This page is not created by, affiliated with, or supported by Slack Technologies, Inc.
2023-02-27
Channels
- # announcements (47)
- # babashka (36)
- # beginners (7)
- # biff (34)
- # calva (9)
- # cider (5)
- # clj-http (13)
- # clj-kondo (24)
- # cljs-dev (9)
- # clojure (146)
- # clojure-austin (1)
- # clojure-europe (16)
- # clojure-nl (1)
- # clojure-norway (8)
- # clojure-uk (2)
- # clojurescript (4)
- # clr (1)
- # core-async (9)
- # cursive (11)
- # datomic (6)
- # emacs (17)
- # events (3)
- # fulcro (45)
- # graphql (7)
- # helix (1)
- # hyperfiddle (28)
- # java (1)
- # london-clojurians (1)
- # lsp (75)
- # malli (1)
- # membrane (35)
- # reitit (6)
- # releases (1)
- # shadow-cljs (48)
- # tools-build (5)
- # tools-deps (27)
Hi all, I am trying to debug an issue with a keystore in reusable connection manager. To do this I want to enable the debug logging that is explained in the README. I can get the logger to log to console when changing the config level, but clj-http never logs anything. I have tried with a log4j2.properties and log4j2.xml file, added dependencie etc. Any tips?
It seems there is an illegal reflective access WARNING: Illegal reflective access by clojure.core$bean$fn__7278$fn__7279 (file:/C:/Users/thier/.m2/repository/org/clojure/clojure/1.11.1/clojure-1.11.1.jar) to method sun.security.provider.certpath.SunCertPathBuilderException.getAdjacencyList()
Would love tips on how to fix that
It ends in [java.lang.Thread run "Thread.java" 834]]} "unable to find valid certification path to requested target"
sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
adjacencyList: #object[sun.security.provider.certpath.AdjacencyList 0x3486199a "[\nLinkedList[0]:\n]\n"]
Well good question. Everything worked fine until last week when the api provider this particular keystore is for upgraded their servers to RHEL 8. After that there are problems with getting a certification path. Going to check if the certificate has an issue somehow tomorrow with Postman
You can try to intercept the traffic with tcpdump / tshark. I would probably start with checking the certificate in the browser and via openssl. Then I would use java ssl debug logging perhaps via javax.net.debug=ssl:handshake
Thanks for the tip @U06BE1L6T . Today I tried 3 different java versions and their respectively cacerts using the code from https://gist.github.com/dportabella/7024146 gist. All came up with same issue so I think it must be something with the keystore or the suppliers endpoint RHEL8 server.