You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "David Handermann (Jira)" <ji...@apache.org> on 2021/09/28 14:54:00 UTC

[jira] [Assigned] (NIFI-9253) Build broken by nifi-security-socket-ssl test issue

     [ https://issues.apache.org/jira/browse/NIFI-9253?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

David Handermann reassigned NIFI-9253:
--------------------------------------

    Assignee: David Handermann

> Build broken by nifi-security-socket-ssl test issue
> ---------------------------------------------------
>
>                 Key: NIFI-9253
>                 URL: https://issues.apache.org/jira/browse/NIFI-9253
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core Framework
>         Environment: Apache Maven 3.8.1 (05c21c65bdfed0f71a2f2ada8b84da59348c4c5d)
> Maven home: /development/tools/apache-maven-3.8.1
> Java version: 11.0.12, vendor: Azul Systems, Inc., runtime: /usr/lib/jvm/zulu11.50.19-ca-jdk11.0.12-linux_x64
> Default locale: en_US, platform encoding: UTF-8
> OS name: "linux", version: "5.13.15-200.fc34.x86_64", arch: "amd64", family: "unix"
>            Reporter: Joe Witt
>            Assignee: David Handermann
>            Priority: Major
>
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by com.esotericsoftware.kryo.util.UnsafeUtil (file:/home/apachenifi/.m2/repository/com/esotericsoftware/kryo/kryo/2.24.0/kryo-2.24.0.jar) to constructor java.nio.DirectByteBuffer(long,int,java.lang.Object)
> [ERROR] WARNING: Please consider reporting this to the maintainers of com.esotericsoftware.kryo.util.UnsafeUtil
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future release
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by org.codehaus.groovy.reflection.CachedClass (file:/home/apachenifi/.m2/repository/org/codehaus/groovy/groovy/2.5.14/groovy-2.5.14.jar) to method java.lang.Object.finalize()
> [ERROR] WARNING: Please consider reporting this to the maintainers of org.codehaus.groovy.reflection.CachedClass
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future release
> [INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.424 s - in org.apache.nifi.authorization.CompositeConfigurableUserGroupProviderTest
> [INFO] Running org.apache.nifi.authorization.StandardManagedAuthorizerTest
> [INFO] Tests run: 15, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.17 s - in org.apache.nifi.authorization.StandardManagedAuthorizerTest
> [INFO] Running org.apache.nifi.authorization.CompositeUserGroupProviderTest
> [INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.apache.nifi.authorization.CompositeUserGroupProviderTest
> [INFO] Running org.apache.nifi.authorization.user.NiFiUserUtilsTest
> [INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.485 s - in org.apache.nifi.properties.AESSensitivePropertyProviderTest
> [ERROR] WARNING: An illegal reflective access operation has occurred
> [ERROR] WARNING: Illegal reflective access by org.codehaus.groovy.reflection.CachedClass (file:/home/apachenifi/.m2/repository/org/codehaus/groovy/groovy/2.5.14/groovy-2.5.14.jar) to method java.lang.Object.finalize()
> [ERROR] WARNING: Please consider reporting this to the maintainers of org.codehaus.groovy.reflection.CachedClass
> [ERROR] WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
> [ERROR] WARNING: All illegal access operations will be denied in a future release
> [ERROR] Errors: 
> [ERROR]   SSLSocketChannelTest.testClientConnectWriteReadTls13:147->assertChannelConnectedWriteReadClosed:208->processClientSslSocketChannel:255->lambda$assertChannelConnectedWriteReadClosed$1:218 UncheckedIO
> [INFO] 
> [ERROR] Tests run: 6, Failures: 0, Errors: 1, Skipped: 0
> [INFO] Skipping because packaging 'nar' is not pom.
> [ERROR] Tests run: 6, Failures: 0, Errors: 1, Skipped: 0, Time elapsed: 12.95 s <<< FAILURE! - in org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest
> [ERROR] org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13  Time elapsed: 2.116 s  <<< ERROR!
> java.io.UncheckedIOException: Channel Failed for TLSv1.3
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:218)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> Caused by: javax.net.ssl.SSLException: Tag mismatch!
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelWriteRead(SSLSocketChannelTest.java:234)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:213)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> Caused by: javax.crypto.AEADBadTagException: Tag mismatch!
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelWriteRead(SSLSocketChannelTest.java:234)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.lambda$assertChannelConnectedWriteReadClosed$1(SSLSocketChannelTest.java:213)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.processClientSslSocketChannel(SSLSocketChannelTest.java:255)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.assertChannelConnectedWriteReadClosed(SSLSocketChannelTest.java:208)
> 	at org.apache.nifi.remote.io.socket.ssl.SSLSocketChannelTest.testClientConnectWriteReadTls13(SSLSocketChannelTest.java:147)
> [INFO] 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)