[jira] [Resolved] (GEODE-1247) Unable to stop members by name when using gfsh over http

2016-11-15 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1247?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1247.

   Resolution: Fixed
 Assignee: Jinmei Liao
Fix Version/s: 1.1.0-incubating

> Unable to stop members by name when using gfsh over http
> 
>
> Key: GEODE-1247
> URL: https://issues.apache.org/jira/browse/GEODE-1247
> Project: Geode
>  Issue Type: Bug
>  Components: gfsh, rest (admin)
>Reporter: Jens Deppe
>Assignee: Jinmei Liao
> Fix For: 1.1.0-incubating
>
>
> I'm connecting to my cluster with http:
> {noformat}
> gfsh>connect --use-http=true --url=http://localhost:7070/gemfire/v1
> {noformat}
> And creating a server...
> {noformat}
> gfsh>start server --name=server1
> Starting a GemFire Server in /Users/jdeppe/debug/server1...
> .
> Server in /Users/jdeppe/debug/server1 on 192.168.99.1[40404] as server1 is 
> currently online.
> Process ID: 97639
> Uptime: 2 seconds
> GemFire Version: 1.0.0-incubating.M3-SNAPSHOT
> Java Version: 1.8.0_77
> Log File: /Users/jdeppe/debug/server1/server1.log
> JVM Arguments: -Dgemfire.default.locators=192.168.99.1[19991] 
> -Dgemfire.use-cluster-configuration=true -XX:OnOutOfMemoryError=kill -KILL %p 
> -Dgemfire.launcher.registerSignalHandlers=true -Djava.awt.headless=true 
> -Dsun.rmi.dgc.server.gcInterval=9223372036854775806
> Class-Path: 
> /Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-core-1.0.0-incubating.M3-SNAPSHOT.jar:/Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-dependencies.jar
> gfsh>list members;
>   Name   | Id
>  | -
> locator1 | 192.168.99.1(locator1:97595:locator):1024
> server1  | 192.168.99.1(server1:97639):1025
> {noformat}
> But cannot stop it...
> {noformat}
> gfsh>stop server --name=server1
> An error occurred while attempting to stop a Cache Server: The HTTP request 
> failed with: 500 - Server Error
> {noformat}
> The locator log shows this error:
> {noformat}
> [severe 2016/04/18 13:54:49.754 PDT locator1  tid=0x42] 
> org.springframework.http.converter.HttpMessageNotReadableException: Could not 
> read document: invalid stream header: 7B226F62; nested exception is 
> java.io.StreamCorruptedException: invalid stream header: 7B226F62
> at 
> org.springframework.web.servlet.mvc.method.annotation.AbstractMessageConverterMethodArgumentResolver.readWithMessageConverters(AbstractMessageConverterMethodArgumentResolver.java:227)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestResponseBodyMethodProcessor.readWithMessageConverters(RequestResponseBodyMethodProcessor.java:147)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestResponseBodyMethodProcessor.resolveArgument(RequestResponseBodyMethodProcessor.java:125)
> at 
> org.springframework.web.method.support.HandlerMethodArgumentResolverComposite.resolveArgument(HandlerMethodArgumentResolverComposite.java:78)
> at 
> org.springframework.web.method.support.InvocableHandlerMethod.getMethodArgumentValues(InvocableHandlerMethod.java:162)
> at 
> org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:129)
> at 
> org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:110)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:814)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:737)
> at 
> org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:85)
> at 
> org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:959)
> at 
> org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893)
> at 
> org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969)
> at 
> org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871)
> at javax.servlet.http.HttpServlet.service(HttpServlet.java:707)
> at 
> org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845)
> at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
> at 
> org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:821)
> at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1685)
> at 
> 

[jira] [Commented] (GEODE-2076) --locators option on start server is broken when specifying an embedded locator

2016-11-15 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2076?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15668236#comment-15668236
 ] 

Jinmei Liao commented on GEODE-2076:


The error you encounter must be because of the gfsh parsing issue we've just 
discovered: GEODE-2104.

> --locators option on start server is broken when specifying an embedded 
> locator
> ---
>
> Key: GEODE-2076
> URL: https://issues.apache.org/jira/browse/GEODE-2076
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jinmei Liao
> Fix For: 1.1.0-incubating
>
>
> This is a follow-on bug from comments in GEODE-1986 from John Blum.
> "2. Second, the --locators option on start server is broken, hence the reason 
> I specified --server-port for both servers on start to avoid bind Exceptions 
> and used the --J option to specify the embedded Locator of "Server1" with the 
> gemfire.locators System property when starting "Server2".
> Otherwise, "Server2" starts in standalone mode!"
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --locators=localhost[10334]
> Starting a Geode Server in /Users/dhardman/test/Server1...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/dhardman/test/Server1 for full details.
> objc[9851]: Class JavaLaunchHelper is implemented in both 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/bin/java 
> and 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/lib/libinstrument.dylib.
>  One of the two will be used. Which one is undefined.
> Exception in thread "main" org.apache.geode.GemFireConfigException: Unable to 
> join the distributed system.  Operation either timed out, was stopped or 
> Locator does not exist.
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.join(GMSMembershipManager.java:659)
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.joinDistributedSystem(GMSMembershipManager.java:745)
> at 
> org.apache.geode.distributed.internal.membership.gms.Services.start(Services.java:181)
> at 
> org.apache.geode.distributed.internal.membership.gms.GMSMemberFactory.newMembershipManager(GMSMemberFactory.java:102)
> at 
> org.apache.geode.distributed.internal.membership.MemberFactory.newMembershipManager(MemberFactory.java:89)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1112)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1160)
> at 
> org.apache.geode.distributed.internal.DistributionManager.create(DistributionManager.java:531)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.initialize(InternalDistributedSystem.java:683)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.newInstance(InternalDistributedSystem.java:297)
> at 
> org.apache.geode.distributed.DistributedSystem.connect(DistributedSystem.java:202)
> at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:216)
> at 
> org.apache.geode.distributed.internal.DefaultServerLauncherCacheProvider.createCache(DefaultServerLauncherCacheProvider.java:52)
> at 
> org.apache.geode.distributed.ServerLauncher.createCache(ServerLauncher.java:857)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:769)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:696)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:228)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2075) --disable-default-server does not prevent "Geode Server" from attempting the default CacheServer port (40404)

2016-11-15 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15668232#comment-15668232
 ] 

Jinmei Liao commented on GEODE-2075:


actually the error must be because of the parsing error.

>  --disable-default-server does not prevent "Geode Server" from attempting the 
> default CacheServer port (40404)
> --
>
> Key: GEODE-2075
> URL: https://issues.apache.org/jira/browse/GEODE-2075
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jared Stewart
> Fix For: 1.1.0-incubating
>
>
> This is a follow-up bug from issues reported in GEODE-1986 from John Blum.
> "--disable-default-server does not prevent the "Geode Server" from trying to 
> start on the default CacheServer port (40404) anyway
> When I attempt to start my second server ("Server2") the firs time if failed 
> with..."
> --disable-default-server should choose a different port
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --J=-Dgemfire.start-locator=localhost[10334]
> gfsh>start server --name=Server2 --log-level=config 
> --J=-Dgemfire.locators=localhost[10334] --disable-default-server
> Starting a Geode Server in /Users/jblum/pivdev/lab/Server2...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/jblum/pivdev/lab/Server2 for full details.
> Exception in thread "main" java.lang.RuntimeException: An IO error occurred 
> while starting a Server in /Users/jblum/pivdev/lab/Server2 on 
> 10.99.199.3[40404]: Network is unreachable; port (40404) is not available on 
> localhost.
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:735)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:633)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:184)
> Caused by: java.net.BindException: Network is unreachable; port (40404) is 
> not available on localhost.
> at 
> org.apache.geode.distributed.AbstractLauncher.assertPortAvailable(AbstractLauncher.java:127)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:688)
> ... 2 more



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2076) --locators option on start server is broken when specifying an embedded locator

2016-11-15 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2076?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15668227#comment-15668227
 ] 

Jinmei Liao commented on GEODE-2076:


Must be you are using an older version of gfsh. I'll close this for now.

> --locators option on start server is broken when specifying an embedded 
> locator
> ---
>
> Key: GEODE-2076
> URL: https://issues.apache.org/jira/browse/GEODE-2076
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jinmei Liao
> Fix For: 1.1.0-incubating
>
>
> This is a follow-on bug from comments in GEODE-1986 from John Blum.
> "2. Second, the --locators option on start server is broken, hence the reason 
> I specified --server-port for both servers on start to avoid bind Exceptions 
> and used the --J option to specify the embedded Locator of "Server1" with the 
> gemfire.locators System property when starting "Server2".
> Otherwise, "Server2" starts in standalone mode!"
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --locators=localhost[10334]
> Starting a Geode Server in /Users/dhardman/test/Server1...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/dhardman/test/Server1 for full details.
> objc[9851]: Class JavaLaunchHelper is implemented in both 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/bin/java 
> and 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/lib/libinstrument.dylib.
>  One of the two will be used. Which one is undefined.
> Exception in thread "main" org.apache.geode.GemFireConfigException: Unable to 
> join the distributed system.  Operation either timed out, was stopped or 
> Locator does not exist.
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.join(GMSMembershipManager.java:659)
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.joinDistributedSystem(GMSMembershipManager.java:745)
> at 
> org.apache.geode.distributed.internal.membership.gms.Services.start(Services.java:181)
> at 
> org.apache.geode.distributed.internal.membership.gms.GMSMemberFactory.newMembershipManager(GMSMemberFactory.java:102)
> at 
> org.apache.geode.distributed.internal.membership.MemberFactory.newMembershipManager(MemberFactory.java:89)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1112)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1160)
> at 
> org.apache.geode.distributed.internal.DistributionManager.create(DistributionManager.java:531)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.initialize(InternalDistributedSystem.java:683)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.newInstance(InternalDistributedSystem.java:297)
> at 
> org.apache.geode.distributed.DistributedSystem.connect(DistributedSystem.java:202)
> at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:216)
> at 
> org.apache.geode.distributed.internal.DefaultServerLauncherCacheProvider.createCache(DefaultServerLauncherCacheProvider.java:52)
> at 
> org.apache.geode.distributed.ServerLauncher.createCache(ServerLauncher.java:857)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:769)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:696)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:228)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2075) --disable-default-server does not prevent "Geode Server" from attempting the default CacheServer port (40404)

2016-11-15 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15668229#comment-15668229
 ] 

Jinmei Liao commented on GEODE-2075:


close this for now according to [~jblum]'s comment in GEODE-2076

>  --disable-default-server does not prevent "Geode Server" from attempting the 
> default CacheServer port (40404)
> --
>
> Key: GEODE-2075
> URL: https://issues.apache.org/jira/browse/GEODE-2075
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jared Stewart
> Fix For: 1.1.0-incubating
>
>
> This is a follow-up bug from issues reported in GEODE-1986 from John Blum.
> "--disable-default-server does not prevent the "Geode Server" from trying to 
> start on the default CacheServer port (40404) anyway
> When I attempt to start my second server ("Server2") the firs time if failed 
> with..."
> --disable-default-server should choose a different port
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --J=-Dgemfire.start-locator=localhost[10334]
> gfsh>start server --name=Server2 --log-level=config 
> --J=-Dgemfire.locators=localhost[10334] --disable-default-server
> Starting a Geode Server in /Users/jblum/pivdev/lab/Server2...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/jblum/pivdev/lab/Server2 for full details.
> Exception in thread "main" java.lang.RuntimeException: An IO error occurred 
> while starting a Server in /Users/jblum/pivdev/lab/Server2 on 
> 10.99.199.3[40404]: Network is unreachable; port (40404) is not available on 
> localhost.
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:735)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:633)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:184)
> Caused by: java.net.BindException: Network is unreachable; port (40404) is 
> not available on localhost.
> at 
> org.apache.geode.distributed.AbstractLauncher.assertPortAvailable(AbstractLauncher.java:127)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:688)
> ... 2 more



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-2076) --locators option on start server is broken when specifying an embedded locator

2016-11-15 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2076?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-2076.

   Resolution: Fixed
Fix Version/s: 1.1.0-incubating

> --locators option on start server is broken when specifying an embedded 
> locator
> ---
>
> Key: GEODE-2076
> URL: https://issues.apache.org/jira/browse/GEODE-2076
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jinmei Liao
> Fix For: 1.1.0-incubating
>
>
> This is a follow-on bug from comments in GEODE-1986 from John Blum.
> "2. Second, the --locators option on start server is broken, hence the reason 
> I specified --server-port for both servers on start to avoid bind Exceptions 
> and used the --J option to specify the embedded Locator of "Server1" with the 
> gemfire.locators System property when starting "Server2".
> Otherwise, "Server2" starts in standalone mode!"
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --locators=localhost[10334]
> Starting a Geode Server in /Users/dhardman/test/Server1...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/dhardman/test/Server1 for full details.
> objc[9851]: Class JavaLaunchHelper is implemented in both 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/bin/java 
> and 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/lib/libinstrument.dylib.
>  One of the two will be used. Which one is undefined.
> Exception in thread "main" org.apache.geode.GemFireConfigException: Unable to 
> join the distributed system.  Operation either timed out, was stopped or 
> Locator does not exist.
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.join(GMSMembershipManager.java:659)
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.joinDistributedSystem(GMSMembershipManager.java:745)
> at 
> org.apache.geode.distributed.internal.membership.gms.Services.start(Services.java:181)
> at 
> org.apache.geode.distributed.internal.membership.gms.GMSMemberFactory.newMembershipManager(GMSMemberFactory.java:102)
> at 
> org.apache.geode.distributed.internal.membership.MemberFactory.newMembershipManager(MemberFactory.java:89)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1112)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1160)
> at 
> org.apache.geode.distributed.internal.DistributionManager.create(DistributionManager.java:531)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.initialize(InternalDistributedSystem.java:683)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.newInstance(InternalDistributedSystem.java:297)
> at 
> org.apache.geode.distributed.DistributedSystem.connect(DistributedSystem.java:202)
> at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:216)
> at 
> org.apache.geode.distributed.internal.DefaultServerLauncherCacheProvider.createCache(DefaultServerLauncherCacheProvider.java:52)
> at 
> org.apache.geode.distributed.ServerLauncher.createCache(ServerLauncher.java:857)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:769)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:696)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:228)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2076) --locators option on start server is broken when specifying an embedded locator

2016-11-15 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2076?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15667453#comment-15667453
 ] 

Jinmei Liao commented on GEODE-2076:


[~jblum] I tried the following gfsh commands, it's working, please let me know 
what I need to do to reproduce the error. thanks!

gfsh>start server --name=server1 --J=-Dgemfire.start-locator=localhost[10334]
gfsh>start server --name=server2 --locators=localhost[10334] --server-port=40405



> --locators option on start server is broken when specifying an embedded 
> locator
> ---
>
> Key: GEODE-2076
> URL: https://issues.apache.org/jira/browse/GEODE-2076
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jinmei Liao
>
> This is a follow-on bug from comments in GEODE-1986 from John Blum.
> "2. Second, the --locators option on start server is broken, hence the reason 
> I specified --server-port for both servers on start to avoid bind Exceptions 
> and used the --J option to specify the embedded Locator of "Server1" with the 
> gemfire.locators System property when starting "Server2".
> Otherwise, "Server2" starts in standalone mode!"
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --locators=localhost[10334]
> Starting a Geode Server in /Users/dhardman/test/Server1...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/dhardman/test/Server1 for full details.
> objc[9851]: Class JavaLaunchHelper is implemented in both 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/bin/java 
> and 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/lib/libinstrument.dylib.
>  One of the two will be used. Which one is undefined.
> Exception in thread "main" org.apache.geode.GemFireConfigException: Unable to 
> join the distributed system.  Operation either timed out, was stopped or 
> Locator does not exist.
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.join(GMSMembershipManager.java:659)
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.joinDistributedSystem(GMSMembershipManager.java:745)
> at 
> org.apache.geode.distributed.internal.membership.gms.Services.start(Services.java:181)
> at 
> org.apache.geode.distributed.internal.membership.gms.GMSMemberFactory.newMembershipManager(GMSMemberFactory.java:102)
> at 
> org.apache.geode.distributed.internal.membership.MemberFactory.newMembershipManager(MemberFactory.java:89)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1112)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1160)
> at 
> org.apache.geode.distributed.internal.DistributionManager.create(DistributionManager.java:531)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.initialize(InternalDistributedSystem.java:683)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.newInstance(InternalDistributedSystem.java:297)
> at 
> org.apache.geode.distributed.DistributedSystem.connect(DistributedSystem.java:202)
> at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:216)
> at 
> org.apache.geode.distributed.internal.DefaultServerLauncherCacheProvider.createCache(DefaultServerLauncherCacheProvider.java:52)
> at 
> org.apache.geode.distributed.ServerLauncher.createCache(ServerLauncher.java:857)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:769)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:696)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:228)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (GEODE-2076) --locators option on start server is broken when specifying an embedded locator

2016-11-15 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2076?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-2076:
--

Assignee: Jinmei Liao

> --locators option on start server is broken when specifying an embedded 
> locator
> ---
>
> Key: GEODE-2076
> URL: https://issues.apache.org/jira/browse/GEODE-2076
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: Diane Hardman
>Assignee: Jinmei Liao
>
> This is a follow-on bug from comments in GEODE-1986 from John Blum.
> "2. Second, the --locators option on start server is broken, hence the reason 
> I specified --server-port for both servers on start to avoid bind Exceptions 
> and used the --J option to specify the embedded Locator of "Server1" with the 
> gemfire.locators System property when starting "Server2".
> Otherwise, "Server2" starts in standalone mode!"
> Steps to reproduce:
> gfsh>start server --name=Server1 --log-level=config 
> --locators=localhost[10334]
> Starting a Geode Server in /Users/dhardman/test/Server1...
> The Cache Server process terminated unexpectedly with exit status 1. Please 
> refer to the log file in /Users/dhardman/test/Server1 for full details.
> objc[9851]: Class JavaLaunchHelper is implemented in both 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/bin/java 
> and 
> /Library/Java/JavaVirtualMachines/jdk1.8.0_101.jdk/Contents/Home/jre/lib/libinstrument.dylib.
>  One of the two will be used. Which one is undefined.
> Exception in thread "main" org.apache.geode.GemFireConfigException: Unable to 
> join the distributed system.  Operation either timed out, was stopped or 
> Locator does not exist.
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.join(GMSMembershipManager.java:659)
> at 
> org.apache.geode.distributed.internal.membership.gms.mgr.GMSMembershipManager.joinDistributedSystem(GMSMembershipManager.java:745)
> at 
> org.apache.geode.distributed.internal.membership.gms.Services.start(Services.java:181)
> at 
> org.apache.geode.distributed.internal.membership.gms.GMSMemberFactory.newMembershipManager(GMSMemberFactory.java:102)
> at 
> org.apache.geode.distributed.internal.membership.MemberFactory.newMembershipManager(MemberFactory.java:89)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1112)
> at 
> org.apache.geode.distributed.internal.DistributionManager.(DistributionManager.java:1160)
> at 
> org.apache.geode.distributed.internal.DistributionManager.create(DistributionManager.java:531)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.initialize(InternalDistributedSystem.java:683)
> at 
> org.apache.geode.distributed.internal.InternalDistributedSystem.newInstance(InternalDistributedSystem.java:297)
> at 
> org.apache.geode.distributed.DistributedSystem.connect(DistributedSystem.java:202)
> at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:216)
> at 
> org.apache.geode.distributed.internal.DefaultServerLauncherCacheProvider.createCache(DefaultServerLauncherCacheProvider.java:52)
> at 
> org.apache.geode.distributed.ServerLauncher.createCache(ServerLauncher.java:857)
> at 
> org.apache.geode.distributed.ServerLauncher.start(ServerLauncher.java:769)
> at 
> org.apache.geode.distributed.ServerLauncher.run(ServerLauncher.java:696)
> at 
> org.apache.geode.distributed.ServerLauncher.main(ServerLauncher.java:228)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1247) Unable to stop members by name when using gfsh over http

2016-11-14 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1247?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15664801#comment-15664801
 ] 

Jinmei Liao commented on GEODE-1247:


The problem occurs when we use the --name option, the command tries to issue a 
query over http first to find out the server mBean, It's the query that chokes 
up. Here is a simple test that reproduce this issue:

public class QueryNamesOverHttpDUnitTest {
  protected static int[] ports = 
AvailablePortHelper.getRandomAvailableTCPPorts(2);
  protected static int jmxPort = ports[0];
  protected static int httpPort = ports[1];

  private static Properties locatorProps = new Properties(){{
  setProperty(HTTP_SERVICE_BIND_ADDRESS, "localhost");
  setProperty(HTTP_SERVICE_PORT, httpPort+"");
  setProperty(JMX_MANAGER_PORT, jmxPort+"");
  }};

  @Rule
  public LocatorStarterRule locatorRule = new LocatorStarterRule(locatorProps);


  @Test
  public void testQueryNameOverHttp() throws Exception{

LinkIndex links = new LinkIndex();
links.add(new Link("mbean-query", new 
URI("http://localhost:"+httpPort+"/gemfire/v1/mbean/query;),
HttpMethod.POST));
RestHttpOperationInvoker invoker = new RestHttpOperationInvoker(links, 
mock(Gfsh.class), new HashMap<>());

ObjectName objectName = ObjectName.getInstance("GemFire:type=Member,*");
QueryExp query = Query.eq(Query.attr("Name"), Query.value("mock"));

invoker.queryNames(objectName, query);
  }
}

> Unable to stop members by name when using gfsh over http
> 
>
> Key: GEODE-1247
> URL: https://issues.apache.org/jira/browse/GEODE-1247
> Project: Geode
>  Issue Type: Bug
>  Components: gfsh, rest (admin)
>Reporter: Jens Deppe
>
> I'm connecting to my cluster with http:
> {noformat}
> gfsh>connect --use-http=true --url=http://localhost:7070/gemfire/v1
> {noformat}
> And creating a server...
> {noformat}
> gfsh>start server --name=server1
> Starting a GemFire Server in /Users/jdeppe/debug/server1...
> .
> Server in /Users/jdeppe/debug/server1 on 192.168.99.1[40404] as server1 is 
> currently online.
> Process ID: 97639
> Uptime: 2 seconds
> GemFire Version: 1.0.0-incubating.M3-SNAPSHOT
> Java Version: 1.8.0_77
> Log File: /Users/jdeppe/debug/server1/server1.log
> JVM Arguments: -Dgemfire.default.locators=192.168.99.1[19991] 
> -Dgemfire.use-cluster-configuration=true -XX:OnOutOfMemoryError=kill -KILL %p 
> -Dgemfire.launcher.registerSignalHandlers=true -Djava.awt.headless=true 
> -Dsun.rmi.dgc.server.gcInterval=9223372036854775806
> Class-Path: 
> /Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-core-1.0.0-incubating.M3-SNAPSHOT.jar:/Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-dependencies.jar
> gfsh>list members;
>   Name   | Id
>  | -
> locator1 | 192.168.99.1(locator1:97595:locator):1024
> server1  | 192.168.99.1(server1:97639):1025
> {noformat}
> But cannot stop it...
> {noformat}
> gfsh>stop server --name=server1
> An error occurred while attempting to stop a Cache Server: The HTTP request 
> failed with: 500 - Server Error
> {noformat}
> The locator log shows this error:
> {noformat}
> [severe 2016/04/18 13:54:49.754 PDT locator1  tid=0x42] 
> org.springframework.http.converter.HttpMessageNotReadableException: Could not 
> read document: invalid stream header: 7B226F62; nested exception is 
> java.io.StreamCorruptedException: invalid stream header: 7B226F62
> at 
> org.springframework.web.servlet.mvc.method.annotation.AbstractMessageConverterMethodArgumentResolver.readWithMessageConverters(AbstractMessageConverterMethodArgumentResolver.java:227)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestResponseBodyMethodProcessor.readWithMessageConverters(RequestResponseBodyMethodProcessor.java:147)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestResponseBodyMethodProcessor.resolveArgument(RequestResponseBodyMethodProcessor.java:125)
> at 
> org.springframework.web.method.support.HandlerMethodArgumentResolverComposite.resolveArgument(HandlerMethodArgumentResolverComposite.java:78)
> at 
> org.springframework.web.method.support.InvocableHandlerMethod.getMethodArgumentValues(InvocableHandlerMethod.java:162)
> at 
> org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:129)
> at 
> org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:110)
> at 
> org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:814)
> at 
> 

[jira] [Comment Edited] (GEODE-1247) Unable to stop members by name when using gfsh over http

2016-11-14 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1247?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15664801#comment-15664801
 ] 

Jinmei Liao edited comment on GEODE-1247 at 11/14/16 7:39 PM:
--

The problem occurs when we use the --name option, the command tries to issue a 
query over http first to find out the server mBean, It's the query that chokes 
up. Here is a simple test that reproduce this issue:


public class QueryNamesOverHttpDUnitTest {
  protected static int[] ports = 
AvailablePortHelper.getRandomAvailableTCPPorts(2);
  protected static int jmxPort = ports[0];
  protected static int httpPort = ports[1];

  private static Properties locatorProps = new Properties(){{
  setProperty(HTTP_SERVICE_BIND_ADDRESS, "localhost");
  setProperty(HTTP_SERVICE_PORT, httpPort+"");
  setProperty(JMX_MANAGER_PORT, jmxPort+"");
  }};

  @Rule
  public LocatorStarterRule locatorRule = new LocatorStarterRule(locatorProps);


  @Test
  public void testQueryNameOverHttp() throws Exception{

LinkIndex links = new LinkIndex();
links.add(new Link("mbean-query", new 
URI("http://localhost:"+httpPort+"/gemfire/v1/mbean/query;),
HttpMethod.POST));
RestHttpOperationInvoker invoker = new RestHttpOperationInvoker(links, 
mock(Gfsh.class), new HashMap<>());

ObjectName objectName = ObjectName.getInstance("GemFire:type=Member,*");
QueryExp query = Query.eq(Query.attr("Name"), Query.value("mock"));

invoker.queryNames(objectName, query);
  }
}



was (Author: jinmeiliao):
The problem occurs when we use the --name option, the command tries to issue a 
query over http first to find out the server mBean, It's the query that chokes 
up. Here is a simple test that reproduce this issue:


public class QueryNamesOverHttpDUnitTest {
  protected static int[] ports = 
AvailablePortHelper.getRandomAvailableTCPPorts(2);
  protected static int jmxPort = ports[0];
  protected static int httpPort = ports[1];

  private static Properties locatorProps = new Properties(){{
  setProperty(HTTP_SERVICE_BIND_ADDRESS, "localhost");
  setProperty(HTTP_SERVICE_PORT, httpPort+"");
  setProperty(JMX_MANAGER_PORT, jmxPort+"");
  }};

  @Rule
  public LocatorStarterRule locatorRule = new LocatorStarterRule(locatorProps);


  @Test
  public void testQueryNameOverHttp() throws Exception{

LinkIndex links = new LinkIndex();
links.add(new Link("mbean-query", new 
URI("http://localhost:"+httpPort+"/gemfire/v1/mbean/query;),
HttpMethod.POST));
RestHttpOperationInvoker invoker = new RestHttpOperationInvoker(links, 
mock(Gfsh.class), new HashMap<>());

ObjectName objectName = ObjectName.getInstance("GemFire:type=Member,*");
QueryExp query = Query.eq(Query.attr("Name"), Query.value("mock"));

invoker.queryNames(objectName, query);
  }
}


> Unable to stop members by name when using gfsh over http
> 
>
> Key: GEODE-1247
> URL: https://issues.apache.org/jira/browse/GEODE-1247
> Project: Geode
>  Issue Type: Bug
>  Components: gfsh, rest (admin)
>Reporter: Jens Deppe
>
> I'm connecting to my cluster with http:
> {noformat}
> gfsh>connect --use-http=true --url=http://localhost:7070/gemfire/v1
> {noformat}
> And creating a server...
> {noformat}
> gfsh>start server --name=server1
> Starting a GemFire Server in /Users/jdeppe/debug/server1...
> .
> Server in /Users/jdeppe/debug/server1 on 192.168.99.1[40404] as server1 is 
> currently online.
> Process ID: 97639
> Uptime: 2 seconds
> GemFire Version: 1.0.0-incubating.M3-SNAPSHOT
> Java Version: 1.8.0_77
> Log File: /Users/jdeppe/debug/server1/server1.log
> JVM Arguments: -Dgemfire.default.locators=192.168.99.1[19991] 
> -Dgemfire.use-cluster-configuration=true -XX:OnOutOfMemoryError=kill -KILL %p 
> -Dgemfire.launcher.registerSignalHandlers=true -Djava.awt.headless=true 
> -Dsun.rmi.dgc.server.gcInterval=9223372036854775806
> Class-Path: 
> /Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-core-1.0.0-incubating.M3-SNAPSHOT.jar:/Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-dependencies.jar
> gfsh>list members;
>   Name   | Id
>  | -
> locator1 | 192.168.99.1(locator1:97595:locator):1024
> server1  | 192.168.99.1(server1:97639):1025
> {noformat}
> But cannot stop it...
> {noformat}
> gfsh>stop server --name=server1
> An error occurred while attempting to stop a Cache Server: The HTTP request 
> failed with: 500 - Server Error
> {noformat}
> The locator log shows this error:
> {noformat}
> [severe 2016/04/18 13:54:49.754 PDT locator1  tid=0x42] 
> org.springframework.http.converter.HttpMessageNotReadableException: Could not 
> read document: invalid stream header: 7B226F62; nested 

[jira] [Comment Edited] (GEODE-1247) Unable to stop members by name when using gfsh over http

2016-11-14 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1247?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15664801#comment-15664801
 ] 

Jinmei Liao edited comment on GEODE-1247 at 11/14/16 7:39 PM:
--

The problem occurs when we use the --name option, the command tries to issue a 
query over http first to find out the server mBean, It's the query that chokes 
up. Here is a simple test that reproduce this issue:


public class QueryNamesOverHttpDUnitTest {
  protected static int[] ports = 
AvailablePortHelper.getRandomAvailableTCPPorts(2);
  protected static int jmxPort = ports[0];
  protected static int httpPort = ports[1];

  private static Properties locatorProps = new Properties(){{
  setProperty(HTTP_SERVICE_BIND_ADDRESS, "localhost");
  setProperty(HTTP_SERVICE_PORT, httpPort+"");
  setProperty(JMX_MANAGER_PORT, jmxPort+"");
  }};

  @Rule
  public LocatorStarterRule locatorRule = new LocatorStarterRule(locatorProps);


  @Test
  public void testQueryNameOverHttp() throws Exception{

LinkIndex links = new LinkIndex();
links.add(new Link("mbean-query", new 
URI("http://localhost:"+httpPort+"/gemfire/v1/mbean/query;),
HttpMethod.POST));
RestHttpOperationInvoker invoker = new RestHttpOperationInvoker(links, 
mock(Gfsh.class), new HashMap<>());

ObjectName objectName = ObjectName.getInstance("GemFire:type=Member,*");
QueryExp query = Query.eq(Query.attr("Name"), Query.value("mock"));

invoker.queryNames(objectName, query);
  }
}



was (Author: jinmeiliao):
The problem occurs when we use the --name option, the command tries to issue a 
query over http first to find out the server mBean, It's the query that chokes 
up. Here is a simple test that reproduce this issue:

public class QueryNamesOverHttpDUnitTest {
  protected static int[] ports = 
AvailablePortHelper.getRandomAvailableTCPPorts(2);
  protected static int jmxPort = ports[0];
  protected static int httpPort = ports[1];

  private static Properties locatorProps = new Properties(){{
  setProperty(HTTP_SERVICE_BIND_ADDRESS, "localhost");
  setProperty(HTTP_SERVICE_PORT, httpPort+"");
  setProperty(JMX_MANAGER_PORT, jmxPort+"");
  }};

  @Rule
  public LocatorStarterRule locatorRule = new LocatorStarterRule(locatorProps);


  @Test
  public void testQueryNameOverHttp() throws Exception{

LinkIndex links = new LinkIndex();
links.add(new Link("mbean-query", new 
URI("http://localhost:"+httpPort+"/gemfire/v1/mbean/query;),
HttpMethod.POST));
RestHttpOperationInvoker invoker = new RestHttpOperationInvoker(links, 
mock(Gfsh.class), new HashMap<>());

ObjectName objectName = ObjectName.getInstance("GemFire:type=Member,*");
QueryExp query = Query.eq(Query.attr("Name"), Query.value("mock"));

invoker.queryNames(objectName, query);
  }
}

> Unable to stop members by name when using gfsh over http
> 
>
> Key: GEODE-1247
> URL: https://issues.apache.org/jira/browse/GEODE-1247
> Project: Geode
>  Issue Type: Bug
>  Components: gfsh, rest (admin)
>Reporter: Jens Deppe
>
> I'm connecting to my cluster with http:
> {noformat}
> gfsh>connect --use-http=true --url=http://localhost:7070/gemfire/v1
> {noformat}
> And creating a server...
> {noformat}
> gfsh>start server --name=server1
> Starting a GemFire Server in /Users/jdeppe/debug/server1...
> .
> Server in /Users/jdeppe/debug/server1 on 192.168.99.1[40404] as server1 is 
> currently online.
> Process ID: 97639
> Uptime: 2 seconds
> GemFire Version: 1.0.0-incubating.M3-SNAPSHOT
> Java Version: 1.8.0_77
> Log File: /Users/jdeppe/debug/server1/server1.log
> JVM Arguments: -Dgemfire.default.locators=192.168.99.1[19991] 
> -Dgemfire.use-cluster-configuration=true -XX:OnOutOfMemoryError=kill -KILL %p 
> -Dgemfire.launcher.registerSignalHandlers=true -Djava.awt.headless=true 
> -Dsun.rmi.dgc.server.gcInterval=9223372036854775806
> Class-Path: 
> /Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-core-1.0.0-incubating.M3-SNAPSHOT.jar:/Users/jdeppe/git/gemfire-develop/open/geode-assembly/build/install/apache-geode/lib/geode-dependencies.jar
> gfsh>list members;
>   Name   | Id
>  | -
> locator1 | 192.168.99.1(locator1:97595:locator):1024
> server1  | 192.168.99.1(server1:97639):1025
> {noformat}
> But cannot stop it...
> {noformat}
> gfsh>stop server --name=server1
> An error occurred while attempting to stop a Cache Server: The HTTP request 
> failed with: 500 - Server Error
> {noformat}
> The locator log shows this error:
> {noformat}
> [severe 2016/04/18 13:54:49.754 PDT locator1  tid=0x42] 
> org.springframework.http.converter.HttpMessageNotReadableException: Could not 
> read document: invalid stream header: 7B226F62; nested 

[jira] [Updated] (GEODE-2053) Improve Geode Security Framework

2016-11-14 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2053?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2053:
---
Component/s: management

> Improve Geode Security Framework 
> -
>
> Key: GEODE-2053
> URL: https://issues.apache.org/jira/browse/GEODE-2053
> Project: Geode
>  Issue Type: Improvement
>  Components: management, security
>Reporter: Jinmei Liao
>
> This is based on the feedback that John provided by using Geode Security in 
> SDG. 
> Below is his email:
> This is will be my final feedback (for now) regarding Geode's Integrated 
> Security framework/feature.  My following recommendations are based on 
> extensive testing and experience trying to configure and enable Geode's 
> security services.
> As you know, my goal was to be able to quickly, easily and conveniently 
> configure Geode's security framework services and features using Spring. 
> However, my techniques could equally apply in any context (e.g. PCF, or a 
> simple test environment without any framework/container).
> To make it quick, easy and convenient, I added support for Geode Integrated 
> Security in SD Geode by way of the new Annotation configuration model, 
> specifically with the addition of the new @EnableSecurity annotation [1].
> The new @EnableSecurity annotation can be seen in action in the SDG Contacts 
> Application RI [2] (apache-geode branch [3]), security-example [4], 
> GeodeSecurityIntegrationTests class [5].  In this test class, I demonstrate 4 
> different ways, each employing different methods an application developer 
> might use to configure and enable Geode's Integrated Security feature to 
> secure Apache Geode operationally:
> 1. I use Geode's security-manager (System) property to refer to an 
> application implementation of "Geode's" SecurityManager interface. See here 
> [6].
> As you may recall, the SimpleSecurityManager [7] implementation is a custom 
> application implementation of Geode's SecurityManager interface [8] (not to 
> be confused with Shiro's [20], or even Java's [21] SecurityManager, for that 
> matter) employing the Repository (DAO) Design Pattern (via the 
> SecurityRepository interface [9]) to load security configuration meta-data 
> (e.g. Users, Roles and Permissions) from a variety of data sources.  This is 
> not at all unlike how the Apache Shiro framework, itself, is organized [10] 
> (i.e. SecurityManager -> (pluggable) Realms).
> 2. Next [11], I use Geode's security-shiro-init (System) property to refer to 
> a Apache Shiro INI security configuration file (e.g. geode-security-shiro.ini 
> [12]).
> NOTE: the Users, Roles and Permissions I define are configured consistently 
> throughout all my security configurations and data source examples (all based 
> on my SecurityRepository implementations [13]).
> 3. Then [14], I create a custom Apache Shiro Realm based on my 
> SecurityRepository interface (the SecurityRepositoryAuthorizingRealm [15]), 
> enabling me, as a application developer, to plug in 1 of my implementations 
> (i.e. JDBC or XML).
> NOTE:, I use XML since Apache Shiro provides no, OOTB implementation for XML, 
> ironically (Shiro only supports Active Directory, JDBC, JNDI, LDAP and TEXT; 
> see sub-packages below org.apache.shiro.realm [16]).
> 4. Finally [17], I use a canned, OOTB, Apache Shiro provided Realm 
> implementation (PropertiesRealm [18]), that, as the name suggests, is based 
> on the Java Properties file format (e.g. geode-security-shiro.properties 
> [19]).
> This may seem like a lot of work, even overkill, but all these were pertinent 
> in finding a number of bugs not only in SDG's @EnableSecurity annotation and 
> supporting classes, but with Geode's own Integrated Security framework, and 
> specifically the API [22].  Individually, or if I had stopped my testing 
> efforts prematurely with only 1 or 2 examples, I definitely would not have 
> uncovered all the problems I found.
> 1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
> Shiro's provided (OOTB) Realms correctly.  Otherwise, the security 
> Permissions are not enforced properly (in a hierarchical fashion as 
> advertised [24], i.e. in section "3. Introduction of ResourcePermission").
> I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
> provided (OOTB) PropertiesRealm implementation [18].
> Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
> particularly important if the user is using Apache Shiro to the fullest 
> extent to configure and secure Apache Geode.
> Of course, I could have provided my own implementation of the Apache Shiro 
> PermissionResolver interface [26] (especially given the simplicity of the 
> GeodePermissionResolver implementation) but if that implementation every 
> involves more logic behind the scenes, 

[jira] [Updated] (GEODE-2053) Improve Geode Security Framework

2016-11-14 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2053?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2053:
---
Component/s: security

> Improve Geode Security Framework 
> -
>
> Key: GEODE-2053
> URL: https://issues.apache.org/jira/browse/GEODE-2053
> Project: Geode
>  Issue Type: Improvement
>  Components: security
>Reporter: Jinmei Liao
>
> This is based on the feedback that John provided by using Geode Security in 
> SDG. 
> Below is his email:
> This is will be my final feedback (for now) regarding Geode's Integrated 
> Security framework/feature.  My following recommendations are based on 
> extensive testing and experience trying to configure and enable Geode's 
> security services.
> As you know, my goal was to be able to quickly, easily and conveniently 
> configure Geode's security framework services and features using Spring. 
> However, my techniques could equally apply in any context (e.g. PCF, or a 
> simple test environment without any framework/container).
> To make it quick, easy and convenient, I added support for Geode Integrated 
> Security in SD Geode by way of the new Annotation configuration model, 
> specifically with the addition of the new @EnableSecurity annotation [1].
> The new @EnableSecurity annotation can be seen in action in the SDG Contacts 
> Application RI [2] (apache-geode branch [3]), security-example [4], 
> GeodeSecurityIntegrationTests class [5].  In this test class, I demonstrate 4 
> different ways, each employing different methods an application developer 
> might use to configure and enable Geode's Integrated Security feature to 
> secure Apache Geode operationally:
> 1. I use Geode's security-manager (System) property to refer to an 
> application implementation of "Geode's" SecurityManager interface. See here 
> [6].
> As you may recall, the SimpleSecurityManager [7] implementation is a custom 
> application implementation of Geode's SecurityManager interface [8] (not to 
> be confused with Shiro's [20], or even Java's [21] SecurityManager, for that 
> matter) employing the Repository (DAO) Design Pattern (via the 
> SecurityRepository interface [9]) to load security configuration meta-data 
> (e.g. Users, Roles and Permissions) from a variety of data sources.  This is 
> not at all unlike how the Apache Shiro framework, itself, is organized [10] 
> (i.e. SecurityManager -> (pluggable) Realms).
> 2. Next [11], I use Geode's security-shiro-init (System) property to refer to 
> a Apache Shiro INI security configuration file (e.g. geode-security-shiro.ini 
> [12]).
> NOTE: the Users, Roles and Permissions I define are configured consistently 
> throughout all my security configurations and data source examples (all based 
> on my SecurityRepository implementations [13]).
> 3. Then [14], I create a custom Apache Shiro Realm based on my 
> SecurityRepository interface (the SecurityRepositoryAuthorizingRealm [15]), 
> enabling me, as a application developer, to plug in 1 of my implementations 
> (i.e. JDBC or XML).
> NOTE:, I use XML since Apache Shiro provides no, OOTB implementation for XML, 
> ironically (Shiro only supports Active Directory, JDBC, JNDI, LDAP and TEXT; 
> see sub-packages below org.apache.shiro.realm [16]).
> 4. Finally [17], I use a canned, OOTB, Apache Shiro provided Realm 
> implementation (PropertiesRealm [18]), that, as the name suggests, is based 
> on the Java Properties file format (e.g. geode-security-shiro.properties 
> [19]).
> This may seem like a lot of work, even overkill, but all these were pertinent 
> in finding a number of bugs not only in SDG's @EnableSecurity annotation and 
> supporting classes, but with Geode's own Integrated Security framework, and 
> specifically the API [22].  Individually, or if I had stopped my testing 
> efforts prematurely with only 1 or 2 examples, I definitely would not have 
> uncovered all the problems I found.
> 1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
> Shiro's provided (OOTB) Realms correctly.  Otherwise, the security 
> Permissions are not enforced properly (in a hierarchical fashion as 
> advertised [24], i.e. in section "3. Introduction of ResourcePermission").
> I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
> provided (OOTB) PropertiesRealm implementation [18].
> Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
> particularly important if the user is using Apache Shiro to the fullest 
> extent to configure and secure Apache Geode.
> Of course, I could have provided my own implementation of the Apache Shiro 
> PermissionResolver interface [26] (especially given the simplicity of the 
> GeodePermissionResolver implementation) but if that implementation every 
> involves more logic behind the scenes, better to 

[jira] [Created] (GEODE-2099) Race condition in ConnectToLocatorSSLDUnitTest

2016-11-11 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2099:
--

 Summary: Race condition in ConnectToLocatorSSLDUnitTest
 Key: GEODE-2099
 URL: https://issues.apache.org/jira/browse/GEODE-2099
 Project: Geode
  Issue Type: Bug
  Components: management, tests
Reporter: Jinmei Liao
 Fix For: 1.1.0-incubating


This test contains 3 tests, if put a long enough wait or a break point in 
between the tests, the tests would pass, otherwise the last two tests would 
fail. Need to get to the bottom of this. For the last tests are ignored. This 
is happening after we have to put "disconnect" after each connect to properly 
close the jmx thread so that it wouldn't pollute other tests.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2094) Update admin/dev REST API documentation

2016-11-10 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2094?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2094:
---
Description: 
The commands to start a server can be simplified in the prose on using gfsh 
with REST commands.

1. In the docs file 
geode-docs/configuring/cluster_config/gfsh_remote.html.md.erb, about using the 
admin REST interface, the sample gfsh start server command can be simplified.

--J=-Dgemfire.http-service-port=8080
becomes
--http-service-port=8080

--J=-Dgemfire.http-service-bind-address=myremotecluster.example.com
becomes
--http-service-bind-address=myremotecluster.example.com

2. In the docs file geode-docs/rest_apps/setup_config.html.md.erb, about using 
the dev REST API, the gfsh start server commands given in steps 2 and 3 can be 
simplified (corrected).

--J=-Dgemfire.start-dev-rest-api=true
becomes
--start-rest-api=true

--J=-Dgemfire.http-service-port=8080
becomes
--http-service-port=8080

--J=-Dgemfire.http-service-bind-address=localhost
becomes 
--http-service-bind-address=localhost

  was:
The commands to start a server can be simplified in the prose on using gfsh 
with REST commands.

1. In the docs file 
geode-docs/configuring/cluster_config/gfsh_remote.html.md.erb, about using the 
admin REST interface, the sample gfsh start server command can be simplified.

--J=-Dgemfire.http-service-port=8080
becomes
--http-service-port=8080

--J=-Dgemfire.http-service-bind-address=myremotecluster.example.com
becomes
--http-service-bind-address=myremotecluster.example.com

2. In the docs file geode-docs/rest_apps/setup_config.html.md.erb, about using 
the dev REST API, the gfsh start server commands given in steps 2 and 3 can be 
simplified (corrected).

--J=-Dgemfire.start-dev-rest-api=true
becomes
--J=-Dgemfire.start-rest-api=true

--J=-Dgemfire.http-service-port=8080
becomes
--http-service-port=8080

--J=-Dgemfire.http-service-bind-address=localhost
becomes 
--http-service-bind-address=localhost


> Update admin/dev REST API documentation
> ---
>
> Key: GEODE-2094
> URL: https://issues.apache.org/jira/browse/GEODE-2094
> Project: Geode
>  Issue Type: Bug
>  Components: docs
>Reporter: Karen Smoler Miller
>
> The commands to start a server can be simplified in the prose on using gfsh 
> with REST commands.
> 1. In the docs file 
> geode-docs/configuring/cluster_config/gfsh_remote.html.md.erb, about using 
> the admin REST interface, the sample gfsh start server command can be 
> simplified.
> --J=-Dgemfire.http-service-port=8080
> becomes
> --http-service-port=8080
> --J=-Dgemfire.http-service-bind-address=myremotecluster.example.com
> becomes
> --http-service-bind-address=myremotecluster.example.com
> 2. In the docs file geode-docs/rest_apps/setup_config.html.md.erb, about 
> using the dev REST API, the gfsh start server commands given in steps 2 and 3 
> can be simplified (corrected).
> --J=-Dgemfire.start-dev-rest-api=true
> becomes
> --start-rest-api=true
> --J=-Dgemfire.http-service-port=8080
> becomes
> --http-service-port=8080
> --J=-Dgemfire.http-service-bind-address=localhost
> becomes 
> --http-service-bind-address=localhost



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2085) GEODE-2083

2016-11-07 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2085:
--

 Summary: GEODE-2083
 Key: GEODE-2085
 URL: https://issues.apache.org/jira/browse/GEODE-2085
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2084) When executing a rest api in a browser, the login page presented in the browser is not setting the username/password correctly

2016-11-07 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2084:
--

 Summary: When executing a rest api in a browser, the login page 
presented in the browser is not setting the username/password correctly
 Key: GEODE-2084
 URL: https://issues.apache.org/jira/browse/GEODE-2084
 Project: Geode
  Issue Type: Bug
Reporter: Jinmei Liao


Steps to reproduce:

1. start up a server with security
2. in a browser address bar, type in: http://:7070/geode/v1/servers, after putting in username/password, I should 
see the result json, but instead, I keep getting the login page.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-2081) ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL setup fails intermittently

2016-11-07 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2081?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-2081.

Resolution: Duplicate

> ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL setup fails 
> intermittently
> 
>
> Key: GEODE-2081
> URL: https://issues.apache.org/jira/browse/GEODE-2081
> Project: Geode
>  Issue Type: Bug
>  Components: tests
>Affects Versions: 1.1.0-incubating
>Reporter: Kirk Lund
>Assignee: Jinmei Liao
>  Labels: CI, Flaky
>
> The setUpLocatorAndConnect methods uses gfshConnector to connect and then 
> asserts that it's connected -- this assertion is failing intermittently:
> {noformat}
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest > 
> testConnectToLocatorWithLegacyJMXSSL FAILED
> org.apache.geode.InternalGemFireError
> at org.apache.geode.internal.Assert.throwError(Assert.java:96)
> at org.apache.geode.internal.Assert.assertTrue(Assert.java:56)
> at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.setUpLocatorAndConnect(ConnectToLocatorSSLDUnitTest.java:132)
> at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL(ConnectToLocatorSSLDUnitTest.java:118)
> {noformat}
> See: https://builds.apache.org/job/Geode-nightly/646/console and search down 
> for ConnectToLocatorSSLDUnitTest.
> Because it's the setup that's failing, I'm going to annotate every test 
> potentially affected with FlakyTest.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1912) gfsh does not validate start server command

2016-11-07 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1912?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15645023#comment-15645023
 ] 

Jinmei Liao commented on GEODE-1912:


a feature branch is started (feature/GEODE-1912) to begin the effort of remove 
Gfsh parser and joptSimple parser to simplify parsing implementation. We should 
rely only in Spring Shell's parsing capability. This branch removes the 
dependency, but more work is needed on help and hint.

> gfsh does not validate start server command
> ---
>
> Key: GEODE-1912
> URL: https://issues.apache.org/jira/browse/GEODE-1912
> Project: Geode
>  Issue Type: Bug
>  Components: gfsh
>Reporter: Swapnil Bawaskar
>Priority: Minor
>
> When I tried to start a server from gfsh I accidently used {{--locator}} 
> (singular) rather than -{{-locators}}. gfsh did not throw an error and 
> started the server without connecting to the locator.
> We should throw an error for unrecognized command options in gfsh.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2079) CI failure: ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL

2016-11-07 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2079?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2079:
---
Component/s: management

> CI failure: ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL
> -
>
> Key: GEODE-2079
> URL: https://issues.apache.org/jira/browse/GEODE-2079
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>  Labels: CI, flaky
>
> org.apache.geode.InternalGemFireError
>   at org.apache.geode.internal.Assert.throwError(Assert.java:96)
>   at org.apache.geode.internal.Assert.assertTrue(Assert.java:56)
>   at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.setUpLocatorAndConnect(ConnectToLocatorSSLDUnitTest.java:132)
>   at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL(ConnectToLocatorSSLDUnitTest.java:118)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
>   at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
>   at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Updated] (GEODE-2079) CI failure: ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL

2016-11-07 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2079?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2079:
---
Labels: CI flaky  (was: )

> CI failure: ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL
> -
>
> Key: GEODE-2079
> URL: https://issues.apache.org/jira/browse/GEODE-2079
> Project: Geode
>  Issue Type: Bug
>Reporter: Jinmei Liao
>  Labels: CI, flaky
>
> org.apache.geode.InternalGemFireError
>   at org.apache.geode.internal.Assert.throwError(Assert.java:96)
>   at org.apache.geode.internal.Assert.assertTrue(Assert.java:56)
>   at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.setUpLocatorAndConnect(ConnectToLocatorSSLDUnitTest.java:132)
>   at 
> org.apache.geode.management.ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL(ConnectToLocatorSSLDUnitTest.java:118)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
>   at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
>   at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Created] (GEODE-2079) CI failure: ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL

2016-11-07 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2079:
--

 Summary: CI failure: 
ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL
 Key: GEODE-2079
 URL: https://issues.apache.org/jira/browse/GEODE-2079
 Project: Geode
  Issue Type: Bug
Reporter: Jinmei Liao


org.apache.geode.InternalGemFireError
at org.apache.geode.internal.Assert.throwError(Assert.java:96)
at org.apache.geode.internal.Assert.assertTrue(Assert.java:56)
at 
org.apache.geode.management.ConnectToLocatorSSLDUnitTest.setUpLocatorAndConnect(ConnectToLocatorSSLDUnitTest.java:132)
at 
org.apache.geode.management.ConnectToLocatorSSLDUnitTest.testConnectToLocatorWithLegacyJMXSSL(ConnectToLocatorSSLDUnitTest.java:118)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at 
org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at 
org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at 
org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at 
org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
at 
org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
at 
org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
at 
org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at 
org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
at 
org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at 
org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
at 
org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
at 
org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at 
org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
at 
org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at 
org.gradle.internal.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:377)
at 
org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
at 

[jira] [Assigned] (GEODE-1875) com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithIncorrectPasswordShouldFail

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1875?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1875:
--

Assignee: Jinmei Liao

> com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithIncorrectPasswordShouldFail
> ---
>
> Key: GEODE-1875
> URL: https://issues.apache.org/jira/browse/GEODE-1875
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
>
> {noformat}
> Geode_develop_DistributedTests/3924
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 85
> [fatal 2016/09/07 14:10:19.642 PDT  tid=0x1dc] 
> (tid=476 msgId=10) No longer connected to localhost[23655].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor155.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at 

[jira] [Assigned] (GEODE-1869) IntegratedClientExecuteRegionFunctionAuthDistributedTest.testExecuteRegionFunction

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1869?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1869:
--

Assignee: Jinmei Liao

> IntegratedClientExecuteRegionFunctionAuthDistributedTest.testExecuteRegionFunction
> --
>
> Key: GEODE-1869
> URL: https://issues.apache.org/jira/browse/GEODE-1869
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.0.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3843
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 162
> [fatal 2016/08/31 18:08:45.159 PDT  tid=0x47c] 
> (tid=1148 msgId=18) No longer connected to localhost[24980].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor165.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor528.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor527.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Resolved] (GEODE-1875) com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithIncorrectPasswordShouldFail

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1875?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1875.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithIncorrectPasswordShouldFail
> ---
>
> Key: GEODE-1875
> URL: https://issues.apache.org/jira/browse/GEODE-1875
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3924
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 85
> [fatal 2016/09/07 14:10:19.642 PDT  tid=0x1dc] 
> (tid=476 msgId=10) No longer connected to localhost[23655].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor155.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> 

[jira] [Resolved] (GEODE-1878) com.gemstone.gemfire.management.RegionCreateDestroyDUnitTest.testCreateDestroyReservedRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1878?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1878.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> com.gemstone.gemfire.management.RegionCreateDestroyDUnitTest.testCreateDestroyReservedRegion
> 
>
> Key: GEODE-1878
> URL: https://issues.apache.org/jira/browse/GEODE-1878
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3933
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 41
> [fatal 2016/09/08 03:40:08.524 PDT  tid=0x179] 
> (tid=377 msgId=23) No longer connected to cc6-co6.gemstone.com[21361].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor6.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor13.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor12.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> 

[jira] [Resolved] (GEODE-1876) com.gemstone.gemfire.security.IntegratedClientRegionClearAuthDistributedTest.testRegionClear

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1876?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1876.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> com.gemstone.gemfire.security.IntegratedClientRegionClearAuthDistributedTest.testRegionClear
> 
>
> Key: GEODE-1876
> URL: https://issues.apache.org/jira/browse/GEODE-1876
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3920
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 41
> [fatal 2016/09/07 06:08:54.299 PDT  tid=0x69c] 
> (tid=1692 msgId=18) No longer connected to localhost[23844].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor214.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor531.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor530.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> 

[jira] [Assigned] (GEODE-1876) com.gemstone.gemfire.security.IntegratedClientRegionClearAuthDistributedTest.testRegionClear

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1876?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1876:
--

Assignee: Jinmei Liao

> com.gemstone.gemfire.security.IntegratedClientRegionClearAuthDistributedTest.testRegionClear
> 
>
> Key: GEODE-1876
> URL: https://issues.apache.org/jira/browse/GEODE-1876
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3920
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 41
> [fatal 2016/09/07 06:08:54.299 PDT  tid=0x69c] 
> (tid=1692 msgId=18) No longer connected to localhost[23844].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor214.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor531.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor530.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Resolved] (GEODE-1879) com.gemstone.gemfire.management.UniversalMembershipListenerAdapterDUnitTest.testServerEventsInPeerSystem

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1879?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1879.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> com.gemstone.gemfire.management.UniversalMembershipListenerAdapterDUnitTest.testServerEventsInPeerSystem
> 
>
> Key: GEODE-1879
> URL: https://issues.apache.org/jira/browse/GEODE-1879
> Project: Geode
>  Issue Type: Bug
>  Components: client/server
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3935
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 417
> [fatal 2016/09/08 09:19:29.240 PDT  tid=0xc2] 
> (tid=194 msgId=28) No longer connected to latvia.gemstone.com[22692].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor11.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> 

[jira] [Assigned] (GEODE-1879) com.gemstone.gemfire.management.UniversalMembershipListenerAdapterDUnitTest.testServerEventsInPeerSystem

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1879?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1879:
--

Assignee: Jinmei Liao  (was: Bruce Schuchardt)

> com.gemstone.gemfire.management.UniversalMembershipListenerAdapterDUnitTest.testServerEventsInPeerSystem
> 
>
> Key: GEODE-1879
> URL: https://issues.apache.org/jira/browse/GEODE-1879
> Project: Geode
>  Issue Type: Bug
>  Components: client/server
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
>
> {noformat}
> Geode_develop_DistributedTests/3935
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 417
> [fatal 2016/09/08 09:19:29.240 PDT  tid=0xc2] 
> (tid=194 msgId=28) No longer connected to latvia.gemstone.com[22692].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor11.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> 

[jira] [Resolved] (GEODE-1877) com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithCorrectPasswordShouldPass

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1877?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1877.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithCorrectPasswordShouldPass
> -
>
> Key: GEODE-1877
> URL: https://issues.apache.org/jira/browse/GEODE-1877
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3931
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 123
> [fatal 2016/09/08 03:33:05.727 PDT  tid=0x1de] 
> (tid=478 msgId=10) No longer connected to localhost[22062].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor155.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> 

[jira] [Assigned] (GEODE-1877) com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithCorrectPasswordShouldPass

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1877?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1877:
--

Assignee: Jinmei Liao

> com.gemstone.gemfire.security.IntegratedClientAuthDUnitTest.authWithCorrectPasswordShouldPass
> -
>
> Key: GEODE-1877
> URL: https://issues.apache.org/jira/browse/GEODE-1877
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3931
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 123
> [fatal 2016/09/08 03:33:05.727 PDT  tid=0x1de] 
> (tid=478 msgId=10) No longer connected to localhost[22062].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor155.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> 

[jira] [Assigned] (GEODE-1878) com.gemstone.gemfire.management.RegionCreateDestroyDUnitTest.testCreateDestroyReservedRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1878?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1878:
--

Assignee: Jinmei Liao

> com.gemstone.gemfire.management.RegionCreateDestroyDUnitTest.testCreateDestroyReservedRegion
> 
>
> Key: GEODE-1878
> URL: https://issues.apache.org/jira/browse/GEODE-1878
> Project: Geode
>  Issue Type: Bug
>Reporter: xiaojian zhou
>Assignee: Jinmei Liao
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> {noformat}
> Geode_develop_DistributedTests/3933
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 41
> [fatal 2016/09/08 03:40:08.524 PDT  tid=0x179] 
> (tid=377 msgId=23) No longer connected to cc6-co6.gemstone.com[21361].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:542)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:491)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:480)
>   at sun.reflect.GeneratedMethodAccessor6.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor13.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor12.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Resolved] (GEODE-1482) CI Failure: MemberMBeanAttributesDUnitTest.testConfigAttributes

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1482.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> CI Failure: MemberMBeanAttributesDUnitTest.testConfigAttributes
> ---
>
> Key: GEODE-1482
> URL: https://issues.apache.org/jira/browse/GEODE-1482
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Udo Kohlmeyer
>  Labels: CI
> Fix For: 1.1.0-incubating
>
>
> Build #2712 (May 27, 2016 7:09:13 PM)
> Revision: 3e8fe7af0ced64d2a15b6c3ce52eb9560a83d097
> https://brazil.gemstone.com:8080/job/Geode_develop_DistributedTests/2712/testReport/com.gemstone.gemfire.management/MemberMBeanAttributesDUnitTest/testConfigAttributes/
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 419
> [fatal 2016/05/27 23:43:44.251 PDT  tid=0x1b6] 
> (tid=438 msgId=303) No longer connected to cc1-co[24095].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:354)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:540)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:489)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:478)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit3DistributedTestCase.tearDown(JUnit3DistributedTestCase.java:206)
>   at junit.framework.TestCase.runBare(TestCase.java:146)
>   at junit.framework.TestResult$1.protect(TestResult.java:122)
>   at junit.framework.TestResult.runProtected(TestResult.java:142)
>   at junit.framework.TestResult.run(TestResult.java:125)
>   at junit.framework.TestCase.run(TestCase.java:129)
>   at junit.framework.TestSuite.runTest(TestSuite.java:252)
>   at junit.framework.TestSuite.run(TestSuite.java:247)
>   at 
> org.junit.internal.runners.JUnit38ClassRunner.run(JUnit38ClassRunner.java:86)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:112)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:56)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor7.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.messaging.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor6.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:360)
>   at 
> org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
>   at 
> org.gradle.internal.concurrent.StoppableExecutorImpl$1.run(StoppableExecutorImpl.java:40)
>   at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
>   at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
>   at java.lang.Thread.run(Thread.java:745)



--
This message was sent by Atlassian JIRA

[jira] [Resolved] (GEODE-1538) RegionManagementDUnitTest.testDistributedRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1538?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1538.

Resolution: Duplicate

> RegionManagementDUnitTest.testDistributedRegion
> ---
>
> Key: GEODE-1538
> URL: https://issues.apache.org/jira/browse/GEODE-1538
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>  Labels: CI
>
> Geode_develop_DistributedTests/2885
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/06/12 01:46:01.785 PDT  tid=0x37c] 
> (tid=892 msgId=75) No longer connected to cc1-co[25609].
> Stacktrace
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/06/12 01:46:01.785 PDT  tid=0x37c] 
> (tid=892 msgId=75) No longer connected to cc1-co[25609].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:345)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:532)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:481)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:470)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:112)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:56)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor7.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.messaging.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> 

[jira] [Resolved] (GEODE-1922) CI Failure: RegionCreateDestroyDUnitTest.testCreateDestroyValidRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1922?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1922.

   Resolution: Duplicate
Fix Version/s: 1.1.0-incubating

> CI Failure: RegionCreateDestroyDUnitTest.testCreateDestroyValidRegion
> -
>
> Key: GEODE-1922
> URL: https://issues.apache.org/jira/browse/GEODE-1922
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Eric Shu
>Assignee: Jinmei Liao
>  Labels: ci
> Fix For: 1.1.0-incubating
>
>
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 84
> [fatal 2016/09/16 04:18:58.969 PDT  tid=0x191] 
> (tid=401 msgId=44) No longer connected to cc6-co6.gemstone.com[24253].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> org.apache.geode.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:545)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:493)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:482)
>   at sun.reflect.GeneratedMethodAccessor8.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor177.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor176.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> 

[jira] [Assigned] (GEODE-1922) CI Failure: RegionCreateDestroyDUnitTest.testCreateDestroyValidRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1922?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1922:
--

Assignee: Jinmei Liao

> CI Failure: RegionCreateDestroyDUnitTest.testCreateDestroyValidRegion
> -
>
> Key: GEODE-1922
> URL: https://issues.apache.org/jira/browse/GEODE-1922
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Eric Shu
>Assignee: Jinmei Liao
>  Labels: ci
> Fix For: 1.1.0-incubating
>
>
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 84
> [fatal 2016/09/16 04:18:58.969 PDT  tid=0x191] 
> (tid=401 msgId=44) No longer connected to cc6-co6.gemstone.com[24253].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> org.apache.geode.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:358)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:545)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:493)
>   at 
> org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:482)
>   at sun.reflect.GeneratedMethodAccessor8.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:114)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:57)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor177.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:109)
>   at sun.reflect.GeneratedMethodAccessor176.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
> 

[jira] [Assigned] (GEODE-1538) RegionManagementDUnitTest.testDistributedRegion

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1538?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1538:
--

Assignee: Jinmei Liao

> RegionManagementDUnitTest.testDistributedRegion
> ---
>
> Key: GEODE-1538
> URL: https://issues.apache.org/jira/browse/GEODE-1538
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>  Labels: CI
>
> Geode_develop_DistributedTests/2885
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/06/12 01:46:01.785 PDT  tid=0x37c] 
> (tid=892 msgId=75) No longer connected to cc1-co[25609].
> Stacktrace
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/06/12 01:46:01.785 PDT  tid=0x37c] 
> (tid=892 msgId=75) No longer connected to cc1-co[25609].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:345)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:532)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:481)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:470)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:112)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:56)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor7.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.messaging.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> 

[jira] [Assigned] (GEODE-1539) QueryDataDUnitTest.testMemberWise

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1539?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1539:
--

Assignee: Jinmei Liao

> QueryDataDUnitTest.testMemberWise
> -
>
> Key: GEODE-1539
> URL: https://issues.apache.org/jira/browse/GEODE-1539
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>  Labels: CI
>
> Geode_develop_DistributedTests/2886
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 633
> [fatal 2016/06/12 00:22:24.537 PDT  tid=0x11a] 
> (tid=282 msgId=75) No longer connected to cc2-ub[20251].
> Stacktrace
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 633
> [fatal 2016/06/12 00:22:24.537 PDT  tid=0x11a] 
> (tid=282 msgId=75) No longer connected to cc2-ub[20251].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:345)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:532)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:481)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:470)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:112)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:56)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor7.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.messaging.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> 

[jira] [Resolved] (GEODE-1539) QueryDataDUnitTest.testMemberWise

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1539?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1539.

Resolution: Duplicate

> QueryDataDUnitTest.testMemberWise
> -
>
> Key: GEODE-1539
> URL: https://issues.apache.org/jira/browse/GEODE-1539
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>  Labels: CI
>
> Geode_develop_DistributedTests/2886
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 633
> [fatal 2016/06/12 00:22:24.537 PDT  tid=0x11a] 
> (tid=282 msgId=75) No longer connected to cc2-ub[20251].
> Stacktrace
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 633
> [fatal 2016/06/12 00:22:24.537 PDT  tid=0x11a] 
> (tid=282 msgId=75) No longer connected to cc2-ub[20251].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:345)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:532)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:481)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:470)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33)
>   at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55)
>   at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.runTestClass(JUnitTestClassExecuter.java:112)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecuter.execute(JUnitTestClassExecuter.java:56)
>   at 
> org.gradle.api.internal.tasks.testing.junit.JUnitTestClassProcessor.processTestClass(JUnitTestClassProcessor.java:66)
>   at 
> org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
>   at sun.reflect.GeneratedMethodAccessor7.invoke(Unknown Source)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:497)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:35)
>   at 
> org.gradle.messaging.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
>   at 
> org.gradle.messaging.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:32)
>   at 
> org.gradle.messaging.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:93)
>   at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
>   at 
> 

[jira] [Assigned] (GEODE-1492) CI Failure: CompositeTypeTestDUnitTest.testCompositeTypeGetters

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1492?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1492:
--

Assignee: Jinmei Liao

> CI Failure: CompositeTypeTestDUnitTest.testCompositeTypeGetters
> ---
>
> Key: GEODE-1492
> URL: https://issues.apache.org/jira/browse/GEODE-1492
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Affects Versions: 1.0.0-incubating.M3
>Reporter: Jason Huynh
>Assignee: Jinmei Liao
>  Labels: CI
>
> This test failed in a private run with the following exception:
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/05/30 03:43:58.791 PDT  tid=0x316] 
> (tid=790 msgId=295) No longer connected to cc2-rh6[27242].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:354)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:540)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:489)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:478)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit3DistributedTestCase.tearDown(JUnit3DistributedTestCase.java:206)
>   at junit.framework.TestCase.runBare(TestCase.java:146)
>   at junit.framework.TestResult$1.protect(TestResult.java:122)
>   at junit.framework.TestResult.runProtected(TestResult.java:142)
>   at junit.framework.TestResult.run(TestResult.java:125)
>   at junit.framework.TestCase.run(TestCase.java:129)
>   at junit.framework.TestSuite.runTest(TestSuite.java:252)
>   at junit.framework.TestSuite.run(TestSuite.java:247)
>   at 
> org.junit.internal.runners.JUnit38ClassRunner.run(JUnit38ClassRunner.java:86)
>   ...
> Previously run tests: [TestSubscriptionsDUnitTest, 
> SharedConfigurationDUnitTest, SharedConfigurationUsingDirDUnitTest, 
> MultiUserDUnitTest, CompositeTypeTestDUnitTest]



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-1492) CI Failure: CompositeTypeTestDUnitTest.testCompositeTypeGetters

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1492?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1492.

Resolution: Duplicate

> CI Failure: CompositeTypeTestDUnitTest.testCompositeTypeGetters
> ---
>
> Key: GEODE-1492
> URL: https://issues.apache.org/jira/browse/GEODE-1492
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Affects Versions: 1.0.0-incubating.M3
>Reporter: Jason Huynh
>Assignee: Jinmei Liao
>  Labels: CI
>
> This test failed in a private run with the following exception:
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 635
> [fatal 2016/05/30 03:43:58.791 PDT  tid=0x316] 
> (tid=790 msgId=295) No longer connected to cc2-rh6[27242].
>   at org.junit.Assert.fail(Assert.java:88)
>   at 
> com.gemstone.gemfire.test.dunit.standalone.DUnitLauncher.closeAndCheckForSuspects(DUnitLauncher.java:354)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.cleanupAllVms(JUnit4DistributedTestCase.java:540)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDownDistributedTestCase(JUnit4DistributedTestCase.java:489)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit4DistributedTestCase.tearDown(JUnit4DistributedTestCase.java:478)
>   at 
> com.gemstone.gemfire.test.dunit.internal.JUnit3DistributedTestCase.tearDown(JUnit3DistributedTestCase.java:206)
>   at junit.framework.TestCase.runBare(TestCase.java:146)
>   at junit.framework.TestResult$1.protect(TestResult.java:122)
>   at junit.framework.TestResult.runProtected(TestResult.java:142)
>   at junit.framework.TestResult.run(TestResult.java:125)
>   at junit.framework.TestCase.run(TestCase.java:129)
>   at junit.framework.TestSuite.runTest(TestSuite.java:252)
>   at junit.framework.TestSuite.run(TestSuite.java:247)
>   at 
> org.junit.internal.runners.JUnit38ClassRunner.run(JUnit38ClassRunner.java:86)
>   ...
> Previously run tests: [TestSubscriptionsDUnitTest, 
> SharedConfigurationDUnitTest, SharedConfigurationUsingDirDUnitTest, 
> MultiUserDUnitTest, CompositeTypeTestDUnitTest]



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-1955) JMX suspect string causes tests to fail

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1955?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1955.

Resolution: Fixed

> JMX suspect string causes tests to fail
> ---
>
> Key: GEODE-1955
> URL: https://issues.apache.org/jira/browse/GEODE-1955
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Bruce Schuchardt
>Assignee: Jinmei Liao
>  Labels: ci
>
> This suspect string is causing periodic failures in a number of unit tests:
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 283
> [fatal 2016/09/29 12:12:03.891 PDT  tid=0x18d] 
> (tid=397 msgId=39) No longer connected to cc6-co6.gemstone.com[27162].



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (GEODE-1955) JMX suspect string causes tests to fail

2016-11-04 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1955?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1955:
--

Assignee: Jinmei Liao

> JMX suspect string causes tests to fail
> ---
>
> Key: GEODE-1955
> URL: https://issues.apache.org/jira/browse/GEODE-1955
> Project: Geode
>  Issue Type: Bug
>  Components: jmx
>Reporter: Bruce Schuchardt
>Assignee: Jinmei Liao
>  Labels: ci
>
> This suspect string is causing periodic failures in a number of unit tests:
> Error Message
> java.lang.AssertionError: Suspicious strings were written to the log during 
> this run.
> Fix the strings or use IgnoredException.addIgnoredException to ignore.
> ---
> Found suspect string in log4j at line 283
> [fatal 2016/09/29 12:12:03.891 PDT  tid=0x18d] 
> (tid=397 msgId=39) No longer connected to cc6-co6.gemstone.com[27162].



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (GEODE-1506) gfsh should not display call stack, just the error message

2016-11-04 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1506?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15317166#comment-15317166
 ] 

Jinmei Liao edited comment on GEODE-1506 at 11/4/16 2:58 PM:
-

When server is started with an error, it writes the errors to System.err 
because the log writer isn't available at that point yet. Gfsh just blindly 
displays the System.err messages line by line. We have these three choices:

1. Have the server only sending the message line to the system.err instead of 
the entire stack.  -- low effort.
2. Have Gfsh parse the entire errors, and only shows the first message line, 
and logs the stack trace into gfsh log. ( We will also need to deal with the 
line saying "going to the server log for more details").  - more code change
3. Leave as it is.  - no effort



was (Author: jinmeiliao):
When server is started with an error, it writes the errors to System.err 
because the log writer isn't available at that point yet. Gfsh just blindly 
displays the System.err messages line by line. We have these three choices:

1. Have the server only sending the message line to the system.err instead of 
the entire stack.  -- low effort.
2. Have Gfsh parse the entire errors, and only shows the first message line, 
and logs the stack trace into gfsh log. ( We will also need to deal with the 
line saying "going to the server log for more details").  - more code change
3. Leave as it is.  - no effort

Assigning to PM for assessment.

> gfsh should not display call stack, just the error message
> --
>
> Key: GEODE-1506
> URL: https://issues.apache.org/jira/browse/GEODE-1506
> Project: Geode
>  Issue Type: Improvement
>  Components: gfsh
>Reporter: Anthony Baker
>Assignee: Swapnil Bawaskar
>
> See the following email thread:
> http://mail-archives.apache.org/mod_mbox/incubator-geode-dev/201606.mbox/%3ccafdh8_1xbyzf44ksai_p9jeu43tajamovagqrtucwvstlgt...@mail.gmail.com%3e
> Instead of printing the call stack, we should just display the error message. 
>  Perhaps the full details can be written to the log instead of the console.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2067) Refactor SecurableCommunicationChannels and SecurableCommunicationChannel

2016-11-03 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2067:
--

 Summary: Refactor SecurableCommunicationChannels and 
SecurableCommunicationChannel
 Key: GEODE-2067
 URL: https://issues.apache.org/jira/browse/GEODE-2067
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao


We should combine org.apache.geode.security.SecurableCommunicationChannels and 
org.apache.geode.internal.security.SecurableCommunicationChannel into a single 
class.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-2058) reorganize security examples

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2058?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-2058.

Resolution: Fixed

> reorganize security examples
> 
>
> Key: GEODE-2058
> URL: https://issues.apache.org/jira/browse/GEODE-2058
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2057) reorganize security packages

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2057?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15633642#comment-15633642
 ] 

Jinmei Liao commented on GEODE-2057:


 Rather than having a org.apache.geode.security.templates package [31] in the 
public API, I might consider moving these classes to the examples.  I would not 
want users thinking these Security classes/components are actually sufficient 
to securing Geode in a production environment (yikes)!

Additionally, I would probably even package the classes under 
org.apache.geode.security [32] a bit differently, having more 
organization/cleanliness with sub-packages.  The security packages feels like a 
dumping ground for anything and everything, all handling related but slightly 
different things, functionally... client vs. the server, authentication vs. 
authorization, securing communication channels, managing over all security, 
etc, etc.  Organization is the key to architecture and making things easy to 
consume and understand by users.

> reorganize security packages
> 
>
> Key: GEODE-2057
> URL: https://issues.apache.org/jira/browse/GEODE-2057
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> move everything under org.apache.geode.internal.security into 
> org.apache.geode.security.internal



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2057) reorganize security packages

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2057?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2057:
---
Description: move everything under org.apache.geode.internal.security into 
org.apache.geode.security.internal

> reorganize security packages
> 
>
> Key: GEODE-2057
> URL: https://issues.apache.org/jira/browse/GEODE-2057
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> move everything under org.apache.geode.internal.security into 
> org.apache.geode.security.internal



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2056) Expose GeodeSecurityService as needed

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2056?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15633617#comment-15633617
 ] 

Jinmei Liao commented on GEODE-2056:


Some of the methods in SecurityService do make sense to be exposed, like all 
the authorize methods, login, getSubject, keep all the rest internal.

> Expose GeodeSecurityService as needed
> -
>
> Key: GEODE-2056
> URL: https://issues.apache.org/jira/browse/GEODE-2056
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> 2. I also think it is pertinent that the SecurityService interface [27] be in 
> Geode's public API.  Given this is just an interface, I am not sure why it 
> was decided to make it "internal" anyway?  I see no good reason NOT to expose 
> this interface, especially since it would be particularly useful for both 
> API/Framework (e.g. SDG) as well as tools developers developing extensions to 
> Apache Geode.
> I actually did make use of the SecurityService interface [28] in SDG, despite 
> my (usually) hard rule of NOT ever using any GemFire/Geode internal classes 
> at all in SDG. Unfortunately, and all too often, in certain cases, such as 
> the currently released version of Apache Geode, 1.0.0-incubating GA, there is 
> simply no other way around it when providing support for securing Apache 
> Geode, especially for making Apache Shiro first-class (something I want to 
> similarly do for Spring Security).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (GEODE-2053) Improve Geode Security Framework

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15633607#comment-15633607
 ] 

Jinmei Liao edited comment on GEODE-2053 at 11/3/16 5:45 PM:
-

1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
Shiro's provided (OOTB) Realms correctly.  Otherwise, the security Permissions 
are not enforced properly (in a hierarchical fashion as advertised [24], i.e. 
in section "3. Introduction of ResourcePermission").

I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
provided (OOTB) PropertiesRealm implementation [18].

Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
particularly important if the user is using Apache Shiro to the fullest extent 
to configure and secure Apache Geode.

Of course, I could have provided my own implementation of the Apache Shiro 
PermissionResolver interface [26] (especially given the simplicity of the 
GeodePermissionResolver implementation) but if that implementation every 
involves more logic behind the scenes, better to "reuse" then "reinvent" in 
this case.


2. I also think it is pertinent that the SecurityService interface [27] be in 
Geode's public API.  Given this is just an interface, I am not sure why it was 
decided to make it "internal" anyway?  I see no good reason NOT to expose this 
interface, especially since it would be particularly useful for both 
API/Framework (e.g. SDG) as well as tools developers developing extensions to 
Apache Geode.

I actually did make use of the SecurityService interface [28] in SDG, despite 
my (usually) hard rule of NOT ever using any GemFire/Geode internal classes at 
all in SDG. Unfortunately, and all too often, in certain cases, such as the 
currently released version of Apache Geode, 1.0.0-incubating GA, there is 
simply no other way around it when providing support for securing Apache Geode, 
especially for making Apache Shiro first-class (something I want to similarly 
do for Spring Security).

The usage in [28] is, well, a hack!  I can certainly think of better uses of 
the SecurityService interface as alluded to above.


3. That brings me to a more general problem I have with the Geode (and 
GemFires) APIs and organization, which surfaces many anti-patterns.  There is 
only 1 thing I will focus on here...

We seem to keep propagating the broken "global", internal package organization 
[29] that has many, many, cross-cutting concerns in it, and recently adds 
"security" [30] into the fold.

While Security IS a "cross-cutting" concern, it is definitely NOT a recommended 
way to organize a modular codebase.  It will only make it more difficult to 
organize and modularize Geode into logical, (hopefully, "pluggable") functional 
units in the future.  It would be better to see the 
org.apache.geode.internal.security package move under 
org.apache.geode.security.  If Security is truly cross-cutting, then it ought 
to be a separate "module", independent of the other geode modules which can 
depend on it.

While OSGi has lost it steam in recent years, the current organization would be 
problematic in this environment, especially where some of these 
classes/interface should have been made public.

Still, given Java 9 is moving to a modular architecture, you might want to be a 
bit more forward thinking in how the codebase organization is going to affect 
modularity.  You can bet users are going to want to leverage Geode in a very 
modular way once Java 9 is readily available.


4. Rather than having a org.apache.geode.security.templates package [31] in the 
public API, I might consider moving these classes to the examples.  I would not 
want users thinking these Security classes/components are actually sufficient 
to securing Geode in a production environment (yikes)!

Additionally, I would probably even package the classes under 
org.apache.geode.security [32] a bit differently, having more 
organization/cleanliness with sub-packages.  The security packages feels like a 
dumping ground for anything and everything, all handling related but slightly 
different things, functionally... client vs. the server, authentication vs. 
authorization, securing communication channels, managing over all security, 
etc, etc.  Organization is the key to architecture and making things easy to 
consume and understand by users.

You could make a SecurableCommunicationChannels [33] an enum, too.


5. One more, and I will leave it at that for now... so I am thinking ahead, 
and... I really want to build support for Spring Security.  This support can 
come by way of SDG to auto-enable this provider.

Anyway, I think it is of paramount importance that we nail down the Geode 
Integrated Security SPI, allowing different "security providers" to be 
"plugged" in to secure Apache Geode in different contexts.

Initially I was thinking the Geode 

[jira] [Commented] (GEODE-2053) Improve Geode Security Framework

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15633607#comment-15633607
 ] 

Jinmei Liao commented on GEODE-2053:




[1] 
https://github.com/spring-projects/spring-data-gemfire/blob/apache-geode/src/main/java/org/springframework/data/gemfire/config/annotation/EnableSecurity.java
[2] https://github.com/jxblum/contacts-application
[3] https://github.com/jxblum/contacts-application/tree/apache-geode
[4] 
https://github.com/jxblum/contacts-application/tree/apache-geode/security-example
[5] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java
[6] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L280-L286
[7] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/geode/security/provider/SimpleSecurityManager.java
[8] 
http://geode.incubator.apache.org/releases/latest/javadoc/org/apache/geode/security/SecurityManager.html
[9] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/geode/security/repository/SecurityRepository.java
[10] http://shiro.apache.org/architecture.html#detailed-architecture
[11] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L311-L315
[12] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/resources/geode-security-shiro.ini
[13] 
https://github.com/jxblum/contacts-application/tree/apache-geode/contacts-core/src/main/java/example/app/geode/security/repository/support
[14] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L317-L331
[15] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/shiro/realm/SecurityRepositoryAuthorizingRealm.java
[16] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/realm/package-summary.html
[17] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L333-L345
[18] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/realm/text/PropertiesRealm.html
[19] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/resources/geode-security-shiro.properties
[20] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/mgt/SecurityManager.html
[21] http://docs.oracle.com/javase/8/docs/api/java/lang/SecurityManager.html
[22] 
http://geode.incubator.apache.org/releases/latest/javadoc/org/apache/geode/security/package-frame.html
[23] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/security/shiro/GeodePermissionResolver.java
[24] https://cwiki.apache.org/confluence/display/GEODE/Geode+Integrated+Security
[25] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L342
[26] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/authz/permission/PermissionResolver.html
[27] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/security/SecurityService.java
[28] 
https://github.com/spring-projects/spring-data-gemfire/blob/apache-geode/src/main/java/org/springframework/data/gemfire/config/annotation/ApacheShiroSecurityConfiguration.java#L208-L224
[29] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/internal
[30] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/internal/security
[31] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/security/templates
[32] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/security
[33] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/security/SecurableCommunicationChannels.java
[34] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/subject/Subject.html
[35] http://docs.oracle.com/javase/8/docs/api/javax/security/auth/Subject.html


> Improve Geode Security Framework 
> -
>
> Key: GEODE-2053
> URL: https://issues.apache.org/jira/browse/GEODE-2053
> Project: Geode
>  Issue Type: Improvement
>Reporter: Jinmei Liao
>
> This is based on the feedback that John provided by using Geode 

[jira] [Comment Edited] (GEODE-2053) Improve Geode Security Framework

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15633607#comment-15633607
 ] 

Jinmei Liao edited comment on GEODE-2053 at 11/3/16 5:45 PM:
-



[1] 
https://github.com/spring-projects/spring-data-gemfire/blob/apache-geode/src/main/java/org/springframework/data/gemfire/config/annotation/EnableSecurity.java
[2] https://github.com/jxblum/contacts-application
[3] https://github.com/jxblum/contacts-application/tree/apache-geode
[4] 
https://github.com/jxblum/contacts-application/tree/apache-geode/security-example
[5] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java
[6] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L280-L286
[7] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/geode/security/provider/SimpleSecurityManager.java
[8] 
http://geode.incubator.apache.org/releases/latest/javadoc/org/apache/geode/security/SecurityManager.html
[9] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/geode/security/repository/SecurityRepository.java
[10] http://shiro.apache.org/architecture.html#detailed-architecture
[11] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L311-L315
[12] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/resources/geode-security-shiro.ini
[13] 
https://github.com/jxblum/contacts-application/tree/apache-geode/contacts-core/src/main/java/example/app/geode/security/repository/support
[14] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L317-L331
[15] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/java/example/app/shiro/realm/SecurityRepositoryAuthorizingRealm.java
[16] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/realm/package-summary.html
[17] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L333-L345
[18] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/realm/text/PropertiesRealm.html
[19] 
https://github.com/jxblum/contacts-application/blob/apache-geode/contacts-core/src/main/resources/geode-security-shiro.properties
[20] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/mgt/SecurityManager.html
[21] http://docs.oracle.com/javase/8/docs/api/java/lang/SecurityManager.html
[22] 
http://geode.incubator.apache.org/releases/latest/javadoc/org/apache/geode/security/package-frame.html
[23] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/security/shiro/GeodePermissionResolver.java
[24] https://cwiki.apache.org/confluence/display/GEODE/Geode+Integrated+Security
[25] 
https://github.com/jxblum/contacts-application/blob/apache-geode/security-example/src/test/java/example/app/geode/security/GeodeSecurityIntegrationTests.java#L342
[26] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/authz/permission/PermissionResolver.html
[27] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/security/SecurityService.java
[28] 
https://github.com/spring-projects/spring-data-gemfire/blob/apache-geode/src/main/java/org/springframework/data/gemfire/config/annotation/ApacheShiroSecurityConfiguration.java#L208-L224
[29] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/internal
[30] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/internal/security
[31] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/security/templates
[32] 
https://github.com/apache/incubator-geode/tree/develop/geode-core/src/main/java/org/apache/geode/security
[33] 
https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/security/SecurableCommunicationChannels.java
[34] 
http://shiro.apache.org/static/1.3.2/apidocs/org/apache/shiro/subject/Subject.html
[35] http://docs.oracle.com/javase/8/docs/api/javax/security/auth/Subject.html


was (Author: jinmeiliao):
1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
Shiro's provided (OOTB) Realms correctly.  Otherwise, the security Permissions 
are not enforced properly (in a hierarchical fashion as advertised [24], i.e. 
in section "3. Introduction of 

[jira] [Updated] (GEODE-2056) Expose GeodeSecurityService as needed

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2056?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2056:
---
Description: 
2. I also think it is pertinent that the SecurityService interface [27] be in 
Geode's public API.  Given this is just an interface, I am not sure why it was 
decided to make it "internal" anyway?  I see no good reason NOT to expose this 
interface, especially since it would be particularly useful for both 
API/Framework (e.g. SDG) as well as tools developers developing extensions to 
Apache Geode.

I actually did make use of the SecurityService interface [28] in SDG, despite 
my (usually) hard rule of NOT ever using any GemFire/Geode internal classes at 
all in SDG. Unfortunately, and all too often, in certain cases, such as the 
currently released version of Apache Geode, 1.0.0-incubating GA, there is 
simply no other way around it when providing support for securing Apache Geode, 
especially for making Apache Shiro first-class (something I want to similarly 
do for Spring Security).

> Expose GeodeSecurityService as needed
> -
>
> Key: GEODE-2056
> URL: https://issues.apache.org/jira/browse/GEODE-2056
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> 2. I also think it is pertinent that the SecurityService interface [27] be in 
> Geode's public API.  Given this is just an interface, I am not sure why it 
> was decided to make it "internal" anyway?  I see no good reason NOT to expose 
> this interface, especially since it would be particularly useful for both 
> API/Framework (e.g. SDG) as well as tools developers developing extensions to 
> Apache Geode.
> I actually did make use of the SecurityService interface [28] in SDG, despite 
> my (usually) hard rule of NOT ever using any GemFire/Geode internal classes 
> at all in SDG. Unfortunately, and all too often, in certain cases, such as 
> the currently released version of Apache Geode, 1.0.0-incubating GA, there is 
> simply no other way around it when providing support for securing Apache 
> Geode, especially for making Apache Shiro first-class (something I want to 
> similarly do for Spring Security).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2055) Expose GeodePermissionResolver

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2055?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2055:
---
Description: 
1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
Shiro's provided (OOTB) Realms correctly.  Otherwise, the security Permissions 
are not enforced properly (in a hierarchical fashion as advertised [24], i.e. 
in section "3. Introduction of ResourcePermission").

I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
provided (OOTB) PropertiesRealm implementation [18].

Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
particularly important if the user is using Apache Shiro to the fullest extent 
to configure and secure Apache Geode.

Of course, I could have provided my own implementation of the Apache Shiro 
PermissionResolver interface [26] (especially given the simplicity of the 
GeodePermissionResolver implementation) but if that implementation every 
involves more logic behind the scenes, better to "reuse" then "reinvent" in 
this case.

> Expose GeodePermissionResolver
> --
>
> Key: GEODE-2055
> URL: https://issues.apache.org/jira/browse/GEODE-2055
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> 1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
> Shiro's provided (OOTB) Realms correctly.  Otherwise, the security 
> Permissions are not enforced properly (in a hierarchical fashion as 
> advertised [24], i.e. in section "3. Introduction of ResourcePermission").
> I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
> provided (OOTB) PropertiesRealm implementation [18].
> Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
> particularly important if the user is using Apache Shiro to the fullest 
> extent to configure and secure Apache Geode.
> Of course, I could have provided my own implementation of the Apache Shiro 
> PermissionResolver interface [26] (especially given the simplicity of the 
> GeodePermissionResolver implementation) but if that implementation every 
> involves more logic behind the scenes, better to "reuse" then "reinvent" in 
> this case.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2054) Do not use classpath: when looking for seucrity-shiro-ini files

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2054?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2054:
---
Description: 
1. Hardcoding [1] the "resource path prefix" [2] (i.e. "classpath:") when the 
user decides to use Apache Shiro [3] to configure security for Apache Geode [4] 
is well, again, rather limiting.

If a user specifies the Geode (System) property, "security-shiro-init", 
referencing an Apache Shiro INI configuration file, why not let the user decide 
the resource path source (i.e. classpath:, file:, or url:) of the INI file.  
For example...

-Dgeode.security-shiro-init=file:/absolute/file/system/path/to/users/application/shiro.ini

I would not arbitrarily restrict users to only the classapth for locating 
resources.  It is unlikely the INI file will contain "sensitive" data (e.g. 
usernames/passwords, or even permission meta-data) in a production environment. 
 It is more likely, that the users will be configuring 1 or more Shiro Realms 
declared in the [main] section of the INI file to load the security 
configuration meta-data from an external repository.

Additionally, Apache Shiro has the ability to detect file changes, and 
dynamically reload the INI security configuration file [5] when the file: 
resource path (i.e. file system) is used.

> Do not use classpath: when looking for seucrity-shiro-ini files
> ---
>
> Key: GEODE-2054
> URL: https://issues.apache.org/jira/browse/GEODE-2054
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> 1. Hardcoding [1] the "resource path prefix" [2] (i.e. "classpath:") when the 
> user decides to use Apache Shiro [3] to configure security for Apache Geode 
> [4] is well, again, rather limiting.
> If a user specifies the Geode (System) property, "security-shiro-init", 
> referencing an Apache Shiro INI configuration file, why not let the user 
> decide the resource path source (i.e. classpath:, file:, or url:) of the INI 
> file.  For example...
> -Dgeode.security-shiro-init=file:/absolute/file/system/path/to/users/application/shiro.ini
> I would not arbitrarily restrict users to only the classapth for locating 
> resources.  It is unlikely the INI file will contain "sensitive" data (e.g. 
> usernames/passwords, or even permission meta-data) in a production 
> environment.  It is more likely, that the users will be configuring 1 or more 
> Shiro Realms declared in the [main] section of the INI file to load the 
> security configuration meta-data from an external repository.
> Additionally, Apache Shiro has the ability to detect file changes, and 
> dynamically reload the INI security configuration file [5] when the file: 
> resource path (i.e. file system) is used.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2054) Do not use classpath: when looking for security-shiro-ini files

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2054?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2054:
---
Summary: Do not use classpath: when looking for security-shiro-ini files  
(was: Do not use classpath: when looking for seucrity-shiro-ini files)

> Do not use classpath: when looking for security-shiro-ini files
> ---
>
> Key: GEODE-2054
> URL: https://issues.apache.org/jira/browse/GEODE-2054
> Project: Geode
>  Issue Type: Sub-task
>Reporter: Jinmei Liao
>
> 1. Hardcoding [1] the "resource path prefix" [2] (i.e. "classpath:") when the 
> user decides to use Apache Shiro [3] to configure security for Apache Geode 
> [4] is well, again, rather limiting.
> If a user specifies the Geode (System) property, "security-shiro-init", 
> referencing an Apache Shiro INI configuration file, why not let the user 
> decide the resource path source (i.e. classpath:, file:, or url:) of the INI 
> file.  For example...
> -Dgeode.security-shiro-init=file:/absolute/file/system/path/to/users/application/shiro.ini
> I would not arbitrarily restrict users to only the classapth for locating 
> resources.  It is unlikely the INI file will contain "sensitive" data (e.g. 
> usernames/passwords, or even permission meta-data) in a production 
> environment.  It is more likely, that the users will be configuring 1 or more 
> Shiro Realms declared in the [main] section of the INI file to load the 
> security configuration meta-data from an external repository.
> Additionally, Apache Shiro has the ability to detect file changes, and 
> dynamically reload the INI security configuration file [5] when the file: 
> resource path (i.e. file system) is used.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2066) Log UnauthorizedException message at INFO and stack at DEBUG

2016-11-03 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2066:
--

 Summary: Log UnauthorizedException message at INFO and stack at 
DEBUG
 Key: GEODE-2066
 URL: https://issues.apache.org/jira/browse/GEODE-2066
 Project: Geode
  Issue Type: Sub-task
  Components: security
Reporter: Jinmei Liao


1. First, a similar Stack Trace appears at the INFO log-level every time a 
security violation (e.g. authentication or authorization failure) occurs...

[info 2016/10/25 21:09:08.339 PDT  tid=0x24] 
(tid=36 msgId=0) Could not execute "list members".
org.apache.geode.security.NotAuthorizedException: guest not authorized for 
CLUSTER:READ
at 
org.apache.geode.internal.security.IntegratedSecurityService.authorize(IntegratedSecurityService.java:303)
at 
org.apache.geode.internal.security.IntegratedSecurityService.authorize(IntegratedSecurityService.java:280)
at 
org.apache.geode.internal.security.IntegratedSecurityService.authorize(IntegratedSecurityService.java:275)
at 
org.apache.geode.internal.security.IntegratedSecurityService.authorize(IntegratedSecurityService.java:217)
at 
org.apache.geode.management.internal.cli.remote.CommandProcessor.executeCommand(CommandProcessor.java:116)
at 
org.apache.geode.management.internal.cli.remote.CommandStatementImpl.process(CommandStatementImpl.java:66)
at 
org.apache.geode.management.internal.cli.remote.MemberCommandService.processCommand(MemberCommandService.java:54)
at 
org.apache.geode.management.internal.beans.MemberMBeanBridge.processCommand(MemberMBeanBridge.java:1690)
at 
org.apache.geode.management.internal.beans.MemberMBean.processCommand(MemberMBean.java:406)
at 
org.apache.geode.management.internal.beans.MemberMBean.processCommand(MemberMBean.java:399)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at sun.reflect.misc.Trampoline.invoke(MethodUtil.java:71)
at sun.reflect.GeneratedMethodAccessor8.invoke(Unknown Source)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at sun.reflect.misc.MethodUtil.invoke(MethodUtil.java:275)
at 
com.sun.jmx.mbeanserver.ConvertingMethod.invokeWithOpenReturn(ConvertingMethod.java:193)
at 
com.sun.jmx.mbeanserver.ConvertingMethod.invokeWithOpenReturn(ConvertingMethod.java:175)
at 
com.sun.jmx.mbeanserver.MXBeanIntrospector.invokeM2(MXBeanIntrospector.java:117)
at 
com.sun.jmx.mbeanserver.MXBeanIntrospector.invokeM2(MXBeanIntrospector.java:54)
at 
com.sun.jmx.mbeanserver.MBeanIntrospector.invokeM(MBeanIntrospector.java:237)
at com.sun.jmx.mbeanserver.PerInterface.invoke(PerInterface.java:138)
at com.sun.jmx.mbeanserver.MBeanSupport.invoke(MBeanSupport.java:252)
at 
com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.invoke(DefaultMBeanServerInterceptor.java:819)
at 
com.sun.jmx.mbeanserver.JmxMBeanServer.invoke(JmxMBeanServer.java:801)
at 
org.apache.geode.management.internal.security.MBeanServerWrapper.invoke(MBeanServerWrapper.java:208)
at 
javax.management.remote.rmi.RMIConnectionImpl.doOperation(RMIConnectionImpl.java:1471)
at 
javax.management.remote.rmi.RMIConnectionImpl.access$300(RMIConnectionImpl.java:76)
at 
javax.management.remote.rmi.RMIConnectionImpl$PrivilegedOperation.run(RMIConnectionImpl.java:1312)
at java.security.AccessController.doPrivileged(Native Method)
at 
javax.management.remote.rmi.RMIConnectionImpl.doPrivilegedOperation(RMIConnectionImpl.java:1411)
at 
javax.management.remote.rmi.RMIConnectionImpl.invoke(RMIConnectionImpl.java:832)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at sun.rmi.server.UnicastServerRef.dispatch(UnicastServerRef.java:323)
at sun.rmi.transport.Transport$1.run(Transport.java:200)
at sun.rmi.transport.Transport$1.run(Transport.java:197)
at java.security.AccessController.doPrivileged(Native Method)
at sun.rmi.transport.Transport.serviceCall(Transport.java:196)
at 
sun.rmi.transport.tcp.TCPTransport.handleMessages(TCPTransport.java:568)
at 
sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run0(TCPTransport.java:826)
at 

[jira] [Comment Edited] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15632873#comment-15632873
 ] 

Jinmei Liao edited comment on GEODE-1986 at 11/3/16 2:32 PM:
-

The fix was put in on 10/11, I believe by that time, 1.0.0 is already out. I've 
updated the fixed version of this ticket. The fix is also in 9.0 support branch.

Do we need to backport this to 1.0.0? A simple workaround of this problem is to 
set enable-cluster-configuration=false when you start up the embedded locator 
(your server 1).


was (Author: jinmeiliao):
The fix was put in on 10/11, I believe by that time, 1.0.0 is already out. I've 
updated the fixed version of this ticket. The fix is also in 9.0 support branch.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Fix For: 1.1.0-incubating
>
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-11-03 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15632873#comment-15632873
 ] 

Jinmei Liao commented on GEODE-1986:


The fix was put in on 10/11, I believe by that time, 1.0.0 is already out. I've 
updated the fixed version of this ticket. The fix is also in 9.0 support branch.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Fix For: 1.1.0-incubating
>
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-11-03 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1986:
---
Fix Version/s: (was: 1.0.0-incubating)
   1.1.0-incubating

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Fix For: 1.1.0-incubating
>
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2058) reorganize security examples

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2058:
--

 Summary: reorganize security examples
 Key: GEODE-2058
 URL: https://issues.apache.org/jira/browse/GEODE-2058
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2056) Expose GeodeSecurityService as needed

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2056:
--

 Summary: Expose GeodeSecurityService as needed
 Key: GEODE-2056
 URL: https://issues.apache.org/jira/browse/GEODE-2056
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2057) reorganize security packages

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2057:
--

 Summary: reorganize security packages
 Key: GEODE-2057
 URL: https://issues.apache.org/jira/browse/GEODE-2057
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2055) Expose GeodePermissionResolver

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2055:
--

 Summary: Expose GeodePermissionResolver
 Key: GEODE-2055
 URL: https://issues.apache.org/jira/browse/GEODE-2055
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2054) Do not use classpath: when looking for seucrity-shiro-ini files

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2054:
--

 Summary: Do not use classpath: when looking for seucrity-shiro-ini 
files
 Key: GEODE-2054
 URL: https://issues.apache.org/jira/browse/GEODE-2054
 Project: Geode
  Issue Type: Sub-task
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2053) Improve Geode Security Framework

2016-11-02 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2053:
--

 Summary: Improve Geode Security Framework 
 Key: GEODE-2053
 URL: https://issues.apache.org/jira/browse/GEODE-2053
 Project: Geode
  Issue Type: Improvement
Reporter: Jinmei Liao


This is based on the feedback that John provided by using Geode Security in 
SDG. 


Below is his email:
This is will be my final feedback (for now) regarding Geode's Integrated 
Security framework/feature.  My following recommendations are based on 
extensive testing and experience trying to configure and enable Geode's 
security services.

As you know, my goal was to be able to quickly, easily and conveniently 
configure Geode's security framework services and features using Spring. 
However, my techniques could equally apply in any context (e.g. PCF, or a 
simple test environment without any framework/container).

To make it quick, easy and convenient, I added support for Geode Integrated 
Security in SD Geode by way of the new Annotation configuration model, 
specifically with the addition of the new @EnableSecurity annotation [1].

The new @EnableSecurity annotation can be seen in action in the SDG Contacts 
Application RI [2] (apache-geode branch [3]), security-example [4], 
GeodeSecurityIntegrationTests class [5].  In this test class, I demonstrate 4 
different ways, each employing different methods an application developer might 
use to configure and enable Geode's Integrated Security feature to secure 
Apache Geode operationally:


1. I use Geode's security-manager (System) property to refer to an application 
implementation of "Geode's" SecurityManager interface. See here [6].

As you may recall, the SimpleSecurityManager [7] implementation is a custom 
application implementation of Geode's SecurityManager interface [8] (not to be 
confused with Shiro's [20], or even Java's [21] SecurityManager, for that 
matter) employing the Repository (DAO) Design Pattern (via the 
SecurityRepository interface [9]) to load security configuration meta-data 
(e.g. Users, Roles and Permissions) from a variety of data sources.  This is 
not at all unlike how the Apache Shiro framework, itself, is organized [10] 
(i.e. SecurityManager -> (pluggable) Realms).


2. Next [11], I use Geode's security-shiro-init (System) property to refer to a 
Apache Shiro INI security configuration file (e.g. geode-security-shiro.ini 
[12]).

NOTE: the Users, Roles and Permissions I define are configured consistently 
throughout all my security configurations and data source examples (all based 
on my SecurityRepository implementations [13]).


3. Then [14], I create a custom Apache Shiro Realm based on my 
SecurityRepository interface (the SecurityRepositoryAuthorizingRealm [15]), 
enabling me, as a application developer, to plug in 1 of my implementations 
(i.e. JDBC or XML).

NOTE:, I use XML since Apache Shiro provides no, OOTB implementation for XML, 
ironically (Shiro only supports Active Directory, JDBC, JNDI, LDAP and TEXT; 
see sub-packages below org.apache.shiro.realm [16]).


4. Finally [17], I use a canned, OOTB, Apache Shiro provided Realm 
implementation (PropertiesRealm [18]), that, as the name suggests, is based on 
the Java Properties file format (e.g. geode-security-shiro.properties [19]).


This may seem like a lot of work, even overkill, but all these were pertinent 
in finding a number of bugs not only in SDG's @EnableSecurity annotation and 
supporting classes, but with Geode's own Integrated Security framework, and 
specifically the API [22].  Individually, or if I had stopped my testing 
efforts prematurely with only 1 or 2 examples, I definitely would not have 
uncovered all the problems I found.


1. First, the GeodePermissionResolver [23] is necessary to configure Apache 
Shiro's provided (OOTB) Realms correctly.  Otherwise, the security Permissions 
are not enforced properly (in a hierarchical fashion as advertised [24], i.e. 
in section "3. Introduction of ResourcePermission").

I used [25] the GeodePermissionResolver class to configure the Apache Shiro 
provided (OOTB) PropertiesRealm implementation [18].

Therefore, the GeodePermissionResolver class must NOT be internal.  This is 
particularly important if the user is using Apache Shiro to the fullest extent 
to configure and secure Apache Geode.

Of course, I could have provided my own implementation of the Apache Shiro 
PermissionResolver interface [26] (especially given the simplicity of the 
GeodePermissionResolver implementation) but if that implementation every 
involves more logic behind the scenes, better to "reuse" then "reinvent" in 
this case.


2. I also think it is pertinent that the SecurityService interface [27] be in 
Geode's public API.  Given this is just an interface, I am not sure why it was 
decided to make it "internal" anyway?  I see no good reason NOT to expose this 
interface, especially since it would be 

[jira] [Resolved] (GEODE-17) Provide Integrated Security

2016-10-28 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-17?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-17.
--
Resolution: Fixed

> Provide Integrated Security
> ---
>
> Key: GEODE-17
> URL: https://issues.apache.org/jira/browse/GEODE-17
> Project: Geode
>  Issue Type: New Feature
>  Components: client/server, docs, security
>Reporter: Tushar Khairnar
>Assignee: Jens Deppe
>  Labels: security
>
> Integrated Security: Purpose of integrated security feature is to provide 
> uniform authentication and authorization capabilities for all Geode clients. 
> Geode distributed systems has different clients, some perform cache/region 
> operations, some perform management operations. In order to authenticate and 
> authorize these actions we need single consistent framework or interface. 
> Such interface should allow configuration of access levels from single place 
> and/or repository. 
> The key requirements being met here are
>  - Authentication of all clients from single plugin
>  - Authorization of cache/data operations (through cache-client and REST) and 
> managements (GFSH/JMX) operations from single plugin
>  - Extend existing Client-Server security framework



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-2025) When starting a geode server from gfsh, the default http-service-port it's using is 8080

2016-10-24 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-2025.

Resolution: Fixed

> When starting a geode server from gfsh, the default http-service-port it's 
> using is 8080
> 
>
> Key: GEODE-2025
> URL: https://issues.apache.org/jira/browse/GEODE-2025
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>
> This is different from the default-http-service-port defined in 
> DistributionConfig. As a result, if we stat a locator, the default 
> http-service-port is 7070, but if we start a server, it's using 8080. This 
> will be confusing to users.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (GEODE-2025) When starting a geode server from gfsh, the default http-service-port it's using is 8080

2016-10-24 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-2025:
--

Assignee: Jinmei Liao

> When starting a geode server from gfsh, the default http-service-port it's 
> using is 8080
> 
>
> Key: GEODE-2025
> URL: https://issues.apache.org/jira/browse/GEODE-2025
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>Assignee: Jinmei Liao
>
> This is different from the default-http-service-port defined in 
> DistributionConfig. As a result, if we stat a locator, the default 
> http-service-port is 7070, but if we start a server, it's using 8080. This 
> will be confusing to users.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2030) Geode Security framework needs to support easier integration in SDG

2016-10-24 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2030?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2030:
---
Component/s: management

> Geode Security framework needs to support easier integration in SDG
> ---
>
> Key: GEODE-2030
> URL: https://issues.apache.org/jira/browse/GEODE-2030
> Project: Geode
>  Issue Type: Bug
>  Components: management
>Reporter: Jinmei Liao
>
> While using gemfire properties to configure security is doable in SDG, they 
> would prefer an object based injection model to configure security. Here are 
> the two things they would need:
> 1. directly inject a Gemfire SecurityManager object into CacheFactory.
> 2. directly configure Shiro Security using their xml based configuration.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-2030) Geode Security framework needs to support easier integration in SDG

2016-10-24 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-2030?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15602398#comment-15602398
 ] 

Jinmei Liao commented on GEODE-2030:


John's email:

To make my example a bit more concrete in Geode terms... as a developer, I 
would like to have the ability to do the following...

SecurityConfigurationRepository repository = ...;

SecurityManager securityManager = new 
example.app.security.MySecurityManager(repository);

new CacheFactory()
  .set("name", "Example")
  .set("log-level", "config")
  .setSecurityManager(securityManager)
  ...
  .create();

This would be very similar to configuring a PdxSerializer using...

CacheFactory.setPdxSerializer(:PdxSerializer); [1]

In fact, having the ability to configure PDX in this manner was very 
useful/instrumental in creating a "composable" [2] PdxSerializer, in this SDG 
test class (defined here [3], configured using a Spring FactoryBean [4], and 
configuration here [5]).  As you can see, I use individual PdxSerializer for 
each application domain object type (here [6] and here [7]).  However, since 
GemFire/Geode can only accept a single PdxSerializer instance, I compose them.

All too often, I see Geode developers naively cram all the de/serialization 
logic for all their application domain objects into a single PdxSerializer 
instance.

Employing the appropriate application design patterns makes this much easier to 
configure, test and maintain.

Using a similar approach in Security would be very beneficial, IMO.


> Geode Security framework needs to support easier integration in SDG
> ---
>
> Key: GEODE-2030
> URL: https://issues.apache.org/jira/browse/GEODE-2030
> Project: Geode
>  Issue Type: Bug
>Reporter: Jinmei Liao
>
> While using gemfire properties to configure security is doable in SDG, they 
> would prefer an object based injection model to configure security. Here are 
> the two things they would need:
> 1. directly inject a Gemfire SecurityManager object into CacheFactory.
> 2. directly configure Shiro Security using their xml based configuration.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2030) Geode Security framework needs to support easier integration in SDG

2016-10-24 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2030:
--

 Summary: Geode Security framework needs to support easier 
integration in SDG
 Key: GEODE-2030
 URL: https://issues.apache.org/jira/browse/GEODE-2030
 Project: Geode
  Issue Type: Bug
Reporter: Jinmei Liao


While using gemfire properties to configure security is doable in SDG, they 
would prefer an object based injection model to configure security. Here are 
the two things they would need:

1. directly inject a Gemfire SecurityManager object into CacheFactory.
2. directly configure Shiro Security using their xml based configuration.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2025) When starting a geode server from gfsh, the default http-service-port it's using is 8080

2016-10-21 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2025:
--

 Summary: When starting a geode server from gfsh, the default 
http-service-port it's using is 8080
 Key: GEODE-2025
 URL: https://issues.apache.org/jira/browse/GEODE-2025
 Project: Geode
  Issue Type: Bug
  Components: management
Reporter: Jinmei Liao


This is different from the default-http-service-port defined in 
DistributionConfig. As a result, if we stat a locator, the default 
http-service-port is 7070, but if we start a server, it's using 8080. This will 
be confusing to users.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2020) Add more tests to replace the legacy tests

2016-10-20 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2020?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2020:
---
Description: Whenever a legacy test failed, we should write an integration 
test or Dunit test to reproduce it and then fix it.

> Add more tests to replace the legacy tests
> --
>
> Key: GEODE-2020
> URL: https://issues.apache.org/jira/browse/GEODE-2020
> Project: Geode
>  Issue Type: Task
>  Components: management
>Reporter: Jinmei Liao
>
> Whenever a legacy test failed, we should write an integration test or Dunit 
> test to reproduce it and then fix it.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2020) Add more tests to replace the legacy tests

2016-10-20 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2020:
--

 Summary: Add more tests to replace the legacy tests
 Key: GEODE-2020
 URL: https://issues.apache.org/jira/browse/GEODE-2020
 Project: Geode
  Issue Type: Task
  Components: management
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-2004) Create/update/delete query through rest api should require DATA:READ instead of DATA:WRITE

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2004?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-2004.

Resolution: Fixed

> Create/update/delete query through rest api should require DATA:READ instead 
> of DATA:WRITE
> --
>
> Key: GEODE-2004
> URL: https://issues.apache.org/jira/browse/GEODE-2004
> Project: Geode
>  Issue Type: Bug
>  Components: management, security
>Reporter: Jinmei Liao
>Assignee: Kevin Duling
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-2004) Create/update/delete query through rest api should require DATA:READ instead of DATA:WRITE

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-2004?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-2004:
---
Summary: Create/update/delete query through rest api should require 
DATA:READ instead of DATA:WRITE  (was: Create/update/delete query through rest 
api should require DATA:MANAGE instead of DATA:READ.)

> Create/update/delete query through rest api should require DATA:READ instead 
> of DATA:WRITE
> --
>
> Key: GEODE-2004
> URL: https://issues.apache.org/jira/browse/GEODE-2004
> Project: Geode
>  Issue Type: Bug
>  Components: management, security
>Reporter: Jinmei Liao
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-2004) Create/update/delete query through rest api should require DATA:MANAGE instead of DATA:READ.

2016-10-17 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-2004:
--

 Summary: Create/update/delete query through rest api should 
require DATA:MANAGE instead of DATA:READ.
 Key: GEODE-2004
 URL: https://issues.apache.org/jira/browse/GEODE-2004
 Project: Geode
  Issue Type: Bug
  Components: management, security
Reporter: Jinmei Liao






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1883) AuthInitializer should be made optional

2016-10-17 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15582647#comment-15582647
 ] 

Jinmei Liao commented on GEODE-1883:


Currently in peer to peer communication, security-auth-init is optional. But in 
client-server, it is still required. It's going to be a very involved change on 
the client side to make it optional in the current state of java client.

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: New Feature
>  Components: management
>Reporter: Swapnil Bawaskar
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1883) AuthInitializer should be made optional

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1883:
---
Component/s: (was: security)

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: Improvement
>  Components: management
>Reporter: Swapnil Bawaskar
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1883) AuthInitializer should be made optional

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1883:
---
Issue Type: New Feature  (was: Improvement)

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: New Feature
>  Components: management
>Reporter: Swapnil Bawaskar
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1883) AuthInitializer should be made optional

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1883:
---
Assignee: (was: Jinmei Liao)

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: Improvement
>  Components: management, security
>Reporter: Swapnil Bawaskar
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1883) AuthInitializer should be made optional

2016-10-17 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1883:
---
Component/s: management

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: Improvement
>  Components: management, security
>Reporter: Swapnil Bawaskar
>Assignee: Jinmei Liao
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (GEODE-1883) AuthInitializer should be made optional

2016-10-14 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao reassigned GEODE-1883:
--

Assignee: Jinmei Liao

> AuthInitializer should be made optional
> ---
>
> Key: GEODE-1883
> URL: https://issues.apache.org/jira/browse/GEODE-1883
> Project: Geode
>  Issue Type: Improvement
>  Components: security
>Reporter: Swapnil Bawaskar
>Assignee: Jinmei Liao
>
> {{AuthInitializer}} is the interface that a client must implement that 
> provides credentials that are verified by the server. The same interface is 
> also used for peer authentication. 
> In order to configure {{AuthInitialize}} any Geode property starting with 
> {{security-}} is passed through to the {{AuthInitialize.getCredentials}} 
> method.
> For simple authentication where only a username and a password are required, 
> users should not really be required to implement the AuthInitialize interface 
> in the presence of property passthrough. 
> Geode should detect {{security-username}} and {{security-password}} 
> properties in gemfire.security OR gfsecurity.properties file and use those 
> for authentication.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-13 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15572773#comment-15572773
 ] 

Jinmei Liao commented on GEODE-1986:


Yes, the fix was pushed to develop yesterday and is available in the nightly 
build.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Fix For: 1.0.0-incubating
>
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-13 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15572623#comment-15572623
 ] 

Jinmei Liao commented on GEODE-1986:


Ok. got you now. Is there a  use case that a peer cache member would need to 
join another peer's locator that has enabled cluster config?

We did lump the security config inside the cluster configuration because we 
decided it should be a cluster-wide configuration. Maybe your concern lies in 
the fact that currently there are limitations of what cluster config service 
can do, so users would disable them to get what they need to do.  We will look 
at how to improve cluster config post 1.0. For now, I want to make sure your 
immediate concern is addressed by our current fix.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-13 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15572521#comment-15572521
 ] 

Jinmei Liao commented on GEODE-1986:


"This suggests the joining member (server) must enable cluster config in order 
to pick up the security configuration"
No, they don't have to "enable" cluster config, they just have to "use" cluster 
config, which are two different configurations.

If a locator is secured but does not have cluster config service running, a 
server can connect to it as long as it has correct credentials. At that point, 
we do no check if their security settings are matched up. It will totally up to 
the person starting them up to make sure they use the same security settings to 
protect their data.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-13 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15569869#comment-15569869
 ] 

Jinmei Liao edited comment on GEODE-1986 at 10/13/16 6:23 AM:
--

The scenario you provided in the beginning of the bug is fixed by correcting 
setting the "enable-cluster-configuration" flag when starting an embedded 
locator. Cluster configuration is not a required service, if the locator does 
not have cluster configuration service running, then regardless of its 
security, a member can join with its own security manager. But if a locator has 
cluster config running and is secured, any member without use-cluster-config 
will be rejected. Are there other use cases that would fail with current 
implementation? We will add it to our Dunit test suite to uncover it and fix it.

Also, without our current implementation,  a server with correct credentials 
and use SSL would successfully join a secured locator  but itself can be 
unprotected. Client can directly connect to that server without any credential 
to get the data even though the locator is secured.


was (Author: jinmeiliao):
The scenario you provided in the beginning of the bug is fixed by correcting 
setting the "enable-cluster-configuration" flag when starting an embedded 
locator. Cluster configuration is not a required service, if the locator does 
not have cluster configuration service running, then regardless of its 
security, a member can join with its own security manager. But if a locator has 
cluster config running and is secured, any member without use-cluster-config 
will be rejected. Are there other use cases that would render this requirement 
unacceptable? We will add it to our Dunit test suite to accommodate it.

Also, a server with correct credentials and use SSL will successfully join the 
locator, but itself can be unprotected. Client can directly connect to that 
server.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> 

[jira] [Updated] (GEODE-1993) value returned through /region/key rest service needs to be post processed

2016-10-11 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1993?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1993:
---
Component/s: (was: rest (dev))
 management

> value returned through /region/key rest service needs to be post processed
> --
>
> Key: GEODE-1993
> URL: https://issues.apache.org/jira/browse/GEODE-1993
> Project: Geode
>  Issue Type: New Feature
>  Components: management
>Reporter: Jinmei Liao
>
> The new rest security did not use post processor before returning the value 
> back to the client.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-1993) value returned through /region/key rest service needs to be post processed

2016-10-11 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-1993:
--

 Summary: value returned through /region/key rest service needs to 
be post processed
 Key: GEODE-1993
 URL: https://issues.apache.org/jira/browse/GEODE-1993
 Project: Geode
  Issue Type: New Feature
Reporter: Jinmei Liao


The new rest security did not use post processor before returning the value 
back to the client.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (GEODE-1993) value returned through /region/key rest service needs to be post processed

2016-10-11 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1993?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao updated GEODE-1993:
---
Component/s: rest (dev)

> value returned through /region/key rest service needs to be post processed
> --
>
> Key: GEODE-1993
> URL: https://issues.apache.org/jira/browse/GEODE-1993
> Project: Geode
>  Issue Type: New Feature
>  Components: rest (dev)
>Reporter: Jinmei Liao
>
> The new rest security did not use post processor before returning the value 
> back to the client.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566533#comment-15566533
 ] 

Jinmei Liao edited comment on GEODE-1986 at 10/11/16 10:03 PM:
---

This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If a locator is secured, a server who wants to join has to use the same 
security manager as the locator.
2. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, 


With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.


was (Author: jinmeiliao):
This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, 
2. If a locator is secured, a server who wants to join has to use the same 
security manager as the locator.

With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> 

[jira] [Comment Edited] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566533#comment-15566533
 ] 

Jinmei Liao edited comment on GEODE-1986 at 10/11/16 10:04 PM:
---

This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If a locator is secured, a server who wants to join has to use the same 
security manager as the locator.
2. If a locator is secured, a server who wants to join has to set 
use-cluster-configuration to be true in order to join, 


With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.


was (Author: jinmeiliao):
This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If a locator is secured, a server who wants to join has to use the same 
security manager as the locator.
2. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, 


With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> 

[jira] [Comment Edited] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566533#comment-15566533
 ] 

Jinmei Liao edited comment on GEODE-1986 at 10/11/16 10:02 PM:
---

This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, 
2. If a locator is secured, a server who wants to join has to use the same 
security manager as the locator.

With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.


was (Author: jinmeiliao):
This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If security-manager is set on a locator, cluster service needs to be running.
2. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, this prevents the 
server to be configured with a different security manager than the locator.

With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> 

[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566533#comment-15566533
 ] 

Jinmei Liao commented on GEODE-1986:


This was true before we put security-manager in the cluster configuration. 
Before, if a member joins and has use-cluster-configuration set to false, it 
won't request any cluster config, just starts up using its own config, joins 
the cluster and all good. But in 9.0. PM wants:
1. If security-manager is set on a locator, cluster service needs to be running.
2. If a locator is secured, a server who wants to join the secured server has 
to set use-cluster-configuration to be true in order to join, this prevents the 
server to be configured with a different security manager than the locator.

With these two new requirements, when a server joins, even it has 
use-cluster-configuration set to be false, we still need to check if the 
locator it's trying to join is a secured one or not, if it is, we need to 
prevent it from starting up by throwing an exception, otherwise, we will let it 
start.  If we don't do that, a server can join a secured locator but itself is 
not secured. This would leads to security leak.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566351#comment-15566351
 ] 

Jinmei Liao commented on GEODE-1986:


the use-cluser-configuration flag is checked, The problem here is that the 
enable-cluster-configuration is wrongfully set.

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

 [ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jinmei Liao resolved GEODE-1986.

Resolution: Workaround

> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (GEODE-1990) String a locator in the embedded mode should set the enable-cluster-configuration correctly

2016-10-11 Thread Jinmei Liao (JIRA)
Jinmei Liao created GEODE-1990:
--

 Summary: String a locator in the embedded mode should set the 
enable-cluster-configuration correctly
 Key: GEODE-1990
 URL: https://issues.apache.org/jira/browse/GEODE-1990
 Project: Geode
  Issue Type: Bug
Reporter: Jinmei Liao


A locator started using the following does not start the cluster configuration, 
but the enabled-cluster-configuration flag is true, this will result in other 
server who joins to request the cluster config and then fail with an exception.

   locator.invoke(()->{
  new CacheFactory()
.set("name", this.getName()+".server1")
.set("mcast-port", "0")
.set("log-level", "config")
.set("start-locator", "localhost["+locatorPort+"]")
.create();
});



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (GEODE-1986) The Cluster Configuration Service must absolutely not be required to run Geode.

2016-10-11 Thread Jinmei Liao (JIRA)

[ 
https://issues.apache.org/jira/browse/GEODE-1986?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15566138#comment-15566138
 ] 

Jinmei Liao commented on GEODE-1986:


So looks like the real problem is that when starting a locator in the embedded 
mode, even though the enable-cluster-configuration is by default, true, it's 
not really starting up the cluster config service, but when a server joins, 
it's sending the message telling the server that it has cluster service 
enabled. The above test will pass, if the locator is started setting an extra 
flag:

 new CacheFactory()
.set("name", this.getName()+".server1")
.set("mcast-port", "0")
.set("log-level", "config")
.set("start-locator", "localhost["+locatorPort+"]")
.set("enable-cluster-configuration", "false")
.create();

I'll create another bug and reference this to that one.


> The Cluster Configuration Service must absolutely not be required to run 
> Geode.
> ---
>
> Key: GEODE-1986
> URL: https://issues.apache.org/jira/browse/GEODE-1986
> Project: Geode
>  Issue Type: Bug
>  Components: configuration
>Reporter: John Blum
>Assignee: Jinmei Liao
>Priority: Critical
>  Labels: ClusterConfig, ClusterConfigurationService
> Attachments: App.java
>
>
> A bug was introduced in Geode when the logic to fetch the Cluster 
> Configuration meta-data from the Locator in the cluster by a joining member 
> was refactored into it's own 
> [class|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java]
>  causing the following issues...
> 1. First, and foremost, the _Cluster Configuration_ service is now, seemingly 
> no longer *optional* (hence, _required_), which is both short sighted and too 
> restrictive, and will break existing [embedded Geode application] 
> deployments, particularly in situations where GemFire config, and especially, 
> _Gfsh_ were not used to configure the cluster, which will be true when users 
> upgrade existing clusters based on an earlier versions of Apache Geode 
> (namely GemFire < v7.0, once GemFire 9 is based on Apache Geode) and as well 
> as _Spring_ applications.
> This change is apparent from the removal of the [conditional check on the 
> Geode System property 
> (1)|https://github.com/apache/incubator-geode/blob/rel/v1.0.0-incubating.M3/geode-core/src/main/java/com/gemstone/gemfire/internal/cache/GemFireCacheImpl.java#L956-L958],
>  which is no longer present [here 
> (2)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/ClusterConfigurationLoader.java#L184-L233]
>  or possibly [here 
> (3)|https://github.com/apache/incubator-geode/blob/develop/geode-core/src/main/java/org/apache/geode/internal/cache/GemFireCacheImpl.java#L976-L981].
> 2. This does not work in the embedded Locator case.  If a user configures a 
> peer Cache using the following in his/her application...
> {code:java}
> ... = new CacheFactory()
>   .set("name", "Example")
>   .set("start-locator", "localhost[10334]")
>   ...
>   .create();
> {code}
> And another members joins, the logic in (2) above, will fail with...
> {code:java}
> Caused by: org.apache.geode.GemFireConfigException: cluster configuration 
> service not available
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:1009)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.initialize(GemFireCacheImpl.java:1135)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.basicCreate(GemFireCacheImpl.java:771)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.create(GemFireCacheImpl.java:758)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:181)
>   at org.apache.geode.cache.CacheFactory.create(CacheFactory.java:231)
>   ... 42 more
>  Caused by: 
> org.apache.geode.internal.process.ClusterConfigurationNotAvailableException: 
> Unable to retrieve cluster configuration from the locator.
>   at 
> org.apache.geode.internal.cache.ClusterConfigurationLoader.requestConfigurationFromLocators(ClusterConfigurationLoader.java:229)
>   at 
> org.apache.geode.internal.cache.GemFireCacheImpl.requestSharedConfiguration(GemFireCacheImpl.java:981)
>   ... 47 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


  1   2   3   >