Error reading xmlstreamreader unexpected eof in prolog at row col unknown source 1 0

I have to add Soap header into web-service responce. I tried to do in couple of ways, first of them: public SendFileToAlfaOutParms sendFileToAlfa(SendFileToAlfaInParms inParms) throws

I have to add Soap header into web-service responce.

I tried to do in couple of ways, first of them:

public SendFileToAlfaOutParms sendFileToAlfa(SendFileToAlfaInParms inParms)
            throws MsgWSException {
        logger.trace(LogMarkers.IN, "sendFileToAlfa(ninParms={})", inParms);

        List<Header> headers = (List<Header>) wsContext.getMessageContext().get(Header.HEADER_LIST);
        headers.add(new Header(new QName("http://WSBigFilesWEBService.WEB.ws.bf.sbrf.ru", "SendFileToAlfaAntiVirusStatus"), "TEST"));
        wsContext.getMessageContext().put(Header.HEADER_LIST, headers);

        try {
            InputStream fileContent = fileService.download(inParms.getTransferJobGUID(), inParms.getChunkIdx());
            SendFileToAlfaOutParms outParms = new SendFileToAlfaOutParms();
            outParms.setFileContent(new DataHandler(new InputStreamDataSource(fileContent)));
            logger.trace(LogMarkers.OUT, "sendFileToAlfan{}", outParms);
            return outParms;
        } catch (Exception e) {
            logger.error("Exception in sendFileToAlfa", e);
            throw new MsgWSException(e.getMessage(), ExceptionHandlingHelper.convertToExceptionInfo(e));
        }
    }

second is through cxf OutInteceptor:

public void handleMessage(SoapMessage message) throws Fault {
    List<Header> list = message.getHeaders();
    QName q = new QName("http://WSBigFilesWEBService.WEB.ws.bf.sbrf.ru", "SendFileToAlfaAntiVirusStatus");
    SoapHeader header = new SoapHeader(q, "TEST");
    list.add(header);
}

So, bouth methods cause an exception:

2015-07-15 17:59:24,719 WARN :[APP] [60069702-34c1-4d4b-9e31-a7282860c10a||DefaultMessageListenerContainer-2] o.a.cxf.phase.PhaseInterceptorChain - []Interceptor for {http://WSBigFilesWEBService.WEB.ws.bf.sbrf.ru}WSBigFilesWEBService#{http://WSBigFilesWEBService.WEB.ws.bf.sbrf.ru}SendFileToAlfa has thrown exception, unwinding now
org.apache.cxf.binding.soap.SoapFault: Error reading XMLStreamReader: Unexpected EOF in prolog
 at [row,col {unknown-source}]: [1,0]
    at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:259) ~[cxf-rt-bindings-soap-3.0.1.jar:3.0.1]
    at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:62) ~[cxf-rt-bindings-soap-3.0.1.jar:3.0.1]
    at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:798) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1636) [cxf-rt-transports-http-3.0.1.jar:3.0.1]
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1525) [cxf-rt-transports-http-3.0.1.jar:3.0.1]
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1330) [cxf-rt-transports-http-3.0.1.jar:3.0.1]
    at org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:638) [cxf-rt-transports-http-3.0.1.jar:3.0.1]
    at org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:514) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:423) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279) [cxf-core-3.0.1.jar:3.0.1]
    at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96) [cxf-rt-frontend-simple-3.0.1.jar:3.0.1]
    at org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:137) [cxf-rt-frontend-jaxws-3.0.1.jar:3.0.1]
    at com.sun.proxy.$Proxy112.sendFileToAlfa(Unknown Source) [na:na]
    at ru.sbrf.bf.alfa.io.ws.client.FileServiceStub.download(FileServiceStub.java:82) [classes/:na]
    at ru.sbrf.bf.alfa.services.impl.TransferJobServiceImpl.fileTransferFromDMZToAlfa(TransferJobServiceImpl.java:251) [classes/:na]
    at ru.sbrf.bf.alfa.services.impl.TransferJobServiceImpl$$FastClassBySpringCGLIB$$367c8f5f.invoke(<generated>) [spring-core-4.1.0.RELEASE.jar:na]
    at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) [spring-core-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:717) [spring-aop-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157) [spring-aop-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.transaction.interceptor.TransactionInterceptor$1.proceedWithInvocation(TransactionInterceptor.java:98) [spring-tx-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.transaction.interceptor.TransactionAspectSupport.invokeWithinTransaction(TransactionAspectSupport.java:266) [spring-tx-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.transaction.interceptor.TransactionInterceptor.invoke(TransactionInterceptor.java:95) [spring-tx-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:179) [spring-aop-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:653) [spring-aop-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at ru.sbrf.bf.alfa.services.impl.TransferJobServiceImpl$$EnhancerBySpringCGLIB$$ea1aa57c.fileTransferFromDMZToAlfa(<generated>) [spring-core-4.1.0.RELEASE.jar:na]
    at ru.sbrf.bf.alfa.events.jms.listeners.TransferDMZToAlphaListener.handleMessage(TransferDMZToAlphaListener.java:50) [classes/:na]
    at ru.sbrf.bf.alfa.events.jms.listeners.TransferDMZToAlphaListener.handleMessage(TransferDMZToAlphaListener.java:28) [classes/:na]
    at ru.sbrf.bf.alfa.io.jms.handler.impl.JmsMessageHandler.handleMessage(JmsMessageHandler.java:27) [big-files-app-jms-0.2.3.jar:na]
    at ru.sbrf.bf.alfa.io.jms.listener.impl.JmsCommonMessageListener.onMessage(JmsCommonMessageListener.java:42) [big-files-app-jms-0.2.3.jar:na]
    at org.springframework.jms.listener.AbstractMessageListenerContainer.doInvokeListener(AbstractMessageListenerContainer.java:685) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.AbstractMessageListenerContainer.invokeListener(AbstractMessageListenerContainer.java:623) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.AbstractMessageListenerContainer.doExecuteListener(AbstractMessageListenerContainer.java:591) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.AbstractPollingMessageListenerContainer.doReceiveAndExecute(AbstractPollingMessageListenerContainer.java:308) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.AbstractPollingMessageListenerContainer.receiveAndExecute(AbstractPollingMessageListenerContainer.java:246) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.DefaultMessageListenerContainer$AsyncMessageListenerInvoker.invokeListener(DefaultMessageListenerContainer.java:1137) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.DefaultMessageListenerContainer$AsyncMessageListenerInvoker.executeOngoingLoop(DefaultMessageListenerContainer.java:1129) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at org.springframework.jms.listener.DefaultMessageListenerContainer$AsyncMessageListenerInvoker.run(DefaultMessageListenerContainer.java:1031) [spring-jms-4.1.0.RELEASE.jar:4.1.0.RELEASE]
    at java.lang.Thread.run(Thread.java:745) [na:1.7.0_71]
Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog
 at [row,col {unknown-source}]: [1,0]
    at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:685) ~[woodstox-core-asl-4.4.0.jar:4.4.0]
    at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2141) ~[woodstox-core-asl-4.4.0.jar:4.4.0]
    at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2047) ~[woodstox-core-asl-4.4.0.jar:4.4.0]
    at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1131) ~[woodstox-core-asl-4.4.0.jar:4.4.0]
    at com.ctc.wstx.sr.BasicStreamReader.nextTag(BasicStreamReader.java:1154) ~[woodstox-core-asl-4.4.0.jar:4.4.0]
    at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:158) ~[cxf-rt-bindings-soap-3.0.1.jar:3.0.1]
    ... 42 common frames omitted

Why added header cause some error in prolog?

Содержание

  1. Unexpected EOF in prolog #2605
  2. Comments
  3. Footer
  4. Исключение при отправке большого запроса на мыло
  5. 3 ответы
  6. Исключение при отправке большого мыльного запроса
  7. JBossDeveloper
  8. Неожиданный EOF в прологе
  9. 1 ответы

Unexpected EOF in prolog #2605

Description:
in 6.4 m7, trying to use the Enrich or PayloadFactory or script mediator after calling a web service that return a 302 status ( lengh message 0), result in error message ERROR — RelayUtils Error while building Passthrough stream
org.apache.axiom.om.OMException: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog

It seems that since the 302 answer has no body, any mediator accessing the payload XML after that fails, but that shouldn’t prevent us to use Payloadmediator, or Enrich to write again in the Payload
Suggested Labels:
6.4
Suggested Assignees:

Affected Product Version:
6.4 m7
OS, DB, other environment details and versions:
Windows 10

Steps to reproduce:
Create a proxy that call to a web service that return a status of http 302 ans with no Body message, then add any mediator that use the payload XML after. Since no content was returned from the web service due to 302 status, any subsequent mediator that use payload xml fails;

Related Issues:

The text was updated successfully, but these errors were encountered:

[2018-08-31 07:27:02,243] [EI-Core] ERROR — RelayUtils Error while building Passthrough stream org.apache.axiom.om.OMException: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at [row,col ]: [1,0] at org.apache.axiom.om.impl.builder.StAXOMBuilder.next(StAXOMBuilder.java:296) at org.apache.axiom.om.impl.llom.OMDocumentImpl.getOMDocumentElement(OMDocumentImpl.java:109) at org.apache.axiom.om.impl.builder.StAXOMBuilder.getDocumentElement(StAXOMBuilder.java:570) at org.apache.axiom.om.impl.builder.StAXOMBuilder.getDocumentElement(StAXOMBuilder.java:566) at org.apache.synapse.transport.passthru.util.DeferredMessageBuilder.getDocument(DeferredMessageBuilder.java:165) at org.apache.synapse.transport.passthru.util.RelayUtils.builldMessage(RelayUtils.java:163) at org.apache.synapse.transport.passthru.util.RelayUtils.buildMessage(RelayUtils.java:116) at org.apache.synapse.mediators.AbstractListMediator.buildMessage(AbstractListMediator.java:145) at org.apache.synapse.mediators.AbstractListMediator.mediate(AbstractListMediator.java:94) at org.apache.synapse.mediators.base.SequenceMediator.mediate(SequenceMediator.java:260) at org.apache.synapse.core.axis2.Axis2SynapseEnvironment.mediateFromContinuationStateStack(Axis2SynapseEnvironment.java:783) at org.apache.synapse.core.axis2.Axis2SynapseEnvironment.injectMessage(Axis2SynapseEnvironment.java:281) at org.apache.synapse.core.axis2.SynapseCallbackReceiver.handleMessage(SynapseCallbackReceiver.java:570) at org.apache.synapse.core.axis2.SynapseCallbackReceiver.receive(SynapseCallbackReceiver.java:193) at org.apache.axis2.engine.AxisEngine.receive(AxisEngine.java:180) at org.apache.synapse.transport.passthru.ClientWorker.run(ClientWorker.java:263) at org.apache.axis2.transport.base.threads.NativeWorkerPool$1.run(NativeWorkerPool.java:172) at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at java.lang.Thread.run(Unknown Source) Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at [row,col ]: [1,0] at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:677) at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2139) at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2045) at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1134) at org.apache.axiom.util.stax.wrapper.XMLStreamReaderWrapper.next(XMLStreamReaderWrapper.java:225) at org.apache.axiom.util.stax.dialect.DisallowDoctypeDeclStreamReaderWrapper.next(DisallowDoctypeDeclStreamReaderWrapper.java:34) at org.apache.axiom.om.impl.builder.StAXOMBuilder.parserNext(StAXOMBuilder.java:681) at org.apache.axiom.om.impl.builder.StAXOMBuilder.next(StAXOMBuilder.java:214) . 19 more [2018-08-31 07:27:02,245] [EI-Core] ERROR — SequenceMediator Error while building message. Error while building Passthrough stream org.apache.axis2.AxisFault: Error while building Passthrough stream at org.apache.synapse.transport.passthru.util.RelayUtils.handleException(RelayUtils.java:397) at org.apache.synapse.transport.passthru.util.RelayUtils.builldMessage(RelayUtils.java:209) at org.apache.synapse.transport.passthru.util.RelayUtils.buildMessage(RelayUtils.java:116) at org.apache.synapse.mediators.AbstractListMediator.buildMessage(AbstractListMediator.java:145) at org.apache.synapse.mediators.AbstractListMediator.mediate(AbstractListMediator.java:94) at org.apache.synapse.mediators.base.SequenceMediator.mediate(SequenceMediator.java:260) at org.apache.synapse.core.axis2.Axis2SynapseEnvironment.mediateFromContinuationStateStack(Axis2SynapseEnvironment.java:783) at org.apache.synapse.core.axis2.Axis2SynapseEnvironment.injectMessage(Axis2SynapseEnvironment.java:281) at org.apache.synapse.core.axis2.SynapseCallbackReceiver.handleMessage(SynapseCallbackReceiver.java:570) at org.apache.synapse.core.axis2.SynapseCallbackReceiver.receive(SynapseCallbackReceiver.java:193) at org.apache.axis2.engine.AxisEngine.receive(AxisEngine.java:180) at org.apache.synapse.transport.passthru.ClientWorker.run(ClientWorker.java:263) at org.apache.axis2.transport.base.threads.NativeWorkerPool$1.run(NativeWorkerPool.java:172) at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at java.lang.Thread.run(Unknown Source) Caused by: org.apache.axiom.om.OMException: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at [row,col ]: [1,0] at org.apache.axiom.om.impl.builder.StAXOMBuilder.next(StAXOMBuilder.java:296) at org.apache.axiom.om.impl.llom.OMDocumentImpl.getOMDocumentElement(OMDocumentImpl.java:109) at org.apache.axiom.om.impl.builder.StAXOMBuilder.getDocumentElement(StAXOMBuilder.java:570) at org.apache.axiom.om.impl.builder.StAXOMBuilder.getDocumentElement(StAXOMBuilder.java:566) at org.apache.synapse.transport.passthru.util.DeferredMessageBuilder.getDocument(DeferredMessageBuilder.java:165) at org.apache.synapse.transport.passthru.util.RelayUtils.builldMessage(RelayUtils.java:163) . 14 more Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at [row,col ]: [1,0] at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:677) at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2139) at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2045) at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1134) at org.apache.axiom.util.stax.wrapper.XMLStreamReaderWrapper.next(XMLStreamReaderWrapper.java:225) at org.apache.axiom.util.stax.dialect.DisallowDoctypeDeclStreamReaderWrapper.next(DisallowDoctypeDeclStreamReaderWrapper.java:34) at org.apache.axiom.om.impl.builder.StAXOMBuilder.parserNext(StAXOMBuilder.java:681) at org.apache.axiom.om.impl.builder.StAXOMBuilder.next(StAXOMBuilder.java:214) . 19 more

Thanks for reporting the issue . I tried this with latest pack and 6.4.0 m7 as follows,

  • Called a web service which returns 302 HTTP SC with no payload.
  • Used a Payload Factory mediator / Enrich Mediator to overwrite the payload after the web service call.

This worked fine and I encountered no issues. Could you please try with a latest pack and if you encounter any issues please provide us the relevant synapse configs to further analyze the issue.

We are closing this issue since this is not reproducible. Could you please reopen the issue with requested details if you encounter this again so that we might be able to help you.

© 2023 GitHub, Inc.

You can’t perform that action at this time.

You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

Источник

Исключение при отправке большого запроса на мыло

Существует веб-сервис, развернутый на tomcat 6 и доступный через apache-cxf 2.3.3. Сгенерированные источники заглушки с использованием wsdl2java, чтобы иметь возможность вызывать эту службу.

Все было хорошо, пока я не отправил большой запрос (

1 МБ). Этот запрос не был обработан и завершился ошибкой, за исключением:

Здесь какая-то максимальная длина запроса, я полностью застрял с этим.

задан 15 марта ’11, 11:03

3 ответы

Предложение Владимира работал. Этот код ниже поможет другим понять, куда поместить 1000000.

ответ дан 23 мая ’17, 11:05

Я понял, что было не так. На самом деле это была ошибка внутри кода перехватчика:

Когда я заменил это на

вещи начинают работать нормально.

Таким образом, запрос просто транкализировался во время копирования потоков.

ответ дан 17 мар ’11, в 06:03

Куда вы добавили этот CachedOutputStream requestStream = new CachedOutputStream(1000000); Смотрите, я также сталкиваюсь с той же проблемой — неизвестный

Я сталкиваюсь с той же проблемой получения «com.ctc.wstx.exc.WstxEOFException: неожиданный EOF в прологе» при использовании класса CachedOutputStream.

Глядя на источники класса CachedOutputStream, порог используется для переключения между хранением данных потока из «в памяти» в «файл».
Предполагая, что поток работает с данными, которые превышают пороговое значение, он сохраняется в файле, поэтому следующий код сломается.

Увеличение «порога» действительно помогает, так как все потоковые данные хранятся в памяти, и в таком сценарии вызов cachedInputStream.close() на самом деле не закрывает базовую реализацию потока, поэтому его можно прочитать позже.

Вот «исправленная» версия приведенного выше кода (по крайней мере, она работала без исключения для меня)

Источник

Исключение при отправке большого мыльного запроса

Есть веб-сервис, развернутый на tomcat 6 и открываемый через apache-cxf 2.3.3. Для вызова этого сервиса были сгенерированы исходные коды с использованием wsdl2java.

Все шло хорошо, пока я не отправил большой запрос (

1Mb). Этот запрос не был обработан и завершился исключением:

Есть ли здесь какая-то максимальная длина запроса, я’полностью застрял на этом.

Vladimir’s suggestion сработало. Приведенный ниже код поможет другим понять, куда поместить 1000000.

Я понял, что было не так. На самом деле это была ошибка в коде перехватчика:

Когда я заменил это на

все начинает работать нормально.

Таким образом, запрос был просто обрезан во время копирования потоков.

Я столкнулся с той же проблемой, получив «com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog» при использовании класса CachedOutputStream.

Если посмотреть на исходники класса CachedOutputStream, то порог используется для переключения между хранением данных потока из «в памяти» в «файл».
Предполагая , что поток работает с данными, превышающими порог, он сохраняется в файл, таким образом, следующий код будет ломаться

Увеличение ‘порога’ действительно помогает, так как все данные потока сохраняются в памяти, и в таком сценарии вызов cachedInputStream.close() на самом деле не закрывает базовую реализацию потока, так что все еще можно читать из него позже.

Вот ‘исправленная’ версия вышеприведенного кода (по крайней мере, у меня она работала без исключений)

Источник

JBossDeveloper

In my personal ESB 101 course, I have created a service with two JMS listeners (one gateway, one esb-aware) and a trivial SystemPrintln action. Here’s the simple jboss-esb.xml:

When I try to deploy the esb archive, JBossESB hits me with the following deployment error:

Can anyone tell me what I’ve done to deserve this?

There seems to be some problem with the registry, but the exception simply isn’t informative enough for me.

1. Re: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in pro

Ok, this experience has been emotional to say the least.

Turns out, that using «Core» as my service category causes some sort of conflict with the service registry!

The problem goes away when I changed the service definition to:

Seriously now, this had devastated my ego. I still can’t believe how unlucky I was!

2. Re: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in pro

that sound’s strange. Can you try updating the helloworld quickstart and modify the service definition to this:

Have you previously deployed any service with the same category and servicename?

3. Re: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in pro

I changed helloworld and got the same exception (see previous post).

When I ran the jms test (ant runtest), the message was added to the queue and I could see from the JMX console that it was waiting in quickstart_helloworld_Request_gw (although there was nothing there to pick it up).

The esb test (ant sendesb) failed with an interesting error:

I thought it was normal for it to fail but certainly not due to depleting the heap memory.

Do you not get an error when using «Core» as the service category? It is very consistent/reproducable on my system. Do you think my registry is in an invalid state? How do I reset it? I uninstalled-reinstalled (ant undeploy / deploy) the JBoss ESB but it didn’t change anything.

I had not encountered any problems until I tried to deploy this simple service and had not used «Core» as the service category prior to this.

4. Re: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in pro

Ok, there’s definitely something stale in my installation that is causing the problem. I performed a clean install of the application server (4.2.3.GA) and then added the ESB (4.4.GA) and there’s nothing wrong with using «Core» as the service category name.

It’s interesting though that when I uninstalled JBossESB and re-installed it, something was kept around and the problem persisted. I had to do a clean install to make this go away.

Источник

Неожиданный EOF в прологе

На стороне клиента я создал 3 вложения следующим образом:

И я получаю исключение ниже, что его вызывает и как это исправить?

ВНИМАНИЕ! Перехватчик для SendMessageService# sendMessage сгенерировал исключение, теперь откатывается org.apache.cxf.binding.soap.SoapFault: Ошибка чтения XMLStreamReader. at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:222) at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:60) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:255) at org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:755) at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:2335) at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:2193) at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:2037) at org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56) at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:697) at org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:255) at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:516) at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:313) at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:265) at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:73) at org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:124) at $Proxy92.sendMessage(Unknown Source) at com.amobee.common.sms.ParlayxMessagingService.sendMessage(ParlayxMessagingService.java:105) at com.amobee.nc.protocol.msg.MMSResponseBuilder.buildResponseMessage(MMSResponseBuilder.java:96) at com.amobee.nc.protocol.msg.BaseMSGResponseWriter.getResponse(BaseMSGResponseWriter.java:59) at com.amobee.nc.protocol.AbstractResponseWriter.write(AbstractResponseWriter.java:75) at com.amobee.frontend.servlets.AbstractBaseServlet.runCommand(AbstractBaseServlet.java:124) at com.amobee.frontend.servlets.AbstractBaseServlet.doGet(AbstractBaseServlet.java:64) at javax.servlet.http.HttpServlet.service(HttpServlet.java:575) at javax.servlet.http.HttpServlet.service(HttpServlet.java:668) at org.mortbay.jetty.servlet.ServletHolder.handle(ServletHolder.java:511) at org.mortbay.jetty.servlet.ServletHandler.handle(ServletHandler.java:390) at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216) at org.mortbay.jetty.servlet.SessionHandler.handle(SessionHandler.java:182) at org.mortbay.jetty.handler.ContextHandler.handle(ContextHandler.java:765) at org.mortbay.jetty.webapp.WebAppContext.handle(WebAppContext.java:418) at org.mortbay.jetty.handler.HandlerCollection.handle(HandlerCollection.java:114) at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152) at org.mortbay.jetty.Server.handle(Server.java:326) at org.mortbay.jetty.HttpConnection.handleRequest(HttpConnection.java:542) at org.mortbay.jetty.HttpConnection$RequestHandler.headerComplete(HttpConnection.java:923) at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:547) at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:212) at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:404) at org.mortbay.jetty.bio.SocketConnector$Connection.run(SocketConnector.java:228) at org.mortbay.thread.QueuedThreadPool$PoolThread.run(QueuedThreadPool.java:582) Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at [row,col ]: [1,0] at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:682) at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2090) at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:1996) at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1100) at com.ctc.wstx.sr.BasicStreamReader.nextTag(BasicStreamReader.java:1123) at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:122) .

задан 28 июн ’11, 11:06

Я искал на многих форумах, пытаясь найти решение этой проблемы, но, к сожалению, окончательного решения нет. Пожалуйста, проверьте, входит ли ваш код в бесконечный цикл в том месте, где генерируется выходной xml. В моем случае между объектами внутри цикла была циклическая ссылка. — André Leitão

1 ответы

Это исключение означает, что у вас есть символ конца файла в сообщении XML, вы должны использовать тип Base64bit для использования вложений в веб-сервисах, чтобы избежать такой ошибки.

Источник

Platform : GfV3 using JDK1.6.0_13 of OS Linux-RHEL5

Error Message:

XML reader error: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog at
[row,col

{unknown-source}]: [1,0]

Soap Log

Jun 27, 2009 1:50:48 AM [com.sun.xml.ws.policy.jaxws.PolicyConfigParser] parse
INFO: WSP5018: Loaded WSIT configuration from file:
file:/space/test4u/cvswork/sunsw/tango/qe-tests/wstrust/functional/data/wsit-client.xml.
Jun 27, 2009 1:50:48 AM [com.sun.xml.ws.assembler.MetroConfigLoader]
INFO: Default metro-default.xml configuration file located at:
‘jar:file:/space/servers/stage/glassfish/modules/webservices-osgi.jar!/META-INF/metro-default.xml’
Service URL=https://localhost:8181/jaxws-s16/simple
stsWsdlLocation=http://localhost:8080/jaxws-s16-sts/sts?wsdl
namespace=http://tempuri.org/
stsServiceName=SecurityTokenService
stsPortName=CustomBinding_ISecurityTokenService
Jun 27, 2009 1:50:49 AM [com.sun.xml.ws.policy.jaxws.PolicyConfigParser] parse
INFO: WSP5018: Loaded WSIT configuration from file:
file:/space/test4u/cvswork/sunsw/tango/qe-tests/wstrust/functional/data/wsit-client.xml.
Jun 27, 2009 1:50:49 AM [com.sun.xml.ws.assembler.MetroConfigLoader]
INFO: Default metro-default.xml configuration file located at:
‘jar:file:/space/servers/stage/glassfish/modules/webservices-osgi.jar!/META-INF/metro-default.xml’
—[HTTP request — https://localhost:8181/jaxws-s16-sts/sts]—
Content-type: text/xml;charset=»utf-8″
Soapaction: «http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue»
Accept: text/xml, multipart/related, text/html, image/gif, image/jpeg, *; q=.2,
/; q=.2

xmlns:S=»http://schemas.xmlsoap.org/soap/envelope/»
xmlns:wsse=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd»
xmlns:wsu=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd»
xmlns:xs=»http://www.w3.org/2001/XMLSchema»><S:Header>https://localhost:8181/jaxws-s16-sts/stshttp://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
[http://www.w3.org/2005/08/addressing/anonymous](http://www.w3.org/2005/08/addressing/anonymous)
uuid:ff85f9e4-4bec-457e-85be-83702684aeb32009-06-26T20:20:49Z2009-06-26T20:25:49ZAliceabcd!1234[http://schemas.xmlsoap.org/ws/2005/02/trust/Issue](http://schemas.xmlsoap.org/ws/2005/02/trust/Issue)[https://localhost:8181/jaxws-s16/simple](https://localhost:8181/jaxws-s16/simple)urn:oasis:names:tc:SAML:1.0:assertion[http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey](http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey)256KjUHSYqD06fW4eqN928nL2XgUGiv8IZZzWoiV4fk5vU=[http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1](http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1)———————
keyStore is : /space/servers/stage/glassfish/domains/domain1/config/keystore.jks
keyStore type is : JKS
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : alice
chain [0] = [
[
Version: V3
Subject: CN=Alice, OU=OASIS Interop Test Cert, O=OASIS
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
114223138481062383818743472854345446729415521820579721478671411120076686448918620302220709845014730631814478188984612465856840519852245805751892337820823145686311359090114506894126920369485682523288840662511969165284005936035859388250282090838456799125935768645086141305672131191153192376610593502582005436827
public exponent: 65537
Validity: [From: Sat Mar 19 05:30:00 IST 2005,
To: Tue Mar 20 05:29:59 IST 2018]
Issuer: CN=OASIS Interop Test CA, O=OASIS
SerialNumber: [ 33a6047f b155631f ed672117 8150a899]

Certificate Extensions: 5
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 0A E2 5D 13 50 76 75 41 5D D5 D9 0B 65 2C D0 E6 ..].PvuA]…e,..
0010: F8 FA 31 88 ..1.
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(…5……..M
0010: C2 49 0F 0F .I..
]

]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl]
]]

[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
Data_Encipherment
]

[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 05 3A A9 3A 9B D6 FB AC AB 2D 7C 94 94 FD B1 25 .:.:…..-…..%
0010: B1 24 A2 15 C7 23 93 96 C0 A5 A5 78 E6 FD 86 59 .$…#…..x…Y
0020: 21 5A 7B 54 6A 57 DC 14 E2 40 81 4C 87 DF 44 D3 !Z.TjW…@.L..D.
0030: A4 79 5D CF 1D 7E BC AD 8B 3F 38 68 50 52 98 1C .y]……?8hPR..
0040: 4D 48 C9 0B E8 90 13 76 26 31 4E EB 80 50 BA 40 MH…..v&1N..P.@
0050: 8A 9D 98 65 74 B4 4F C4 68 5F 91 37 71 42 07 5F …et.O.h_.7qB._
0060: E6 B0 8A FF 08 77 C5 5B 19 08 D4 DF B8 C3 66 94 …..w.[……f.
0070: 03 3A 94 E0 20 F1 07 6E 0D A8 77 58 56 69 10 0D .:.. ..n..wXVi..
0080: 2C DA 7C 10 68 23 50 4C D3 23 24 2F 2D 6A FD 42 ,…h#PL.#$/-j.B
0090: 06 BE BE 13 91 40 9B 03 D7 3F BA 49 C6 7F 45 C3 …..@…?.I..E.
00A0: D3 97 47 2A 9B 44 0E 2F DB 2E D8 A5 B1 A4 1B 61 ..G*.D./…….a
00B0: 88 F5 4B CE 1F 0E 92 1A F7 F8 15 14 AD 84 C3 0E ..K………….
00C0: DF 96 1B A6 29 06 B0 B8 B1 DE F0 2C 5D 65 A2 E2 ….)……,]e..
00D0: BC 1F 54 E6 33 40 AD 0E 14 F3 62 F5 13 02 51 D4 ..T.3@….b…Q.
00E0: 87 D3 A9 BD B8 B5 9C 92 20 B1 8E 8B 34 15 03 83 …….. …4…
00F0: 64 4F 65 E0 04 C6 CB DB 3D 84 D5 70 AF 23 89 4F dOe…..=..p.#.O

]



found key for : wssip’s oasis interop test ca id
chain [0] = [
[
Version: V3
Subject: CN=WssIP, OU=OASIS Interop Test Cert, O=OASIS
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
152731908429346588730068360962668953900816590598573127696124766695253122017791738328837353267094702038559194680367759644684600694221294729010805567875125016802553296793218010147463081720392111828099629295564763330559728661279044988160615075979483161526388678483156815781713837823436974912141856438310787879333
public exponent: 65537
Validity: [From: Thu Oct 27 05:30:00 IST 2005,
To: Sun Oct 28 05:29:59 IST 2018]
Issuer: CN=OASIS Interop Test CA, O=OASIS
SerialNumber: [ 6fa53a6d e7386475 bde93e4d d80fcd75]

Certificate Extensions: 5
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 1B D4 06 04 F8 FF 2E 7B FF 2A 6E 05 09 38 AA 32 ………*n..8.2
0010: 0D 71 6A 69 .qji
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(…5……..M
0010: C2 49 0F 0F .I..
]

]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl]
]]

[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
Data_Encipherment
]

[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 7A 5B 73 C9 41 E3 FB FD 22 DC 7B 23 E5 7B D6 AC z[s.A…»..#….
0010: 9E E6 17 EC C1 17 0A 7B 13 A0 8F 2C FF EE AD F3 ………..,….
0020: 1D 97 55 45 68 1B 6D 38 27 1D 59 1A E6 F0 62 37 ..UEh.m8′.Y…b7
0030: 2A C1 90 31 5E 9D A7 30 32 92 5D 49 0C EE D3 E8 *..1^..02.]I….
0040: 83 12 31 80 35 FD 84 EC 48 7F 52 F3 1A 2E 6C BF ..1.5…H.R…l.
0050: FB 20 66 23 DE 2C CA 67 D2 EB 57 B7 C9 24 E1 CE . f#.,.g..W..$..
0060: 7A B2 8B 80 89 3F D1 7F 03 CC 7D 79 8F 07 A5 DB z….?…..y….
0070: BD 6C E8 D8 7A 0E 25 EA 53 61 DF D1 85 26 6A E2 .l..z.%.Sa…&j.
0080: C0 1F EA DB 8A E3 4B 95 42 8C E5 49 0F E0 1B 46 ……K.B..I…F
0090: A8 FC 3E EA DB F2 69 43 9A DD FC C9 B3 DD 96 07 ..>…iC……..
00A0: E8 F9 C7 DD 7F C6 6B CD 83 E6 53 A7 E4 C4 7F 22 ……k…S….»
00B0: 0D 33 7C 19 00 7C 28 23 35 ED 11 58 A8 A4 24 6C .3….(#5..X..$l
00C0: 5E 49 8B AF E2 01 1A CC E6 52 96 67 3D DD 90 BA ^I…….R.g=…
00D0: A0 D2 4A 44 21 95 99 94 02 E3 55 3C 24 C1 A0 DB ..JD!…..U<$…
00E0: 96 05 7F ED BE F0 30 DD AD E3 97 E0 D7 07 E1 67 ……0……..g
00F0: D8 96 D1 A6 85 1D BE 48 00 58 20 09 EA 1A CA 80 …….H.X …..

]



found key for : xws-security-server
chain [0] = [
[
Version: V3
Subject: CN=xwssecurityserver, OU=SUN, O=Internet Widgits Pty Ltd,
ST=Some-State, C=AU
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: Sun RSA public key, 1024 bits
modulus:
134380884586947569142825510026957928705259114787295999460299304319999556741376176410521840240185200127360341811174579859559994224484465126310840116632395426094038541933377168542195870651060761615431789862699562179055428897933368389743032967628136767342402913821910863199535693252320451216466183837201122780179
public exponent: 65537
Validity: [From: Mon Mar 12 15:48:05 IST 2007,
To: Thu Mar 09 15:48:05 IST 2017]
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
SerialNumber: [ 02]

Certificate Extensions: 4
[1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ….OpenSSL Gene
0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat
0020: 65 e

[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 75 51 36 F7 2B 32 15 6F E2 0F 59 5A DD D7 5E 3F uQ6.+2.o..YZ..^?
0010: 33 3A 21 6A 3:!j
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 67 BA 65 C6 CE 95 C8 E3 8E 4D 21 72 A2 30 D5 D3 g.e……M!r.0..
0010: F6 18 8C 95 ….
]

[CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU]
SerialNumber: [ db1e425a aba2a28e]
]

[4]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [MD5withRSA]
Signature:
0000: 56 A4 FC D5 96 41 94 19 AA D6 73 48 21 A1 BE 76 V….A….sH!..v
0010: 82 F5 96 8D 8A 10 FF 66 F5 CC 7A 94 70 B1 AD D5 …….f..z.p…
0020: F1 8A 73 04 B4 9B 6D CF 30 25 A3 C1 C4 EF E0 02 ..s…m.0%……
0030: B3 E1 90 2D CA 62 BD C5 EF 54 3A 83 24 26 DF 8D …-.b…T:.$&..
0040: F5 2B 8E 6A 31 B3 2A FA 5F ED E5 DA 0B 97 7E 09 .+.j1.*._…….
0050: C1 A6 22 14 43 2F EF 04 C7 3F 43 56 A2 C3 8B C3 ..».C/…?CV….
0060: 15 1D DF 28 32 0F D6 78 FD 9C D2 AD 13 08 3C 57 …(2..x……<W
0070: 98 04 E7 EA 7F 61 0B 46 9B 38 38 7C 70 B5 21 ED …..a.F.88.p.!.

]



found key for : wssip
chain [0] = [
[
Version: V3
Subject: CN=WSSIP, OU=SUN, O=Internet Widgits Pty Ltd, ST=Some-State, C=AU
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: Sun RSA public key, 1024 bits
modulus:
136182010680155297606561595011425323579362322711921130761953400317580675943452447276133022377231895170364900325745204633293601250915765991228082050254935726231827116470834426019543205150805704969824130387848216159371418147699591687574806139777477077377060203096361164648346982373597294715179079895492667443341
public exponent: 65537
Validity: [From: Tue Mar 13 12:25:25 IST 2007,
To: Fri Mar 10 12:25:25 IST 2017]
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
SerialNumber: [ 04]

Certificate Extensions: 4
[1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ….OpenSSL Gene
0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat
0020: 65 e

[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 1B 1D CC 8B 24 E2 CC 5C 4C 6C CC 95 78 F4 83 85 ….$..Ll..x…
0010: E4 D8 E0 9C ….
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 67 BA 65 C6 CE 95 C8 E3 8E 4D 21 72 A2 30 D5 D3 g.e……M!r.0..
0010: F6 18 8C 95 ….
]

[CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU]
SerialNumber: [ db1e425a aba2a28e]
]

[4]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [MD5withRSA]
Signature:
0000: 89 A5 29 EA 60 0C 20 F7 6B 5C 96 36 BB 8B 32 09 ..).`. .k.6..2.
0010: B0 5C DF 41 33 F3 C0 EE A5 FF ED CE 00 81 BD DD ..A3………..
0020: D7 94 C8 A9 6C E1 57 03 EA E5 CE 3A 7C FC 09 70 ….l.W….:…p
0030: 3A 87 08 7D A4 BA EB 62 2F 4C 79 6B B2 77 07 77 :……b/Lyk.w.w
0040: 2C BC CB 48 B2 BA 5F A5 4F 44 2D 3B 6F 5C 6E 26 ,..H.._.OD-;on&
0050: F9 0B 1C B7 89 DE 9F 48 70 F5 5E AB DF F3 07 DE …….Hp.^…..
0060: 0D 5C 88 9E 84 7C 43 C1 CD A9 73 1C 75 D0 0A E4 …..C…s.u…
0070: 44 13 DB 00 25 78 7A D1 B5 3E 76 FD 6F 94 93 65 D…%xz..>v.o..e

]



found key for : bob
chain [0] = [
[
Version: V3
Subject: CN=Bob, OU=OASIS Interop Test Cert, O=OASIS
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
135295285768874163724858150895572108771303052544131111158491626858771419023556869986177194556598644010563047970383118260987442622257403553743505845304214998847674634607587725027593402879123660460192008702628353163941650161098799365056811528186823367899707404681618830609935129636702367727579605587436315509563
public exponent: 65537
Validity: [From: Sat Mar 19 05:30:00 IST 2005,
To: Tue Mar 20 05:29:59 IST 2018]
Issuer: CN=OASIS Interop Test CA, O=OASIS
SerialNumber: [ 6038eedb feac9bbe c89d87d3 abae71f8]

Certificate Extensions: 5
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 5D E8 39 E6 F4 72 2B 76 61 00 48 44 7F E6 13 D3 ].9..r+va.HD….
0010: 3F 7C E8 BD ?…
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(…5……..M
0010: C2 49 0F 0F .I..
]

]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl]
]]

[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
Data_Encipherment
]

[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 88 95 1A FD A5 18 B8 51 BE 63 00 1D 29 58 EE B2 …….Q.c..)X..
0010: 8B 56 4B FE CC 45 2D 4B 28 34 F0 50 53 F3 3F D1 .VK..E-K(4.PS.?.
0020: 7A 95 1B B5 44 12 85 C2 2A C1 6B 1E 98 35 3C 25 z…D…*.k..5<%
0030: 5B 6C B9 C4 0B 73 E8 3A 18 24 17 82 40 A4 32 20 [l…s.:.$..@.2
0040: BC AA 17 0B 02 DD C1 5F 31 66 2F 1B 82 10 04 1E ……._1f/…..
0050: 78 57 BC 20 04 EB E3 00 02 98 44 04 DF B4 C4 A8 xW. ……D…..
0060: 0B 96 10 86 A7 3D 82 29 95 BC 58 83 03 F4 38 15 …..=.)..X…8.
0070: 81 4A 37 11 A4 A4 40 C6 31 33 BB 03 9B 62 36 E5 .J7…@.13…b6.
0080: 97 AB CA 74 51 D8 23 07 96 86 15 8F AD E7 EA B8 …tQ.#………
0090: 5A 7B 4D E7 D3 90 5E 03 DE B7 1C B5 37 D6 27 BE Z.M…^…..7.’.
00A0: 88 E4 DA C4 56 57 7E EC F0 67 9C 93 69 74 31 2E ….VW…g..it1.
00B0: 1A CA 1A 88 9A F0 4D 6D C8 C6 6E 34 45 7B C6 DD ……Mm..n4E…
00C0: F6 12 E2 12 00 3D E4 C2 52 4D D1 91 87 D4 92 A9 …..=..RM……
00D0: 5A 68 B4 27 52 B1 76 85 94 A0 88 13 4B 3D EF 20 Zh.’R.v…..K=.
00E0: 1A 46 0E 45 C7 11 22 56 42 19 00 C4 A5 C5 A5 D5 .F.E..»VB…….
00F0: 47 FD 38 7C 3A 7C 2F B7 86 4A A8 94 57 79 09 52 G.8.:./..J..Wy.R

]



found key for : xws-security-client
chain [0] = [
[
Version: V3
Subject: CN=xwssecurityclient, OU=SUN, O=Internet Widgits Pty Ltd,
ST=Some-State, C=AU
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: Sun RSA public key, 1024 bits
modulus:
133105257151488742777178014720864970212352034371474717525944712679897844800730072738019662760820888900224958796184868482915704443965368120190590722524292164199674260554413803993233045230164485554750539035041005981801086676142619232025988417355674812630480744302779780483984167726014353484815747704304310295329
public exponent: 65537
Validity: [From: Mon Mar 12 15:54:40 IST 2007,
To: Thu Mar 09 15:54:40 IST 2017]
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
SerialNumber: [ 03]

Certificate Extensions: 4
[1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ….OpenSSL Gene
0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat
0020: 65 e

[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: FE 62 2D 7E FB 85 75 2E C0 D0 60 B2 B0 4E F5 4C .b-…u…`..N.L
0010: 54 71 3F 67 Tq?g
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 67 BA 65 C6 CE 95 C8 E3 8E 4D 21 72 A2 30 D5 D3 g.e……M!r.0..
0010: F6 18 8C 95 ….
]

[CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU]
SerialNumber: [ db1e425a aba2a28e]
]

[4]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

]
Algorithm: [MD5withRSA]
Signature:
0000: 44 9D 17 5C 41 E3 32 09 8A 8E 1F 0D A3 6C F3 8F D..A.2……l..
0010: 52 5B EE D3 B6 D9 7B BB 08 DE 5C BF 43 3F B8 9A R[………C?..
0020: 4A C5 72 DA 8C 4A EA 60 85 0B 4B BF D7 59 72 A0 J.r..J.`..K..Yr.
0030: CE 50 52 C2 18 CB 1E EF E9 79 30 6D 34 55 AC 33 .PR……y0m4U.3
0040: B2 85 5E DB 8D A2 5F 32 41 D7 5D 5E 3F 38 61 A6 ..…_2A.]?8a.
0050: 92 0F 38 75 D7 B5 F9 63 FC 90 F6 53 84 33 EF 90 ..8u…c…S.3..
0060: BF 75 F7 5D E4 00 19 6E A1 92 16 D6 61 EE 9C 84 .u.]…n….a…
0070: F0 EB 75 BC EA BB 47 8F 3F 6C 7B AF 4E C1 15 51 ..u…G.?l..N..Q

]



found key for : s1as
chain [0] = [
[
Version: V3
Subject: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
132038703725718144416927031948321473557049868406732935017415845809337101332996938638778516129775091643726393634355134864612333481246427792352610711248831104188901755747940843193896980130574565249118860160414475360590303685232355490809806188008513990659986220880167076420771783474716293192614291806078670341577
public exponent: 65537
Validity: [From: Sat Jun 27 01:39:00 IST 2009,
To: Tue Jun 25 01:39:00 IST 2019]
Issuer: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
SerialNumber: [ 4a452adc]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C4 46 00 69 27 85 37 3B 1B D9 7B 94 FE A8 F8 71 .F.i’.7;…….q
0010: 39 58 C2 D8 9X..
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 53 BD 02 10 76 F2 75 46 7A A1 68 F4 FB 38 52 72 S…v.uFz.h..8Rr
0010: 5E 76 6D 24 79 ED 8A A7 0D FA 99 36 42 DC 71 6C ^vm$y……6B.ql
0020: 4B EF AB C0 01 3A F1 B0 ED 30 05 65 0E 62 73 B3 K….:…0.e.bs.
0030: D6 75 17 70 CA 3C D7 6E 7F 6F 93 4E CE C4 DB C7 .u.p.<.n.o.N….
0040: 59 48 9E 63 3D 11 C9 00 D3 3E DC FB 46 2E 4C E9 YH.c=….>..F.L.
0050: 1C A5 63 81 EF BF 55 A4 C0 76 16 96 EB F2 44 3D ..c…U..v….D=
0060: AC EA 73 F5 D6 BA 6B 2C 43 41 AF 51 2C 45 4B 46 ..s…k,CA.Q,EKF
0070: 20 48 3E 89 4D 60 36 14 06 EE 81 5C 54 89 03 A3 H>.M`6….T…

]


trustStore is: /space/servers/stage/glassfish/domains/domain1/config/keystore.jks
trustStore type is : JKS
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=xwssecurityserver, OU=SUN, O=Internet Widgits Pty Ltd,
ST=Some-State, C=AU
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
Algorithm: RSA; Serial number: 0x2
Valid from Mon Mar 12 15:48:05 IST 2007 until Thu Mar 09 15:48:05 IST 2017

adding as trusted cert:
Subject: CN=xwssecurityclient, OU=SUN, O=Internet Widgits Pty Ltd,
ST=Some-State, C=AU
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
Algorithm: RSA; Serial number: 0x3
Valid from Mon Mar 12 15:54:40 IST 2007 until Thu Mar 09 15:54:40 IST 2017

adding as trusted cert:
Subject: CN=WssIP, OU=OASIS Interop Test Cert, O=OASIS
Issuer: CN=OASIS Interop Test CA, O=OASIS
Algorithm: RSA; Serial number: 0x6fa53a6de7386475bde93e4dd80fcd75
Valid from Thu Oct 27 05:30:00 IST 2005 until Sun Oct 28 05:29:59 IST 2018

adding as trusted cert:
Subject: CN=Alice, OU=OASIS Interop Test Cert, O=OASIS
Issuer: CN=OASIS Interop Test CA, O=OASIS
Algorithm: RSA; Serial number: 0x33a6047fb155631fed6721178150a899
Valid from Sat Mar 19 05:30:00 IST 2005 until Tue Mar 20 05:29:59 IST 2018

adding as trusted cert:
Subject: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
Issuer: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
Algorithm: RSA; Serial number: 0x4a452adc
Valid from Sat Jun 27 01:39:00 IST 2009 until Tue Jun 25 01:39:00 IST 2019

adding as trusted cert:
Subject: CN=WSSIP, OU=SUN, O=Internet Widgits Pty Ltd, ST=Some-State, C=AU
Issuer: CN=SUNCA, OU=JWS, O=SUN, ST=Some-State, C=AU
Algorithm: RSA; Serial number: 0x4
Valid from Tue Mar 13 12:25:25 IST 2007 until Fri Mar 10 12:25:25 IST 2017

adding as trusted cert:
Subject: CN=Bob, OU=OASIS Interop Test Cert, O=OASIS
Issuer: CN=OASIS Interop Test CA, O=OASIS
Algorithm: RSA; Serial number: 0x6038eedbfeac9bbec89d87d3abae71f8
Valid from Sat Mar 19 05:30:00 IST 2005 until Tue Mar 20 05:29:59 IST 2018

trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1246047394 bytes = { 28, 198, 166, 121, 16, 19, 83, 99, 187, 233, 43, 236, 228, 247, 134, 186, 60, 5, 212, 218, 49, 16, 109, 129, 89, 233, 42, 215 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA,
SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA,
SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }


main, WRITE: TLSv1 Handshake, length = 79
main, WRITE: SSLv2 client hello message, length = 107
main, READ: TLSv1 Handshake, length = 782
*** ServerHello, TLSv1
RandomCookie: GMT: 1246047394 bytes = { 249, 188, 121, 167, 104, 243, 216, 11, 14, 80, 3, 133, 155, 92, 238, 57, 251, 102, 235, 126, 182, 90, 221, 70, 227, 64, 0, 230 }
Session ID: {74, 69, 45, 162, 60, 226, 130, 196, 172, 210, 91, 14, 246, 144, 138, 113, 144, 191, 226, 1, 167, 199, 45, 173, 168, 4, 156, 119, 193, 208, 239, 63}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0


%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
132038703725718144416927031948321473557049868406732935017415845809337101332996938638778516129775091643726393634355134864612333481246427792352610711248831104188901755747940843193896980130574565249118860160414475360590303685232355490809806188008513990659986220880167076420771783474716293192614291806078670341577
public exponent: 65537
Validity: [From: Sat Jun 27 01:39:00 IST 2009,
To: Tue Jun 25 01:39:00 IST 2019]
Issuer: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
SerialNumber: [ 4a452adc]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C4 46 00 69 27 85 37 3B 1B D9 7B 94 FE A8 F8 71 .F.i’.7;…….q
0010: 39 58 C2 D8 9X..
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 53 BD 02 10 76 F2 75 46 7A A1 68 F4 FB 38 52 72 S…v.uFz.h..8Rr
0010: 5E 76 6D 24 79 ED 8A A7 0D FA 99 36 42 DC 71 6C ^vm$y……6B.ql
0020: 4B EF AB C0 01 3A F1 B0 ED 30 05 65 0E 62 73 B3 K….:…0.e.bs.
0030: D6 75 17 70 CA 3C D7 6E 7F 6F 93 4E CE C4 DB C7 .u.p.<.n.o.N….
0040: 59 48 9E 63 3D 11 C9 00 D3 3E DC FB 46 2E 4C E9 YH.c=….>..F.L.
0050: 1C A5 63 81 EF BF 55 A4 C0 76 16 96 EB F2 44 3D ..c…U..v….D=
0060: AC EA 73 F5 D6 BA 6B 2C 43 41 AF 51 2C 45 4B 46 ..s…k,CA.Q,EKF
0070: 20 48 3E 89 4D 60 36 14 06 EE 81 5C 54 89 03 A3 H>.M`6….T…

]


Found trusted certificate:
[
[
Version: V3
Subject: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus:
132038703725718144416927031948321473557049868406732935017415845809337101332996938638778516129775091643726393634355134864612333481246427792352610711248831104188901755747940843193896980130574565249118860160414475360590303685232355490809806188008513990659986220880167076420771783474716293192614291806078670341577
public exponent: 65537
Validity: [From: Sat Jun 27 01:39:00 IST 2009,
To: Tue Jun 25 01:39:00 IST 2019]
Issuer: CN=eas-x2100-1.India.Sun.COM, OU=GlassFish, O=Sun Microsystems,
L=Santa Clara, ST=California, C=US
SerialNumber: [ 4a452adc]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C4 46 00 69 27 85 37 3B 1B D9 7B 94 FE A8 F8 71 .F.i’.7;…….q
0010: 39 58 C2 D8 9X..
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 53 BD 02 10 76 F2 75 46 7A A1 68 F4 FB 38 52 72 S…v.uFz.h..8Rr
0010: 5E 76 6D 24 79 ED 8A A7 0D FA 99 36 42 DC 71 6C ^vm$y……6B.ql
0020: 4B EF AB C0 01 3A F1 B0 ED 30 05 65 0E 62 73 B3 K….:…0.e.bs.
0030: D6 75 17 70 CA 3C D7 6E 7F 6F 93 4E CE C4 DB C7 .u.p.<.n.o.N….
0040: 59 48 9E 63 3D 11 C9 00 D3 3E DC FB 46 2E 4C E9 YH.c=….>..F.L.
0050: 1C A5 63 81 EF BF 55 A4 C0 76 16 96 EB F2 44 3D ..c…U..v….D=
0060: AC EA 73 F5 D6 BA 6B 2C 43 41 AF 51 2C 45 4B 46 ..s…k,CA.Q,EKF
0070: 20 48 3E 89 4D 60 36 14 06 EE 81 5C 54 89 03 A3 H>.M`6….T…

]
*** ServerHelloDone
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
main, WRITE: TLSv1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 4A 95 F9 FC CC 75 4B 71 DB 9D 14 90 DB 91 ..J….uKq……
0010: 77 A0 FE 42 40 07 35 BF BA 8E E2 0F 1B F0 D4 E8 w..B@.5………
0020: 42 C2 AB DA AB 85 72 AB 0C 1B 1C 19 65 A2 C3 23 B…..r…..e..#
CONNECTION KEYGEN:
Client Nonce:
0000: 4A 45 2D A2 1C C6 A6 79 10 13 53 63 BB E9 2B EC JE-….y..Sc..+.
0010: E4 F7 86 BA 3C 05 D4 DA 31 10 6D 81 59 E9 2A D7 ….<…1.m.Y.*.
Server Nonce:
0000: 4A 45 2D A2 F9 BC 79 A7 68 F3 D8 0B 0E 50 03 85 JE-…y.h….P..
0010: 9B 5C EE 39 FB 66 EB 7E B6 5A DD 46 E3 40 00 E6 ..9.f…Z.F.@..
Master Secret:
0000: ED 1B E0 3D 9C 43 5A C4 7B 01 95 AE BA C8 AC E9 …=.CZ………
0010: 57 81 7C EA 49 5C 4A DA 83 86 2E 72 E0 4E 77 49 W…IJ….r.NwI
0020: 93 F8 57 7F F1 66 96 F3 94 0C EB 2E 2F 99 4E 5E ..W..f……/.N^
Client MAC write Secret:
0000: 3F 13 7B 8B 01 B1 B0 82 F5 45 C4 3C 4B 0F 28 FA ?……..E.<K.(.
Server MAC write Secret:
0000: 02 C9 4D 16 04 8E A4 78 E1 C7 95 14 43 F8 77 F8 ..M….x….C.w.
Client write key:
0000: 18 E3 36 8F 2D BC 8B 67 01 0E 34 96 BD 0D D7 EC ..6.-..g..4…..
Server write key:
0000: 8A CF D8 F5 4D EF 91 59 D2 35 4E 4B 6C DD AA 4F ….M..Y.5NKl..O
… no IV used for this cipher
main, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished
verify_data: { 230, 200, 196, 27, 16, 181, 137, 217, 12, 10, 82, 108 }


main, WRITE: TLSv1 Handshake, length = 32
main, READ: TLSv1 Change Cipher Spec, length = 1
main, READ: TLSv1 Handshake, length = 32
*** Finished
verify_data: { 34, 207, 226, 141, 126, 73, 113, 175, 205, 107, 208, 203 }


%% Cached client session: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
main, WRITE: TLSv1 Application Data, length = 362
main, WRITE: TLSv1 Application Data, length = 2734
main, READ: TLSv1 Application Data, length = 6865
main, READ: TLSv1 Application Data, length = 21
—[HTTP response — https://localhost:8181/jaxws-s16-sts/sts — 200]—
Transfer-encoding: chunked
null: HTTP/1.1 200 OK
Content-type: text/xml;charset=»utf-8″
Server: GlassFish/v3
X-powered-by: Servlet/3.0
Date: Fri, 26 Jun 2009 20:20:50 GMT

xmlns:S=»http://schemas.xmlsoap.org/soap/envelope/»
xmlns:wsse=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd»
xmlns:wsu=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd»
xmlns:xs=»http://www.w3.org/2001/XMLSchema»><S:Header>http://www.w3.org/2005/08/addressing/anonymoushttp://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issueuuid:bbbd3caf-5df0-44c9-bd44-1b250628456buuid:ff85f9e4-4bec-457e-85be-83702684aeb3<wsse:Security
S:mustUnderstand=»1″><wsu:Timestamp
xmlns:ns14=»http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512″
xmlns:ns13=»http://www.w3.org/2003/05/soap-envelope»
wsu:Id=»_1″>wsu:Created2009-06-26T20:20:50Z</wsu:Created>wsu:Expires2009-06-26T20:25:50Z</wsu:Expires></wsu:Timestamp></wsse:Security></S:Header><S:Body><wst:RequestSecurityTokenResponse
xmlns:wsa=»http://www.w3.org/2005/08/addressing»
xmlns:wsp=»http://schemas.xmlsoap.org/ws/2004/09/policy»
xmlns:wssc=»http://schemas.xmlsoap.org/ws/2005/02/sc»
xmlns:wsse=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd»
xmlns:wst=»http://schemas.xmlsoap.org/ws/2005/02/trust»
xmlns:wsu=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd»>wst:TokenTypeurn:oasis:names:tc:SAML:1.0:assertion</wst:TokenType>wst:RequestedSecurityToken<saml:Assertion
xmlns:ds=»http://www.w3.org/2000/09/xmldsig#»
xmlns:exc14n=»http://www.w3.org/2001/10/xml-exc-c14n#»
xmlns:saml=»urn:oasis:names:tc:SAML:1.0:assertion»
xmlns:xs=»http://www.w3.org/2001/XMLSchema»
AssertionID=»uuid-6e639854-c6b5-47f9-9ac6-13a1463ff539″
IssueInstant=»2009-06-26T20:20:50.514Z» MajorVersion=»1″
MinorVersion=»1″><saml:Conditions NotBefore=»2009-06-26T20:20:50.514Z»
NotOnOrAfter=»2009-06-26T20:21:26.514Z» /><saml:Advice
/>saml:AttributeStatementsaml:Subject<saml:NameIdentifier
NameQualifier=»http://sun.com»>CN=Alice</saml:NameIdentifier>saml:SubjectConfirmationsaml:ConfirmationMethodurn:oasis:names:tc:SAML:1.0:cm:holder-of-key</saml:ConfirmationMethod><ds:KeyInfo
xmlns:ns5=»http://www.w3.org/2001/XMLSchema-instance» ns5:type=»keyInfo»>
<xenc:EncryptedKey
xmlns:xenc=»http://www.w3.org/2001/04/xmlenc#»><xenc:EncryptionMethod
Algorithm=»http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p»
/>ds:KeyInfowsse:SecurityTokenReference<wsse:KeyIdentifier
ValueType=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentifier»>Xeg55vRyK3ZhAEhEf+YT0z986L0=</wsse:KeyIdentifier></wsse:SecurityTokenReference>
</ds:KeyInfo>xenc:CipherDataxenc:CipherValueaAGv03E/Ntrq0mOQNNHW4IjcKrHHH7kh1KDwsyq1hCnTGJH3T2sR6EvsUkJvJDQRljvhpY6Lf40x
StjEvHHtWplqh0VtzNGI23U3ZDn2Q5my3ovfeqHXgyFTTvfoQONfvrwJug/HzfmEmfhAShV/zYuB
wg9JSHR90ALQBsORuwA=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></ds:KeyInfo></saml:SubjectConfirmation></saml:Subject><saml:Attribute
AttributeName=»token-requestor»
AttributeNamespace=»http://sun.com»>saml:AttributeValueauthenticated</saml:AttributeValue></saml:Attribute></saml:AttributeStatement>ds:Signatureds:SignedInfo<ds:CanonicalizationMethod
Algorithm=»http://www.w3.org/2001/10/xml-exc-c14n#» /><ds:SignatureMethod
Algorithm=»http://www.w3.org/2000/09/xmldsig#rsa-sha1″ /><ds:Reference
URI=»#uuid-6e639854-c6b5-47f9-9ac6-13a1463ff539″>ds:Transforms<ds:Transform
Algorithm=»http://www.w3.org/2000/09/xmldsig#enveloped-signature»
/><ds:Transform Algorithm=»http://www.w3.org/2001/10/xml-exc-c14n#»
/></ds:Transforms><ds:DigestMethod
Algorithm=»http://www.w3.org/2000/09/xmldsig#sha1″
/>ds:DigestValueuyK1XCS5Bdk5b+ZnKI9eNyPk/kM=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueaw4ip+v++agW99zsZ4X3Lxw25npB0gFI91BxUXLSYv9hjzfIJb93SdCzAV/M9MqHVeEGu4kX95mH
/3A4pwj5IvBYc4FY4SLeH5Pw/CRu1uJteBzR3siOa3rkdIF/M0mSiiz3KxF8KQFqeZXVW0qAj90b
t2QZ2lTjVCce11i7b6Y=</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDDDCCAfSgAwIBAgIQb6U6bec4ZHW96T5N2A/NdTANBgkqhkiG9w0BAQUFADAwMQ4wDAYDVQQK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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature></saml:Assertion></wst:RequestedSecurityToken>wst:RequestedAttachedReferencewsse:SecurityTokenReference<wsse:KeyIdentifier
ValueType=»http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID»>uuid-6e639854-c6b5-47f9-9ac6-13a1463ff539</wsse:KeyIdentifier></wsse:SecurityTokenReference></wst:RequestedAttachedReference>wst:RequestedUnattachedReferencewsse:SecurityTokenReference<wsse:KeyIdentifier
ValueType=»http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID»>uuid-6e639854-c6b5-47f9-9ac6-13a1463ff539</wsse:KeyIdentifier></wsse:SecurityTokenReference></wst:RequestedUnattachedReference>wsp:AppliesTowsa:EndpointReferencewsa:Addresshttps://localhost:8181/jaxws-s16/simple</wsa:Address></wsa:EndpointReference></wsp:AppliesTo>wst:RequestedProofTokenwst:ComputedKeyhttp://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1</wst:ComputedKey></wst:RequestedProofToken><wst:Entropy
wst:Type=»BinarySecret»><wst:BinarySecret
Type=»http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce»>X3N7rfMgZS8czHDXKX+ls6OksTJbHKdLhXnVJ9CgZ4I=</wst:BinarySecret></wst:Entropy>wst:Lifetimewsu:Created2009-06-26T20:20:50.534Z</wsu:Created>wsu:Expires2009-06-26T20:21:26.534Z</wsu:Expires></wst:Lifetime>wst:KeySize256</wst:KeySize></wst:RequestSecurityTokenResponse></S:Body></S:Envelope>———————
—[HTTP request — https://localhost:8181/jaxws-s16/simple]—
Content-type: text/xml;charset=»utf-8″
Soapaction: «http://xmlsoap.org/Ping»
Accept: text/xml, multipart/related, text/html, image/gif, image/jpeg, *; q=.2,
/; q=.2
xmlns:S=»http://schemas.xmlsoap.org/soap/envelope/»
xmlns:wsse=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd»
xmlns:wsu=»http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd»
xmlns:xs=»http://www.w3.org/2001/XMLSchema»
xmlns:ds=»http://www.w3.org/2000/09/xmldsig#»
xmlns:exc14n=»http://www.w3.org/2001/10/xml-exc-c14n#»><S:Header>https://localhost:8181/jaxws-s16/simplehttp://xmlsoap.org/Ping
[http://www.w3.org/2005/08/addressing/anonymous](http://www.w3.org/2005/08/addressing/anonymous)
uuid:13e024c8-a2b5-42fb-a9ae-fe67114012022009-06-26T20:20:50Z2009-06-26T20:25:50ZCN=Aliceurn:oasis:names:tc:SAML:1.0:cm:holder-of-key
Xeg55vRyK3ZhAEhEf+YT0z986L0=
aAGv03E/Ntrq0mOQNNHW4IjcKrHHH7kh1KDwsyq1hCnTGJH3T2sR6EvsUkJvJDQRljvhpY6Lf40x
StjEvHHtWplqh0VtzNGI23U3ZDn2Q5my3ovfeqHXgyFTTvfoQONfvrwJug/HzfmEmfhAShV/zYuB
wg9JSHR90ALQBsORuwA=authenticateduyK1XCS5Bdk5b+ZnKI9eNyPk/kM=aw4ip+v++agW99zsZ4X3Lxw25npB0gFI91BxUXLSYv9hjzfIJb93SdCzAV/M9MqHVeEGu4kX95mH
/3A4pwj5IvBYc4FY4SLeH5Pw/CRu1uJteBzR3siOa3rkdIF/M0mSiiz3KxF8KQFqeZXVW0qAj90b
t2QZ2lTjVCce11i7b6Y=MIIDDDCCAfSgAwIBAgIQb6U6bec4ZHW96T5N2A/NdTANBgkqhkiG9w0BAQUFADAwMQ4wDAYDVQQK
DAVPQVNJUzEeMBwGA1UEAwwVT0FTSVMgSW50ZXJvcCBUZXN0IENBMB4XDTA1MTAyNzAwMDAwMFoX
DTE4MTAyNzIzNTk1OVowQjEOMAwGA1UECgwFT0FTSVMxIDAeBgNVBAsTF09BU0lTIEludGVyb3Ag
VGVzdCBDZXJ0MQ4wDAYDVQQDDAVXc3NJUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA2X9Z
Wiek/59vvg+l/lmzWjBYiqoOuSI+ms3ief7RyhPNh/IrGE3VwU67HsygNeavE06S6xNfcNWUNLqE
dRmd/29WnubNH7hWJsqp7rn8g/mxNVkynCkJ1saKuD8ILiKfNg0e8UUE9QzwEz1fxw81OR0SbDit
fTrDj8Q/ouCgEaUCAwEAAaOBkzCBkDAJBgNVHRMEAjAAMDMGA1UdHwQsMCowKKImhiRodHRwOi8v
aW50ZXJvcC5iYnRlc3QubmV0L2NybC9jYS5jcmwwDgYDVR0PAQH/BAQDAgSwMB0GA1UdDgQWBBQb
1AYE+P8ue/8qbgUJOKoyDXFqaTAfBgNVHSMEGDAWgBTAnSj8wes1oR3WqqqgHBpNwkkPDzANBgkq
hkiG9w0BAQUFAAOCAQEAeltzyUHj+/0i3Hsj5XvWrJ7mF+zBFwp7E6CPLP/urfMdl1VFaBttOCcd
WRrm8GI3KsGQMV6dpzAykl1JDO7T6IMSMYA1/YTsSH9S8xoubL/7IGYj3izKZ9LrV7fJJOHOerKL
gIk/0X8DzH15jwel271s6Nh6DiXqU2Hf0YUmauLAH+rbiuNLlUKM5UkP4BtGqPw+6tvyaUOa3fzJ
s92WB+j5x91/xmvNg+ZTp+TEfyINM3wZAHwoIzXtEViopCRsXkmLr+IBGszmUpZnPd2QuqDSSkQh
lZmUAuNVPCTBoNuWBX/tvvAw3a3jl+DXB+Fn2JbRpoUdvkgAWCAJ6hrKgA==FQnK6EV4IQsTVKvPZUdiirHjGM4=j5iCd36T/h1Ci2Ml/mDgBy99Jqk=uuid-6e639854-c6b5-47f9-9ac6-13a1463ff5391sunPassed!———————
main, WRITE: TLSv1 Application Data, length = 331
main, WRITE: TLSv1 Application Data, length = 6096
main, READ: TLSv1 Application Data, length = 224
main, called close()
main, called closeInternal(true)
main, SEND TLSv1 ALERT: warning, description = close_notify
main, WRITE: TLSv1 Alert, length = 18
main, Exception sending alert: java.net.SocketException: Broken pipe
—[HTTP response — https://localhost:8181/jaxws-s16/simple — 500]—
null: HTTP/1.1 500 Internal Server Error
Content-type: text/plain; charset=iso-8859-1
Content-length: 0
Connection: close
Server: GlassFish/v3
X-powered-by: Servlet/3.0
Date: Fri, 26 Jun 2009 20:20:50 GMT
———————
==========================================================
../../../functional/logs/run_log/s16-output.txt
com.sun.xml.ws.streaming.XMLStreamReaderException: XML reader error:
com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog
at [row,col {unknown-source}

]: [1,0]
at
com.sun.xml.ws.streaming.XMLStreamReaderUtil.wrapException(XMLStreamReaderUtil.java:267)
at com.sun.xml.ws.streaming.XMLStreamReaderUtil.next(XMLStreamReaderUtil.java:95)
at
com.sun.xml.ws.streaming.XMLStreamReaderUtil.nextContent(XMLStreamReaderUtil.java:110)
at
com.sun.xml.ws.streaming.XMLStreamReaderUtil.nextElementContent(XMLStreamReaderUtil.java:100)
at com.sun.xml.ws.encoding.StreamSOAPCodec.decode(StreamSOAPCodec.java:175)
at com.sun.xml.ws.encoding.StreamSOAPCodec.decode(StreamSOAPCodec.java:157)
at
com.sun.xml.ws.message.stream.LazyStreamBasedMessage.cacheMessage(LazyStreamBasedMessage.java:97)
at
com.sun.xml.ws.message.stream.LazyStreamBasedMessage.getHeaders(LazyStreamBasedMessage.java:135)
at
com.sun.xml.wss.jaxws.impl.SecurityTubeBase.getAction(SecurityTubeBase.java:1192)
at
com.sun.xml.wss.jaxws.impl.SecurityTubeBase.isTrustMessage(SecurityTubeBase.java:1162)
at
com.sun.xml.wss.jaxws.impl.SecurityTubeBase.initializeInboundProcessingContext(SecurityTubeBase.java:545)
at
com.sun.xml.wss.jaxws.impl.SecurityClientTube.processClientResponsePacket(SecurityClientTube.java:308)
at
com.sun.xml.wss.jaxws.impl.SecurityClientTube.processResponse(SecurityClientTube.java:270)
at com.sun.xml.ws.api.pipe.Fiber.__doRun(Fiber.java:639)
at com.sun.xml.ws.api.pipe.Fiber._doRun(Fiber.java:588)
at com.sun.xml.ws.api.pipe.Fiber.doRun(Fiber.java:573)
at com.sun.xml.ws.api.pipe.Fiber.runSync(Fiber.java:470)
at com.sun.xml.ws.client.Stub.process(Stub.java:235)
at com.sun.xml.ws.client.sei.SEIStub.doProcess(SEIStub.java:147)
at com.sun.xml.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:109)
at com.sun.xml.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:89)
at com.sun.xml.ws.client.sei.SEIStub.invoke(SEIStub.java:130)
at $Proxy40.ping(Unknown Source)
at simple.client.PingServiceClient.main(Unknown Source)
Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog
at [row,col

{unknown-source}

]: [1,0]
at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:661)
at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2134)
at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2040)
at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1069)
at com.sun.xml.ws.streaming.XMLStreamReaderUtil.next(XMLStreamReaderUtil.java:76)
… 22 more

Environment

Operating System: Linux
Platform: Other

Affected Versions

[2.0]

I am trying to invoke soap webservice over https protocal.

I have wsdl and generated classes by using Apache CXF, version : 3.0.5

when i post the request in soapui, i am getting successfull response from server

but when the same is invoked from Java client getting error : javax.xml.ws.soap.SOAPFaultException: Error reading XMLStreamReader: Unexpected EOF in prolog

Below is java code

package com.cts.pepsi.util;
import java.text.SimpleDateFormat;
import java.util.ArrayList;
import java.util.Date;
import java.util.List;
import java.util.Map;
import javax.xml.ws.BindingProvider;
import org.apache.cxf.jaxws.JaxWsProxyFactoryBean;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import com.oracle.xmlns.apps.financials.commonmodules.shared.model.erpintegrationservice.DocumentDetails;
import com.oracle.xmlns.apps.financials.commonmodules.shared.model.erpintegrationservice.ErpIntegrationService;
import com.oracle.xmlns.apps.financials.commonmodules.shared.model.erpintegrationservice.ErpIntegrationService_Service;
import com.oracle.xmlns.apps.financials.commonmodules.shared.model.erpintegrationservice.EssJob;
import com.oracle.xmlns.apps.financials.commonmodules.shared.model.erpintegrationservice.ObjectFactory;

public class SoapClient {
    private static final Logger           log      = LoggerFactory.getLogger(SoapClient.class);
    private String username = "username";
    private String password = "password";
    static ErpIntegrationService erpIntegrationService;
    static long value = 0;
    public static void main(String[] args) {
        log.info("START : Invoking  service");
        System.out.println("done");
        try {
            String documentAccount = null;
            String documentTitle = null;
            String fileName = null;
            String interfaceDetails = null;
            String jobName = null;
            String jobParams = null;
            EssJob essJob = new EssJob();
            List<EssJob> jobList = new ArrayList<EssJob>();
            ObjectFactory erpobjfac = new ObjectFactory();
                documentAccount = "abc$/xyz$/take$";
                documentTitle = "ekat throw bill";
                fileName = "abcd.zip";
                interfaceDetails = "2";
                jobName = "/pqr/stu/ddd/fdg/qwe/tyu/poi,lkj";
                jobParams = "090900909090909090909,andis,2016/05/17,,,,,,,,,,,,,,,,,,,,Y,null";
                essJob.setJobName(erpobjfac.createEssJobJobName(jobName));
                essJob.setParameterList(erpobjfac.createEssJobParameterList(jobParams));
                jobList.add(essJob);

            System.out.println("iiiii  ");
            StringBuffer encodedContent = new StringBuffer();
            encodedContent.append("encoded content");//here Base64 encoded data is appended
            //DocumentDetails
            DocumentDetails docDtls = new DocumentDetails();
            docDtls.setDocumentAccount(erpobjfac.createDocumentDetailsDocumentAccount(documentAccount));
            docDtls.setContentType(erpobjfac.createDocumentDetailsContentType("zip"));
            docDtls.setDocumentTitle(erpobjfac.createDocumentDetailsDocumentTitle(documentTitle));
            docDtls.setFileName(fileName);
            docDtls.setDocumentSecurityGroup(erpobjfac.createDocumentDetailsDocumentSecurityGroup("FAFtakeExcellent"));
            docDtls.setContent(encodedContent.toString().getBytes());

            //NotificationCode
            String notificationCode = "50";
            //CallBackURL
            String callbackURL = "http://somecallbackserver.domain.com/mycallback";

            new SoapClient().authenticate();
            JaxWsProxyFactoryBean factory = new JaxWsProxyFactoryBean();
            factory.setServiceClass(ErpIntegrationService.class);
            //factory.setAddress("https://eeln-test.fin.us2.oraclecloud.com:443/publicFinancialCommonErpIntegration/ErpIntegrationService");
            factory.setAddress("http://xmlns.oracle.com/apps/financials/commonModules/shared/model/erpIntegrationService/loadAndImportData");
            factory.getInInterceptors().add(new org.apache.cxf.interceptor.LoggingInInterceptor());
            factory.getOutInterceptors().add(new org.apache.cxf.interceptor.LoggingOutInterceptor());
            //ErpIntegrationService erpIntServiceSoap = (ErpIntegrationService) factory.create();
            erpIntegrationService = (ErpIntegrationService) factory.create();

            value = erpIntegrationService.loadAndImportData(docDtls, jobList, interfaceDetails, notificationCode, callbackURL);
            System.out.println("value is not :- "+value);
        }
        catch (Exception e) {
            log.error("An exception occurred, exiting", e);
        }
    }
    public <K> void authenticate() {
          log.info("Entering authenticate ");
          try {
           ErpIntegrationService_Service erpIntgService_Service = new ErpIntegrationService_Service();
           this.erpIntegrationService = erpIntgService_Service.getErpIntegrationServiceSoapHttpPort();
           Map requestCredentails = ((BindingProvider) this.erpIntegrationService).getRequestContext();
           requestCredentails.put("javax.xml.ws.security.auth.username", this.username);
           requestCredentails.put("javax.xml.ws.security.auth.password", this.password);
           log.info("Exiting authenticate ");
          } catch (Exception exception) {
           log.info("Error in authenticate " + exception.getMessage());
          }
         }
}

below is the log

javax.xml.ws.soap.SOAPFaultException: Error reading XMLStreamReader: Unexpected EOF in prolog
 at [row,col {unknown-source}]: [1,0]
    at org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:160)
    at com.sun.proxy.$Proxy52.loadAndImportData(Unknown Source)
    at com.cts.pepsi.util.SoapClient.main(SoapClient.java:109)
Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog
 at [row,col {unknown-source}]: [1,0]
    at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:685)
    at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2141)
    at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2047)
    at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1131)
    at com.ctc.wstx.sr.BasicStreamReader.nextTag(BasicStreamReader.java:1154)
    at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:165)
    at org.apache.cxf.binding.soap.interceptor.ReadHeadersInterceptor.handleMessage(ReadHeadersInterceptor.java:66)
    at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
    at org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:802)
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1645)
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1533)
    at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1336)
    at org.apache.cxf.io.CacheAndWriteOutputStream.postClose(CacheAndWriteOutputStream.java:56)
    at org.apache.cxf.io.CachedOutputStream.close(CachedOutputStream.java:215)
    at org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56)
    at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:652)
    at org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62)
    at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
    at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:516)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:425)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:326)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:279)
    at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:96)
    at org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:138)
    ... 2 more

i have taken the soap request from the logs and posted from SOAP ui, it worked fine.

i have tried to invoke all operations which exists in wsdl from Java client and the same error is repeated

below is wsdl policy

<wsp:Policy xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" wsu:Id="ErpIntegrationServiceSoapHttpPort_Input_Policy" xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy">
   <wsp:ExactlyOne>
      <wsp:All>
         <sp:SignedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Namespace="http://www.w3.org/2005/08/addressing"/>
            <sp:Header Namespace="http://schemas.xmlsoap.org/ws/2004/08/addressing"/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:SignedParts>
         <sp:EncryptedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:EncryptedParts>
      </wsp:All>
      <wsp:All>
         <sp:SignedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Namespace="http://www.w3.org/2005/08/addressing"/>
            <sp:Header Namespace="http://schemas.xmlsoap.org/ws/2004/08/addressing"/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:SignedParts>
         <sp:EncryptedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:EncryptedParts>
      </wsp:All>
      <wsp:All>
         <sp:SignedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Namespace="http://www.w3.org/2005/08/addressing"/>
            <sp:Header Namespace="http://schemas.xmlsoap.org/ws/2004/08/addressing"/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:SignedParts>
         <sp:EncryptedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:EncryptedParts>
      </wsp:All>
      <wsp:All>
         <sp:SignedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Namespace="http://www.w3.org/2005/08/addressing"/>
            <sp:Header Namespace="http://schemas.xmlsoap.org/ws/2004/08/addressing"/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:SignedParts>
         <sp:EncryptedParts xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy">
            <sp:Body/>
            <sp:Header Name="fmw-context" Namespace="http://xmlns.oracle.com/fmw/context/1.0"/>
         </sp:EncryptedParts>
      </wsp:All>
   </wsp:ExactlyOne>
</wsp:Policy>

requesting you to please help where i have committed the mistake in java code, thanks


posted 9 years ago

  • Mark post as helpful


  • send pies

    Number of slices to send:

    Optional ‘thank-you’ note:



  • Quote
  • Report post to moderator

We have a spring-cxf ( Spring 3.0.4, CXF 2.5.10, Java 6) web service application deployed in WAS 8.0.0.7 @ Linux machine. We are able to access all services through soap ui by directly using ip on url (through Linux IP in which application installed). Now the app server is behind the Web server (iplanet, & configured by client) and now the issue comes(we are using https to hit the web server where as web server to app server is http).

We are able to see xml content in browser using the url provided by client but when we access the web service through SOAPUI we are getting «Error reading XMLStreamReader.» and following exception in WAS log

—————————————

[1/14/14 5:14:34:375 GMT] 00000040 AccDetailsInt I org.apache.cxf.services.AccountDetailsWSService.AccountDetailsWSPort.AccDetailsInt Inbound Message

—————————-

ID: 13

Address: https://{ip:port}/infox/services/AccountDetailsWSPort

Encoding: UTF-8

Http-Method: POST

Content-Type: text/xml;charset=UTF-8

Headers: {$WSCS=[SSL_RSA_WITH_RC4_128_MD5-128], $WSIS=[true], $WSPR=[HTTP/1.1], $WSRA=[10.203.118.218], $WSRH=[10.203.118.218], $WSSC=[https], $WSSI=[Q1IrQ29oeGJCMFNHRWFPNzdBYjBRSU1RNEVZd3RWSHhlVWJyRGtnaDBEWT0=], $WSSN=[ip], $WSSP=[2006], _WS_HAPRT_WLMVERSION=[-1], accept-encoding=[gzip,deflate], conten-lengtth=[1594], content-type=[text/xml;charset=UTF-8], Host=[{ip:port}], SOAPAction=[«urn:GetAccountProfile»], Surrogate-Capability=[WS-ESI=»ESI/1.0+»], User-Agent=[Apache-HttpClient/4.1.1 (java 1.5)]}

—————————————

[1/14/14 5:14:34:376 GMT] 00000040 SystemOut O Request XML :

[1/14/14 5:14:34:376 GMT] 00000040 PhaseIntercep W org.apache.cxf.phase.PhaseInterceptorChain doDefaultLogging Interceptor for {http://wsbroker.core.infx.com/}AccountDetailsWSService has thrown exception, unwinding now

org.apache.cxf.binding.soap.SoapFault: Error reading XMLStreamReader.

at org.apache.cxf.binding.soap.saaj.SAAJInInterceptor$SAAJPreInInterceptor.handleMessage(SAAJInInterceptor.java:139)

at org.apache.cxf.binding.soap.saaj.SAAJInInterceptor$SAAJPreInInterceptor.handleMessage(SAAJInInterceptor.java:102)

at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:263)

at org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:122)

at org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:233)

at org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:214)

at org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:194)

at org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:129)

at org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:223)

at org.apache.cxf.transport.servlet.AbstractHTTPServlet.doPost(AbstractHTTPServlet.java:143)

at javax.servlet.http.HttpServlet.service(HttpServlet.java:595)

at org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:199)

at com.ibm.ws.webcontainer.servlet.ServletWrapper.service(ServletWrapper.java:1230)

at com.ibm.ws.webcontainer.servlet.ServletWrapper.handleRequest(ServletWrapper.java:779)

at com.ibm.ws.webcontainer.servlet.ServletWrapper.handleRequest(ServletWrapper.java:478)

at com.ibm.ws.webcontainer.servlet.ServletWrapperImpl.handleRequest(ServletWrapperImpl.java:178)

at com.ibm.ws.webcontainer.filter.WebAppFilterManager.invokeFilters(WebAppFilterManager.java:1071)

at com.ibm.ws.webcontainer.servlet.CacheServletWrapper.handleRequest(CacheServletWrapper.java:87)

at com.ibm.ws.webcontainer.WebContainer.handleRequest(WebContainer.java:909)

at com.ibm.ws.webcontainer.WSWebContainer.handleRequest(WSWebContainer.java:1662)

at com.ibm.ws.webcontainer.channel.WCChannelLink.ready(WCChannelLink.java:200)

at com.ibm.ws.http.channel.inbound.impl.HttpInboundLink.handleDiscrimination(HttpInboundLink.java:453)

at com.ibm.ws.http.channel.inbound.impl.HttpInboundLink.handleNewRequest(HttpInboundLink.java:515)

at com.ibm.ws.http.channel.inbound.impl.HttpInboundLink.processRequest(HttpInboundLink.java:306)

at com.ibm.ws.http.channel.inbound.impl.HttpInboundLink.ready(HttpInboundLink.java:277)

at com.ibm.ws.tcp.channel.impl.NewConnectionInitialReadCallback.sendToDiscriminators(NewConnectionInitialReadCallback.java:214)

at com.ibm.ws.tcp.channel.impl.NewConnectionInitialReadCallback.complete(NewConnectionInitialReadCallback.java:113)

at com.ibm.ws.tcp.channel.impl.AioReadCompletionListener.futureCompleted(AioReadCompletionListener.java:175)

at com.ibm.io.async.AbstractAsyncFuture.invokeCallback(AbstractAsyncFuture.java:217)

at com.ibm.io.async.AsyncChannelFuture$1.run(AsyncChannelFuture.java:205)

at com.ibm.ws.util.ThreadPool$Worker.run(ThreadPool.java:1700)

Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF in prolog

at [row,col {unknown-source}]: [1,0]

at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:677)

at com.ctc.wstx.sr.BasicStreamReader.handleEOF(BasicStreamReader.java:2139)

at com.ctc.wstx.sr.BasicStreamReader.nextFromProlog(BasicStreamReader.java:2045)

at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1134)

at com.ctc.wstx.sr.BasicStreamReader.nextTag(BasicStreamReader.java:1157)

at org.apache.cxf.binding.soap.saaj.SAAJInInterceptor$SAAJPreInInterceptor.handleMessage(SAAJInInterceptor.java:125)

… 30 more

[1/14/14 5:14:34:412 GMT] 00000040 SystemOut O ****************************In DB LOGGIN INTERCEPTOR…DBLogOutIntercepter:Adding Logs ************************************

[1/14/14 5:14:34:417 GMT] 00000040 SystemOut O ****************************In DB LOGGIN INTERCEPTOR…DBLogOutIntercepter:Logt Added ************************************

[1/14/14 5:14:34:417 GMT] 00000040 AccDetailsInt I org.apache.cxf.services.AccountDetailsWSService.AccountDetailsWSPort.AccDetailsInt Outbound Message

—————————

ID: 13

Response-Code: 500

Encoding: UTF-8

Content-Type: text/xml

Headers: {}

Payload: <soap:Envelope xmlns:soap=»http://schemas.xmlsoap.org/soap/envelope/»><soap:Body><soap:Fault><faultcode>soap:Client</faultcode><faultstring>Error reading XMLStreamReader.</faultstring></soap:Fault></soap:Body></soap:Envelope>

——————————-

Am i missing any configurations? any help would be appreciated

thanks & regards, Harilal.A.S.

Понравилась статья? Поделить с друзьями:
  • Error reading trayicon1 visible cannot create system shell notification icon
  • Error reading the license file null this license is invalid odis
  • Error reading system wide configuration file
  • Error reading ssh protocol banner paramiko
  • Error reading sparse file xiaomi