Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-20698

Handle cases when Reset Password action fails in an external User/Group repository

    XMLWordPrintable

Details

    Description

      For instance, when JIRA tries to reset a password in AD (or a Crowd instance connected to AD) and the reset operation fails because the new password proposed by JIRA does not match the AD requirements (size, complexity, etc..).

      Currently, if the problem happens, a stack trace is displayed in the browser:

      (Active Directory example)

      org.codehaus.xfire.XFireRuntimeException: Could not invoke service.. Nested exception is org.codehaus.xfire.fault.XFireFault: Could not parse message.
      org.codehaus.xfire.fault.XFireFault: Could not parse message.
      at org.codehaus.xfire.fault.Soap11FaultSerializer.readMessage(Soap11FaultSerializer.java:78)
      at org.codehaus.xfire.fault.SoapFaultSerializer.readMessage(SoapFaultSerializer.java:28)
      at org.codehaus.xfire.soap.handler.ReadHeadersHandler.checkForFault(ReadHeadersHandler.java:111)
      at org.codehaus.xfire.soap.handler.ReadHeadersHandler.invoke(ReadHeadersHandler.java:67)
      at org.codehaus.xfire.handler.HandlerPipeline.invoke(HandlerPipeline.java:131)
      at org.codehaus.xfire.client.Client.onReceive(Client.java:406)
      at org.codehaus.xfire.transport.http.HttpChannel.sendViaClient(HttpChannel.java:139)
      at org.codehaus.xfire.transport.http.HttpChannel.send(HttpChannel.java:48)
      at org.codehaus.xfire.handler.OutMessageSender.invoke(OutMessageSender.java:26)
      at org.codehaus.xfire.handler.HandlerPipeline.invoke(HandlerPipeline.java:131)
      at org.codehaus.xfire.client.Invocation.invoke(Invocation.java:79)
      at org.codehaus.xfire.client.Invocation.invoke(Invocation.java:114)
      at org.codehaus.xfire.client.Client.invoke(Client.java:336)
      at org.codehaus.xfire.client.XFireProxy.handleRequest(XFireProxy.java:77)
      at org.codehaus.xfire.client.XFireProxy.invoke(XFireProxy.java:57)
      at $Proxy6.updatePrincipalCredential(Unknown Source)
      at com.atlassian.crowd.integration.service.soap.client.SecurityServerClientImpl.updatePrincipalCredential(SecurityServerClientImpl.java:739)
      at com.atlassian.crowd.integration.service.cache.CachingUserManager$Server.updatePassword(CachingUserManager.java:294)
      at com.atlassian.crowd.integration.service.cache.CachingUserManager.updatePassword(CachingUserManager.java:130)
      at com.atlassian.crowd.integration.osuser.CrowdCredentialsProvider.changePassword(CrowdCredentialsProvider.java:92)
      at com.opensymphony.user.User.setPassword(User.java:102)
      at com.atlassian.core.user.UserUtils.resetPassword(UserUtils.java:310)
      at com.atlassian.jira.web.action.user.ForgotPassword.doPassword(ForgotPassword.java:29)
      
      at org.apache.jk.common.ChannelSocket.processConnection(ChannelSocket.java:697)
      at org.apache.jk.common.ChannelSocket$SocketConnection.runIt(ChannelSocket.java:889)
      at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:684)
      at java.lang.Thread.run(Thread.java:619)
      Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF; was expecting a close tag for element <faultstring>
      at [row,col {unknown-source}]: [1,239]
      at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:661)
      at com.ctc.wstx.sr.BasicStreamReader.nextFromTree(BasicStreamReader.java:2730)
      at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1019)
      at com.ctc.wstx.sr.BasicStreamReader.getElementText(BasicStreamReader.java:669)
      at org.codehaus.xfire.fault.Soap11FaultSerializer.readMessage(Soap11FaultSerializer.java:59)
      ... 95 more
      

      Attachments

        Activity

          People

            Unassigned Unassigned
            rbattaglin Renan Battaglin
            Votes:
            3 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated: