-
Type:
Bug
-
Status: Resolved (View Workflow)
-
Priority:
Blocker
-
Resolution: Done
-
Affects Version/s: EAP64 1.8.2.GA, EAP71 1.2.2.GA
-
Fix Version/s: SSO72 1.2.0.GA, JDG71 1.4.0.GA, KIESRV64_70 1.1.0.GA, KIESRV64 1.4.0.GA, EAP71 1.3.0.GA, JDV64 1.1.0.GA, EAP64 1.9.0.GA
-
Labels:
-
Target Release:
-
Steps to Reproduce:
-
Git Pull Request:https://github.com/jboss-openshift/cct_module/pull/232, https://github.com/jboss-openshift/cct_module/pull/233, https://github.com/jboss-openshift/cct_module/pull/234, https://github.com/jboss-openshift/cct_module/pull/238, https://github.com/jboss-openshift/cct_module/pull/239, https://github.com/jboss-openshift/cct_module/pull/240
On the current jboss-eap-7/eap71-openshift:1.2-15 (unreleased) there seems to be a regression affecting the JCEKS keystores. The only change in the image since 1.2-12 is an update to the OpenJDK java-1.8.0-openjdk-1.8.0.171-7.b10.el7.x86_64
5:44:07,350 ERROR [org.jboss.msc.service.fail] (ServerService Thread Pool -- 68) MSC000001: Failed to start service org.wildfly.clustering.jgroups.channel.ee: org.jboss.msc.service.StartException in service org.wildfly.clustering.jgroups.channel.ee: java.lang.Exception: Unable to load keystore /etc/jgroups-encrypt-secret-volume/jgroups.jceks: java.io.IOException: Invalid secret key format
|
at org.jboss.as.clustering.jgroups.subsystem.ChannelBuilder.start(ChannelBuilder.java:104)
|
at org.wildfly.clustering.service.AsynchronousServiceBuilder.lambda$start$0(AsynchronousServiceBuilder.java:99)
|
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
|
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
|
at java.lang.Thread.run(Thread.java:748)
|
at org.jboss.threads.JBossThread.run(JBossThread.java:320)
|
Caused by: java.lang.Exception: Unable to load keystore /etc/jgroups-encrypt-secret-volume/jgroups.jceks: java.io.IOException: Invalid secret key format
|
at org.jgroups.protocols.SYM_ENCRYPT.readSecretKeyFromKeystore(SYM_ENCRYPT.java:106)
|
at org.jgroups.protocols.SYM_ENCRYPT.init(SYM_ENCRYPT.java:76)
|
at org.jgroups.stack.ProtocolStack.initProtocolStack(ProtocolStack.java:861)
|
at org.jgroups.stack.ProtocolStack.init(ProtocolStack.java:831)
|
at org.jboss.as.clustering.jgroups.JChannelFactory.createChannel(JChannelFactory.java:108)
|
at org.jboss.as.clustering.jgroups.subsystem.ChannelBuilder.start(ChannelBuilder.java:102)
|
... 5 more
|
- is followed up by
-
CLOUD-2506 [EAP7] - Drop CLOUD-2501 workaround
-
- New
-
-
CLOUD-2507 [EAP64] Drop CLOUD-2501 workaround
-
- New
-
- is incorporated by
-
CLOUD-2495 [EAP7.1] RHSA-2018:1191 Openjdk
-
- Closed
-
-
CLOUD-2496 [EAP6.4] RHSA-2018:1191
-
- Closed
-
-
CLOUD-2500 EAP-CD: OpenJDK multiple CVEs (CVE-2018-2790, CVE-2018-2794, CVE-2018-2795, CVE-2018-2796, CVE-2018-2797, CVE-2018-2798, CVE-2018-2799, CVE-2018-2800, CVE-2018-2814, CVE-2018-2815)
-
- Closed
-