Details
-
Bug
-
Resolution: Unresolved
-
Low
-
None
-
4.0
-
4
-
Severity 3 - Minor
-
0
-
Description
For instance, when JIRA tries to reset a password in AD (or a Crowd instance connected to AD) and the reset operation fails because the new password proposed by JIRA does not match the AD requirements (size, complexity, etc..).
Currently, if the problem happens, a stack trace is displayed in the browser:
(Active Directory example)
org.codehaus.xfire.XFireRuntimeException: Could not invoke service.. Nested exception is org.codehaus.xfire.fault.XFireFault: Could not parse message. org.codehaus.xfire.fault.XFireFault: Could not parse message. at org.codehaus.xfire.fault.Soap11FaultSerializer.readMessage(Soap11FaultSerializer.java:78) at org.codehaus.xfire.fault.SoapFaultSerializer.readMessage(SoapFaultSerializer.java:28) at org.codehaus.xfire.soap.handler.ReadHeadersHandler.checkForFault(ReadHeadersHandler.java:111) at org.codehaus.xfire.soap.handler.ReadHeadersHandler.invoke(ReadHeadersHandler.java:67) at org.codehaus.xfire.handler.HandlerPipeline.invoke(HandlerPipeline.java:131) at org.codehaus.xfire.client.Client.onReceive(Client.java:406) at org.codehaus.xfire.transport.http.HttpChannel.sendViaClient(HttpChannel.java:139) at org.codehaus.xfire.transport.http.HttpChannel.send(HttpChannel.java:48) at org.codehaus.xfire.handler.OutMessageSender.invoke(OutMessageSender.java:26) at org.codehaus.xfire.handler.HandlerPipeline.invoke(HandlerPipeline.java:131) at org.codehaus.xfire.client.Invocation.invoke(Invocation.java:79) at org.codehaus.xfire.client.Invocation.invoke(Invocation.java:114) at org.codehaus.xfire.client.Client.invoke(Client.java:336) at org.codehaus.xfire.client.XFireProxy.handleRequest(XFireProxy.java:77) at org.codehaus.xfire.client.XFireProxy.invoke(XFireProxy.java:57) at $Proxy6.updatePrincipalCredential(Unknown Source) at com.atlassian.crowd.integration.service.soap.client.SecurityServerClientImpl.updatePrincipalCredential(SecurityServerClientImpl.java:739) at com.atlassian.crowd.integration.service.cache.CachingUserManager$Server.updatePassword(CachingUserManager.java:294) at com.atlassian.crowd.integration.service.cache.CachingUserManager.updatePassword(CachingUserManager.java:130) at com.atlassian.crowd.integration.osuser.CrowdCredentialsProvider.changePassword(CrowdCredentialsProvider.java:92) at com.opensymphony.user.User.setPassword(User.java:102) at com.atlassian.core.user.UserUtils.resetPassword(UserUtils.java:310) at com.atlassian.jira.web.action.user.ForgotPassword.doPassword(ForgotPassword.java:29)
at org.apache.jk.common.ChannelSocket.processConnection(ChannelSocket.java:697) at org.apache.jk.common.ChannelSocket$SocketConnection.runIt(ChannelSocket.java:889) at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:684) at java.lang.Thread.run(Thread.java:619) Caused by: com.ctc.wstx.exc.WstxEOFException: Unexpected EOF; was expecting a close tag for element <faultstring> at [row,col {unknown-source}]: [1,239] at com.ctc.wstx.sr.StreamScanner.throwUnexpectedEOF(StreamScanner.java:661) at com.ctc.wstx.sr.BasicStreamReader.nextFromTree(BasicStreamReader.java:2730) at com.ctc.wstx.sr.BasicStreamReader.next(BasicStreamReader.java:1019) at com.ctc.wstx.sr.BasicStreamReader.getElementText(BasicStreamReader.java:669) at org.codehaus.xfire.fault.Soap11FaultSerializer.readMessage(Soap11FaultSerializer.java:59) ... 95 more