[jbossws-issues] [JBoss JIRA] Commented: (JBWS-1913) WS-Security doesn't work any more
Alessio Soldano (JIRA)
jira-events at lists.jboss.org
Tue Nov 27 10:08:46 EST 2007
[ http://jira.jboss.com/jira/browse/JBWS-1913?page=comments#action_12389336 ]
Alessio Soldano commented on JBWS-1913:
---------------------------------------
Could you please post some further details on the user forum linking this issue?
Thank you
> WS-Security doesn't work any more
> ---------------------------------
>
> Key: JBWS-1913
> URL: http://jira.jboss.com/jira/browse/JBWS-1913
> Project: JBoss Web Services
> Issue Type: Bug
> Security Level: Public(Everyone can see)
> Components: ws-security
> Affects Versions: jbossws-2.0.2
> Environment: JBossAS 4.2.2, JBossWS 2.0.2; JDK 1.6.0_03
> Reporter: Juergen Zimmermann
>
> My application works fine with JBossAS 4.2.2 and the included JBossWS 2.0.1. However, after upgrading to JBossWS 2.0.2 I get this stacktrace:
> 2007-11-27 15:43:10,209 ERROR org.jboss.ws.extensions.security.WSSecurityDispatcher - Internal error occured handling outbound message:
> org.jboss.ws.extensions.security.WSSecurityException: Problems loading Keystore: Keystore was tampered with, or password was incorrect
> at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:167)
> at org.jboss.ws.extensions.security.SecurityStore.loadKeyStore(SecurityStore.java:100)
> at org.jboss.ws.extensions.security.SecurityStore.<init>(SecurityStore.java:90)
> at org.jboss.ws.extensions.security.WSSecurityDispatcher.handleOutbound(WSSecurityDispatcher.java:303)
> at org.jboss.ws.extensions.security.jaxws.WSSecurityHandler.handleOutboundSecurity(WSSecurityHandler.java:95)
> at org.jboss.ws.extensions.security.jaxws.WSSecurityHandlerClient.handleOutbound(WSSecurityHandlerClient.java:45)
> at org.jboss.ws.core.jaxws.handler.GenericHandler.handleMessage(GenericHandler.java:55)
> at org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:295)
> at org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:140)
> at org.jboss.ws.core.jaxws.client.ClientImpl.callRequestHandlerChain(ClientImpl.java:160)
> at org.jboss.ws.core.CommonClient.invoke(CommonClient.java:297)
> at org.jboss.ws.core.jaxws.client.ClientImpl.invoke(ClientImpl.java:243)
> at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:164)
> at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:150)
> at $Proxy25.getVersion(Unknown Source)
> at de.hska.test.JBossWSTest.getVersion(JBossWSTest.java:130)
> at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
> at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
> at java.lang.reflect.Method.invoke(Method.java:597)
> at org.junit.experimental.theories.runner.Function.invoke(Function.java:25)
> at org.junit.experimental.theories.runner.TheoryContainerReference.invoke(TheoryContainerReference.java:26)
> at org.junit.experimental.theories.runner.TheoryContainerReference.runWithParameters(TheoryContainerReference.java:107)
> at org.junit.experimental.theories.runner.TheoryMethod.invoke(TheoryMethod.java:37)
> at org.junit.internal.runners.MethodRoadie.runTestMethod(MethodRoadie.java:98)
> at org.junit.internal.runners.MethodRoadie$2.run(MethodRoadie.java:79)
> at org.junit.internal.runners.MethodRoadie.runBeforesThenTestThenAfters(MethodRoadie.java:87)
> at org.junit.internal.runners.MethodRoadie.runTest(MethodRoadie.java:77)
> at org.junit.internal.runners.MethodRoadie.run(MethodRoadie.java:42)
> at org.junit.internal.runners.JUnit4ClassRunner.invokeTestMethod(JUnit4ClassRunner.java:88)
> at org.junit.internal.runners.JUnit4ClassRunner.runMethods(JUnit4ClassRunner.java:51)
> at org.junit.internal.runners.JUnit4ClassRunner$1.run(JUnit4ClassRunner.java:44)
> at org.junit.internal.runners.ClassRoadie.runUnprotected(ClassRoadie.java:26)
> at org.junit.internal.runners.ClassRoadie.runProtected(ClassRoadie.java:36)
> at org.junit.internal.runners.JUnit4ClassRunner.run(JUnit4ClassRunner.java:42)
> at junit.framework.JUnit4TestAdapter.run(JUnit4TestAdapter.java:36)
> at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:421)
> at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:912)
> at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:766)
> Caused by: java.io.IOException: Keystore was tampered with, or password was incorrect
> at com.sun.crypto.provider.JceKeyStore.engineLoad(DashoA13*..)
> at java.security.KeyStore.load(KeyStore.java:1185)
> at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:155)
> ... 38 more
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
More information about the jbossws-issues
mailing list