That error may be because you didn't run "install" to make sure its in your
local repository (unless you had run "install" previoulsy).  Though I don't
understand why the extension is currently a dependency for the webapp.  I
thought ClearPass was not being enabled by default.

Thanks for pointing that out.  One error down, 4 to go.

I started looking into the other failures. Honestly I don't understand how org.jasig.cas.authentication.handler.support.HttpBasedServiceCredentialsAuthenticationHandlerTests#testAcceptsProperCertificateCredentials is working for anyone. It's pointing at https://wwws.mint.com/, and OpenSSL is clearly showing an incomplete certificate chain for that host:

$ openssl s_client -connect wwws.mint.com:443 -showcerts
CONNECTED(00000003)
depth=1 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = Terms of use at https://www.verisign.com/rpa (c)06, CN = VeriSign Class 3 Extended Validation SSL SGC CA
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Delaware/businessCategory=Private Organization/serialNumber=2324451/C=US/postalCode=92129/ST=California/L=San Diego/street=7535 Torrey Santa FE Rd/O=INTUIT INC./OU=Technology Operations/CN=wwws.mint.com i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)06/CN=VeriSign Class 3 Extended Validation SSL SGC CA 1 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)06/CN=VeriSign Class 3 Extended Validation SSL SGC CA i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5

The JSSE PKI validation routines are very picky about proper cert chain ordering, and the chain above is clearly lacking the root cert. I suppose this could still pass validation if there's an explicit trust entry for the G5 authority. I'm guessing that the JRE on OSX has such an entry in the default truststore, while there is no such entry on Linux. Actually, it's more than a guess: my Linux workstation lacks an entry in the default system truststore, and my colleague verified there is an entry for the G5 authority in that of OSX.

We've run into this problem at least once in the past, and we're likely to run into it again. Ideally we'd have a test fixture that didn't depend on the vagaries of remote hosts, but that's admittedly a big undertaking. For now I will simply change the host to something that presents a cert with a common issuer.

Changing to https://github.com resolved all core test failures for me, so I'll commit that one-liner. Guess we'll chalk this up to platform-specific behavior.

M

--
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to