[jira] [Created] (CXF-6863) WS-RM 3.x does not work with attachments upon a network error

2016-04-08 Thread Akitoshi Yoshida (JIRA)
Akitoshi Yoshida created CXF-6863:
-

 Summary: WS-RM 3.x does not work with attachments upon a network 
error
 Key: CXF-6863
 URL: https://issues.apache.org/jira/browse/CXF-6863
 Project: CXF
  Issue Type: Bug
  Components: WS-* Components
Affects Versions: 3.0.9, 3.1.3
Reporter: Akitoshi Yoshida


When sending messages with an attachment, the CXF 3.x WS-RM code may lose 
message at the client side when a network error occurs. This was working with 
CXF 2.x WS-RM.

This problem is related to the change CXF-4866 which changed the way how the 
outgoing message is captured. Previously, the entire message was buffered and 
captured, which isolated this capturing from network issue. In 3.x, only the 
SOAP part is captured in this way and not the attachments. As a result, an 
exception will be thrown during the attachment serialization when a network 
error occurs and the message will not be correctly placed in the retransmission 
queue.

By comparing CXF 3.x and 2.x code, 

In 3.x., AttachmentSerializer.writeProlog will directly writes to the IO and 
this can trigger a Fault from AttachmentOutInterceptor.handleMessage.

URLConnectionHTTPConduit$URLConnectionWrappedOutputStream(AbstractThresholdOutputStream).write(byte[],
 int, int) line: 61   
URLConnectionHTTPConduit$URLConnectionWrappedOutputStream(AbstractWrappedOutputStream).write(byte[])
 line: 60   
CacheAndWriteOutputStream.write(byte[]) line: 89
AttachmentSerializer.writeProlog() line: 182
AttachmentOutInterceptor.handleMessage(Message) line: 77

whereas in CXF 2.x, AttachmentSerializer.writeProlog will write to the buffered 
WriteOnCloseOutputStream, as its RetransmissionInterceptor inserts 
WriteOnCloseOutputStream to isolate itself from any network issue.

WriteOnCloseOutputStream(CachedOutputStream).write(byte[]) line: 466
CacheAndWriteOutputStream.write(byte[]) line: 89
AttachmentSerializer.writeProlog() line: 172
AttachmentOutInterceptor.handleMessage(Message) line: 72

CXF 2.x, RetransmissionInterceptor inserted WriteOnCloseOutputStream to capture 
the message entirely.

There seem to be other issues with attachments handling in CXF 3.x. Along with 
other issues CXF-6646, I am not sure how we should fix all these issues.





--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (CXF-6646) CXF 3.x WSRM message may not be retrieved from database

2016-04-08 Thread Akitoshi Yoshida (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-6646?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Akitoshi Yoshida updated CXF-6646:
--
Assignee: (was: Akitoshi Yoshida)

> CXF 3.x WSRM message may not be retrieved from database
> ---
>
> Key: CXF-6646
> URL: https://issues.apache.org/jira/browse/CXF-6646
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.0.4
>Reporter: Kai Rommel
> Attachments: 
> 0001-WSRM-enable-RMTxStore-for-different-database-impleme.patch, 
> 0002-WSRM-enable-RMTxStore-for-different-database-impleme.patch
>
>
> With CXF-4866, CXF-352 changes to the RMTxStore implementation were 
> introduced.
> Running the JUnit Tests for rt/ws/rm with a newer Derby version, some tests 
> will fail.
> You can switch to version 10.8.2.2 and messages won't be recovered from 
> database, as database connection will be released before message is read.
> I used the CachedOutputStream to cache the message. Find attached the patch 
> files.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6646) CXF 3.x WSRM message may not be retrieved from database

2016-04-08 Thread Akitoshi Yoshida (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6646?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15231879#comment-15231879
 ] 

Akitoshi Yoshida commented on CXF-6646:
---

While looking at the change introduced with CXF-4866, it seems to require a 
more drastic change to fix the issue.

The patch currently attached to this ticket preserves the content in some cases 
but it uses a complex sequence of operations and it also does not cover for the 
attachments.

If we are to stay in the current model, one option will be to go back to use 
CachedOutputStream in
RMMessage and serialize the whole message including the attachments in
one blob associated with this content. In that way, the DB operation
is kept simpler (one table write) when storing a multipart message and
it also keeps the management of attachment resources simpler (no need
to cache the attachment streams separately).





> CXF 3.x WSRM message may not be retrieved from database
> ---
>
> Key: CXF-6646
> URL: https://issues.apache.org/jira/browse/CXF-6646
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.0.4
>Reporter: Kai Rommel
>Assignee: Akitoshi Yoshida
> Attachments: 
> 0001-WSRM-enable-RMTxStore-for-different-database-impleme.patch, 
> 0002-WSRM-enable-RMTxStore-for-different-database-impleme.patch
>
>
> With CXF-4866, CXF-352 changes to the RMTxStore implementation were 
> introduced.
> Running the JUnit Tests for rt/ws/rm with a newer Derby version, some tests 
> will fail.
> You can switch to version 10.8.2.2 and messages won't be recovered from 
> database, as database connection will be released before message is read.
> I used the CachedOutputStream to cache the message. Find attached the patch 
> files.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6769) Underscores in values of FIQL search expressions are incorrectly escaped

2016-04-08 Thread JIRA

[ 
https://issues.apache.org/jira/browse/CXF-6769?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15231929#comment-15231929
 ] 

Torsten Römer commented on CXF-6769:


I've just tried this and while this would solve our problem, we unfortunately 
can't use in our setup.

We are running in WildFly 8/10 which includes Apache CXF, but uses RESTEasy 
instead of CXF's RS implementation. So we basically just include 
cxf-rt-rs-extension-search in our WAR deployment and create our "own" instance 
of FiqlParser (all we want to do is to convert an FIQL expression to an SQL 
query):

{code}
final FiqlParser fiqlParser = new 
FiqlParser<>(SearchBean.class);
final SearchCondition searchCondition = 
fiqlParser.parse(search);
final SQLPrinterVisitor visitor = new 
SQLPrinterVisitor(table);
searchCondition.accept(visitor);
final String sql = visitor.getQuery();
{code}

And like that we are not able to set the property.

Any suggestion?

> Underscores in values of FIQL search expressions are incorrectly escaped
> 
>
> Key: CXF-6769
> URL: https://issues.apache.org/jira/browse/CXF-6769
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.2
> Environment: Webapp deployed to WildFly 10
>Reporter: Torsten Römer
>Assignee: Sergey Beryozkin
>Priority: Minor
> Fix For: 3.1.6, 3.0.9, 3.2.0
>
>
> We are basically "just" using FIQLParser and SQLPrinterVisitor like this:
> final FiqlParser fiqlParser = new FiqlParser<>(SearchBean.class);
> final SearchCondition searchCondition = fiqlParser.parse(search);
> final SQLPrinterVisitor visitor = new 
> SQLPrinterVisitor(table);
> searchCondition.accept(visitor);
> final String sql = visitor.getQuery();
> A search expression like this:
> text==VAL_UE
> yields an SQL query like this:
> SELECT * FROM some_table WHERE text = 'VAL[backslash]_UE'
> (Note [backslash] is supposed to mean a literal "\" which is swallowed here)
> If the table contains a row with text "VAL_UE", the query returns no results 
> because the underscore in the value was preceded with a backslash.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)
Charles Moulliard created CXF-6864:
--

 Summary: STS Demo - Invalid Key
 Key: CXF-6864
 URL: https://issues.apache.org/jira/browse/CXF-6864
 Project: CXF
  Issue Type: Bug
Affects Versions: 3.0.9
Reporter: Charles Moulliard


The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work

When the client issues the request to get the token from the STS server, the 
following error is reported 

Server

{code}
Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
INFO: Started SelectChannelConnector@localhost:8080
Server ready...
Apr 08, 2016 11:57:42 AM 
org.apache.cxf.services.SecurityTokenService.UT_Port.STS
INFO: Inbound Message

ID: 1
Address: http://localhost:8080/SecurityTokenService/UT?wsdl
Http-Method: GET
Content-Type:
Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
User-Agent=[Apache CXF 3.0.9]}
--
{code}

Client
{code}
WARNING: Interceptor for 
{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
 has thrown exception, unwinding now
org.apache.cxf.interceptor.Fault: Illegal key size
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
at 
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
at 
org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
at 
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
at 
org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
at com.sun.proxy.$Proxy49.greetMe(Unknown Source)
at demo.wssec.client.Client.main(Client.java:77)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at org.codehaus.mojo.exec.ExecJavaMojo$1.run(ExecJavaMojo.java:291)
at java.lang.Thread.run(Thread.java:745)
Caused by: org.apache.cxf.ws.policy.PolicyException: Illegal key size
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.AbstractCommonBindingHandler.policyNotAsserted(AbstractCommonBindingHandler.java:117)
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doEncryptionDerived(SymmetricBindingHandler.java:492)
at 
org.apache.cxf.ws.security.wss4j.policyhandler

[jira] [Updated] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Charles Moulliard updated CXF-6864:
---
Description: 
The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work

When the client issues the request to get the token from the STS server, the 
following error is reported 

Server

{code}
Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
INFO: Started SelectChannelConnector@localhost:8080
Server ready...
Apr 08, 2016 11:57:42 AM 
org.apache.cxf.services.SecurityTokenService.UT_Port.STS
INFO: Inbound Message

ID: 1
Address: http://localhost:8080/SecurityTokenService/UT?wsdl
Http-Method: GET
Content-Type:
Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
User-Agent=[Apache CXF 3.0.9]}
--
{code}

Client
{code}
INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
from WSDL: 
file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
Invoking greetMe...
Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
doDefaultLogging
WARNING: Interceptor for 
{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
 has thrown exception, unwinding now
org.apache.cxf.interceptor.Fault: Illegal key size
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
at 
org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
at 
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
at 
org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
at 
org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
at 
org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
at 
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
at 
org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
at com.sun.proxy.$Proxy49.greetMe(Unknown Source)
at demo.wssec.client.Client.main(Client.java:77)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at org.codehaus.mojo.exec.ExecJavaMojo$1.run(ExecJavaMojo.java:291)
at java.lang.Thread.run(Thread.java:745)
Caused by: org.apache.cxf.ws.policy.PolicyException: Illegal key size
at 
org.apache.cxf.ws.security.wss4j.policyhandlers.AbstractCommonBindingHandler.policyNotAsserted(AbstractCommonBindingHandler.java:117)
at 
org.apache.cxf.ws.security.wss4j.p

[jira] [Commented] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15231965#comment-15231965
 ] 

Charles Moulliard commented on CXF-6864:


JDK version used : 8 with JCE

{code}
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ java -version
java version "1.8.0_45"
Java(TM) SE Runtime Environment (build 1.8.0_45-b14)
Java HotSpot(TM) 64-Bit Server VM (build 25.45-b02, mixed mode)
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ ll 
/Library/Java/JavaVirtualMachines/jdk1.8.0_45.jdk/Contents/Home/jre/lib/security/
total 288
drwxrwxr-x   10 root  wheel340 Apr 10  2015 .
drwxrwxr-x  100 root  wheel   3400 Apr 10  2015 ..
-rw-rw-r--1 root  wheel   3026 Apr 10  2015 US_export_policy.jar
-rw-rw-r--1 root  wheel   4054 Apr 10  2015 blacklist
-rw-rw-r--1 root  wheel   1188 Apr 10  2015 blacklisted.certs
-rw-rw-r--1 root  wheel  98626 Apr 10  2015 cacerts
-rw-rw-r--1 root  wheel   2466 Apr 10  2015 java.policy
-rw-rw-r--1 root  wheel  21270 Apr 10  2015 java.security
-rw-rw-r--1 root  wheel   3527 Apr 10  2015 local_policy.jar
-rw-rw-r--1 root  wheel  0 Apr 10  2015 trusted.libraries
{code}

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterce

[jira] [Comment Edited] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15231965#comment-15231965
 ] 

Charles Moulliard edited comment on CXF-6864 at 4/8/16 10:11 AM:
-

JDK version used : 8 with JCE jar files 

{code}
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ java -version
java version "1.8.0_45"
Java(TM) SE Runtime Environment (build 1.8.0_45-b14)
Java HotSpot(TM) 64-Bit Server VM (build 25.45-b02, mixed mode)
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ ll 
/Library/Java/JavaVirtualMachines/jdk1.8.0_45.jdk/Contents/Home/jre/lib/security/
total 288
drwxrwxr-x   10 root  wheel340 Apr 10  2015 .
drwxrwxr-x  100 root  wheel   3400 Apr 10  2015 ..
-rw-rw-r--1 root  wheel   3026 Apr 10  2015 US_export_policy.jar
-rw-rw-r--1 root  wheel   4054 Apr 10  2015 blacklist
-rw-rw-r--1 root  wheel   1188 Apr 10  2015 blacklisted.certs
-rw-rw-r--1 root  wheel  98626 Apr 10  2015 cacerts
-rw-rw-r--1 root  wheel   2466 Apr 10  2015 java.policy
-rw-rw-r--1 root  wheel  21270 Apr 10  2015 java.security
-rw-rw-r--1 root  wheel   3527 Apr 10  2015 local_policy.jar
-rw-rw-r--1 root  wheel  0 Apr 10  2015 trusted.libraries
{code}


was (Author: cmoulliard):
JDK version used : 8 with JCE

{code}
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ java -version
java version "1.8.0_45"
Java(TM) SE Runtime Environment (build 1.8.0_45-b14)
Java HotSpot(TM) 64-Bit Server VM (build 25.45-b02, mixed mode)
dabou:~/Downloads/apache-cxf-3.0.9/samples/sts$ ll 
/Library/Java/JavaVirtualMachines/jdk1.8.0_45.jdk/Contents/Home/jre/lib/security/
total 288
drwxrwxr-x   10 root  wheel340 Apr 10  2015 .
drwxrwxr-x  100 root  wheel   3400 Apr 10  2015 ..
-rw-rw-r--1 root  wheel   3026 Apr 10  2015 US_export_policy.jar
-rw-rw-r--1 root  wheel   4054 Apr 10  2015 blacklist
-rw-rw-r--1 root  wheel   1188 Apr 10  2015 blacklisted.certs
-rw-rw-r--1 root  wheel  98626 Apr 10  2015 cacerts
-rw-rw-r--1 root  wheel   2466 Apr 10  2015 java.policy
-rw-rw-r--1 root  wheel  21270 Apr 10  2015 java.security
-rw-rw-r--1 root  wheel   3527 Apr 10  2015 local_policy.jar
-rw-rw-r--1 root  wheel  0 Apr 10  2015 trusted.libraries
{code}

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cx

[jira] [Commented] (CXF-6769) Underscores in values of FIQL search expressions are incorrectly escaped

2016-04-08 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6769?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232001#comment-15232001
 ] 

Sergey Beryozkin commented on CXF-6769:
---

FiqlParser has another constructor which additionally accepts a Map of 
properties, that will do it.

> Underscores in values of FIQL search expressions are incorrectly escaped
> 
>
> Key: CXF-6769
> URL: https://issues.apache.org/jira/browse/CXF-6769
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.2
> Environment: Webapp deployed to WildFly 10
>Reporter: Torsten Römer
>Assignee: Sergey Beryozkin
>Priority: Minor
> Fix For: 3.1.6, 3.0.9, 3.2.0
>
>
> We are basically "just" using FIQLParser and SQLPrinterVisitor like this:
> final FiqlParser fiqlParser = new FiqlParser<>(SearchBean.class);
> final SearchCondition searchCondition = fiqlParser.parse(search);
> final SQLPrinterVisitor visitor = new 
> SQLPrinterVisitor(table);
> searchCondition.accept(visitor);
> final String sql = visitor.getQuery();
> A search expression like this:
> text==VAL_UE
> yields an SQL query like this:
> SELECT * FROM some_table WHERE text = 'VAL[backslash]_UE'
> (Note [backslash] is supposed to mean a literal "\" which is swallowed here)
> If the table contains a row with text "VAL_UE", the query returns no results 
> because the underscore in the value was preceded with a backslash.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6769) Underscores in values of FIQL search expressions are incorrectly escaped

2016-04-08 Thread JIRA

[ 
https://issues.apache.org/jira/browse/CXF-6769?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232047#comment-15232047
 ] 

Torsten Römer commented on CXF-6769:


Setting the property is fine, but since the Message given to 
MessageUtil.getContextualBoolean() is null in this case,
the property is not considered and the defaultValue "true" is returned and the 
underscore is still escaped.

Or am I missing something here?

> Underscores in values of FIQL search expressions are incorrectly escaped
> 
>
> Key: CXF-6769
> URL: https://issues.apache.org/jira/browse/CXF-6769
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.2
> Environment: Webapp deployed to WildFly 10
>Reporter: Torsten Römer
>Assignee: Sergey Beryozkin
>Priority: Minor
> Fix For: 3.1.6, 3.0.9, 3.2.0
>
>
> We are basically "just" using FIQLParser and SQLPrinterVisitor like this:
> final FiqlParser fiqlParser = new FiqlParser<>(SearchBean.class);
> final SearchCondition searchCondition = fiqlParser.parse(search);
> final SQLPrinterVisitor visitor = new 
> SQLPrinterVisitor(table);
> searchCondition.accept(visitor);
> final String sql = visitor.getQuery();
> A search expression like this:
> text==VAL_UE
> yields an SQL query like this:
> SELECT * FROM some_table WHERE text = 'VAL[backslash]_UE'
> (Note [backslash] is supposed to mean a literal "\" which is swallowed here)
> If the table contains a row with text "VAL_UE", the query returns no results 
> because the underscore in the value was preceded with a backslash.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6554) Exception thrown in LoggingInInterceptor

2016-04-08 Thread David J. M. Karlsen (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6554?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232052#comment-15232052
 ] 

David J. M. Karlsen commented on CXF-6554:
--

Any progress on this one? Still seeing the same in 3.1.1

> Exception thrown in LoggingInInterceptor
> 
>
> Key: CXF-6554
> URL: https://issues.apache.org/jira/browse/CXF-6554
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 2.7.17
>Reporter: Damon Horrell
>Priority: Minor
>
> An exception is thrown for some inbound messages when logging is enabled via:
> 
>   
> 
> Overriding the default 65536 character limit fixes the problem:
> 
>   
>   
> 
> -
> Exception in thread "main" javax.xml.ws.soap.SOAPFaultException: 
> [com.ctc.wstx.exc.WstxLazyException] Unexpected end of input block in entity 
> reference
>  at [row,col {unknown-source}]: [1017,49]
>   at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:158)
>   at $Proxy42.getDocumentById(Unknown Source)
>   at 
> nz.govt.moh.eps.proxy.PrescriptionServiceProxy.getDocumentById(PrescriptionServiceProxy.java:82)
>   at nz.govt.moh.eps.client.EpsTestClient.main(EpsTestClient.java:45)
> Caused by: [com.ctc.wstx.exc.WstxLazyException] 
> com.ctc.wstx.exc.WstxEOFException: Unexpected end of input block in entity 
> reference
>  at [row,col {unknown-source}]: [1017,49]
>   at 
> com.ctc.wstx.exc.WstxLazyException.throwLazily(WstxLazyException.java:45)
>   at com.ctc.wstx.sr.StreamScanner.throwLazyError(StreamScanner.java:728)
>   at 
> com.ctc.wstx.sr.BasicStreamReader.safeFinishToken(BasicStreamReader.java:3678)
>   at com.ctc.wstx.sr.BasicStreamReader.getText(BasicStreamReader.java:860)
>   at org.apache.cxf.staxutils.StaxUtils.copy(StaxUtils.java:748)
>   at org.apache.cxf.staxutils.StaxUtils.copy(StaxUtils.java:697)
>   at org.apache.cxf.staxutils.StaxUtils.copy(StaxUtils.java:621)
>   at 
> org.apache.cxf.interceptor.AbstractLoggingInterceptor.writePayload(AbstractLoggingInterceptor.java:164)
>   at 
> org.apache.cxf.interceptor.LoggingInInterceptor.logInputStream(LoggingInInterceptor.java:215)
>   at 
> org.apache.cxf.interceptor.LoggingInInterceptor.logging(LoggingInInterceptor.java:153)
>   at 
> org.apache.cxf.interceptor.LoggingInInterceptor.handleMessage(LoggingInInterceptor.java:79)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:272)
>   at org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:849)
>   at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1632)
>   at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1520)
>   at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1318)
>   at 
> org.apache.cxf.io.CacheAndWriteOutputStream.postClose(CacheAndWriteOutputStream.java:56)
>   at 
> org.apache.cxf.io.CachedOutputStream.close(CachedOutputStream.java:223)
>   at 
> org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56)
>   at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:633)
>   at 
> org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:272)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:572)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:481)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:382)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:335)
>   at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
>   at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:136)
>   ... 3 more
> Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected end of input block 
> in entity reference
>  at [row,col {unknown-source}]: [1017,49]
>   at 
> com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOB(StreamScanner.java:699)
>   at 
> com.ctc.wstx.sr.StreamScanner.loadMoreFromCurrent(StreamScanner.java:1071)
>   at 
> com.ctc.wstx.sr.StreamScanner.getNextCharFromCurrent(StreamScanner.java:810)
>   at com.ctc.wstx.sr.StreamScanner.resolveCharEnt(StreamScanner.java:2325)
>   at 
> com.ctc.wstx.sr.StreamScanner.resolveCharOnlyEntity(StreamScanner.java:1347)
>   at 
> com.ctc.wstx.sr.BasicStreamReader.readTextSecondary(BasicStreamReader.java:4715)
>   at 
> com.ctc.wstx.sr.BasicStreamReader.finishToken(BasicStreamReader.java:3722)
>   at 
> com.ctc.wstx.sr.BasicStreamReader.safeFinishToken(B

[jira] [Commented] (CXF-6769) Underscores in values of FIQL search expressions are incorrectly escaped

2016-04-08 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6769?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232196#comment-15232196
 ] 

Sergey Beryozkin commented on CXF-6769:
---

Right I see...The only workaround then is to copy  SQLPrinterVisitor.visit() 
into its subclass and block escaping the underscore. I guess for the next 
release I can try to make much easier to override it...

> Underscores in values of FIQL search expressions are incorrectly escaped
> 
>
> Key: CXF-6769
> URL: https://issues.apache.org/jira/browse/CXF-6769
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.2
> Environment: Webapp deployed to WildFly 10
>Reporter: Torsten Römer
>Assignee: Sergey Beryozkin
>Priority: Minor
> Fix For: 3.1.6, 3.0.9, 3.2.0
>
>
> We are basically "just" using FIQLParser and SQLPrinterVisitor like this:
> final FiqlParser fiqlParser = new FiqlParser<>(SearchBean.class);
> final SearchCondition searchCondition = fiqlParser.parse(search);
> final SQLPrinterVisitor visitor = new 
> SQLPrinterVisitor(table);
> searchCondition.accept(visitor);
> final String sql = visitor.getQuery();
> A search expression like this:
> text==VAL_UE
> yields an SQL query like this:
> SELECT * FROM some_table WHERE text = 'VAL[backslash]_UE'
> (Note [backslash] is supposed to mean a literal "\" which is swallowed here)
> If the table contains a row with text "VAL_UE", the query returns no results 
> because the underscore in the value was preceded with a backslash.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6769) Underscores in values of FIQL search expressions are incorrectly escaped

2016-04-08 Thread JIRA

[ 
https://issues.apache.org/jira/browse/CXF-6769?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232223#comment-15232223
 ] 

Torsten Römer commented on CXF-6769:


Fine, we'll either avoid underscores for now or implement the workaround.

Thank you!

> Underscores in values of FIQL search expressions are incorrectly escaped
> 
>
> Key: CXF-6769
> URL: https://issues.apache.org/jira/browse/CXF-6769
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.2
> Environment: Webapp deployed to WildFly 10
>Reporter: Torsten Römer
>Assignee: Sergey Beryozkin
>Priority: Minor
> Fix For: 3.1.6, 3.0.9, 3.2.0
>
>
> We are basically "just" using FIQLParser and SQLPrinterVisitor like this:
> final FiqlParser fiqlParser = new FiqlParser<>(SearchBean.class);
> final SearchCondition searchCondition = fiqlParser.parse(search);
> final SQLPrinterVisitor visitor = new 
> SQLPrinterVisitor(table);
> searchCondition.accept(visitor);
> final String sql = visitor.getQuery();
> A search expression like this:
> text==VAL_UE
> yields an SQL query like this:
> SELECT * FROM some_table WHERE text = 'VAL[backslash]_UE'
> (Note [backslash] is supposed to mean a literal "\" which is swallowed here)
> If the table contains a row with text "VAL_UE", the query returns no results 
> because the underscore in the value was preceded with a backslash.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Colm O hEigeartaigh (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232265#comment-15232265
 ] 

Colm O hEigeartaigh commented on CXF-6864:
--

You need to install the unlimited security files in the JDK. See the README:

https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=blob;f=distribution/src/main/release/samples/sts/README.txt;h=ea9d096e5c62cea575b7a6002b88a3925629e265;hb=HEAD

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
>   at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
>   at com.sun.proxy.$Proxy49.greetMe(Unknown Source)
>   at demo.wssec.client.Client.main(Client.java:77)
>   at sun.reflect.NativeMethodAccessorImpl.

[jira] [Commented] (CXF-6862) Quoted path field in Cookies appears to be ignored by Chrome and Firefox

2016-04-08 Thread Brendon (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6862?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232270#comment-15232270
 ] 

Brendon commented on CXF-6862:
--

Hi Sergey,

Thanks for looking at this so quickly!

We pass the root path (/) to the NewCookie as a string without escaped quotes 
e.g. new NewCookie(etc, "/", etc).

I wasn't very clear but when I mentioned that Firefox interprets the cookie as 
""/"", I meant that if you inspect the cookie in developer tools it shows the / 
within double quotes but this probably isn't so important.

The main thing is that the cookie was sent to the browser on the root path but 
the browser was storing it under the current path e.g. /login.
Navigating to another page would then not include the cookie (unless it was 
under the previous path).
e.g. /login/profile would pass the cookie but /profile wouldn't.

I will check the latest snapshot when I get a chance and get let you know.

> Quoted path field in Cookies appears to be ignored by Chrome and Firefox
> 
>
> Key: CXF-6862
> URL: https://issues.apache.org/jira/browse/CXF-6862
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.5, 3.1.6
>Reporter: Brendon
>
> I am attempting to update a project from v3.1.4 to v3.1.6 which includes a 
> fix for RFC 2109 compliance (https://issues.apache.org/jira/browse/CXF-6729) 
> but have hit a problem.
> The problem is that since 3.1.5, the cookie path field is wrapped in 
> quotations if it has a special character. This quoted path appears to be 
> ignored by Firefox and Chrome (it does work in Safari though).
> Example:
> Our code base is setting path=/ to specify the root path.
> This gets wrapped in quotations in NewCookieHeaderProvider's toString and 
> sent to the browser (Firefox). 
> Firefox then sees it as ""/"" and ignores it (presumable as "/" is not a 
> valid path).
> The cookie is then set on the current path and not the root path.
> This was not an issue in 3.1.4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (FEDIZ-162) Make it possible to disable the requirement for a Signature when validating a SAML SSO AuthnRequest in the IdP

2016-04-08 Thread Colm O hEigeartaigh (JIRA)
Colm O hEigeartaigh created FEDIZ-162:
-

 Summary: Make it possible to disable the requirement for a 
Signature when validating a SAML SSO AuthnRequest in the IdP
 Key: FEDIZ-162
 URL: https://issues.apache.org/jira/browse/FEDIZ-162
 Project: CXF-Fediz
  Issue Type: Improvement
Affects Versions: 1.3.0
Reporter: Colm O hEigeartaigh
Assignee: Colm O hEigeartaigh
 Fix For: 1.3.1


Make it possible to disable the requirement for a Signature when validating a 
SAML SSO AuthnRequest in the IdP



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (FEDIZ-163) Default to disabling Deflate Encoding for the SAML SSO response

2016-04-08 Thread Colm O hEigeartaigh (JIRA)
Colm O hEigeartaigh created FEDIZ-163:
-

 Summary: Default to disabling Deflate Encoding for the SAML SSO 
response
 Key: FEDIZ-163
 URL: https://issues.apache.org/jira/browse/FEDIZ-163
 Project: CXF-Fediz
  Issue Type: Improvement
Affects Versions: 1.3.0
Reporter: Colm O hEigeartaigh
Assignee: Colm O hEigeartaigh
 Fix For: 1.3.1


In 1.3.0, the deflate encoding is used by default to encode SAML SSO Responses. 
However, the default web flow is to POST the response, and the deflate encoding 
is not supposed to be used here according to the spec.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6862) Quoted path field in Cookies appears to be ignored by Chrome and Firefox

2016-04-08 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6862?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232320#comment-15232320
 ] 

Sergey Beryozkin commented on CXF-6862:
---

thanks; this is a sensitive issue, I'd qualify it as Critical if it were not 
possible to have a workaround, by setting Set-Cookie on Response manually :-). 
yes, please try 3.1.7-SNAPSHOT when you get a chance and let me know if it 
works as expected

> Quoted path field in Cookies appears to be ignored by Chrome and Firefox
> 
>
> Key: CXF-6862
> URL: https://issues.apache.org/jira/browse/CXF-6862
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Affects Versions: 3.1.5, 3.1.6
>Reporter: Brendon
>
> I am attempting to update a project from v3.1.4 to v3.1.6 which includes a 
> fix for RFC 2109 compliance (https://issues.apache.org/jira/browse/CXF-6729) 
> but have hit a problem.
> The problem is that since 3.1.5, the cookie path field is wrapped in 
> quotations if it has a special character. This quoted path appears to be 
> ignored by Firefox and Chrome (it does work in Safari though).
> Example:
> Our code base is setting path=/ to specify the root path.
> This gets wrapped in quotations in NewCookieHeaderProvider's toString and 
> sent to the browser (Firefox). 
> Firefox then sees it as ""/"" and ignores it (presumable as "/" is not a 
> valid path).
> The cookie is then set on the current path and not the root path.
> This was not an issue in 3.1.4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Colm O hEigeartaigh (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232368#comment-15232368
 ] 

Colm O hEigeartaigh commented on CXF-6864:
--

Are you sure you copied the correct jars? The jar sizes listed above match for 
my JDK 8 installation with the default jars:

ls -l /opt/jdk1.8.0_66_restr/jre/lib/security/*.jar
-rw-r--r-- 1 colm colm 3527 Oct  7  2015 
/opt/jdk1.8.0_66_restr/jre/lib/security/local_policy.jar
-rw-r--r-- 1 colm colm 3026 Oct  7  2015 
/opt/jdk1.8.0_66_restr/jre/lib/security/US_export_policy.jar

Whereas using the unlimited jars:

ls -l /opt/jdk1.8.0_72/jre/lib/security/*.jar
-rw-r--r-- 1 colm colm 3035 Jan 21 14:57 
/opt/jdk1.8.0_72/jre/lib/security/local_policy.jar
-rw-r--r-- 1 colm colm 3023 Jan 21 14:57 
/opt/jdk1.8.0_72/jre/lib/security/US_export_policy.jar


> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.

[jira] [Resolved] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Charles Moulliard resolved CXF-6864.

Resolution: Fixed

I did a mistake during the process to copy unlimited files to jre/lib/security. 
That works after issuing them again.

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
>   at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
>   at com.sun.proxy.$Proxy49.greetMe(Unknown Source)
>   at demo.wssec.client.Client.main(Client.java:77)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAcc

[jira] [Commented] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15232358#comment-15232358
 ] 

Charles Moulliard commented on CXF-6864:


This has been done. The 2 files (US_export_policy.jar,  local_policy.jar) have 
been copied here as described within the JCE Readme file

{code}
ll 
/Library/Java/JavaVirtualMachines/jdk1.8.0_45.jdk/Contents/Home/jre/lib/security/
total 288
drwxrwxr-x   10 root  wheel340 Apr 10  2015 .
drwxrwxr-x  100 root  wheel   3400 Apr 10  2015 ..
-rw-rw-r--1 root  wheel   3026 Apr 10  2015 US_export_policy.jar
-rw-rw-r--1 root  wheel   4054 Apr 10  2015 blacklist
-rw-rw-r--1 root  wheel   1188 Apr 10  2015 blacklisted.certs
-rw-rw-r--1 root  wheel  98626 Apr 10  2015 cacerts
-rw-rw-r--1 root  wheel   2466 Apr 10  2015 java.policy
-rw-rw-r--1 root  wheel  21270 Apr 10  2015 java.security
-rw-rw-r--1 root  wheel   3527 Apr 10  2015 local_policy.jar
{code}

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at

[jira] [Closed] (CXF-6864) STS Demo - Invalid Key

2016-04-08 Thread Charles Moulliard (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-6864?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Charles Moulliard closed CXF-6864.
--

> STS Demo - Invalid Key
> --
>
> Key: CXF-6864
> URL: https://issues.apache.org/jira/browse/CXF-6864
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.0.9
>Reporter: Charles Moulliard
>
> The STS Demo packaged within the distribution of CXF 3.0.9 doesn't work
> When the client issues the request to get the token from the STS server, the 
> following error is reported 
> Server
> {code}
> Apr 08, 2016 11:57:04 AM org.eclipse.jetty.server.AbstractConnector doStart
> INFO: Started SelectChannelConnector@localhost:8080
> Server ready...
> Apr 08, 2016 11:57:42 AM 
> org.apache.cxf.services.SecurityTokenService.UT_Port.STS
> INFO: Inbound Message
> 
> ID: 1
> Address: http://localhost:8080/SecurityTokenService/UT?wsdl
> Http-Method: GET
> Content-Type:
> Headers: {Accept=[*/*], Cache-Control=[no-cache], connection=[keep-alive], 
> Content-Type=[null], Host=[localhost:8080], Pragma=[no-cache], 
> User-Agent=[Apache CXF 3.0.9]}
> --
> {code}
> Client
> {code}
> INFO: Creating Service {http://apache.org/hello_world_soap_http}SOAPService 
> from WSDL: 
> file:/Users/chmoulli/Downloads/apache-cxf-3.0.9/samples/sts/wsdl/hello_world.wsdl
> Invoking greetMe...
> Apr 08, 2016 11:57:42 AM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Issue
>  has thrown exception, unwinding now
> org.apache.cxf.interceptor.Fault: Illegal key size
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.doSignBeforeEncrypt(SymmetricBindingHandler.java:388)
>   at 
> org.apache.cxf.ws.security.wss4j.policyhandlers.SymmetricBindingHandler.handleBinding(SymmetricBindingHandler.java:124)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessageInternal(PolicyBasedWSS4JOutInterceptor.java:210)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:115)
>   at 
> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JOutInterceptor$PolicyBasedWSS4JOutInterceptorInternal.handleMessage(PolicyBasedWSS4JOutInterceptor.java:102)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at 
> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:849)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:61)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:55)
>   at 
> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:51)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.getTokenFromSTS(IssuedTokenInterceptorProvider.java:397)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.issueToken(IssuedTokenInterceptorProvider.java:531)
>   at 
> org.apache.cxf.ws.security.policy.interceptors.IssuedTokenInterceptorProvider$IssuedTokenOutInterceptor.handleMessage(IssuedTokenInterceptorProvider.java:165)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>   at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>   at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>   at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
>   at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
>   at com.sun.proxy.$Proxy49.greetMe(Unknown Source)
>   at demo.wssec.client.Client.main(Client.java:77)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at org.codehaus.mojo.e

[jira] [Resolved] (FEDIZ-162) Make it possible to disable the requirement for a Signature when validating a SAML SSO AuthnRequest in the IdP

2016-04-08 Thread Colm O hEigeartaigh (JIRA)

 [ 
https://issues.apache.org/jira/browse/FEDIZ-162?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh resolved FEDIZ-162.
---
Resolution: Fixed

> Make it possible to disable the requirement for a Signature when validating a 
> SAML SSO AuthnRequest in the IdP
> --
>
> Key: FEDIZ-162
> URL: https://issues.apache.org/jira/browse/FEDIZ-162
> Project: CXF-Fediz
>  Issue Type: Improvement
>Affects Versions: 1.3.0
>Reporter: Colm O hEigeartaigh
>Assignee: Colm O hEigeartaigh
> Fix For: 1.3.1
>
>
> Make it possible to disable the requirement for a Signature when validating a 
> SAML SSO AuthnRequest in the IdP



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)