When transfering integration between two syndesis instances: Unable to decrypt key:accessToken
See original GitHub issueThis is a…
[ ] Feature request
[ ] Regression (a behavior that used to work and stopped working in a new release)
[ x ] Bug report
[ ] Documentation issue or request
The problem
I’m unable to transfer integration from one syndesis instance to another. The connections (twitter and salesforce in my case) used by the integration use the “basic connection configuration” I don’t use the “OAuth Application Management”. After I updated both connections (Orange triangle “Configuration required”), I tried to publish the integration. The server log provides following error:
2018-05-10 07:52:42.744 ERROR [-,,,] 1 --- [tion Controller] i.s.s.c.integration.online.BaseHandler : Integration [twitter-salesforce]: [ERROR] Activation failure
java.lang.IllegalArgumentException: Unable to decrypt key:accessToken
at io.syndesis.integration.project.generator.ProjectGeneratorHelper.mandatoryDecrypt(ProjectGeneratorHelper.java:133) ~[integration-project-generator-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.integration.project.generator.ProjectGenerator.addDecryptedKeyProperty(ProjectGenerator.java:223) ~[integration-project-generator-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.integration.project.generator.ProjectGenerator.generateApplicationProperties(ProjectGenerator.java:151) ~[integration-project-generator-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.server.controller.integration.online.PublishHandler.createDeploymentData(PublishHandler.java:131) ~[server-controller-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.server.controller.integration.online.PublishHandler.execute(PublishHandler.java:100) ~[server-controller-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.server.controller.StateChangeHandler.execute(StateChangeHandler.java:33) [server-controller-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at io.syndesis.server.controller.integration.IntegrationController.lambda$callStateChangeHandler$11(IntegrationController.java:196) [server-controller-1.3.5.fuse-000002-redhat-1.jar!/:1.3.5.fuse-000002-redhat-1]
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) ~[na:1.8.0_171]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) ~[na:1.8.0_171]
at java.lang.Thread.run(Thread.java:748) ~[na:1.8.0_171]
2018-05-10 07:52:42.744 INFO [-,,,] 1 --- [tion Controller] i.s.s.c.i.IntegrationController : Integration i-LC7vFY2P96ad_t7Pzytz : Setting status to Pending (Unable to decrypt key:accessToken)
Expected behavior
The integration should get published after user updates the connections.
Request and Response Data
Attached the exported integration (created on CR1): twitter_salesforce-export.zip
Server log: server_log.txt
Tasks involved / Steps to Reproduce
- Start two syndesis instances (or you can simply use the attached integration)
- Create integration TW->SF on one instance, export it
- Import to second instance, update the connections
- Publish integration
- observe errors in server log, the integration will stay in “Publishing” state indefinitely
Issue Analytics
- State:
- Created 5 years ago
- Comments:17 (8 by maintainers)
Top Results From Across the Web
Required AWS KMS key policy for use with encrypted volumes
Your KMS keys must have a key policy that allows Amazon EC2 Auto Scaling to launch instances with Amazon EBS volumes encrypted with...
Read more >Encrypting and decrypting data with a symmetric key
Decrypt ciphertext that was encrypted with a Cloud KMS key. ... Please note that the roles/cloudkms.admin role does not provide these two permissions....
Read more >Release Notes for Red Hat Fuse 7.8
As a middleware integration platform, Fuse can be integrated with third-party components. ... Slack connector now uses the Bot User OAuth Access Token....
Read more >Lambda was unable to decrypt the environment variables ...
Lambda was unable to decrypt the environment variables because KMS access was denied #279. Open. mohitkale opened this issue on Jul 13, ...
Read more >Introducing AWS Key Management Service Custom Key Store
AWS Key Management Service (KMS) has integrated with AWS CloudHSM so you now have the option to create your own KMS custom key...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@tplevko yes it is a workaround
there is a general issue about the relation of an integration and external objects such as connections that we need to discuss.
@lburgazzoli for now, as there is this workarround, I’ll let documentation team know, so they could cover it in our docs. I think however it would be good, if this got solved in a more intuitive way in the future.