Ошибка при доступе к блоку привилегий Java Security Manager при изменении пароля пользователя - PullRequest
0 голосов
/ 26 февраля 2019

Когда я пытаюсь изменить пароли для пользователей с использованием углерода на API-M, я получаю «Ошибка при доступе к блоку привилегий Java Security Manager», но пароли меняются, несмотря на ошибку.Пароли не меняются для существующих пользователей, для новых пользователей пароли меняются.Недавно я поменял сертификаты на API-M.В чем проблема?Сертификаты влияют на эту ошибку?

Ответы [ 3 ]

0 голосов
/ 27 февраля 2019

я включил log4j.logger.org.wso2.carbon.user.core = DEBUG.Когда я пытаюсь изменить пароль для пользователя, я получаю это:

DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : admin resource /permission/admin/manage/identity/usermgt/update action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission/admin/manage/identity/usermgt/update Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission/admin/manage/identity/usermgt/update action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - admin user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : alibek resource /permission action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.common.AbstractUserStoreManager} - Retrieving internal roles for user name : alibek and search filter * {org.wso2.carbon.user.core.common.AbstractUserStoreManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - alibek user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Searching for user alibek {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Searching for user with SearchFilter: (&(objectClass=person)(uid=alibek)) in SearchBase: {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Name in space for alibek is uid=alibek,ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - User: alibek exist: true {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} ERROR {org.wso2.carbon.user.core.common.AbstractUserStoreManager} - Error occurred while accessing Java Security Manager Privilege Block {org.wso2.carbon.user.core.common.AbstractUserStoreManager} ERROR {org.wso2.carbon.user.mgt.ui.UserAdminClient} - Error occurred while accessing Java Security Manager Privilege Block {org.wso2.carbon.user.mgt.ui.UserAdminClient} org.wso2.carbon.user.mgt.stub.UserAdminUserAdminException: UserAdminUserAdminException at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at java.lang.Class.newInstance(Class.java:442) at org.wso2.carbon.user.mgt.stub.UserAdminStub.changePassword(UserAdminStub.java:3678) at org.wso2.carbon.user.mgt.ui.UserAdminClient.changePassword(UserAdminClient.java:102) at org.apache.jsp.user.change_002dpasswd_002dfinish_002dajaxprocessor_jsp._jspService(change_002dpasswd_002dfinish_002dajaxprocessor_jsp.java:148) at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70) at javax.servlet.http.HttpServlet.service(HttpServlet.java:731) at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:439) at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395) at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339) at javax.servlet.http.HttpServlet.service(HttpServlet.java:731) at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155) at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80) at javax.servlet.http.HttpServlet.service(HttpServlet.java:731) at org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37) at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61) at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128) at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68) at javax.servlet.http.HttpServlet.service(HttpServlet.java:731) at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.wso2.carbon.ui.filters.cache.URLBasedCachePreventionFilter.doFilter(URLBasedCachePreventionFilter.java:57) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:88) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:219) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110) at org.apache.catalina.valves.RequestFilterValve.process(RequestFilterValve.java:364) at org.apache.catalina.valves.RemoteAddrValve.invoke(RemoteAddrValve.java:76) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103) at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:80) at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:91) at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:60) at org.wso2.carbon.ui.valve.XSSValve.invoke(XSSValve.java:94) at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99) at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47) at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57) at org.wso2.carbon.event.receiver.core.internal.tenantmgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:48) at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47) at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62) at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159) at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962) at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445) at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1115) at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1775) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1734) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.lang.Thread.run(Thread.java:748) DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : admin resource /permission/admin/login action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission/admin/login Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: TEST_SSL {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/creator {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: MessageRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: SMROLE {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/subscriber {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: TestRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/publisher {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: APPLICATION/TST01_TST01 {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission/admin/login action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : TEST_SSL {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/creator {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : MessageRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : SMROLE {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/subscriber {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : TestRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/publisher {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : APPLICATION/TST01_TST01 {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - admin user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}

0 голосов
/ 28 февраля 2019

Ваши журналы отладки содержат только исключение на стороне клиента

org.wso2.carbon.user.mgt.stub.UserAdminStub.changePassword (UserAdminStub.java:3678) в org.wso2.carbon.user.mgt.ui.UserAdminClient.changePassword (UserAdminClient.java:102)

Чтобы получить представление о фактических исключениях бэкэнда, посмотрите ниже места.Вы можете, вероятно, удаленно отлаживать код на основе используемой версии APIM.

[1] https://github.com/wso2/carbon-kernel/blob/v4.4.26/core/org.wso2.carbon.user.core/src/main/java/org/wso2/carbon/user/core/ldap/ReadWriteLDAPUserStoreManager.java#L682

[2] https://github.com/wso2/carbon-kernel/blob/v4.4.26/core/org.wso2.carbon.user.core/src/main/java/org/wso2/carbon/user/core/common/AbstractUserStoreManager.java#L1108

[3] https://github.com/wso2/carbon-kernel/blob/v4.4.26/core/org.wso2.carbon.user.core/src/main/java/org/wso2/carbon/user/core/common/AbstractUserStoreManager.java#L176

0 голосов
/ 26 февраля 2019

«Произошла ошибка при доступе к блоку привилегий Java Security Manager» - это общее сообщение об ошибке, полученное от компонента ядра пользователя.Пожалуйста, предоставьте полную трассировку стека для расследования проблемы.Вы можете поместить ниже запись

log4j.logger.org.wso2.carbon.user.core = DEBUG

в log4j.properties для получения дополнительной информации.Нет прямой связи с сертификатами.

Добро пожаловать на сайт PullRequest, где вы можете задавать вопросы и получать ответы от других членов сообщества.
...