Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jdk_security3_0 and jdk_security1_0 have problems on Windows systems. #3855

Open
sxa opened this issue Jan 6, 2025 · 4 comments
Open

jdk_security3_0 and jdk_security1_0 have problems on Windows systems. #3855

sxa opened this issue Jan 6, 2025 · 4 comments
Labels

Comments

@sxa
Copy link
Member

sxa commented Jan 6, 2025

Please set the title to indicate the test name and machine name where known.

To make it easy for the infrastructure team to repeat and diagnose, please
answer the following questions:

Any other details:
This is a full dump of links etc. so may have more information not directly relevant to this, especially since some of it covers the wsl issue covered in another issue in this repostitory:
:
Noticed during some experimentation I've been doing on Windows. I initially thought that this was restricted to the new -4 machine (which is currently offline) but it has also been seen on -1:

Original failures on -1 in jdk_security1 and jdk_security4 (Some covered by #3853)

 - sun/security/krb5/runNameEquals.sh.runNameEqualsjava/security/Security/ClassLoaderDeadlock/ClassLoaderDeadlock.sh.ClassLoaderDeadlock 94 ms 1

jdk_security3 and jdk_imageio failed in two tests on -1 (checked after seeing jdk_security3 failures on -4) :

sun/security/ssl/X509TrustManagerImpl/distrust/Symantec.java.Symantecjavax/imageio/plugins/jpeg/JPEGsNotAcceleratedTest.java.JPEGsNotAcceleratedTest 2.8 sec 1

For the above, the first failure is sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target and the second is java.awt.HeadlessException: The application does not have desktop access, but this program performed an operation which requires it. which should have been fixed by running the agent via a terminal on the logged in machine instead of as a service but doesn't seem to have been fully resolved for some reason...

The full list of jdk_security3 failures on -4 were as follows (The math ones seem to be Agent error: java.lang.Exception: Agent 38 timed out with a timeout of 960 seconds; check console log for any additional details:

sun/security/ssl/X509TrustManagerImpl/distrust/Symantec.java.Symantecjavax/net/ssl/SSLSocket/Tls13PacketSize.java.Tls13PacketSize 2.7 sec 1

@sxa sxa added the testFail label Jan 6, 2025
@sxa
Copy link
Member Author

sxa commented Jan 6, 2025

Noting that from https://ci.adoptium.net/job/Grinder/12174/testReport/ (jdk_security3) the distrust test fails on -3 as well, so this might be a potential "real" problem that is showing up and not something specific to the machines.

@Haroon-Khel
Copy link
Contributor

Haroon-Khel commented Jan 7, 2025

According to the openj9 team, the failing sun/security/ssl/X509TrustManagerImpl/distrust/Symantec.java test was renamed from sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java which we have excluded for many jdk versions and platforms
https://github.com/search?q=repo%3Aadoptium%2Faqa-tests+sun%2Fsecurity%2Fssl%2FX509TrustManagerImpl%2FSymantec%2Fdistrust&type=code

@sxa
Copy link
Member Author

sxa commented Jan 7, 2025

It doesn't look like it's just a straight rename - the new one is about 30% smaller (changes occurred between 21.0.6+0 and 21.0.6+1:

Symantec-Distrust.java.gz
distrust-Symantec.java.gz

Having said that - since the OpenJ9 team concluded that this was a result of using the Mozilla cacerts bundle, which adoptium also uses, I suspect this is a valid candidate for exclusion for us too.

@Haroon-Khel
Copy link
Contributor

I suspect this is a valid candidate for exclusion for us too.

I agree

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: No status
Development

No branches or pull requests

2 participants