Details
-
Bug
-
Resolution: Fixed
-
Major
-
Cheshire-Cat
-
Untriaged
-
Unknown
Description
Test: Avg Throughput (queries/sec), Workload E, MOI, SSL, X.509 Auth, 4 nodes
This test uses SSL and starting in build 1209 we are seeing SSL exception that prevent the test from running properly.
Not a performance issue but these are the test runs:
1209 - http://perf.jenkins.couchbase.com/job/hebe/5872/ - 6
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.190.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.191.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.192.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.193.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.204.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.205.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.206.zip
https://s3-us-west-2.amazonaws.com/perf-artifacts/jenkins-hebe-5872/172.23.100.207.zip
1207 - http://perf.jenkins.couchbase.com/job/hebe/5873/ - 37040
The error is:
Jan 28, 2020 1:21:58 PM com.couchbase.client.core.endpoint.AbstractGenericHandler exceptionCaught WARNING: [ycsb-c05-s433.sc.couchbase.com/172.23.100.204:18093][QueryEndpoint]: Caught SSL exception after being connected: javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request com.couchbase.client.deps.io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request at com.couchbase.client.deps.io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:461) at com.couchbase.client.deps.io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:267) at com.couchbase.client.deps.io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:356) at com.couchbase.client.deps.io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:342) at com.couchbase.client.deps.io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:335) at com.couchbase.client.deps.io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1304) at com.couchbase.client.deps.io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:356) at com.couchbase.client.deps.io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:342) at com.couchbase.client.deps.io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:921) at com.couchbase.client.deps.io.netty.channel.epoll.AbstractEpollStreamChannel$EpollStreamUnsafe.epollInReady(AbstractEpollStreamChannel.java:725) at com.couchbase.client.deps.io.netty.channel.epoll.EpollEventLoop.processReady(EpollEventLoop.java:400) at com.couchbase.client.deps.io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:300) at com.couchbase.client.deps.io.netty.util.concurrent.SingleThreadEventExecutor$2.run(SingleThreadEventExecutor.java:131) at com.couchbase.client.deps.io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.base/java.lang.Thread.run(Thread.java:834) Caused by: javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:308) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:264) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:255) at java.base/sun.security.ssl.SSLExtensions.<init>(SSLExtensions.java:89) at java.base/sun.security.ssl.CertificateRequest$T13CertificateRequestMessage.<init>(CertificateRequest.java:818) at java.base/sun.security.ssl.CertificateRequest$T13CertificateRequestConsumer.consume(CertificateRequest.java:922) at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:450) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1078) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1065) at java.base/java.security.AccessController.doPrivileged(Native Method) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1012) at com.couchbase.client.deps.io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1365) at com.couchbase.client.deps.io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1273) at com.couchbase.client.deps.io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1108) at com.couchbase.client.deps.io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1151) at com.couchbase.client.deps.io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:491) at com.couchbase.client.deps.io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:430) ... 14 more
|
This seems to be an issue in go 1.13 which we just upgraded to in query: https://github.com/golang/go/issues/35722
This issue involves the java ssl handling as well Michael Nitschinger
We are using java sdk 2.7.0 and this ycsb branch: https://github.com/couchbaselabs/YCSB/tree/tmp-x509