[
https://issues.jboss.org/browse/WFLY-9185?page=com.atlassian.jira.plugin....
]
David Lloyd reopened WFLY-9185:
-------------------------------
It looks like maybe this one isn't solved after all. See
https://ci.wildfly.org/viewLog.html?buildId=96925&tab=buildResultsDiv...
recent CI build].
The permission clause seems right to me though; I wonder if maybe the system property
changed or something?
Authentication mechanisms failed for some tests with security
manager
---------------------------------------------------------------------
Key: WFLY-9185
URL:
https://issues.jboss.org/browse/WFLY-9185
Project: WildFly
Issue Type: Bug
Components: Test Suite
Reporter: Hynek Švábek
Assignee: Martin Stefanko
Labels: security-manager
Fix For: 11.0.0.CR1
Authentication mechanisms failed for some tests with security manager
same for some other tests:
* NestedRemoteContextTestCase
* RebindTestCase
* WebSuspendTestCase
{code}
Caused by: javax.security.sasl.SaslException: Authentication failed: all available
authentication mechanisms failed:
JBOSS-LOCAL-USER: java.security.AccessControlException: WFSM000001: Permission check
failed (permission "("java.io.FilePermission"
"/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local8043870012544300330.challenge"
"read")" in code source "(vfs:/content/ejb.ear/web.war/WEB-INF/classes
<no signer certificates>)" of "ModuleClassLoader for Module
"deployment.ejb.ear.web.war" from Service Module Loader")
at
org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
at
org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
at
org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
at
org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
at ...asynchronous invocation...(Unknown Source)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
at
org.wildfly.naming.client.remote.SingleRemoteNamingProvider.lambda$new$0(SingleRemoteNamingProvider.java:82)
at java.security.AccessController.doPrivileged(Native Method)
at
org.wildfly.naming.client.remote.SingleRemoteNamingProvider.getFuturePeerIdentity(SingleRemoteNamingProvider.java:117)
at
org.wildfly.naming.client.remote.SingleRemoteNamingProvider.getPeerIdentity(SingleRemoteNamingProvider.java:106)
at
org.wildfly.naming.client.remote.RemoteNamingProvider.getPeerIdentityForNaming(RemoteNamingProvider.java:65)
... 51 more
Suppressed: java.security.AccessControlException: WFSM000001: Permission check
failed (permission "("java.io.FilePermission"
"/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local8043870012544300330.challenge"
"read")" in code source "(vfs:/content/ejb.ear/web.war/WEB-INF/classes
<no signer certificates>)" of "ModuleClassLoader for Module
"deployment.ejb.ear.web.war" from Service Module Loader")
at
org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:278)
at
org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:175)
at java.lang.SecurityManager.checkRead(SecurityManager.java:888)
at
org.wildfly.security.manager.WildFlySecurityManager.checkRead(WildFlySecurityManager.java:350)
at
java.io.FileInputStream.<init>(FileInputStream.java:127)
at
org.wildfly.security.sasl.localuser.LocalUserClient.evaluateMessage(LocalUserClient.java:93)
at
org.wildfly.security.sasl.util.AbstractSaslParticipant.evaluateMessage(AbstractSaslParticipant.java:180)
at
org.wildfly.security.sasl.util.AbstractSaslClient.evaluateChallenge(AbstractSaslClient.java:59)
at
org.wildfly.security.sasl.util.AbstractDelegatingSaslClient.evaluateChallenge(AbstractDelegatingSaslClient.java:54)
at
org.wildfly.security.sasl.util.PrivilegedSaslClient.lambda$evaluateChallenge$0(PrivilegedSaslClient.java:55)
at java.security.AccessController.doPrivileged(Native Method)
at
org.wildfly.security.sasl.util.PrivilegedSaslClient.evaluateChallenge(PrivilegedSaslClient.java:55)
at
org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.lambda$handleEvent$0(ClientConnectionOpenListener.java:644)
at
org.jboss.remoting3.EndpointImpl$TrackingExecutor.lambda$execute$0(EndpointImpl.java:898)
... 3 more
...
{code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)