[jboss-jira] [JBoss JIRA] (WFLY-9185) NestedRemoteContextTestCase fails with security manager

Tomaz Cerar (JIRA) issues at jboss.org
Fri Aug 4 10:22:00 EDT 2017


     [ https://issues.jboss.org/browse/WFLY-9185?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Tomaz Cerar reassigned WFLY-9185:
---------------------------------

    Assignee:     (was: Tomaz Cerar)


> NestedRemoteContextTestCase fails with security manager
> -------------------------------------------------------
>
>                 Key: WFLY-9185
>                 URL: https://issues.jboss.org/browse/WFLY-9185
>             Project: WildFly
>          Issue Type: Bug
>          Components: Test Suite
>            Reporter: Hynek Švábek
>              Labels: security-manager
>
> NestedRemoteContextTestCase fails with security manager
> {code}
> Caused by: javax.security.sasl.SaslException: Authentication failed: all available authentication mechanisms failed:
>    JBOSS-LOCAL-USER: java.security.AccessControlException: WFSM000001: Permission check failed (permission "("java.io.FilePermission" "/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local8043870012544300330.challenge" "read")" in code source "(vfs:/content/ejb.ear/web.war/WEB-INF/classes <no signer certificates>)" of "ModuleClassLoader for Module "deployment.ejb.ear.web.war" from Service Module Loader")
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener.allMechanismsFailed(ClientConnectionOpenListener.java:109)
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:440)
>         at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:242)
>         at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
>         at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
>         at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
>         at org.xnio.nio.WorkerThread.run(WorkerThread.java:571)
>         at ...asynchronous invocation...(Unknown Source)
>         at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:542)
>         at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:508)
>         at org.jboss.remoting3.ConnectionInfo$None.getConnection(ConnectionInfo.java:83)
>         at org.jboss.remoting3.ConnectionInfo.getConnection(ConnectionInfo.java:56)
>         at org.jboss.remoting3.EndpointImpl.doGetConnection(EndpointImpl.java:459)
>         at org.jboss.remoting3.EndpointImpl.getConnectedIdentity(EndpointImpl.java:405)
>         at org.wildfly.naming.client.remote.SingleRemoteNamingProvider.lambda$new$0(SingleRemoteNamingProvider.java:82)
>         at java.security.AccessController.doPrivileged(Native Method)
>         at org.wildfly.naming.client.remote.SingleRemoteNamingProvider.getFuturePeerIdentity(SingleRemoteNamingProvider.java:117)
>         at org.wildfly.naming.client.remote.SingleRemoteNamingProvider.getPeerIdentity(SingleRemoteNamingProvider.java:106)
>         at org.wildfly.naming.client.remote.RemoteNamingProvider.getPeerIdentityForNaming(RemoteNamingProvider.java:65)
>         ... 51 more
>         Suppressed: java.security.AccessControlException: WFSM000001: Permission check failed (permission "("java.io.FilePermission" "/home/hsvabek/securityworkspace/VERIFICATION/2017_08_02_BEAP-7584/jboss-eap-7.1.0.ER3-src/testsuite/integration/basic/target/jbossas/standalone/tmp/auth/local8043870012544300330.challenge" "read")" in code source "(vfs:/content/ejb.ear/web.war/WEB-INF/classes <no signer certificates>)" of "ModuleClassLoader for Module "deployment.ejb.ear.web.war" from Service Module Loader")
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:278)
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkPermission(WildFlySecurityManager.java:175)
>                 at java.lang.SecurityManager.checkRead(SecurityManager.java:888)
>                 at org.wildfly.security.manager.WildFlySecurityManager.checkRead(WildFlySecurityManager.java:350)
>                 at java.io.FileInputStream.<init>(FileInputStream.java:127)
>                 at org.wildfly.security.sasl.localuser.LocalUserClient.evaluateMessage(LocalUserClient.java:93)
>                 at org.wildfly.security.sasl.util.AbstractSaslParticipant.evaluateMessage(AbstractSaslParticipant.java:180)
>                 at org.wildfly.security.sasl.util.AbstractSaslClient.evaluateChallenge(AbstractSaslClient.java:59)
>                 at org.wildfly.security.sasl.util.AbstractDelegatingSaslClient.evaluateChallenge(AbstractDelegatingSaslClient.java:54)
>                 at org.wildfly.security.sasl.util.PrivilegedSaslClient.lambda$evaluateChallenge$0(PrivilegedSaslClient.java:55)
>                 at java.security.AccessController.doPrivileged(Native Method)
>                 at org.wildfly.security.sasl.util.PrivilegedSaslClient.evaluateChallenge(PrivilegedSaslClient.java:55)
>                 at org.jboss.remoting3.remote.ClientConnectionOpenListener$Authentication.lambda$handleEvent$0(ClientConnectionOpenListener.java:644)
>                 at org.jboss.remoting3.EndpointImpl$TrackingExecutor.lambda$execute$0(EndpointImpl.java:898)
>                 ... 3 more
> ...
> {code}



--
This message was sent by Atlassian JIRA
(v7.2.3#72005)



More information about the jboss-jira mailing list