[jboss-jira] [JBoss JIRA] (WFLY-9161) JobControlTestCase fails with security manager

James Perkins (JIRA) issues at jboss.org
Wed Aug 2 12:22:00 EDT 2017


    [ https://issues.jboss.org/browse/WFLY-9161?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13443524#comment-13443524 ] 

James Perkins commented on WFLY-9161:
-------------------------------------

This looks like an Elytron issue. [~dlofthouse] any thoughts on this?

> JobControlTestCase fails with security manager
> ----------------------------------------------
>
>                 Key: WFLY-9161
>                 URL: https://issues.jboss.org/browse/WFLY-9161
>             Project: WildFly
>          Issue Type: Bug
>          Components: Batch, Test Suite
>            Reporter: Hynek Švábek
>            Assignee: James Perkins
>
> JobControlTestCase fails with security manager
> Some tests fail with:
> {code}
> aused by: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
>    JBOSS-LOCAL-USER: java.security.AccessControlException: WFSM000001: Permission check failed (permission "("java.io.FilePermission" "/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local2441956400719098652.challenge" "read")" in code source "(vfs:/content/test-batch.war/WEB-INF/classes <no signer certificates>)" of "ModuleClassLoader for Module "deployment.test-batch.war" from Service Module Loader")
>    DIGEST-MD5: javax.security.sasl.SaslException: DIGEST-MD5: Server rejected authentication
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:400)
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
>         at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
>         at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
>         at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
>         at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
>         at ...asynchronous invocation...(Unknown Source)
>         at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
>         at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:504)
>         at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:492)
>         at org.jboss.as.protocol.ProtocolConnectionUtils.connect(ProtocolConnectionUtils.java:194)
>         at org.jboss.as.protocol.ProtocolConnectionUtils.connectSync(ProtocolConnectionUtils.java:118)
>         ... 155 more
> ...
> {code}
> or
> {code}
> Suppressed: java.security.AccessControlException: WFSM000001: Permission check failed (permission "("java.io.FilePermission" "/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local471205335337215113.challenge" "read")" in code source "(vfs:/content/test-batch.war/WEB-INF/classes <no signer certificates>)" of "ModuleClassLoader for Module "deployment.test-batch.war" from Service Module Loader")
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:278)
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:175)
>                 at java.lang.SecurityManager.checkRead(SecurityManager.java:888)
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkRead(WildFlySecurityManager.java:350)
>                 at java.io.FileInputStream.<init>(FileInputStream.java:127)
>                 at org.wildfly.security.sasl.localuser.LocalUserClient.evaluateMessage(LocalUserClient.java:93)
>                 at org.wildfly.security.sasl.util.AbstractSaslParticipant.evaluateMessage(AbstractSaslParticipant.java:180)
>                 at org.wildfly.security.sasl.util.AbstractSaslClient.evaluateChallenge(AbstractSaslClient.java:59)
>                 at org.wildfly.security.sasl.util.AbstractDelegatingSaslClient.evaluateChallenge(AbstractDelegatingSaslClient.java:54)
>                 at org.wildfly.security.sasl.util.PrivilegedSaslClient.lambda$evaluateChallenge$0(PrivilegedSaslClient.java:55)
>                 at java.security.AccessController.doPrivileged(Native Method)
>                 at org.wildfly.security.sasl.util.PrivilegedSaslClient.evaluateChallenge(PrivilegedSaslClient.java:55)
>                 at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.lambda$handleEvent$0(ClientConnectionOpenListener.java:644)
>                 at org.jboss.remoting3.EndpointImpl$TrackingExecutor.lambda$execute$0(EndpointImpl.java:898)
>                 ... 3 more
> ...
> {code}



--
This message was sent by Atlassian JIRA
(v7.2.3#72005)



More information about the jboss-jira mailing list