当我尝试用API-M上的碳纤维更改用户密码时,我得到“访问Java Security Manager特权块时发生错误”,但是即使出错,密码也会更改。现有用户的密码不会更改,新用户的密码也会更改。最近,我更改了API-M上的证书。 问题是什么?证书会影响此错误吗?
答案 0 :(得分:0)
“访问Java Security Manager特权块时发生错误”是来自用户核心组件的一般错误消息。请提供完整的堆栈跟踪以调查问题。 您可以在条目
下方放置log4j.logger.org.wso2.carbon.user.core =调试
以获得log4j.properties以获取更多信息。 与证书没有直接关系。
答案 1 :(得分:0)
我启用了log4j.logger.org.wso2.carbon.user.core = DEBUG。当我尝试为用户更改密码时,得到以下信息:
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : admin resource /permission/admin/manage/identity/usermgt/update action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission/admin/manage/identity/usermgt/update Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission/admin/manage/identity/usermgt/update action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - admin user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : alibek resource /permission action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.common.AbstractUserStoreManager} - Retrieving internal roles for user name : alibek and search filter * {org.wso2.carbon.user.core.common.AbstractUserStoreManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - alibek user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Searching for user alibek {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Searching for user with SearchFilter: (&(objectClass=person)(uid=alibek)) in SearchBase: {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Using default configurations for the user DN cache, having search base : ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - Name in space for alibek is uid=alibek,ou=Users,dc=wso2,dc=org {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
DEBUG {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} - User: alibek exist: true {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager}
ERROR {org.wso2.carbon.user.core.common.AbstractUserStoreManager} - Error occurred while accessing Java Security Manager Privilege Block {org.wso2.carbon.user.core.common.AbstractUserStoreManager}
ERROR {org.wso2.carbon.user.mgt.ui.UserAdminClient} - Error occurred while accessing Java Security Manager Privilege Block {org.wso2.carbon.user.mgt.ui.UserAdminClient}
org.wso2.carbon.user.mgt.stub.UserAdminUserAdminException: UserAdminUserAdminException
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
at java.lang.Class.newInstance(Class.java:442)
at org.wso2.carbon.user.mgt.stub.UserAdminStub.changePassword(UserAdminStub.java:3678)
at org.wso2.carbon.user.mgt.ui.UserAdminClient.changePassword(UserAdminClient.java:102)
at org.apache.jsp.user.change_002dpasswd_002dfinish_002dajaxprocessor_jsp._jspService(change_002dpasswd_002dfinish_002dajaxprocessor_jsp.java:148)
at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:439)
at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395)
at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155)
at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.wso2.carbon.ui.filters.cache.URLBasedCachePreventionFilter.doFilter(URLBasedCachePreventionFilter.java:57)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:88)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:219)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
at org.apache.catalina.valves.RequestFilterValve.process(RequestFilterValve.java:364)
at org.apache.catalina.valves.RemoteAddrValve.invoke(RemoteAddrValve.java:76)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:80)
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:91)
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:60)
at org.wso2.carbon.ui.valve.XSSValve.invoke(XSSValve.java:94)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
at org.wso2.carbon.event.receiver.core.internal.tenantmgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:48)
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1115)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1775)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1734)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:748)
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Authorization cache miss for username : admin resource /permission/admin/login action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Allowed roles for the ResourceID: /permission/admin/login Action: ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: TEST_SSL {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/creator {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: MessageRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: SMROLE {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/subscriber {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: TestRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: INTERNAL/publisher {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - role: APPLICATION/TST01_TST01 {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Roles which have permission for resource : /permission/admin/login action : ui.execute {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : TEST_SSL {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/creator {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : MessageRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : SMROLE {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/subscriber {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : TestRole {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/identity {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : INTERNAL/publisher {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - Role : APPLICATION/TST01_TST01 {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
DEBUG {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} - admin user is in role : INTERNAL/admin {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager}
答案 2 :(得分:0)
您的调试日志仅包含客户端异常
org.wso2.carbon.user.mgt.stub.UserAdminStub.changePassword(UserAdminStub.java:3678) 在org.wso2.carbon.user.mgt.ui.UserAdminClient.changePassword(UserAdminClient.java:102)
为了了解有关实际后端异常的信息,请在以下位置进行查看。您可能会根据所使用的APIM版本对代码进行远程调试。