]
Darran Lofthouse commented on WFLY-11123:
-----------------------------------------
The implementation does also 'fail safe' is the method is not accessible to
identify if FIPS mode has been enabled it falls back to assuming it has not been enabled.
Illegal reflective access by
org.wildfly.extension.elytron.SSLDefinitions
-------------------------------------------------------------------------
Key: WFLY-11123
URL:
https://issues.jboss.org/browse/WFLY-11123
Project: WildFly
Issue Type: Bug
Components: Security
Affects Versions: 14.0.1.Final
Environment: Windows 7 x64. Java 11: OpenJDK 64-Bit Server VM AdoptOpenJDK (build
11+28-201810022317, mixed mode)
Reporter: Marco Del Percio
Assignee: Darran Lofthouse
Priority: Critical
Labels: Java11, access, elytron, illegal, reflective, wildfly
After configuring HTTPS using the following guide: [Enable One-way SSL/TLS for
Applications|http://docs.wildfly.org/14/WildFly_Elytron_Security.html#con...],
configuration seems ok and server boots fine however an illegal reflective access warning
comes up from jar within Elytron:
{color:red}
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by org.wildfly.extension.elytron.SSLDefinitions
(jar:file:/D:/wildfly-14.0.1.Final_FleetManager/modules/system/layers/base/org/wildfly/extension/elytron/main/wildfly-elytron-integration-6.0.2.Final.jar!/)
to method com.sun.net.ssl.internal.ssl.Provider.isFIPS()
WARNING: Please consider reporting this to the maintainers of
org.wildfly.extension.elytron.SSLDefinitions
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective
access operations
WARNING: All illegal access operations will be denied in a future release
{color}