brian.stansberry):
[~dlofthouse] Note resolving is not a bug. It is by design. We should not support resolving via a management API call, and the resolve-expressions op is specifically meant to not do that.
If the credential-store handling is different from vault (e.g. the weird result" => ":RUxZAUMQHrI7PMuvU+0pJ9EgITJmFPWa9iIb5yZ6i9K3mtgnY2kLo3AIL4d/GIeo7GKzSkXB") then that is something to fix for this RFE.
If vault behaves the same way, then it's a general, low-priority, bug to not do the weird stripping of the vault equivalent of ENC:
Simply returning the unresolved expression is IMHO ok. IIRC that is what we decided to do, with due consideration first. Doing something else would be an enhancement.
> :resolve-expression does not resolve encrypted expressions
> ----------------------------------------------------------
>
> Key: WFWIP-373
> URL: https://issues.redhat.com/browse/WFWIP-373
> Project: WildFly WIP
> Issue Type: Bug
> Components: Security
> Reporter: Ondrej Kotek
> Assignee: Darran Lofthouse
> Priority: Major
>
> The {{:resolve-expression}} operation does not resolve encrypted expressions.
> {noformat}
> [standalone@localhost:9990 /] /subsystem=elytron/expression=encryption:read-resource
> {
> "outcome" => "success",
> "result" => {
> "default-resolver" => "Default",
> "prefix" => "ENC",
> "resolvers" => [
> {
> "name" => "Default",
> "credential-store" => "credentialstorethree",
> "secret-key" => "secretkey"
> },
> {
> "name" => "resolver2",
> "credential-store" => "credentialstorethree",
> "secret-key" => "secretkey2"
> }
> ]
> }
> }
> [standalone@localhost:9990 /] /subsystem=elytron/expression=encryption:create-expression(clear-text=CredentialStoreTwoPassword)
> {
> "outcome" => "success",
> "result" => {"expression" => "${ENC::RUxZAUMQHrI7PMuvU+0pJ9EgITJmFPWa9iIb5yZ6i9K3mtgnY2kLo3AIL4d/GIeo7GKzSkXB}"}
> }
> [standalone@localhost:9990 /] :resolve-expression(expression="${ENC::RUxZAUMQHrI7PMuvU+0pJ9EgITJmFPWa9iIb5yZ6i9K3mtgnY2kLo3AIL4d/GIeo7GKzSkXB}")
> {
> "outcome" => "success",
> "result" => ":RUxZAUMQHrI7PMuvU+0pJ9EgITJmFPWa9iIb5yZ6i9K3mtgnY2kLo3AIL4d/GIeo7GKzSkXB"
> }
> {noformat}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 1 month
[Red Hat JIRA] (WFLY-14107) EJBInvocationStatistics TestCase Failures
by Cheng Fang (Jira)
[ https://issues.redhat.com/browse/WFLY-14107?page=com.atlassian.jira.plugi... ]
Cheng Fang commented on WFLY-14107:
-----------------------------------
this test has a pass rate of 99.9% (as of 2021-02-19), with 1 failure out of 1588 recent runs. So it has improved after the fixed made last time ( WFLY-10173), but the intermittent failure still exists. I suggest we igore this test.
> EJBInvocationStatistics TestCase Failures
> -----------------------------------------
>
> Key: WFLY-14107
> URL: https://issues.redhat.com/browse/WFLY-14107
> Project: WildFly
> Issue Type: Bug
> Components: EJB, Test Suite
> Reporter: Darran Lofthouse
> Assignee: Cheng Fang
> Priority: Major
>
> I have been seeing test failures running this test locally quite often:
> {code:java}
> [ERROR] Failures:
> [ERROR] EjbInvocationStatisticsTestCase.testSingletonWaitTime:147->validateWaitTimeStatistic:175 Expecting wait-time attribute value > 0, but got {
> "async-methods" => undefined,
> "business-local" => undefined,
> "business-remote" => ["org.jboss.as.test.integration.ejb.management.deployments.BusinessInterface"],
> "component-class-name" => "org.jboss.as.test.integration.ejb.management.deployments.WaitTimeSingletonBean",
> "concurrency-management-type" => undefined,
> "declared-roles" => [],
> "depends-on" => undefined,
> "execution-time" => 2L,
> "init-on-startup" => false,
> "invocations" => 4L,
> "jndi-names" => [
> "java:app/ejb-management/WaitTimeSingletonBean!org.jboss.as.test.integration.ejb.management.deployments.BusinessInterface",
> "java:module/WaitTimeSingletonBean!org.jboss.as.test.integration.ejb.management.deployments.BusinessInterface",
> "java:global/ejb-management/WaitTimeSingletonBean",
> "java:app/ejb-management/WaitTimeSingletonBean",
> "java:global/ejb-management/WaitTimeSingletonBean!org.jboss.as.test.integration.ejb.management.deployments.BusinessInterface",
> "java:module/WaitTimeSingletonBean"
> ],
> "methods" => {
> "doIt" => {
> "execution-time" => 2L,
> "invocations" => 3L,
> "wait-time" => 0L
> },
> "remove" => {
> "execution-time" => 0L,
> "invocations" => 1L,
> "wait-time" => 0L
> }
> },
> "peak-concurrent-invocations" => 1L,
> "run-as-role" => undefined,
> "security-domain" => "other",
> "timeout-method" => "private void org.jboss.as.test.integration.ejb.management.deployments.WaitTimeSingletonBean.timeout(javax.ejb.Timer)",
> "timers" => [],
> "transaction-type" => "BEAN",
> "wait-time" => 0L,
> "service" => {"timer-service" => undefined}
> } {code}
> My desktop PC is quite fast so I don't know if this means invocations are passing faster than the test expects.
>
>
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 1 month
[Red Hat JIRA] (WFWIP-379) secret-key-creadential-store reload results in an error
by Ondrej Kotek (Jira)
Ondrej Kotek created WFWIP-379:
----------------------------------
Summary: secret-key-creadential-store reload results in an error
Key: WFWIP-379
URL: https://issues.redhat.com/browse/WFWIP-379
Project: WildFly WIP
Issue Type: Bug
Components: Security
Reporter: Ondrej Kotek
Assignee: Darran Lofthouse
The {[reload}} operation of the {{secret-key-creadential-store}} resource results in an error
{noformat}
[domain@localhost:9990 /] /subsystem=elytron/secret-key-credential-store=a:add(path=ax)
{"outcome" => "success"}
[domain@localhost:9990 /] /subsystem=elytron/secret-key-credential-store=a:read-aliases
{
"outcome" => "success",
"result" => ["key"]
}
[domain@localhost:9990 /] /subsystem=elytron/secret-key-credential-store=a:reload
{
"outcome" => "failed",
"failure-description" => "WFLYCTL0158: Operation handler failed: java.lang.ClassCastException: class org.wildfly.extension.elytron.SecretKeyCredentialStoreDefinition$SecretKeyDoohickey cannot be cast to clas
s org.wildfly.extension.elytron.CredentialStoreResourceDefinition$CredentialStoreDoohickey (org.wildfly.extension.elytron.SecretKeyCredentialStoreDefinition$SecretKeyDoohickey and org.wildfly.extension.elytron.C
redentialStoreResourceDefinition$CredentialStoreDoohickey are in unnamed module of loader 'org.wildfly.extension.elytron(a)15.0.0.Beta1-SNAPSHOT' @50dfce09)",
"rolled-back" => true
}
{noformat}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 1 month
[Red Hat JIRA] (WFCORE-4827) Errors Missing on Invalid Configuration
by Bartosz Spyrko-Smietanko (Jira)
[ https://issues.redhat.com/browse/WFCORE-4827?page=com.atlassian.jira.plug... ]
Bartosz Spyrko-Smietanko commented on WFCORE-4827:
--------------------------------------------------
I found there's one more problem - as soon as the FAILURE_DESCRIPTION is set in the first failing ServiceVerificationHelper, the rollback flag will be set in [https://github.com/wildfly/wildfly-core/blob/master/controller/src/main/j... will prevent any further ServiceVerificationHelpers from running.
Maybe in this case SVH could attach something like DEFERED_ROLLBACK flag to the context and if it's present, canContinueProcessing() would allow the VERIFY stage to finish?
> Errors Missing on Invalid Configuration
> ---------------------------------------
>
> Key: WFCORE-4827
> URL: https://issues.redhat.com/browse/WFCORE-4827
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Affects Versions: 11.0.0.Beta7
> Reporter: Darran Lofthouse
> Assignee: Richard Opalka
> Priority: Critical
> Labels: domain-mode
>
> [~ropalka] I believe this is caused by the MSC refactoring.
> Steps, in the default host.xml for domain mode.
> 1. Define the following security realm: -
> {noformat}
> <security-realms>
> <security-realm name="ldap_security_realm">
> <server-identities>
> <ssl>
> <keystore path="generated.keystore" relative-to="jboss.server.config.dir" keystore-password="password" alias="server" key-password="password" generate-self-signed-certificate-host="localhost"/>
> </ssl>
> </server-identities>
> <authentication>
> <ldap connection="testLdap" base-dn="dc=test,dc=sbc,dc=com" recursive="true">
> <username-filter attribute="samaccountname"/>
> </ldap>
> </authentication>
> </security-realm>
> {noformat}
> 2. Define the following outbound connection: -
> {noformat}
> <outbound-connections>
> <ldap name="testLdap" url="ldap://localhost:636" search-dn="CN=mxxxxxx,OU=GenericID,OU=testUsers,DC=testServices,DC=test,DC=com" search-credential="passowrd" />
> </outbound-connections>
> {noformat}
> 3. Update the management interfaces to: -
> {noformat}
> <management-interfaces>
> <http-interface security-realm="ldap_security_realm">
> <http-upgrade enabled="true"/>
> <socket interface="management" port="${jboss.management.http.port:9990}"/>
> </http-interface>
> </management-interfaces>
> {noformat}
> The server fails to boot with just the following error: -
> {noformat}
> [Host Controller] 17:56:40,052 FATAL [org.jboss.as.host.controller] (Controller Boot Thread) WFLYHC0034: Host Controller boot has failed in an unrecoverable manner; exiting. See previous messages for details.
> {noformat}
> If the management interface is then updated to reference the ManagementRealm instead the error is now: -
> {noformat}
> [Host Controller] 18:01:48,595 ERROR [org.jboss.as.controller.management-operation] (Controller Boot Thread) WFLYCTL0013: Operation ("add") failed - address: ([
> [Host Controller] ("host" => "master"),
> [Host Controller] ("core-service" => "management"),
> [Host Controller] ("security-realm" => "ldap_security_realm")
> [Host Controller] ]) - failure description: {
> [Host Controller] "WFLYCTL0412: Required services that are not installed:" => ["jboss.server.path.\"jboss.server.config.dir\""],
> [Host Controller] "WFLYCTL0180: Services with missing/unavailable dependencies" => ["org.wildfly.core.management.security.realm.ldap_security_realm.key-manager is missing [jboss.server.path.\"jboss.server.config.dir\"]"]
> [Host Controller] }
> {noformat}
> This error is expected as the realm defined in step 1 referenced an invalid path.
> I believe the error reporting should come from this method: -
> org.jboss.as.controller.ServiceVerificationHelper.execute(OperationContext, ModelNode)
> However something seems to have changes with the MSC migration.
> This was recently encountered debugging the bug report in https://issues.redhat.com/browse/WFCORE-4820, if you see an error "Multiple CallbackHandlerServices for the same mechanism (PLAIN)" that has been covered by WFCORE-4820.
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
5 years, 1 month