[
https://issues.apache.org/jira/browse/CXF-7148?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15687380#comment-15687380
]
Colm O hEigeartaigh commented on CXF-7148:
------------------------------------------
We need to cache SecurityTokens to make sure that we have access to the
symmetric key when processing the response. I think the problem here is that
the key used to cache the tokens is dependent on the request. CXF uses random
wsu:Ids, but other stacks do not. I'll take a look at this tomorrow.
Colm.
> Race Condition while handling symmetric key in SymmetricBindingHandler
> ----------------------------------------------------------------------
>
> Key: CXF-7148
> URL: https://issues.apache.org/jira/browse/CXF-7148
> Project: CXF
> Issue Type: Bug
> Components: WS-* Components
> Affects Versions: 3.1.7, 3.1.8
> Reporter: Max Fichtelmann
> Assignee: Colm O hEigeartaigh
>
> when using an asymmetricBinding, when requested in parallel, quite a few
> requests fail, where the client could not associate a symmetric key with the
> response.
> As it turned out, the symmetric key was stored temporarily in a cache using
> an id that is not unique at all.
> {code:title=SymmetricBindingHandler.java|borderStyle=solid}
> // line 985 via 162
> tokenStore.add(tempTok);
> // line 182
> tok = tokenStore.getToken(tokenId);
> {code}
> This leads to a race condition if another thread reaches line 162 before the
> key is retrieved in 182 and the same id is used.
> In my case, the id was "_5002" consistently.
> We implemented a hack using a ThreadLocal based TokenStore, but I think the
> symmetric key should actually not be cached at all.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)