[jira] [Assigned] (CXF-7086) Dynamically load signature validation keys using KeyName

2016-10-12 Thread Colm O hEigeartaigh (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-7086?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh reassigned CXF-7086:


Assignee: Colm O hEigeartaigh

> Dynamically load signature validation keys using KeyName
> 
>
> Key: CXF-7086
> URL: https://issues.apache.org/jira/browse/CXF-7086
> Project: CXF
>  Issue Type: New Feature
>  Components: JAX-RS Security
>Reporter: Hugo Trippaers
>Assignee: Colm O hEigeartaigh
>Priority: Minor
>
> The current implementation of handling incoming messages with a KeyName 
> identifier is to rely on a single "default" key. The SignatureValidationKey. 
> However it is possible to have multiple different KeyNames and the expected 
> behaviour is to select the right certificate based on the KeyName.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7086) Dynamically load signature validation keys using KeyName

2016-10-12 Thread Colm O hEigeartaigh (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7086?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15568109#comment-15568109
 ] 

Colm O hEigeartaigh commented on CXF-7086:
--

Revisit when we pick up Santuario 2.0.8.

> Dynamically load signature validation keys using KeyName
> 
>
> Key: CXF-7086
> URL: https://issues.apache.org/jira/browse/CXF-7086
> Project: CXF
>  Issue Type: New Feature
>  Components: JAX-RS Security
>Reporter: Hugo Trippaers
>Assignee: Colm O hEigeartaigh
>Priority: Minor
>
> The current implementation of handling incoming messages with a KeyName 
> identifier is to rely on a single "default" key. The SignatureValidationKey. 
> However it is possible to have multiple different KeyNames and the expected 
> behaviour is to select the right certificate based on the KeyName.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (CXF-7075) Remove unnecessary string.length() and map.containsKey(...) calls to improve performance

2016-10-12 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15549928#comment-15549928
 ] 

Sergey Beryozkin edited comment on CXF-7075 at 10/12/16 10:53 AM:
--

Interestingly, when I bump up the TIMES_TO_RUN from 500k to 1 million, then the 
proposed fix looks a bit slower:
Original Code Test
Time to parse one type: 146873609 nanoseconds
Time to parse two types: 119980999 nanoseconds
Time to parse three types: 158751189 nanoseconds
Time to parse twelve types: 792077205 nanoseconds
Proposed Change Test
Time to parse one type: 166478348 nanoseconds
Time to parse two types: 135731365 nanoseconds
Time to parse three types: 163320358 nanoseconds
Time to parse twelve types: 758674187 nanoseconds
Original Code Test
Time to parse one type: 157246321 nanoseconds
Time to parse two types: 129763922 nanoseconds
Time to parse three types: 164354449 nanoseconds
Time to parse twelve types: 840647904 nanoseconds
Proposed Change Test
Time to parse one type: 162607531 nanoseconds
Time to parse two types: 123097493 nanoseconds
Time to parse three types: 165173994 nanoseconds
Time to parse twelve types: 768583383 nanoseconds
Original Code Test
Time to parse one type: 143968053 nanoseconds
Time to parse two types: 133924033 nanoseconds
Time to parse three types: 161509309 nanoseconds
Time to parse twelve types: 809422872 nanoseconds
Proposed Change Test
Time to parse one type: 157101703 nanoseconds
Time to parse two types: 135634786 nanoseconds
Time to parse three types: 158294707 nanoseconds
Time to parse twelve types: 781427304 nanoseconds

I tried re-implementing another way which looks like it might be a little 
faster...
{code:java}
public static List parseMediaTypes(String types) {
List acceptValues = new ArrayList();

if (types != null) {
int x = 0;
int y = types.indexOf(',');
while (y > 0) {
acceptValues.add(toMediaType(types.substring(x, y)));
x = y + 2;
y = types.indexOf(',', x);
}
acceptValues.add(toMediaType(types.substring(x)));

} else {
acceptValues.add(ALL_TYPES);
}

return acceptValues;
}
{code}
With that code, I get these results (new code is labeled as Proposed):
Original Code Test
Time to parse one type: 162089550 nanoseconds
Time to parse two types: 121634212 nanoseconds
Time to parse three types: 164150901 nanoseconds
Time to parse twelve types: 1027082012 nanoseconds
Proposed Change Test
Time to parse one type: 147992281 nanoseconds
Time to parse two types: 118361681 nanoseconds
Time to parse three types: 154465943 nanoseconds
Time to parse twelve types: 744372633 nanoseconds
Original Code Test
Time to parse one type: 171457432 nanoseconds
Time to parse two types: 123348169 nanoseconds
Time to parse three types: 163685283 nanoseconds
Time to parse twelve types: 759016041 nanoseconds
Proposed Change Test
Time to parse one type: 147617428 nanoseconds
Time to parse two types: 118008933 nanoseconds
Time to parse three types: 153649110 nanoseconds
Time to parse twelve types: 756229153 nanoseconds
Original Code Test
Time to parse one type: 151245814 nanoseconds
Time to parse two types: 122917357 nanoseconds
Time to parse three types: 159188030 nanoseconds
Time to parse twelve types: 843513510 nanoseconds
Proposed Change Test
Time to parse one type: 145248903 nanoseconds
Time to parse two types: 118914505 nanoseconds
Time to parse three types: 155509909 nanoseconds
Time to parse twelve types: 767379270 nanoseconds

I haven't run this change on the simple JAX-RS benchmark, but I can do that -- 
I'll be on vacation the next couple of days, so I may not have results until 
next week.

Thanks, Andy




was (Author: andymc):
Interestingly, when I bump up the TIMES_TO_RUN from 500k to 1 million, then the 
proposed fix looks a bit slower:
Original Code Test
Time to parse one type: 146873609 nanoseconds
Time to parse two types: 119980999 nanoseconds
Time to parse three types: 158751189 nanoseconds
Time to parse twelve types: 792077205 nanoseconds
Proposed Change Test
Time to parse one type: 166478348 nanoseconds
Time to parse two types: 135731365 nanoseconds
Time to parse three types: 163320358 nanoseconds
Time to parse twelve types: 758674187 nanoseconds
Original Code Test
Time to parse one type: 157246321 nanoseconds
Time to parse two types: 129763922 nanoseconds
Time to parse three types: 164354449 nanoseconds
Time to parse twelve types: 840647904 nanoseconds
Proposed Change Test
Time to parse one type: 162607531 nanoseconds
Time to parse two types: 123097493 nanoseconds
Time to parse three types: 165173994 nanoseconds
Time to parse twelve types: 768583383 nanoseconds
Original Code Test
Time to parse one type: 143968053 nanoseconds
Time to parse two types: 133924033 nanoseconds
Time to parse 

[jira] [Resolved] (CXF-7075) Remove unnecessary string.length() and map.containsKey(...) calls to improve performance

2016-10-12 Thread Sergey Beryozkin (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-7075?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Beryozkin resolved CXF-7075.
---
Resolution: Fixed

> Remove unnecessary string.length() and map.containsKey(...) calls to improve 
> performance
> 
>
> Key: CXF-7075
> URL: https://issues.apache.org/jira/browse/CXF-7075
> Project: CXF
>  Issue Type: Improvement
>  Components: JAX-RS
>Affects Versions: 3.1.7
>Reporter: Andy McCright
>Assignee: Sergey Beryozkin
> Fix For: 3.2.0, 3.1.8, 3.0.11
>
> Attachments: JAXRSUtils-parseMediaType-perfTest.zip
>
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> Using a simple (echo) JAX-RS benchmark, we've found a few hot spots around 
> string.length() and map.containsKey(...) calls that could be optimized.  
> Initial testing with the proposed changes yielded about a 2-3% improvement.  



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7075) Remove unnecessary string.length() and map.containsKey(...) calls to improve performance

2016-10-12 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15568731#comment-15568731
 ] 

Sergey Beryozkin commented on CXF-7075:
---

Hi Andy

I've applied the code highlighted here:

https://issues.apache.org/jira/browse/CXF-7075?focusedCommentId=15549928&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-15549928

with the minor modifications - some tests were failing: if media types had no 
spaces between them hence trim() was also required, or if the string had a 
trailing ',' - which I believe can happen sometimes with Accept). 

Thanks, Sergey

> Remove unnecessary string.length() and map.containsKey(...) calls to improve 
> performance
> 
>
> Key: CXF-7075
> URL: https://issues.apache.org/jira/browse/CXF-7075
> Project: CXF
>  Issue Type: Improvement
>  Components: JAX-RS
>Affects Versions: 3.1.7
>Reporter: Andy McCright
>Assignee: Sergey Beryozkin
> Fix For: 3.2.0, 3.1.8, 3.0.11
>
> Attachments: JAXRSUtils-parseMediaType-perfTest.zip
>
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> Using a simple (echo) JAX-RS benchmark, we've found a few hot spots around 
> string.length() and map.containsKey(...) calls that could be optimized.  
> Initial testing with the proposed changes yielded about a 2-3% improvement.  



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (CXF-6798) JAXRS 2.0 Clients do not support ParamConverters

2016-10-12 Thread Sergey Beryozkin (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-6798?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Beryozkin resolved CXF-6798.
---
   Resolution: Fixed
 Assignee: Sergey Beryozkin
Fix Version/s: 3.0.10
   3.1.7
   3.2.0

> JAXRS 2.0 Clients do not support ParamConverters
> 
>
> Key: CXF-6798
> URL: https://issues.apache.org/jira/browse/CXF-6798
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Reporter: Sergey Beryozkin
>Assignee: Sergey Beryozkin
> Fix For: 3.2.0, 3.1.7, 3.0.10
>
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6798) JAXRS 2.0 Clients do not support ParamConverters

2016-10-12 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6798?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569058#comment-15569058
 ] 

Sergey Beryozkin commented on CXF-6798:
---

I've just added a test,
http://git-wip-us.apache.org/repos/asf/cxf/commit/9a46a89c

Looks like it was fixed for 3.1.7

Thanks 

> JAXRS 2.0 Clients do not support ParamConverters
> 
>
> Key: CXF-6798
> URL: https://issues.apache.org/jira/browse/CXF-6798
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Reporter: Sergey Beryozkin
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7070) HTTP headers logged in debug

2016-10-12 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7070?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569098#comment-15569098
 ] 

ASF GitHub Bot commented on CXF-7070:
-

GitHub user andymc12 opened a pull request:

https://github.com/apache/cxf/pull/178

CXF-7070 - Avoid logging sensitive headers



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andymc12/cxf headers

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/cxf/pull/178.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #178






> HTTP headers logged in debug
> 
>
> Key: CXF-7070
> URL: https://issues.apache.org/jira/browse/CXF-7070
> Project: CXF
>  Issue Type: Bug
>  Components: Transports
>Reporter: Fadi Mohsen
>
> We try to avoid logging of authorization header value in out/in requests, we 
> filtered out these in interceptors, but turns out these are logged anyway in 
> [CXF debug mode| 
> https://github.com/apache/cxf/blob/120d20f47022a76970ff0fb9c9d7413cfe019eb2/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java#L436]:
> {code}
> if (LOG.isLoggable(Level.FINE)) {
> LOG.log(Level.FINE, "Request Headers: " + headers.toString());
> }
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7046) java.lang.ArrayIndexOutOfBoundsException: 1 AbstractHTTPDestination.getAuthorizationPolicyFromMessage(AbstractHTTPDestination.java:161)

2016-10-12 Thread Andy McCright (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7046?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569271#comment-15569271
 ] 

Andy McCright commented on CXF-7046:


It looks like this issue may have been resolved by CXF-6492 which was released 
in 3.0.9 and 3.1.6.  The affected versions shows 3.1.7, but if that is the 
case, the stack trace is no longer accurate.  Can you try running this test on 
3.1.7 to see if the problem still occurs?  If so, can you post the updated 
stack trace?

Thanks, Andy

> java.lang.ArrayIndexOutOfBoundsException: 1 
> AbstractHTTPDestination.getAuthorizationPolicyFromMessage(AbstractHTTPDestination.java:161)
> ---
>
> Key: CXF-7046
> URL: https://issues.apache.org/jira/browse/CXF-7046
> Project: CXF
>  Issue Type: Bug
>  Components: Transports
>Affects Versions: 2.7.17, 3.1.7
>Reporter: Ranjeeth
>
> When the authorization header is basic and does not contain userinfo cxf 
> thorws exception
>  example header authorization header [ Authorization:Basic ]
> {code:title=ArrayIndexOutOfBoundsException: 1|borderStyle=solid}
> java.lang.ArrayIndexOutOfBoundsException: 1
>   at 
> org.apache.cxf.transport.http.AbstractHTTPDestination.getAuthorizationPolicyFromMessage(AbstractHTTPDestination.java:161)
>   at 
> org.apache.cxf.transport.http.AbstractHTTPDestination.setupMessage(AbstractHTTPDestination.java:349)
>   at 
> org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:222)
>   at 
> org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:218)
>   at 
> org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:163)
>   at 
> org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:137)
>   at 
> org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:158)
>   at 
> org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:243)
>   at 
> org.apache.cxf.transport.servlet.AbstractHTTPServlet.doGet(AbstractHTTPServlet.java:168)
>   at javax.servlet.http.HttpServlet.service(HttpServlet.java:687)
>   at 
> org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:219)
>   at 
> org.eclipse.equinox.http.servlet.internal.HttpServiceRuntimeImpl$LegacyServlet.service(HttpServiceRuntimeImpl.java:1271)
>   at 
> org.eclipse.equinox.http.servlet.internal.registration.EndpointRegistration.service(EndpointRegistration.java:162)
>   at 
> org.eclipse.equinox.http.servlet.internal.servlet.ResponseStateHandler.processRequest(ResponseStateHandler.java:63)
>   at 
> org.eclipse.equinox.http.servlet.internal.HttpServiceRuntimeImpl.doDispatch(HttpServiceRuntimeImpl.java:413)
>   at 
> org.eclipse.equinox.http.servlet.internal.HttpServiceRuntimeImpl.doDispatch(HttpServiceRuntimeImpl.java:358)
>   at 
> org.eclipse.equinox.http.servlet.internal.HttpServiceRuntimeImpl.doDispatch(HttpServiceRuntimeImpl.java:204)
>   at 
> org.eclipse.equinox.http.servlet.internal.servlet.ProxyServlet.processAlias(ProxyServlet.java:91)
>   at 
> org.eclipse.equinox.http.servlet.internal.servlet.ProxyServlet.service(ProxyServlet.java:70)
>   at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
>   at 
> org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:816)
>   at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:583)
>   at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:224)
>   at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1121)
>   at 
> org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:511)
>   at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:185)
>   at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1055)
>   at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)
>   at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:213)
>   at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:109)
>   at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:118)
>   at org.eclipse.jetty.server.Server.handle(Server.java:515)
>   at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:291)
>   at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:242)
>   at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.ja

[jira] [Commented] (CXF-6798) JAXRS 2.0 Clients do not support ParamConverters

2016-10-12 Thread Andrei Ivanov (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6798?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569681#comment-15569681
 ] 

Andrei Ivanov commented on CXF-6798:


Seemed weird to still have missing functionalities for 2.0 after all this time 
:)
But I've learned about {{ParamConverter}} only recently, when trying to use a 
Joda DateTime as param and I didn't understand how this doesn't work in 2016 :-/
I actually thought the {{jackson-datatype-joda}} module would take care of the 
conversion, but it seems I just misunderstood how these things work.

Maybe CXF should provide some {{ParamConverters}} for usual types, like dates 
(both Joda and JSR 310)?

> JAXRS 2.0 Clients do not support ParamConverters
> 
>
> Key: CXF-6798
> URL: https://issues.apache.org/jira/browse/CXF-6798
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-RS
>Reporter: Sergey Beryozkin
>Assignee: Sergey Beryozkin
> Fix For: 3.0.10, 3.1.7, 3.2.0
>
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7041) Observed Memory leak under high traffic condition while using Apache CXF libraries SSL communication

2016-10-12 Thread Andy McCright (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7041?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569904#comment-15569904
 ] 

Andy McCright commented on CXF-7041:


Would it be possible for you to provide an example that could be used to 
reproduce the issue?  If not, could you provide heap dumps after you have 
reproduced the problem?

Thanks, Andy

> Observed Memory leak under high traffic condition while using Apache CXF 
> libraries SSL communication
> 
>
> Key: CXF-7041
> URL: https://issues.apache.org/jira/browse/CXF-7041
> Project: CXF
>  Issue Type: Bug
>  Components: Transports
>Affects Versions: 3.1.2
> Environment: Machine : SunOS lava 5.10 Generic_137137-09 sun4v sparc 
> SUNW,Sun-Fire-T200
>Reporter: Savita
>Priority: Critical
>  Labels: patch, security
>   Original Estimate: 72h
>  Remaining Estimate: 72h
>
> We are using Apache CXF libraries for SSL client implementation in a Spring 
> based application. The client behavior is not stable. We are observing 2 
> issue:
> a) When the load is increased to 20-25 TPS the application processing time 
> increases by 2-3 time. 
> b) We are experiencing memory leak. Basically the memory consumption is not 
> going down. In the heap dump, we could see lot of Apache CXF Objects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-6981) Getting "java.io.IOException: stream is closed" for > 64K messages

2016-10-12 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-6981?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569944#comment-15569944
 ] 

ASF GitHub Bot commented on CXF-6981:
-

GitHub user andymc12 opened a pull request:

https://github.com/apache/cxf/pull/179

CXF-6981 Avoid double close in CacheAndWriteOutputStream



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andymc12/cxf postClose

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/cxf/pull/179.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #179


commit 25aa09fe52180beb183bae3cdc18d7eb9f6807cb
Author: Andy McCright 
Date:   2016-10-03T16:30:24Z

Merge pull request #1 from apache/master

updating to master

commit 6e5efebdff68804a4fc4faf39d4b116aa0444efe
Author: Andy McCright 
Date:   2016-10-12T14:39:13Z

Merge pull request #2 from apache/master

update to latest

commit 192ab806ee18e355f052b327918c84d60e71faf1
Author: andymc12 
Date:   2016-10-12T21:43:52Z

CXF-6981 - Avoid double close on CacheAndWriteOutputStream




> Getting "java.io.IOException: stream is closed" for > 64K messages
> --
>
> Key: CXF-6981
> URL: https://issues.apache.org/jira/browse/CXF-6981
> Project: CXF
>  Issue Type: Bug
>  Components: JAX-WS Runtime
>Affects Versions: 3.0.9
> Environment: JRE 1.8.0_101-b13
>Reporter: Michal Sabo
>
> I am getting an IOException (stream is closed) when CachedOutputStream is 
> trying to close the very same stream twice. For the first time it is closed 
> when maybeDeleteTempFile(currentStream) method is called, the second time 
> during postClose(), both as part of the close() method in CachedOutputStream.
> java.io.IOException: stream is closed
>  at 
> sun.net.www.protocol.http.HttpURLConnection$HttpInputStream.ensureOpen(HttpURLConnection.java:3309)
>  at 
> sun.net.www.protocol.http.HttpURLConnection$HttpInputStream.read(HttpURLConnection.java:3314)
>  at org.apache.cxf.helpers.IOUtils.consume(IOUtils.java:363)
>  at 
> org.apache.cxf.transport.http.URLConnectionHTTPConduit$URLConnectionWrappedOutputStream.closeInputStream(URLConnectionHTTPConduit.java:327)
>  at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1628)
>  at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1551)
>  at 
> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1348)
>  at 
> org.apache.cxf.io.CacheAndWriteOutputStream.postClose(CacheAndWriteOutputStream.java:56)
>  at 
> org.apache.cxf.io.CachedOutputStream.close(CachedOutputStream.java:215)
>  at 
> org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56)
>  at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:651)
>  at 
> org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62)
>  at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
>  at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
>  at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
>  at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
>  at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
>  at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
>  at 
> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CXF-7070) HTTP headers logged in debug

2016-10-12 Thread S V Mohana Rao (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-7070?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15569949#comment-15569949
 ] 

S V Mohana Rao commented on CXF-7070:
-

But with respective security is it okay to pass sensitive data through header?

> HTTP headers logged in debug
> 
>
> Key: CXF-7070
> URL: https://issues.apache.org/jira/browse/CXF-7070
> Project: CXF
>  Issue Type: Bug
>  Components: Transports
>Reporter: Fadi Mohsen
>
> We try to avoid logging of authorization header value in out/in requests, we 
> filtered out these in interceptors, but turns out these are logged anyway in 
> [CXF debug mode| 
> https://github.com/apache/cxf/blob/120d20f47022a76970ff0fb9c9d7413cfe019eb2/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java#L436]:
> {code}
> if (LOG.isLoggable(Level.FINE)) {
> LOG.log(Level.FINE, "Request Headers: " + headers.toString());
> }
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)