[JBoss JIRA] (JBWS-3748) Wildfly 8 ws-security client throws exception
by Joseph Hwang (JIRA)
[ https://issues.jboss.org/browse/JBWS-3748?page=com.atlassian.jira.plugin.... ]
Joseph Hwang edited comment on JBWS-3748 at 1/7/14 8:55 PM:
------------------------------------------------------------
Thank you for your reply, Alessio!
The classpath of client libraries is ok. As mentioned above, client function returns right value when the project is deployed in JBoss EAP 6.1.1, not only in WIldFly 8.0. Pls, check it.
was (Author: aupres):
Thank you for your reply, Alessio!
The classpath of client libraries is ok. As mentioned above, client function returns right value when the project is deployed in JBoss EAP 6.1.1, only in WIldFly 8.0. Pls, check it.
> Wildfly 8 ws-security client throws exception
> ---------------------------------------------
>
> Key: JBWS-3748
> URL: https://issues.jboss.org/browse/JBWS-3748
> Project: JBoss Web Services
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Components: ws-security
> Reporter: Joseph Hwang
> Attachments: WSSHelloWorld.zip
>
>
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
11 years, 2 months
[JBoss JIRA] (JBWS-3748) Wildfly 8 ws-security client throws exception
by Alessio Soldano (JIRA)
[ https://issues.jboss.org/browse/JBWS-3748?page=com.atlassian.jira.plugin.... ]
Alessio Soldano commented on JBWS-3748:
---------------------------------------
Hi Joseph,
before I have a deep look at this and at the attachment, please make sure the JBossWS / CXF client libs are actually used by your client. The exception message you pasted above is from the JAXWS RI (most likely from the current JDK), as you can see from the mentioned packages (com.sun.xml.internal.ws.policy.*)
So the SecurityConstants.* stuff in the request context is not actually being considered, as the JBossWS / CXF stack is not being used.
Please check the classpath / endorsed dirs.
> Wildfly 8 ws-security client throws exception
> ---------------------------------------------
>
> Key: JBWS-3748
> URL: https://issues.jboss.org/browse/JBWS-3748
> Project: JBoss Web Services
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Components: ws-security
> Reporter: Joseph Hwang
> Attachments: WSSHelloWorld.zip
>
>
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
11 years, 2 months
[JBoss JIRA] (JBWS-3738) Expand WS-Trust / STS test coverage and documentation
by R Searls (JIRA)
[ https://issues.jboss.org/browse/JBWS-3738?page=com.atlassian.jira.plugin.... ]
R Searls commented on JBWS-3738:
--------------------------------
Proposed set of tests.
It is recommended that tests be provided to confirm that the optional settings and priority of ref is handled properly for these security constants.
/**
* The user's name. It is used differently by each of the WS-Security functions:
* a) It is used as the name in the UsernameToken
* b) It is used as the alias name in the keystore to get the user's cert and private key for signature
* if {@link SIGNATURE_USERNAME} is not set.
* c) It is used as the alias name in the keystore to get the user's public key for encryption if
* {@link ENCRYPT_USERNAME} is not set.
*/
public static final String USERNAME = "ws-security.username";
/**
* The user's password when a {@link CALLBACK_HANDLER} is not defined. It is currently only used for
* the case of adding a password to a UsernameToken.
*/
public static final String PASSWORD = "ws-security.password";
/**
* The user's name for signature. It is used as the alias name in the keystore to get the user's cert
* and private key for signature.
- If this is not defined, then {@link USERNAME} is used instead.
- If that is also not specified, it uses the the default alias set in the properties file referenced by
{@link SIGNATURE_PROPERTIES}.
- If that's also not set, and the keystore only contains a single key,
that key will be used.
*/
public static final String SIGNATURE_USERNAME = "ws-security.signature.username";
/**
* The user's name for encryption. It is used as the alias name in the keystore to get the user's public
* key for encryption. If this is not defined, then {@link USERNAME} is used instead. If
* that is also not specified, it uses the the default alias set in the properties file referenced by
* {@link ENCRYPT_PROPERTIES}. If that's also not set, and the keystore only contains a single key,
* that key will be used.
*
* For the web service provider, the "useReqSigCert" keyword can be used to accept (encrypt to) any
* client whose public key is in the service's truststore (defined in {@link ENCRYPT_PROPERTIES}).
*/
public static final String ENCRYPT_USERNAME = "ws-security.encryption.username";
provide test for each
- public static final String CALLBACK_HANDLER = "ws-security.callback-handler";
- public static final String SAML_CALLBACK_HANDLER = "ws-security.saml-callback-handler";
/**
* The Crypto property configuration to use for signature, if {@link SIGNATURE_CRYPTO} is not set instead.
* The value of this tag must be either:
* a) A Java Properties object that contains the Crypto configuration.
* b) The path of the Crypto property file that contains the Crypto configuration.
* c) A URL that points to the Crypto property file that contains the Crypto configuration.
*/
public static final String SIGNATURE_PROPERTIES = "ws-security.signature.properties";
/**
* The Crypto property configuration to use for encryption, if {@link ENCRYPT_CRYPTO} is not set instead.
* The value of this tag must be either:
* a) A Java Properties object that contains the Crypto configuration.
* b) The path of the Crypto property file that contains the Crypto configuration.
* c) A URL that points to the Crypto property file that contains the Crypto configuration.
*/
public static final String ENCRYPT_PROPERTIES = "ws-security.encryption.properties";
/**
* A Crypto object to be used for signature. If this is not defined then the
* {@link SIGNATURE_PROPERTIES} is used instead.
*/
public static final String SIGNATURE_CRYPTO = "ws-security.signature.crypto";
/**
* A Crypto object to be used for encryption. If this is not defined then the
* {@link ENCRYPT_PROPERTIES} is used instead.
*/
public static final String ENCRYPT_CRYPTO = "ws-security.encryption.crypto";
/**
* Whether to enable Certificate Revocation List (CRL) checking or not when verifying trust
* in a certificate. The default value is "false".
*/
public static final String ENABLE_REVOCATION = "ws-security.enableRevocation";
/**
* The Subject Role Classifier to use. If one of the WSS4J Validators returns a JAAS Subject
* from Validation, then the WSS4JInInterceptor will attempt to create a SecurityContext
* based on this Subject. If this value is not specified, then it tries to get roles using
* the DefaultSecurityContext in cxf-rt-core. Otherwise it uses this value in combination
* with the SUBJECT_ROLE_CLASSIFIER_TYPE to get the roles from the Subject.
*/
public static final String SUBJECT_ROLE_CLASSIFIER = "ws-security.role.classifier";
/**
* The Crypto property configuration to use for the STS, if {@link STS_TOKEN_CRYPTO} is not
* set instead.
* The value of this tag must be either:
* a) A Java Properties object that contains the Crypto configuration.
* b) The path of the Crypto property file that contains the Crypto configuration.
* c) A URL that points to the Crypto property file that contains the Crypto configuration.
*/
public static final String STS_TOKEN_PROPERTIES = "ws-security.sts.token.properties";
/**
* The token to be sent to the STS in an "ActAs" field. It can be either:
* a) A String
* b) A DOM Element
* c) A CallbackHandler object to use to obtain the token
*/
public static final String STS_TOKEN_ACT_AS = "ws-security.sts.token.act-as";
/**
* The token to be sent to the STS in an "OnBehalfOf" field. It can be either:
* a) A String
* b) A DOM Element
* c) A CallbackHandler object to use to obtain the token
*/
public static final String STS_TOKEN_ON_BEHALF_OF = "ws-security.sts.token.on-behalf-of";
> Expand WS-Trust / STS test coverage and documentation
> -----------------------------------------------------
>
> Key: JBWS-3738
> URL: https://issues.jboss.org/browse/JBWS-3738
> Project: JBoss Web Services
> Issue Type: Enhancement
> Security Level: Public(Everyone can see)
> Components: jbossws-cxf
> Reporter: Alessio Soldano
> Assignee: R Searls
> Fix For: jbossws-cxf-4.3
>
>
> We should possibly cover more WS-Trust/STS scenarios in the testsuite (different SAML tokens, etc.) and expand the documentation accordingly.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
11 years, 2 months
[JBoss JIRA] (JBWS-3748) Wildfly 8 ws-security client throws exception
by Joseph Hwang (JIRA)
[ https://issues.jboss.org/browse/JBWS-3748?page=com.atlassian.jira.plugin.... ]
Joseph Hwang edited comment on JBWS-3748 at 1/1/14 11:31 PM:
-------------------------------------------------------------
I try to implement WS-Security with WildFly 8 JBossWS libraries files. My reference site is https://docs.jboss.org/author/display/JBWS/WS-Security#WS-Security-Authen.... My developemnt ide is eclipse kepler with JBossTools for kepler. But client function throws exception.
This is @PolicySets annotation and @EndpointConfig annotation of Service Endpoint Interface and Service Bean Class.
@WebService(targetNamespace = "http://www.aaa.com/jbossws/ws-extensions/wssecurity")
@PolicySets({"WS-SP-EX223_WSS11_Anonymous_X509_Sign_Encrypt"})
public interface IHelloWorld {
@WebMethod
@WebResult
public String sayHello(@WebParam String name);
}
======
import org.jboss.ws.api.annotation.EndpointConfig;
@WebService(
portName = "HelloWorldServicePort",
serviceName = "HelloWorldService",
targetNamespace = "http://www.aaa.com/jbossws/ws-extensions/wssecurity",
endpointInterface = "com.aaa.wss.IHelloWorld"
)
@EndpointConfig(configFile = "WEB-INF/jaxws-endpoint-config.xml", configName = "Custom WS-Security Endpoint")
public class HelloWorld implements IHelloWorld {
@Override
public String sayHello(String name) {
// TODO Auto-generated method stub
return "Hello " + name;
}
}
The contents of jaxws-endpoint-config.xml are like below:
<jaxws-config xmlns="urn:jboss:jbossws-jaxws-config:4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:javaee="http://java.sun.com/xml/ns/javaee"
xsi:schemaLocation="urn:jboss:jbossws-jaxws-config:4.0 schema/jbossws-jaxws-config_4_0.xsd">
<endpoint-config>
<config-name>Custom WS-Security Endpoint</config-name>
<property>
<property-name>ws-security.signature.properties</property-name>
<property-value>META-INF/server.properties</property-value>
</property>
<property>
<property-name>ws-security.encryption.properties</property-name>
<property-value>META-INF/server.properties</property-value>
</property>
<property>
<property-name>ws-security.signature.username</property-name>
<property-value>server</property-value>
</property>
<property>
<property-name>ws-security.encryption.username</property-name>
<property-value>client</property-value>
</property>
<property>
<property-name>ws-security.callback-handler</property-name>
<property-value>com.aaa.wss.KeystorePasswordCallback</property-value>
</property>
</endpoint-config>
</jaxws-config>
Deployment is successful. And Below is client code.
public class WSSClient {
private final String serviceURL="http://localhost:8080/WSSHelloWorld/HelloWorld";
private IHelloWorld proxy;
public WSSClient() throws IOException {
QName serviceName = new QName("http://www.aaa.com/jbossws/ws-extensions/wssecurity", "HelloWorldService");
URL wsdlURL = new URL(serviceURL + "?wsdl");
Service service = Service.create(wsdlURL, serviceName);
proxy = (IHelloWorld)service.getPort(IHelloWorld.class);
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback());
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, Thread.currentThread().getContextClassLoader().getResource("META-INF/client.properties"));
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, Thread.currentThread().getContextClassLoader().getResource("META-INF/client.properties"));
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.SIGNATURE_USERNAME, "client");
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.ENCRYPT_USERNAME, "server");
} // the constructor throws no exception.
public String callMethd(String name) {
return proxy.sayHello(name); // this method throws exception
}
public static void main(String[] args) throws Exception {
WSClient tc= new WSClient();
String result=tc.callMethd("Joseph");
System.out.println(result);
}
}
But the client function throws following exception.
ct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SymmetricBinding" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}Wss11" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}EncryptedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SignedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}EncryptedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SignedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Exception in thread "main" javax.xml.ws.soap.SOAPFaultException: com.aaa.ws.KeystorePasswordCallback from [Module "org.apache.cxf.impl:main" from local module loader @562ca0db (finder: local module finder @bf4b610 (roots: /home/jooho/Applications/JBoss/EAP/wildfly-8.0.0.Alpha4/modules,/home/jooho/Applications/JBoss/EAP/wildfly-8.0.0.Alpha4/modules/system/layers/base))]
at com.sun.xml.internal.ws.fault.SOAP11Fault.getProtocolException(SOAP11Fault.java:178)
at com.sun.xml.internal.ws.fault.SOAPFaultBuilder.createException(SOAPFaultBuilder.java:111)
at com.sun.xml.internal.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:108)
at com.sun.xml.internal.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:78)
at com.sun.xml.internal.ws.client.sei.SEIStub.invoke(SEIStub.java:129)
at com.sun.proxy.$Proxy23.sayHello(Unknown Source)
at test.WSClient.callMethd(WSClient.java:53)
at test.WSClient.main(WSClient.java:60)
However, the end function of this project throws no exception and returns good result value with Eclipse kepler ,JBoss tool for kepler and JBoss EAP 6.1.1.
I attach project zip file for your convenience.
was (Author: aupres):
I try to implement WS-Security with WildFly 8 JBossWS libraries files. My reference site is https://docs.jboss.org/author/display/JBWS/WS-Security#WS-Security-Authen.... My developemnt ide is eclipse kepler with JBossTools for kepler. But client function throws exception.
This is @PolicySets annotation and @EndpointConfig annotation of Service Endpoint Interface and Service Bean Class.
@WebService(targetNamespace = "http://www.aaa.com/jbossws/ws-extensions/wssecurity")
@PolicySets({"WS-SP-EX223_WSS11_Anonymous_X509_Sign_Encrypt"})
public interface IHelloWorld {
@WebMethod
@WebResult
public String sayHello(@WebParam String name);
}
======
import org.jboss.ws.api.annotation.EndpointConfig;
@WebService(
portName = "HelloWorldServicePort",
serviceName = "HelloWorldService",
targetNamespace = "http://www.aaa.com/jbossws/ws-extensions/wssecurity",
endpointInterface = "com.aaa.wss.IHelloWorld"
)
@EndpointConfig(configFile = "WEB-INF/jaxws-endpoint-config.xml", configName = "Custom WS-Security Endpoint")
public class HelloWorld implements IHelloWorld {
@Override
public String sayHello(String name) {
// TODO Auto-generated method stub
return "Hello " + name;
}
}
The contents of jaxws-endpoint-config.xml are like below:
<jaxws-config xmlns="urn:jboss:jbossws-jaxws-config:4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:javaee="http://java.sun.com/xml/ns/javaee"
xsi:schemaLocation="urn:jboss:jbossws-jaxws-config:4.0 schema/jbossws-jaxws-config_4_0.xsd">
<endpoint-config>
<config-name>Custom WS-Security Endpoint</config-name>
<property>
<property-name>ws-security.signature.properties</property-name>
<property-value>META-INF/server.properties</property-value>
</property>
<property>
<property-name>ws-security.encryption.properties</property-name>
<property-value>META-INF/server.properties</property-value>
</property>
<property>
<property-name>ws-security.signature.username</property-name>
<property-value>server</property-value>
</property>
<property>
<property-name>ws-security.encryption.username</property-name>
<property-value>client</property-value>
</property>
<property>
<property-name>ws-security.callback-handler</property-name>
<property-value>com.aaa.wss.KeystorePasswordCallback</property-value>
</property>
</endpoint-config>
</jaxws-config>
Deployment is successful. And Below is client code.
public class WSSClient {
private final String serviceURL="http://localhost:8080/WSSHelloWorld/HelloWorld";
private IHelloWorld proxy;
public WSSClient() throws IOException {
QName serviceName = new QName("http://www.aaa.com/jbossws/ws-extensions/wssecurity", "HelloWorldService");
URL wsdlURL = new URL(serviceURL + "?wsdl");
Service service = Service.create(wsdlURL, serviceName);
proxy = (IHelloWorld)service.getPort(IHelloWorld.class);
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback());
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, Thread.currentThread().getContextClassLoader().getResource("META-INF/client.properties"));
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, Thread.currentThread().getContextClassLoader().getResource("META-INF/client.properties"));
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.SIGNATURE_USERNAME, "client");
((BindingProvider)proxy).getRequestContext().put(SecurityConstants.ENCRYPT_USERNAME, "server");
} // the constructor throws no exception.
public String callMethd(String name) {
return proxy.sayHello(name); // this method throws exception
}
public static void main(String[] args) throws Exception {
WSClient tc= new WSClient();
String result=tc.callMethd("Joseph");
System.out.println(result);
}
}
But the client function throws following exception.
ct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SymmetricBinding" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}Wss11" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}EncryptedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SignedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}EncryptedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0075: Policy assertion "{http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SignedParts" was evaluated as "UNKNOWN".
Oct 24, 2013 3:54:49 PM [com.sun.xml.internal.ws.policy.EffectiveAlternativeSelector] selectAlternatives
WARNING: WSP0019: Suboptimal policy alternative selected on the client side with fitness "UNKNOWN".
Exception in thread "main" javax.xml.ws.soap.SOAPFaultException: com.aaa.ws.KeystorePasswordCallback from [Module "org.apache.cxf.impl:main" from local module loader @562ca0db (finder: local module finder @bf4b610 (roots: /home/jooho/Applications/JBoss/EAP/wildfly-8.0.0.Alpha4/modules,/home/jooho/Applications/JBoss/EAP/wildfly-8.0.0.Alpha4/modules/system/layers/base))]
at com.sun.xml.internal.ws.fault.SOAP11Fault.getProtocolException(SOAP11Fault.java:178)
at com.sun.xml.internal.ws.fault.SOAPFaultBuilder.createException(SOAPFaultBuilder.java:111)
at com.sun.xml.internal.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:108)
at com.sun.xml.internal.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:78)
at com.sun.xml.internal.ws.client.sei.SEIStub.invoke(SEIStub.java:129)
at com.sun.proxy.$Proxy23.sayHello(Unknown Source)
at test.WSClient.callMethd(WSClient.java:53)
at test.WSClient.main(WSClient.java:60)
However, the end function of this project throws no exception and returns good result value with Eclipse kepler ,JBoss tool for kepler and JBoss EAP 6.1.1.
I attach project zip file for your convenience.
> Wildfly 8 ws-security client throws exception
> ---------------------------------------------
>
> Key: JBWS-3748
> URL: https://issues.jboss.org/browse/JBWS-3748
> Project: JBoss Web Services
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Components: ws-security
> Reporter: Joseph Hwang
> Attachments: WSSHelloWorld.zip
>
>
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
11 years, 2 months