[ https://issues.apache.org/jira/browse/KAFKA-7485?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16647991#comment-16647991 ]
ASF GitHub Bot commented on KAFKA-7485: --------------------------------------- rajinisivaram opened a new pull request #5791: KAFKA-7485: Wait for truststore update request to complete in test URL: https://github.com/apache/kafka/pull/5791 ### Committer Checklist (excluded from commit message) - [ ] Verify design and implementation - [ ] Verify test coverage and CI build status - [ ] Verify documentation (including upgrade notes) ---------------------------------------------------------------- This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org > Flaky test `DyanamicBrokerReconfigurationTest.testTrustStoreAlter` > ------------------------------------------------------------------ > > Key: KAFKA-7485 > URL: https://issues.apache.org/jira/browse/KAFKA-7485 > Project: Kafka > Issue Type: Bug > Reporter: Jason Gustafson > Assignee: Rajini Sivaram > Priority: Major > > {code} > 09:53:53 > 09:53:53 kafka.server.DynamicBrokerReconfigurationTest > testTrustStoreAlter > FAILED > 09:53:53 org.apache.kafka.common.errors.SslAuthenticationException: SSL > handshake failed > 09:53:53 > 09:53:53 Caused by: > 09:53:53 javax.net.ssl.SSLProtocolException: Handshake message > sequence violation, 2 > 09:53:53 at > java.base/sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1611) > 09:53:53 at > java.base/sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:497) > 09:53:53 at > java.base/sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:745) > 09:53:53 at > java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:680) > 09:53:53 at > java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:626) > 09:53:53 at > org.apache.kafka.common.network.SslTransportLayer.handshakeUnwrap(SslTransportLayer.java:474) > 09:53:53 at > org.apache.kafka.common.network.SslTransportLayer.handshake(SslTransportLayer.java:274) > 09:53:53 at > org.apache.kafka.common.network.KafkaChannel.prepare(KafkaChannel.java:126) > 09:53:53 at > org.apache.kafka.common.network.Selector.pollSelectionKeys(Selector.java:532) > 09:53:53 at > org.apache.kafka.common.network.Selector.poll(Selector.java:467) > 09:53:53 at > org.apache.kafka.clients.NetworkClient.poll(NetworkClient.java:510) > 09:53:53 at > org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:265) > 09:53:53 at > org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:236) > 09:53:53 at > org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:215) > 09:53:53 at > org.apache.kafka.clients.consumer.internals.AbstractCoordinator.ensureCoordinatorReady(AbstractCoordinator.java:231) > 09:53:53 at > org.apache.kafka.clients.consumer.internals.ConsumerCoordinator.poll(ConsumerCoordinator.java:316) > 09:53:53 at > org.apache.kafka.clients.consumer.KafkaConsumer.updateAssignmentMetadataIfNeeded(KafkaConsumer.java:1210) > 09:53:53 at > org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1179) > 09:53:53 at > org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1119) > 09:53:53 at > kafka.server.DynamicBrokerReconfigurationTest.kafka$server$DynamicBrokerReconfigurationTest$$awaitInitialPositions(DynamicBrokerReconfigurationTest.scala:997) > 09:53:53 at > kafka.server.DynamicBrokerReconfigurationTest$ConsumerBuilder.build(DynamicBrokerReconfigurationTest.scala:1424) > 09:53:53 at > kafka.server.DynamicBrokerReconfigurationTest.verifySslProduceConsume$1(DynamicBrokerReconfigurationTest.scala:286) > 09:53:53 at > kafka.server.DynamicBrokerReconfigurationTest.testTrustStoreAlter(DynamicBrokerReconfigurationTest.scala:311) > 09:53:53 > 09:53:53 Caused by: > 09:53:53 javax.net.ssl.SSLProtocolException: Handshake message > sequence violation, 2 > 09:53:53 at > java.base/sun.security.ssl.HandshakeStateManager.check(HandshakeStateManager.java:398) > 09:53:53 at > java.base/sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:215) > 09:53:53 at > java.base/sun.security.ssl.Handshaker.processLoop(Handshaker.java:1098) > 09:53:53 at > java.base/sun.security.ssl.Handshaker$1.run(Handshaker.java:1031) > 09:53:53 at > java.base/sun.security.ssl.Handshaker$1.run(Handshaker.java:1028) > 09:53:53 at > java.base/java.security.AccessController.doPrivileged(Native Method) > 09:53:53 at > java.base/sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1540) > 09:53:53 at > org.apache.kafka.common.network.SslTransportLayer.runDelegatedTasks(SslTransportLayer.java:399) > 09:53:53 at > org.apache.kafka.common.network.SslTransportLayer.handshakeUnwrap(SslTransportLayer.java:479) > 09:53:53 ... 17 more > {code} > Also, it seems we might not be cleaning up the consumer because I see a bunch > of subsequent failures due to lingering consumer heartbeat thread. -- This message was sent by Atlassian JIRA (v7.6.3#76005)