[jira] Commented: (CXF-2354) WSDLException thrown for NO Subject alternative DNS name matching when the server names do actually match

2009-08-25 Thread Benson Margulies (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-2354?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12747368#action_12747368
 ] 

Benson Margulies commented on CXF-2354:
---

The problem is :

'https://g4w0203.americas.hpqcorp.net/HPISWeb/ISASCustomerWebService/CustomerService.svc?wsdl=wsdl0'.:
 javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: 
No subject alternative DNS name matching g4w0203.americas.hpqcorp.net found. 


I strongly recommend downloading to the file system and running wsdl2java from 
there. If that won't work, we'll need someone with a lot more SSL knowledge 
than myself.


> WSDLException thrown for NO Subject alternative DNS name matching when the 
> server names do actually match
> -
>
> Key: CXF-2354
> URL: https://issues.apache.org/jira/browse/CXF-2354
> Project: CXF
>  Issue Type: Bug
>  Components: Tooling
>Affects Versions: 2.2.2
> Environment: Ubuntu 8.10 32bit OS, Java 1.6.10, CXF 2.2.2, Ant 1.7.1
>Reporter: Conor Buescher
>
> I am working on building a java based web services client for an already 
> deployed .Net based web service built using WCF.  I am unable to run 
> wsdl2java on the remote wsdl and have downloaded all of the associated wsdl 
> files to my machine and I can then run wsdl2java using the following ant 
> build.xml file:
>  
> 
> ="/home/conorb/devTools/apache-cxf-2.2.2"/> 
>  
> 
>
>   
>
>
> 
>
> 
>
>
>   
>
> 
>
>
>
>
>
>
>
>
> 
> 
> Once that works I can edit the created files to point to the wsdl url, the 
> external url is here: 
> https://g4w0209.americas.hpqcorp.net/HPISWeb/ISASCustomerWebService/CustomerService.svc?wsdl
>  - and then make changes to the client class for testing the service.
> Additionally I download the SSL certificate into my java keystore using the 
> following command: sudo keytool -import -trustcacerts -keystore  
> /usr/lib/jvm/java-6-sun-1.6.0.10/jre/lib/security/cacerts -storepass changeit 
> -alias g4w0217 -file /home/conorb/Documents/groovy/g4w0217.cert.pem 
> When I run ant ICustomerServiceClient on my modified java code I receive the 
> following error:
> con...@conorb-desktop:~/Documents/groovy/ispe-client$ ant 
> ICustomerServiceClient
> Buildfile: build.xml
> compile:
> ICustomerServiceClient:
>  [java] Exception in thread "main" javax.xml.ws.WebServiceException: 
> org.apache.cxf.service.factory.ServiceConstructionException: Failed to create 
> service.
>  [java]   at org.apache.cxf.jaxws.ServiceImpl.(ServiceImpl.java:149)
>  [java]   at 
> org.apache.cxf.jaxws.spi.ProviderImpl.createServiceDelegate(ProviderImpl.java:65)
>  [java]   at javax.xml.ws.Service.(Service.java:56)
>  [java]   at org.tempuri.CustomerService.(CustomerService.java:49)
>  [java]   at 
> com.hp.hpis.customerservice._2009._02.ICustomerService_BasicHttpBindingICustomerService_Client.main(ICustomerService_BasicHttpBindingICustomerService_Client.java:55)
>  [java] Caused by: 
> org.apache.cxf.service.factory.ServiceConstructionException: Failed to create 
> service.
>  [java]   at 
> org.apache.cxf.wsdl11.WSDLServiceFactory.(WSDLServiceFactory.java:93)
>  [java]   at 
> org.apache.cxf.jaxws.ServiceImpl.initializePorts(ServiceImpl.java:204)
>  [java]   at org.apache.cxf.jaxws.ServiceImpl.(ServiceImpl.java:147)
>  [java]   ... 4 more
>  [java] Caused by: javax.wsdl.WSDLException: WSDLException (at 
> /wsdl:definitions/wsdl:import): faultCode=PARSER_ERROR: Problem parsing 
> 'https://g4w0203.americas.hpqcorp.net/HPISWeb/ISASCustomerWebService/CustomerService.svc?wsdl=wsdl0'.:
>  javax.net.ssl.SSLHandshakeException: 
> java.security.cert.CertificateException: No subject alternative DNS name 
> matching g4w0203.americas.hpqcorp.net found.
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.getDocument(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.parseImport(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.parseDefinitions(Unknown 
> Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.readWSDL(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.readWSDL(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.readWSDL(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.readWSDL(Unknown Source)
>  [java]   at com.ibm.wsdl.xml.WSDLReaderImpl.readWSDL(Unknown Source)
>  [java]   at 
> org.apache.cxf.wsdl11.WSDLManagerImpl.loadDefinition(WSDLManagerImpl.java:210)
>  [java]   at 
> org.apache.cxf.wsdl11.WSDLManagerImpl.getDefinition(WSDLManagerImpl.java:175)
>  

[jira] Created: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Wolfgang Nagele (JIRA)
Use of client certificates via http conduit configuration broken


 Key: CXF-2403
 URL: https://issues.apache.org/jira/browse/CXF-2403
 Project: CXF
  Issue Type: Bug
  Components: Configuration
Reporter: Wolfgang Nagele


To use standard SSL client certificates for authentication the following 
configuration should work:

  

  


  

  


In this configuration we would have the public certificate of the server we 
want to connect to in the truststore and the private key and certificate in the 
keystore.

With the current CXF implementation this results in the following exception:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
at 
sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
 [na:1.6.0_13]
at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
[na:1.6.0_13]
at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
[na:1.6.0_13]
... 39 common frames omitted

Once we additionally define the following properties it works:
* javax.net.ssl.keyStore=keystore
* javax.net.ssl.keyStorePassword=password
* javax.net.ssl.trustStore=truststore
* javax.net.ssl.trustStorePassword=password


This however results in very ugly setups where we have to define the same data 
twice. Also we miss out on CXF's option of defining specific keystores and 
truststores per webservice.

For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Commented: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Eamonn Dwyer (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-2403?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12747480#action_12747480
 ] 

Eamonn Dwyer commented on CXF-2403:
---

Hi Wolfgang
the use of http:conduit / http:tlsClientParameters is quite widespread and has 
worked for me (at least). Maybe it is something to do with the particular 
keystore/trustsore you have set up. Can you upload your truststore and keystore 
so it can be tested?

Thanks
Eamonn

> Use of client certificates via http conduit configuration broken
> 
>
> Key: CXF-2403
> URL: https://issues.apache.org/jira/browse/CXF-2403
> Project: CXF
>  Issue Type: Bug
>  Components: Configuration
>Reporter: Wolfgang Nagele
>
> To use standard SSL client certificates for authentication the following 
> configuration should work:
> 
>   
> 
>   
> 
> 
>   
> 
>   
> 
> In this configuration we would have the public certificate of the server we 
> want to connect to in the truststore and the private key and certificate in 
> the keystore.
> With the current CXF implementation this results in the following exception:
> sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
> valid certification path to requested target
>   at 
> sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
>  [na:1.6.0_13]
>   at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
> [na:1.6.0_13]
>   at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
> [na:1.6.0_13]
>   ... 39 common frames omitted
> Once we additionally define the following properties it works:
> * javax.net.ssl.keyStore=keystore
> * javax.net.ssl.keyStorePassword=password
> * javax.net.ssl.trustStore=truststore
> * javax.net.ssl.trustStorePassword=password
> This however results in very ugly setups where we have to define the same 
> data twice. Also we miss out on CXF's option of defining specific keystores 
> and truststores per webservice.
> For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Commented: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Eamonn Dwyer (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-2403?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12747483#action_12747483
 ] 

Eamonn Dwyer commented on CXF-2403:
---

also could you just check that you have the keystore file in the same directory 
as your application?

Maybe also try setting the full path name for the keystore like..
file="C:\Projects\mycersts\keystore"

> Use of client certificates via http conduit configuration broken
> 
>
> Key: CXF-2403
> URL: https://issues.apache.org/jira/browse/CXF-2403
> Project: CXF
>  Issue Type: Bug
>  Components: Configuration
>Reporter: Wolfgang Nagele
>
> To use standard SSL client certificates for authentication the following 
> configuration should work:
> 
>   
> 
>   
> 
> 
>   
> 
>   
> 
> In this configuration we would have the public certificate of the server we 
> want to connect to in the truststore and the private key and certificate in 
> the keystore.
> With the current CXF implementation this results in the following exception:
> sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
> valid certification path to requested target
>   at 
> sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
>  [na:1.6.0_13]
>   at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
> [na:1.6.0_13]
>   at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
> [na:1.6.0_13]
>   ... 39 common frames omitted
> Once we additionally define the following properties it works:
> * javax.net.ssl.keyStore=keystore
> * javax.net.ssl.keyStorePassword=password
> * javax.net.ssl.trustStore=truststore
> * javax.net.ssl.trustStorePassword=password
> This however results in very ugly setups where we have to define the same 
> data twice. Also we miss out on CXF's option of defining specific keystores 
> and truststores per webservice.
> For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Updated: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Wolfgang Nagele (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-2403?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Wolfgang Nagele updated CXF-2403:
-

Attachment: keystore

> Use of client certificates via http conduit configuration broken
> 
>
> Key: CXF-2403
> URL: https://issues.apache.org/jira/browse/CXF-2403
> Project: CXF
>  Issue Type: Bug
>  Components: Configuration
>Reporter: Wolfgang Nagele
> Attachments: client.crt, client.key, client.p12, keystore
>
>
> To use standard SSL client certificates for authentication the following 
> configuration should work:
> 
>   
> 
>   
> 
> 
>   
> 
>   
> 
> In this configuration we would have the public certificate of the server we 
> want to connect to in the truststore and the private key and certificate in 
> the keystore.
> With the current CXF implementation this results in the following exception:
> sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
> valid certification path to requested target
>   at 
> sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
>  [na:1.6.0_13]
>   at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
> [na:1.6.0_13]
>   at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
> [na:1.6.0_13]
>   ... 39 common frames omitted
> Once we additionally define the following properties it works:
> * javax.net.ssl.keyStore=keystore
> * javax.net.ssl.keyStorePassword=password
> * javax.net.ssl.trustStore=truststore
> * javax.net.ssl.trustStorePassword=password
> This however results in very ugly setups where we have to define the same 
> data twice. Also we miss out on CXF's option of defining specific keystores 
> and truststores per webservice.
> For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Updated: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Wolfgang Nagele (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-2403?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Wolfgang Nagele updated CXF-2403:
-

Attachment: client.p12
client.key
client.crt

> Use of client certificates via http conduit configuration broken
> 
>
> Key: CXF-2403
> URL: https://issues.apache.org/jira/browse/CXF-2403
> Project: CXF
>  Issue Type: Bug
>  Components: Configuration
>Reporter: Wolfgang Nagele
> Attachments: client.crt, client.key, client.p12, keystore
>
>
> To use standard SSL client certificates for authentication the following 
> configuration should work:
> 
>   
> 
>   
> 
> 
>   
> 
>   
> 
> In this configuration we would have the public certificate of the server we 
> want to connect to in the truststore and the private key and certificate in 
> the keystore.
> With the current CXF implementation this results in the following exception:
> sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
> valid certification path to requested target
>   at 
> sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
>  [na:1.6.0_13]
>   at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
> [na:1.6.0_13]
>   at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
> [na:1.6.0_13]
>   ... 39 common frames omitted
> Once we additionally define the following properties it works:
> * javax.net.ssl.keyStore=keystore
> * javax.net.ssl.keyStorePassword=password
> * javax.net.ssl.trustStore=truststore
> * javax.net.ssl.trustStorePassword=password
> This however results in very ugly setups where we have to define the same 
> data twice. Also we miss out on CXF's option of defining specific keystores 
> and truststores per webservice.
> For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Commented: (CXF-2403) Use of client certificates via http conduit configuration broken

2009-08-25 Thread Wolfgang Nagele (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-2403?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12747495#action_12747495
 ] 

Wolfgang Nagele commented on CXF-2403:
--

I have tried several ways of generating the certificates (using openssl and 
keytool alone) none of them worked. Also i do not understand how the workaround 
would make it work if the keystore were the problem? I have also tried full VS 
relative path configurations both did not work. The keystore is in the same 
directory as the application, but i also do not understand how that would 
change this.

The way i generate the client certificate (attached an example with password 
set as 'password'):
openssl genrsa -des3 -out client.key 1024
openssl req -new -x509 -key client.key -out client.crt -days 1000
openssl pkcs12 -export -out client.p12 -inkey client.key -in client.crt
keytool -importkeystore -srckeystore client.p12 -srcstoretype PKCS12 
-destkeystore keystore

For the truststore i import the server.crt that i already have:
keytool -import -v -trustcacerts -file server.crt -keystore truststore

> Use of client certificates via http conduit configuration broken
> 
>
> Key: CXF-2403
> URL: https://issues.apache.org/jira/browse/CXF-2403
> Project: CXF
>  Issue Type: Bug
>  Components: Configuration
>Reporter: Wolfgang Nagele
>
> To use standard SSL client certificates for authentication the following 
> configuration should work:
> 
>   
> 
>   
> 
> 
>   
> 
>   
> 
> In this configuration we would have the public certificate of the server we 
> want to connect to in the truststore and the private key and certificate in 
> the keystore.
> With the current CXF implementation this results in the following exception:
> sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
> valid certification path to requested target
>   at 
> sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
>  [na:1.6.0_13]
>   at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238) 
> [na:1.6.0_13]
>   at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280) 
> [na:1.6.0_13]
>   ... 39 common frames omitted
> Once we additionally define the following properties it works:
> * javax.net.ssl.keyStore=keystore
> * javax.net.ssl.keyStorePassword=password
> * javax.net.ssl.trustStore=truststore
> * javax.net.ssl.trustStorePassword=password
> This however results in very ugly setups where we have to define the same 
> data twice. Also we miss out on CXF's option of defining specific keystores 
> and truststores per webservice.
> For further information also see: http://www.quendor.org/archiv/428

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Created: (CXF-2404) remove reference to the node when defining an interceptor

2009-08-25 Thread Vladimir Ritz Bossicard (JIRA)
remove reference to the  node when defining an interceptor


 Key: CXF-2404
 URL: https://issues.apache.org/jira/browse/CXF-2404
 Project: CXF
  Issue Type: Bug
  Components: Documentation
Reporter: Vladimir Ritz Bossicard
Priority: Trivial


according to [1], the  node must be omitted when defining an Interceptor 
but the node is still referenced in the documentation [2]

[1] 
http://mail-archives.apache.org/mod_mbox/cxf-users/200906.mbox/%3c61b5d9410906111005v11511b92kae587d0b9dc0...@mail.gmail.com%3e
[2] http://cwiki.apache.org/CXF20DOC/interceptors.html

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Resolved: (CXF-2404) remove reference to the node when defining an interceptor

2009-08-25 Thread Daniel Kulp (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-2404?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Daniel Kulp resolved CXF-2404.
--

   Resolution: Fixed
Fix Version/s: 2.2.4
 Assignee: Daniel Kulp

> remove reference to the  node when defining an interceptor
> 
>
> Key: CXF-2404
> URL: https://issues.apache.org/jira/browse/CXF-2404
> Project: CXF
>  Issue Type: Bug
>  Components: Documentation
>Reporter: Vladimir Ritz Bossicard
>Assignee: Daniel Kulp
>Priority: Trivial
> Fix For: 2.2.4
>
>
> according to [1], the  node must be omitted when defining an 
> Interceptor but the node is still referenced in the documentation [2]
> [1] 
> http://mail-archives.apache.org/mod_mbox/cxf-users/200906.mbox/%3c61b5d9410906111005v11511b92kae587d0b9dc0...@mail.gmail.com%3e
> [2] http://cwiki.apache.org/CXF20DOC/interceptors.html

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Closed: (CXF-2046) Response entity is enclosed in "Result" tags for classes implementing ExceptionMapper

2009-08-25 Thread Gabo Manuel (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-2046?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gabo Manuel closed CXF-2046.


Resolution: Invalid

Hi Team,

My apologies. Just now I realized that a registered provider is affecting the 
result. The class some.domain.handlers.StringProvider is adding the unwanted 
tags.

Again, sorry.

Gabo

> Response entity is enclosed in "Result" tags for classes implementing 
> ExceptionMapper
> -
>
> Key: CXF-2046
> URL: https://issues.apache.org/jira/browse/CXF-2046
> Project: CXF
>  Issue Type: Bug
>  Components: REST
>Affects Versions: 2.2
> Environment: Java 1.5
> Jetty 6.1
>Reporter: Gabo Manuel
> Attachments: rtbe-ws4-retest_jira.zip, rtbe-ws4-retest_jira.zip
>
>
> Environment and objects involved is the same as that in another issue: 
> https://issues.apache.org/jira/browse/CXF-2045
> Additional objects involved:
> public class RuntimeExceptionMapper implements 
> ExceptionMapper{
> private static Logger logger = 
> Logger.getLogger(RuntimeExceptionMapper.class);
> public Response toResponse(RuntimeException fault) {
> StringBuffer sb = new StringBuffer();
> sb.append("Generate some custom message to hide the real problem from 
> end user.");
> 
> ResponseBuilder rb = Response.status(500);
> rb.type(MediaType.TEXT_PLAIN_TYPE);
> rb.entity(sb.toString());
> logger.fatal(fault);
> 
> Response resp = rb.build();
> 
> logger.info("entity: " + resp.getEntity().toString());
> 
> return resp;
> }
> }
> Logs captured by TCPMon
> HTTP/1.1 500 Internal Server Error
> Content-Type: text/plain
> Content-Length: 69
> Server: Jetty(6.1.11)
> Generate some custom message to hide the real problem from end 
> user.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.