[
http://jira.jboss.com/jira/browse/JBWS-1913?page=comments#action_12390816 ]
Juergen Zimmermann commented on JBWS-1913:
------------------------------------------
I'm using JBoss Tools for development and it looks like JBoss Tools didn't realize
that my JBoss directory changed. After removing the Eclipse workspace and resetting the
Eclipse preferences everything works fine.
WS-Security doesn't work any more
---------------------------------
Key: JBWS-1913
URL:
http://jira.jboss.com/jira/browse/JBWS-1913
Project: JBoss Web Services
Issue Type: Bug
Security Level: Public(Everyone can see)
Components: ws-security
Affects Versions: jbossws-2.0.2
Environment: JBossAS 4.2.2, JBossWS 2.0.2; JDK 1.6.0_03
Reporter: Juergen Zimmermann
Fix For: jbossws-2.0.2
My application works fine with JBossAS 4.2.2 and the included JBossWS 2.0.1. However,
after upgrading to JBossWS 2.0.2 I get this stacktrace:
2007-11-27 15:43:10,209 ERROR org.jboss.ws.extensions.security.WSSecurityDispatcher -
Internal error occured handling outbound message:
org.jboss.ws.extensions.security.WSSecurityException: Problems loading Keystore: Keystore
was tampered with, or password was incorrect
at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:167)
at org.jboss.ws.extensions.security.SecurityStore.loadKeyStore(SecurityStore.java:100)
at org.jboss.ws.extensions.security.SecurityStore.<init>(SecurityStore.java:90)
at
org.jboss.ws.extensions.security.WSSecurityDispatcher.handleOutbound(WSSecurityDispatcher.java:303)
at
org.jboss.ws.extensions.security.jaxws.WSSecurityHandler.handleOutboundSecurity(WSSecurityHandler.java:95)
at
org.jboss.ws.extensions.security.jaxws.WSSecurityHandlerClient.handleOutbound(WSSecurityHandlerClient.java:45)
at org.jboss.ws.core.jaxws.handler.GenericHandler.handleMessage(GenericHandler.java:55)
at
org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:295)
at
org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:140)
at
org.jboss.ws.core.jaxws.client.ClientImpl.callRequestHandlerChain(ClientImpl.java:160)
at org.jboss.ws.core.CommonClient.invoke(CommonClient.java:297)
at org.jboss.ws.core.jaxws.client.ClientImpl.invoke(ClientImpl.java:243)
at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:164)
at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:150)
at $Proxy25.getVersion(Unknown Source)
at de.hska.test.JBossWSTest.getVersion(JBossWSTest.java:130)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at org.junit.experimental.theories.runner.Function.invoke(Function.java:25)
at
org.junit.experimental.theories.runner.TheoryContainerReference.invoke(TheoryContainerReference.java:26)
at
org.junit.experimental.theories.runner.TheoryContainerReference.runWithParameters(TheoryContainerReference.java:107)
at org.junit.experimental.theories.runner.TheoryMethod.invoke(TheoryMethod.java:37)
at org.junit.internal.runners.MethodRoadie.runTestMethod(MethodRoadie.java:98)
at org.junit.internal.runners.MethodRoadie$2.run(MethodRoadie.java:79)
at
org.junit.internal.runners.MethodRoadie.runBeforesThenTestThenAfters(MethodRoadie.java:87)
at org.junit.internal.runners.MethodRoadie.runTest(MethodRoadie.java:77)
at org.junit.internal.runners.MethodRoadie.run(MethodRoadie.java:42)
at
org.junit.internal.runners.JUnit4ClassRunner.invokeTestMethod(JUnit4ClassRunner.java:88)
at org.junit.internal.runners.JUnit4ClassRunner.runMethods(JUnit4ClassRunner.java:51)
at org.junit.internal.runners.JUnit4ClassRunner$1.run(JUnit4ClassRunner.java:44)
at org.junit.internal.runners.ClassRoadie.runUnprotected(ClassRoadie.java:26)
at org.junit.internal.runners.ClassRoadie.runProtected(ClassRoadie.java:36)
at org.junit.internal.runners.JUnit4ClassRunner.run(JUnit4ClassRunner.java:42)
at junit.framework.JUnit4TestAdapter.run(JUnit4TestAdapter.java:36)
at
org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:421)
at
org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:912)
at
org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:766)
Caused by: java.io.IOException: Keystore was tampered with, or password was incorrect
at com.sun.crypto.provider.JceKeyStore.engineLoad(DashoA13*..)
at java.security.KeyStore.load(KeyStore.java:1185)
at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:155)
... 38 more
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
http://www.atlassian.com/software/jira