[
https://issues.apache.org/jira/browse/NIFI-9253?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17421463#comment-17421463
]
Joe Witt commented on NIFI-9253:
--------------------------------
The issue is intermittent. I have run two builds since and the issue has not
happened. So brittle build problem.
> Build broken by nifi-security-socket-ssl test issue
> ---------------------------------------------------
>
> Key: NIFI-9253
> URL: https://issues.apache.org/jira/browse/NIFI-9253
> Project: Apache NiFi
> Issue Type: Bug
> Components: Core Framework
> Environment: Apache Maven 3.8.1
> (05c21c65bdfed0f71a2f2ada8b84da59348c4c5d)
> Maven home: /development/tools/apache-maven-3.8.1
> Java version: 11.0.12, vendor: Azul Systems, Inc., runtime:
> /usr/lib/jvm/zulu11.50.19-ca-jdk11.0.12-linux_x64
> Default locale: en_US, platform encoding: UTF-8
> OS name: "linux", version: "5.13.15-200.fc34.x86_64", arch: "amd64", family:
> "unix"
> Reporter: Joe Witt
> Assignee: David Handermann
> Priority: Major
>
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by
> com.esotericsoftware.kryo.util.UnsafeUtil
> (file:/home/apachenifi/.m2/repository/com/esotericsoftware/kryo/kryo/2.24.0/kryo-2.24.0.jar)
> to constructor java.nio.DirectByteBuffer(long,int,java.lang.Object)
> [ERROR] WARNING: Please consider reporting this to the maintainers of
> com.esotericsoftware.kryo.util.UnsafeUtil
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further
> illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future
> release
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by
> org.codehaus.groovy.reflection.CachedClass
> (file:/home/apachenifi/.m2/repository/org/codehaus/groovy/groovy/2.5.14/groovy-2.5.14.jar)
> to method java.lang.Object.finalize()
> [ERROR] WARNING: Please consider reporting this to the maintainers of
> org.codehaus.groovy.reflection.CachedClass
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further
> illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future
> release
> [INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.424
> s - in
> org.apache.nifi.authorization.CompositeConfigurableUserGroupProviderTest
> [INFO] Running org.apache.nifi.authorization.StandardManagedAuthorizerTest
> [INFO] Tests run: 15, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.17
> s - in org.apache.nifi.authorization.StandardManagedAuthorizerTest
> [INFO] Running org.apache.nifi.authorization.CompositeUserGroupProviderTest
> [INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014
> s - in org.apache.nifi.authorization.CompositeUserGroupProviderTest
> [INFO] Running org.apache.nifi.authorization.user.NiFiUserUtilsTest
> [INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.485
> s - in org.apache.nifi.properties.AESSensitivePropertyProviderTest
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by
> org.codehaus.groovy.reflection.CachedClass
> (file:/home/apachenifi/.m2/repository/org/codehaus/groovy/groovy/2.5.14/groovy-2.5.14.jar)
> to method java.lang.Object.finalize()
> [ERROR] WARNING: Please consider reporting this to the maintainers of
> org.codehaus.groovy.reflection.CachedClass
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further
> illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future
> release
> [ERROR] Errors:
> [ERROR]
> SSLSocketChannelTest.testClientConnectWriteReadTls13:147->assertChannelConnectedWriteReadClosed:208->processClientSslSocketChannel:255->lambda$assertChannelConnectedWriteReadClosed$1:218
> UncheckedIO
> [INFO]
> [ERROR] Tests run: 6, Failures: 0, Errors: 1, Skipped: 0
> [INFO] Skipping because packaging 'nar' is not pom.
> [ERROR] Tests run: 6, Failures: 0, Errors: 1, Skipped: 0, Time elapsed: 12.95
> s <<< FAILURE! - in org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest
> [ERROR]
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13
> Time elapsed: 2.116 s <<< ERROR!
> java.io.UncheckedIOException: Channel Failed for TLSv1.3
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:218)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> Caused by: javax.net.ssl.SSLException: Tag mismatch!
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelWriteRead(SSLSocketChannelTest.java:234)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:213)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> Caused by: javax.crypto.AEADBadTagException: Tag mismatch!
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelWriteRead(SSLSocketChannelTest.java:234)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:213)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> at
> org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> [INFO]
--
This message was sent by Atlassian Jira
(v8.3.4#803005)