-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Konstantin,

On 5/6/15 9:25 AM, Konstantin Kolinko wrote:
> 2015-05-06 15:52 GMT+03:00 Christopher Schultz >
>> Mark,
>> 
>> On 5/6/15 8:03 AM, Mark Thomas wrote:
>>> On 06/05/2015 10:43, Arjit Gupta wrote:
>>>> Hello Tomcat Community,
>>>> 
>>>> I am building tomcat 7.0.59 with java7 on HP-UX(OS)
>>>> itanium(IA64) processor. After building it successful I am
>>>> running *ant test*. Which is failing due to exception which
>>>> is as below:
>>>> 
>>>> Testcase: testSimpleSsl took 4.085 sec Caused an ERROR 
>>>> sun.security.validator.ValidatorException: PKIX path
>>>> validation failed:
>>>> java.security.cert.CertPathValidatorException: timestamp 
>>>> check failed javax.net.ssl.SSLHandshakeException:
>>> 
>>> <snip/>
>>> 
>>>> I have manually tested the ssl functionality on Tomcat by 
>>>> enabling it from server.xml .It is working fine. Please
>>>> suggest the plausible cause of the above exception.
>>> 
>>> The test certificates used in the unit tests have expired.
>>> 
>>>> Is the this exception is coming due to some problem in build
>>>> or some configuration issue in OS?
>>> 
>>> No.
>> 
>> Is there any reason not to auto-generate test certs at the
>> beginning of the "ant test" target?
>> 
>> Also, it's possible to disable certain portions of the 
>> certificate-checking algorithm. Would it be worth it to
>> implement those workarounds so that expired certs won't fail?
> 
> 
> 1) Document this issue in BUILDING.txt
> 
> 2) Usually people can get recent certificates from our source tree
> in svn and swap them in.

So in order to successfully run unit tests against an old package
(e.g. Tomcat 7.0.5), one has to fetch artifacts from the current
source tree? That's just ugly.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: GPGTools - http://gpgtools.org
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=4xIj
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to