You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Jinmei Liao (JIRA)" <ji...@apache.org> on 2018/10/17 18:21:00 UTC

[jira] [Comment Edited] (GEODE-5819) Handshake fails on Java11

    [ https://issues.apache.org/jira/browse/GEODE-5819?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16653992#comment-16653992 ] 

Jinmei Liao edited comment on GEODE-5819 at 10/17/18 6:20 PM:
--------------------------------------------------------------

More SSL failures when we use jdk11 in integration tests:

{quote}
org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest > testConnectionCountIsProperlyDecremented[use ssl true] FAILED
    javax.net.ssl.SSLProtocolException: Connection reset
        at sun.security.ssl.Alert.createSSLException(Alert.java:126)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:321)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:264)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:259)
        at sun.security.ssl.SSLTransport.decode(SSLTransport.java:137)
        at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1152)
        at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1063)
        at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402)
        at org.apache.geode.internal.net.SocketCreator.configureClientSSLSocket(SocketCreator.java:1076)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:934)
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.protobuf.UnsafeUtil (file:/home/geode/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.0/5333f7e422744d76840c08a106e28e519fbe3acd/protobuf-java-3.6.0.jar) to field java.nio.Buffer.address
WARNING: Please consider reporting this to the maintainers of com.google.protobuf.UnsafeUtil
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.protobuf.UnsafeUtil (file:/home/geode/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.0/5333f7e422744d76840c08a106e28e519fbe3acd/protobuf-java-3.6.0.jar) to field java.nio.Buffer.address
WARNING: Please consider reporting this to the maintainers of com.google.protobuf.UnsafeUtil
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:896)
        at org.apache.geode.internal.net.SocketCreator.connectForClient(SocketCreator.java:852)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.getSSLSocket(CacheConnectionJUnitTest.java:258)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.setup(CacheConnectionJUnitTest.java:138)

        Caused by:
        java.net.SocketException: Connection reset
            at java.net.SocketInputStream.read(SocketInputStream.java:186)
            at java.net.SocketInputStream.read(SocketInputStream.java:140)
            at sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:448)
            at sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:165)
            at sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
            ... 9 more

    java.lang.NullPointerException
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.cleanup(CacheConnectionJUnitTest.java:153)

org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest > testBasicMessagesAndStats[use ssl true] FAILED
    javax.net.ssl.SSLProtocolException: Connection reset
        at sun.security.ssl.Alert.createSSLException(Alert.java:126)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:321)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:264)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:259)
        at sun.security.ssl.SSLTransport.decode(SSLTransport.java:137)
        at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1152)
        at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1063)
        at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402)
        at org.apache.geode.internal.net.SocketCreator.configureClientSSLSocket(SocketCreator.java:1076)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:934)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:896)
        at org.apache.geode.internal.net.SocketCreator.connectForClient(SocketCreator.java:852)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.getSSLSocket(CacheConnectionJUnitTest.java:258)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.setup(CacheConnectionJUnitTest.java:138)

        Caused by:
        java.net.SocketException: Connection reset
            at java.net.SocketInputStream.read(SocketInputStream.java:186)
            at java.net.SocketInputStream.read(SocketInputStream.java:140)
            at sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:448)
            at sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:165)
            at sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
            ... 9 more

    java.lang.NullPointerException
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.cleanup(CacheConnectionJUnitTest.java:153)

org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest > clientFailsToConnectIfServerCertificateWrongHostname FAILED
    java.lang.AssertionError: 
    Expecting a cause with message:
      <"java.security.cert.CertificateException: No subject alternative DNS name matching 2a045d79b73b found.">
    but message was:
      <"No subject alternative DNS name matching 2a045d79b73b found.">.
        at org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest.clientFailsToConnectIfServerCertificateWrongHostname(TCPClientSSLIntegrationTest.java:169)

org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest > clientFailsToConnectIfServerCertificateNoHostname FAILED
    java.lang.AssertionError: 
    Expecting a cause with message:
      <"java.security.cert.CertificateException: No name matching 2a045d79b73b found">
    but message was:
      <"No name matching 2a045d79b73b found">.
        at org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest.clientFailsToConnectIfServerCertificateNoHostname(TCPClientSSLIntegrationTest.java:151)
{quote}


was (Author: jinmeiliao):
More SSL failures when we use jdk11 in integration tests:
{{org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest > testConnectionCountIsProperlyDecremented[use ssl true] FAILED
    javax.net.ssl.SSLProtocolException: Connection reset
        at sun.security.ssl.Alert.createSSLException(Alert.java:126)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:321)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:264)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:259)
        at sun.security.ssl.SSLTransport.decode(SSLTransport.java:137)
        at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1152)
        at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1063)
        at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402)
        at org.apache.geode.internal.net.SocketCreator.configureClientSSLSocket(SocketCreator.java:1076)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:934)
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.protobuf.UnsafeUtil (file:/home/geode/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.0/5333f7e422744d76840c08a106e28e519fbe3acd/protobuf-java-3.6.0.jar) to field java.nio.Buffer.address
WARNING: Please consider reporting this to the maintainers of com.google.protobuf.UnsafeUtil
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.protobuf.UnsafeUtil (file:/home/geode/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.0/5333f7e422744d76840c08a106e28e519fbe3acd/protobuf-java-3.6.0.jar) to field java.nio.Buffer.address
WARNING: Please consider reporting this to the maintainers of com.google.protobuf.UnsafeUtil
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:896)
        at org.apache.geode.internal.net.SocketCreator.connectForClient(SocketCreator.java:852)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.getSSLSocket(CacheConnectionJUnitTest.java:258)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.setup(CacheConnectionJUnitTest.java:138)

        Caused by:
        java.net.SocketException: Connection reset
            at java.net.SocketInputStream.read(SocketInputStream.java:186)
            at java.net.SocketInputStream.read(SocketInputStream.java:140)
            at sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:448)
            at sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:165)
            at sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
            ... 9 more

    java.lang.NullPointerException
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.cleanup(CacheConnectionJUnitTest.java:153)

org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest > testBasicMessagesAndStats[use ssl true] FAILED
    javax.net.ssl.SSLProtocolException: Connection reset
        at sun.security.ssl.Alert.createSSLException(Alert.java:126)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:321)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:264)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:259)
        at sun.security.ssl.SSLTransport.decode(SSLTransport.java:137)
        at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1152)
        at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1063)
        at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402)
        at org.apache.geode.internal.net.SocketCreator.configureClientSSLSocket(SocketCreator.java:1076)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:934)
        at org.apache.geode.internal.net.SocketCreator.connect(SocketCreator.java:896)
        at org.apache.geode.internal.net.SocketCreator.connectForClient(SocketCreator.java:852)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.getSSLSocket(CacheConnectionJUnitTest.java:258)
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.setup(CacheConnectionJUnitTest.java:138)

        Caused by:
        java.net.SocketException: Connection reset
            at java.net.SocketInputStream.read(SocketInputStream.java:186)
            at java.net.SocketInputStream.read(SocketInputStream.java:140)
            at sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:448)
            at sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:165)
            at sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
            ... 9 more

    java.lang.NullPointerException
        at org.apache.geode.internal.protocol.protobuf.v1.acceptance.CacheConnectionJUnitTest.cleanup(CacheConnectionJUnitTest.java:153)

org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest > clientFailsToConnectIfServerCertificateWrongHostname FAILED
    java.lang.AssertionError: 
    Expecting a cause with message:
      <"java.security.cert.CertificateException: No subject alternative DNS name matching 2a045d79b73b found.">
    but message was:
      <"No subject alternative DNS name matching 2a045d79b73b found.">.
        at org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest.clientFailsToConnectIfServerCertificateWrongHostname(TCPClientSSLIntegrationTest.java:169)

org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest > clientFailsToConnectIfServerCertificateNoHostname FAILED
    java.lang.AssertionError: 
    Expecting a cause with message:
      <"java.security.cert.CertificateException: No name matching 2a045d79b73b found">
    but message was:
      <"No name matching 2a045d79b73b found">.
        at org.apache.geode.distributed.internal.tcpserver.TCPClientSSLIntegrationTest.clientFailsToConnectIfServerCertificateNoHostname(TCPClientSSLIntegrationTest.java:151)

}}

> Handshake fails on Java11
> -------------------------
>
>                 Key: GEODE-5819
>                 URL: https://issues.apache.org/jira/browse/GEODE-5819
>             Project: Geode
>          Issue Type: Sub-task
>            Reporter: Jinmei Liao
>            Assignee: Patrick Rhomberg
>            Priority: Major
>
> * [RestAPIsWithSSLDUnitTest|http://files.apachegeode-ci.info/builds/1.8.0-build.5/test-results/distributedTest/1538508591/classes/org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.html]. [testSSLWithMultipleCipherSuite|http://files.apachegeode-ci.info/builds/1.8.0-build.5/test-results/distributedTest/1538508591/classes/org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.html#testSSLWithMultipleCipherSuite]
>  * [RestAPIsWithSSLDUnitTest|http://files.apachegeode-ci.info/builds/1.8.0-build.5/test-results/distributedTest/1538508591/classes/org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.html]. [testSSLWithMultipleCipherSuiteLegacy|http://files.apachegeode-ci.info/builds/1.8.0-build.5/test-results/distributedTest/1538508591/classes/org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.html#testSSLWithMultipleCipherSuiteLegacy]
> {noformat}
> java.lang.RuntimeException: unexpected exception
> 	at org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.validateConnection(RestAPIsWithSSLDUnitTest.java:512)
> 	at org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.testSSLWithMultipleCipherSuite(RestAPIsWithSSLDUnitTest.java:701)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> 	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.base/java.lang.reflect.Method.invoke(Method.java:564)
> 	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
> 	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> 	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
> 	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> 	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> 	at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> 	at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
> 	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
> 	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
> 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
> 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
> 	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
> 	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
> 	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
> 	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
> 	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
> 	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> 	at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.runTestClass(JUnitTestClassExecutor.java:106)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:58)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:38)
> 	at org.gradle.api.internal.tasks.testing.junit.AbstractJUnitTestClassProcessor.processTestClass(AbstractJUnitTestClassProcessor.java:66)
> 	at org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> 	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.base/java.lang.reflect.Method.invoke(Method.java:564)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
> 	at org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
> 	at org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
> 	at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
> 	at org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:117)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> 	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.base/java.lang.reflect.Method.invoke(Method.java:564)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
> 	at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:155)
> 	at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:137)
> 	at org.gradle.internal.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:404)
> 	at org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:63)
> 	at org.gradle.internal.concurrent.ManagedExecutorImpl$1.run(ManagedExecutorImpl.java:46)
> 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1135)
> 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
> 	at org.gradle.internal.concurrent.ThreadFactoryImpl$ManagedThreadRunnable.run(ThreadFactoryImpl.java:55)
> 	at java.base/java.lang.Thread.run(Thread.java:844)
> Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
> 	at java.base/sun.security.ssl.Alerts.getSSLException(Alerts.java:198)
> 	at java.base/sun.security.ssl.Alerts.getSSLException(Alerts.java:159)
> 	at java.base/sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2046)
> 	at java.base/sun.security.ssl.SSLSocketImpl.processInputRecord(SSLSocketImpl.java:1207)
> 	at java.base/sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1074)
> 	at java.base/sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973)
> 	at java.base/sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1402)
> 	at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1429)
> 	at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)
> 	at org.apache.http.conn.ssl.SSLConnectionSocketFactory.createLayeredSocket(SSLConnectionSocketFactory.java:396)
> 	at org.apache.http.conn.ssl.SSLConnectionSocketFactory.connectSocket(SSLConnectionSocketFactory.java:355)
> 	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
> 	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
> 	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
> 	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
> 	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
> 	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
> 	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
> 	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
> 	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
> 	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
> 	at org.apache.geode.rest.internal.web.controllers.RestAPIsWithSSLDUnitTest.validateConnection(RestAPIsWithSSLDUnitTest.java:490){noformat}



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)