Uploaded image for project: 'WildFly Elytron'
  1. WildFly Elytron
  2. ELY-1492

java.nio.file.InvalidPathException: Illegal char ':' at krb5.conf

    XMLWordPrintable

Details

    Description

      This occures in TS on JDK9 on Windows in tests:

      • org.wildfly.security.sasl.gssapi.CommunicationSuiteChild
      • org.wildfly.security.sasl.gs2.Gs2SuiteChild
      javax.security.auth.login.LoginException: 
      java.nio.file.InvalidPathException: Illegal char <:> at index 2: /W:/workspace/wildfly-elytron-unit-tests/4ad7c91f/wildfly-elytron/target/test-classes/krb5.conf
      	at java.base/sun.nio.fs.WindowsPathParser.normalize(WindowsPathParser.java:182)
      	at java.base/sun.nio.fs.WindowsPathParser.parse(WindowsPathParser.java:153)
      	at java.base/sun.nio.fs.WindowsPathParser.parse(WindowsPathParser.java:77)
      	at java.base/sun.nio.fs.WindowsPath.parse(WindowsPath.java:92)
      	at java.base/sun.nio.fs.WindowsFileSystem.getPath(WindowsFileSystem.java:229)
      	at java.base/java.nio.file.Paths.get(Paths.java:84)
      	at java.security.jgss/sun.security.krb5.Config.lambda$loadConfigFile$0(Config.java:639)
      	at java.base/java.security.AccessController.doPrivileged(Native Method)
      	at java.base/java.security.AccessController.doPrivileged(AccessController.java:429)
      	at java.security.jgss/sun.security.krb5.Config.loadConfigFile(Config.java:638)
      	at java.security.jgss/sun.security.krb5.Config.<init>(Config.java:176)
      	at java.security.jgss/sun.security.krb5.Config.refresh(Config.java:115)
      	at jdk.security.auth/com.sun.security.auth.module.Krb5LoginModule.login(Krb5LoginModule.java:528)
      	at java.base/javax.security.auth.login.LoginContext.invoke(LoginContext.java:726)
      	at java.base/javax.security.auth.login.LoginContext.access$000(LoginContext.java:194)
      	at java.base/javax.security.auth.login.LoginContext$4.run(LoginContext.java:665)
      	at java.base/javax.security.auth.login.LoginContext$4.run(LoginContext.java:663)
      	at java.base/java.security.AccessController.doPrivileged(Native Method)
      	at java.base/javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:663)
      	at java.base/javax.security.auth.login.LoginContext.login(LoginContext.java:574)
      	at org.wildfly.security.sasl.gssapi.JaasUtil.login(JaasUtil.java:71)
      	at org.wildfly.security.sasl.gssapi.JaasUtil.loginClient(JaasUtil.java:53)
      	at org.wildfly.security.sasl.gs2.Gs2SuiteChild.init(Gs2SuiteChild.java:102)
      	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
      	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      	at java.base/java.lang.reflect.Method.invoke(Method.java:564)
      	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
      	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
      	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
      	at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.executeClassMethod(JUnit4TestRunnerDecorator.java:92)
      	at mockit.integration.junit4.internal.JUnit4TestRunnerDecorator.invokeExplosively(JUnit4TestRunnerDecorator.java:30)
      	at mockit.integration.junit4.internal.MockFrameworkMethod.invokeExplosively(MockFrameworkMethod.java:37)
      	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java)
      	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:24)
      	at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
      	at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
      	at org.junit.runners.Suite.runChild(Suite.java:128)
      	at org.junit.runners.Suite.runChild(Suite.java:27)
      	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
      	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
      	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
      	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
      	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
      	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
      	at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
      	at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
      	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:367)
      	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:274)
      	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
      	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:161)
      	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:290)
      	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:242)
      	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:121)
      
      	at java.base/javax.security.auth.login.LoginContext.invoke(LoginContext.java:821)
      	at java.base/javax.security.auth.login.LoginContext.access$000(LoginContext.java:194)
      	at java.base/javax.security.auth.login.LoginContext$4.run(LoginContext.java:665)
      	at java.base/javax.security.auth.login.LoginContext$4.run(LoginContext.java:663)
      	at java.base/java.security.AccessController.doPrivileged(Native Method)
      	at java.base/javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:663)
      	at java.base/javax.security.auth.login.LoginContext.login(LoginContext.java:574)
      	at org.wildfly.security.sasl.gssapi.JaasUtil.login(JaasUtil.java:71)
      	at org.wildfly.security.sasl.gssapi.JaasUtil.loginClient(JaasUtil.java:53)
      	at org.wildfly.security.sasl.gs2.Gs2SuiteChild.init(Gs2SuiteChild.java:102)
      

      [1] https://jenkins.hosts.mwqe.eng.bos.redhat.com/hudson/view/EAP7/view/EAP7-Security/view/Wildfly-Elytron/job/wildfly-elytron-unit-tests/41/jdk=jdk1.9,label=eap-sustaining&&w2k12r2&&x86_64/testReport/

      Attachments

        Activity

          People

            jkalina@redhat.com Jan Kalina (Inactive)
            mchoma@redhat.com Martin Choma
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: