[jbossws-issues] [JBoss JIRA] Commented: (JBWS-1913) WS-Security doesn't work any more

Alessio Soldano (JIRA) jira-events at lists.jboss.org
Tue Nov 27 10:08:46 EST 2007


    [ http://jira.jboss.com/jira/browse/JBWS-1913?page=comments#action_12389336 ] 
            
Alessio Soldano commented on JBWS-1913:
---------------------------------------

Could you please post some further details on the user forum linking this issue?
Thank you

> WS-Security doesn't work any more
> ---------------------------------
>
>                 Key: JBWS-1913
>                 URL: http://jira.jboss.com/jira/browse/JBWS-1913
>             Project: JBoss Web Services
>          Issue Type: Bug
>      Security Level: Public(Everyone can see) 
>          Components: ws-security
>    Affects Versions:  jbossws-2.0.2
>         Environment: JBossAS 4.2.2, JBossWS 2.0.2; JDK 1.6.0_03
>            Reporter: Juergen Zimmermann
>
> My application works fine with JBossAS 4.2.2 and the included JBossWS 2.0.1. However, after upgrading to JBossWS 2.0.2 I get this stacktrace:
> 2007-11-27 15:43:10,209 ERROR org.jboss.ws.extensions.security.WSSecurityDispatcher - Internal error occured handling outbound message:
> org.jboss.ws.extensions.security.WSSecurityException: Problems loading Keystore: Keystore was tampered with, or password was incorrect
> 	at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:167)
> 	at org.jboss.ws.extensions.security.SecurityStore.loadKeyStore(SecurityStore.java:100)
> 	at org.jboss.ws.extensions.security.SecurityStore.<init>(SecurityStore.java:90)
> 	at org.jboss.ws.extensions.security.WSSecurityDispatcher.handleOutbound(WSSecurityDispatcher.java:303)
> 	at org.jboss.ws.extensions.security.jaxws.WSSecurityHandler.handleOutboundSecurity(WSSecurityHandler.java:95)
> 	at org.jboss.ws.extensions.security.jaxws.WSSecurityHandlerClient.handleOutbound(WSSecurityHandlerClient.java:45)
> 	at org.jboss.ws.core.jaxws.handler.GenericHandler.handleMessage(GenericHandler.java:55)
> 	at org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:295)
> 	at org.jboss.ws.core.jaxws.handler.HandlerChainExecutor.handleMessage(HandlerChainExecutor.java:140)
> 	at org.jboss.ws.core.jaxws.client.ClientImpl.callRequestHandlerChain(ClientImpl.java:160)
> 	at org.jboss.ws.core.CommonClient.invoke(CommonClient.java:297)
> 	at org.jboss.ws.core.jaxws.client.ClientImpl.invoke(ClientImpl.java:243)
> 	at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:164)
> 	at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:150)
> 	at $Proxy25.getVersion(Unknown Source)
> 	at de.hska.test.JBossWSTest.getVersion(JBossWSTest.java:130)
> 	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
> 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
> 	at java.lang.reflect.Method.invoke(Method.java:597)
> 	at org.junit.experimental.theories.runner.Function.invoke(Function.java:25)
> 	at org.junit.experimental.theories.runner.TheoryContainerReference.invoke(TheoryContainerReference.java:26)
> 	at org.junit.experimental.theories.runner.TheoryContainerReference.runWithParameters(TheoryContainerReference.java:107)
> 	at org.junit.experimental.theories.runner.TheoryMethod.invoke(TheoryMethod.java:37)
> 	at org.junit.internal.runners.MethodRoadie.runTestMethod(MethodRoadie.java:98)
> 	at org.junit.internal.runners.MethodRoadie$2.run(MethodRoadie.java:79)
> 	at org.junit.internal.runners.MethodRoadie.runBeforesThenTestThenAfters(MethodRoadie.java:87)
> 	at org.junit.internal.runners.MethodRoadie.runTest(MethodRoadie.java:77)
> 	at org.junit.internal.runners.MethodRoadie.run(MethodRoadie.java:42)
> 	at org.junit.internal.runners.JUnit4ClassRunner.invokeTestMethod(JUnit4ClassRunner.java:88)
> 	at org.junit.internal.runners.JUnit4ClassRunner.runMethods(JUnit4ClassRunner.java:51)
> 	at org.junit.internal.runners.JUnit4ClassRunner$1.run(JUnit4ClassRunner.java:44)
> 	at org.junit.internal.runners.ClassRoadie.runUnprotected(ClassRoadie.java:26)
> 	at org.junit.internal.runners.ClassRoadie.runProtected(ClassRoadie.java:36)
> 	at org.junit.internal.runners.JUnit4ClassRunner.run(JUnit4ClassRunner.java:42)
> 	at junit.framework.JUnit4TestAdapter.run(JUnit4TestAdapter.java:36)
> 	at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:421)
> 	at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:912)
> 	at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:766)
> Caused by: java.io.IOException: Keystore was tampered with, or password was incorrect
> 	at com.sun.crypto.provider.JceKeyStore.engineLoad(DashoA13*..)
> 	at java.security.KeyStore.load(KeyStore.java:1185)
> 	at org.jboss.ws.extensions.security.SecurityStore.loadStore(SecurityStore.java:155)
> 	... 38 more

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        



More information about the jbossws-issues mailing list